To see the other types of publications on this topic, follow the link: AI security.

Journal articles on the topic 'AI security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'AI security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.

Full text
Abstract:
This article examines the evolving security landscape for Generative Artificial Intelligence (GenAI) systems as they become increasingly integrated across critical sectors including healthcare, finance, and transportation. The proliferation of these technologies creates both transformative opportunities and significant security challenges that require specialized approaches. It explores key security vulnerabilities unique to GenAI implementations, including data protection vulnerabilities, access control complexities, data anonymization gaps, model integrity risks, monitoring challenges, intel
APA, Harvard, Vancouver, ISO, and other styles
2

Poongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.

Full text
Abstract:
The integration of Zero Trust (ZT) security models with Artificial Intelligence (AI) authentication mechanisms, along with the utilization of blockchain technology, offers a novel paradigm for securing digital interactions and data exchanges in increasingly decentralized and complex networks. Zero Trust, a security framework that assumes no implicit trust and enforces strict identity verification, is well-suited for AI-driven authentication systems that require robust, real-time, and adaptive security measures Blockchain technology further enhances this framework by providing a transparent, im
APA, Harvard, Vancouver, ISO, and other styles
3

Chiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.

Full text
Abstract:
Decentralized solutions, widely adopted across industries like banking, health- care, and logistics, face persistent security concerns from potential threats. This study introduces a novel decentralized vulnerability assessment using GPT-3, an artificial intelligence (AI) technology. Employing Dockerized containers for disinfecting environments and creating unique connections to the AI API service enhances system responsiveness. AI algorithms, specifically GPT-3, conduct comprehensive network scans to identify security flaws. Findings are securely distributed to network nodes, fortifying the s
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Agrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Full text
Abstract:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security
APA, Harvard, Vancouver, ISO, and other styles
7

Abudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.

Full text
Abstract:
"Protection DevOps: Security DevOps: Enhancing Application Delivery with Speed and Security" is a whole paper that explores the combination of synthetic intelligence (AI) technology into the protection DevOps framework. This integration goals to enhance software transport with the aid of AI-driven automation, predictive analytics, and chance intelligence. Inside the contemporary, rapid-paced virtual panorama, groups face developing pressure to deliver applications quickly while making sure sturdy safety capabilities are in proximity. The traditional method of protection frequently results in d
APA, Harvard, Vancouver, ISO, and other styles
8

Poonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.

Full text
Abstract:
The objective of this special issue titled “Securing the Sustainable Future: Cryptography and Security in AI & IoT” is to discuss recent advancements of cryptography and security in AI & IoT for a secure, sustainable future. The issue focuses on the social and economic impact of sustainable computing, with sub-topics covering the applications of AI & IoT. Additionally, the conference has explored security mechanisms in the context of sustainability.
APA, Harvard, Vancouver, ISO, and other styles
9

Gudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.

Full text
Abstract:
This study assesses the effectiveness of artificial intelligence (AI) technologies in enhancing threat detection within cloud environments, a critical component given the escalating security challenges in cloud computing. Leveraging various AI methodologies, including machine learning models, deep learning, and anomaly detection techniques, the research aims to improve the accuracy and efficiency of security systems. These AI methods were applied to a series of simulated threat scenarios across diverse cloud platforms to evaluate their capability in real-time threat identification and mitigati
APA, Harvard, Vancouver, ISO, and other styles
10

Sohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.

Full text
Abstract:
The integration of artificial intelligence (AI) has enhanced banking operations by providing improved customer service, security, and efficiency. For data privacy and security, Banks must implement robust data security measures to gain customer trust as well as comply with regulatory requirements. Therefore, this study examined whether AI-based security systems can augment transactional safety, secure pay systems, and strengthen customer trust in digital banks. Quantitative research design and stratified random sampling technique is used for data collection. Questionnaire is filled up with dig
APA, Harvard, Vancouver, ISO, and other styles
11

Reddy, Haritha Madhava. "Role of AI in Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.

Full text
Abstract:
Abstract—Artificial Intelligence (AI) has emerged as a pivotal tool in enhancing security compliance across various industries. Its ability to analyze vast datasets, detect intricate patterns, and automate complex processes significantly improves risk management and regulatory adherence. AI enables real-time data analysis, promptly identifying potential violations and flagging security threats, thereby strengthening an organization’s overall security framework. However, while AI offers transformative advantages, its integration into existing security systems introduces new challenges, such as
APA, Harvard, Vancouver, ISO, and other styles
12

Sengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–2. https://doi.org/10.55041/ijsrem40091.

Full text
Abstract:
The proliferation of Artificial Intelligence (AI) agents, characterized by their autonomy and capacity for independent decision-making, presents both unprecedented opportunities and novel security challenges. This research paper provides a comprehensive analysis of the security landscape surrounding AI agents, examining the unique vulnerabilities stemming from their inherent characteristics and the emerging threat vectors targeting these autonomous systems. We delve into a categorized framework of potential attacks, ranging from data poisoning and adversarial manipulation to physical tampering
APA, Harvard, Vancouver, ISO, and other styles
13

Prashant, Kailas Awasare. "Role of Artificial Intelligence in Identity and Access Management." International Journal of Advance and Applied Research S6, no. 23 (2025): 261–65. https://doi.org/10.5281/zenodo.15195212.

Full text
Abstract:
<em>As digital transformation accelerates, Identity and Access Management (IAM) plays a crucial role in securing organizational resources from unauthorized access. Traditional IAM systems struggle to keep pace with increasing security threats and complexities. Artificial Intelligence (AI) has emerged as a transformative force in IAM, enhancing authentication, authorization, and anomaly detection. This paper explores the integration of AI in IAM, highlighting its ability to strengthen security by automating user authentication, detecting anomalies, and implementing adaptive access controls. AI-
APA, Harvard, Vancouver, ISO, and other styles
14

Taherdoost, Hamed, Tuan-Vinh Le, and Khadija Slimani. "Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review." Cryptography 9, no. 1 (2025): 17. https://doi.org/10.3390/cryptography9010017.

Full text
Abstract:
With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, and privacy violations. Cryptography has emerged as a crucial component in enhancing AI security by ensuring data confidentiality, authentication, and integrity. This paper presents a comprehensive bibliometric review to understand the intersection between cryptography, AI, and security. A total of 495 journal articles and reviews were identified us
APA, Harvard, Vancouver, ISO, and other styles
15

Ryzhov, Igor, and Petro Yashchuk. "Vital security: Rethinking human security in the context of hybrid peace." Revista Amazonia Investiga 13, no. 84 (2024): 167–82. https://doi.org/10.34069/ai/2024.84.12.10.

Full text
Abstract:
The study's relevance is determined by the fact that in the 21st century, the problem of ensuring the safe existence of a person has not only retained its acuteness but has also become significantly more relevant due to new challenges, dangers and threats that are becoming global. The international community and individual nation-states have yet to develop sufficient answers to these dangers. Ensuring the individual's security (vital security) about the advent of new hazards and threats to his or her essential interests entails the search for innovative ways. The study aims to systematise know
APA, Harvard, Vancouver, ISO, and other styles
16

Oluwatosin Oladayo Aramide. "Zero trust in AI pipelines: Securing distributed model training and inference." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 194–204. https://doi.org/10.30574/wjaets.2025.16.1.1207.

Full text
Abstract:
As Artificial Intelligence (AI) and machine learning (ML) become more integrated into business operations, securing AI pipelines has become essential. This paper explains how the concept of Zero Trust can be used to provide a greater security to training distributed AI models, especially when federated learning or multi-region trainings are involved. The concepts of Zero Trust who concentrate on identity verification, tightly controlled accesses to sensitive data and persistence monitoring can protect sensitive data, as well as maintain integrity in machine learning during training and during
APA, Harvard, Vancouver, ISO, and other styles
17

Samijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.

Full text
Abstract:
Taking into account the fact that artificial intelligence can expand the capabilities of humanity, accelerate the speed of data analysis several times, and help people reach correct and accurate conclusions in the decision-making process, it can improve data security or, on the contrary, target propaganda and fake news. Collecting information, taking very little responsibility, and taking into account the fact that social networks can expand the speed and extent of dissemination of information simultaneously in two opposite directions, AI can both strengthen cyber security or create new types
APA, Harvard, Vancouver, ISO, and other styles
18

IZUGBOEKWE, Chimezie Seth, Sonia Sim JOSHUA, Nasamu GAMBO, Sijibomi Victor OLUBODUN, and Blessing Onyemowo AMEH. "Artificial Intelligence and Business Security among SMEs in Abuja Metropolis." International Journal of Management Technology 11, no. 3 (2024): 17–41. https://doi.org/10.37745/ijmt.2013/vol11n31741.

Full text
Abstract:
This study investigates the impact of Artificial Intelligence (AI) on business security among Small and Medium Enterprises (SMEs) in Abuja, Federal Capital Territory (FCT), Nigeria. The primary objectives are to assess the influence of AI security protocols, employee AI training, customer data privacy measures, and automated threat detection on enhancing business security. Anchored in the Socio-Technical Systems (STS) Theory, which emphasizes the interplay between social and technical elements within organizations, this research explores how these AI-driven measures collectively contribute to
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Tae Min. "Development Tasks of AI-based Security Industry." Korean Society of Private Security 23, no. 1 (2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.

Full text
Abstract:
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's fifth largest information security industry by 2027, with a market size of 30 trillion won, driven by digitalization and expansion in the security domain. AI represents a paradigm shift demanding innovation across nations, societies, and industries, necessitating proactive preparation and response. In the security sector, the paradigm is shifting from traditional human security to integrated security, convergence sec
APA, Harvard, Vancouver, ISO, and other styles
20

Samijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE." Journal of Social Sciences and Humanities Research Fundamentals 3, no. 11 (2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.

Full text
Abstract:
Recently, there has been a lot of hype surrounding AI, bringing urgent concerns along with lots of myth, as the future of AI is still uncertain. While social media headlines warn that AI is about to outperform humans in near future, there's a good chance that attacks made possible by the increased application of AI will be very potent, precisely targeted, hard to identify, and likely to take advantage of holes in AI systems. This article analyzes the emerging security issues that are forming in the way AI is used in practice.
APA, Harvard, Vancouver, ISO, and other styles
21

Sujatha Lakshmi Narra. "Human-AI Collaboration in Identity Security: When Should AI Decide?" Journal of Computer Science and Technology Studies 7, no. 7 (2025): 191–97. https://doi.org/10.32996/jcsts.2025.7.7.17.

Full text
Abstract:
The integration of artificial intelligence into identity and access management presents both transformative opportunities and significant challenges for contemporary security frameworks. This article examines the critical question of decision authority allocation in AI-augmented security environments: determining when automated systems should independently make access determinations versus when human expertise remains essential. Through analysis of implementation case studies across financial services and healthcare sectors, the research identifies patterns of successful collaboration between
APA, Harvard, Vancouver, ISO, and other styles
22

Nallam, Madhuri. "AI Privacy Policies and Security." African Journal of Biological Sciences 6, Si4 (2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.

Full text
Abstract:
AI technologies often trigger concerns about privacy, a concept whose meaning can be challenging to grasp. Consequently, people’s worries about privacy tend to be unclear, complicating efforts to address these concerns and clarify how AI either poses or doesn’t pose threats to individuals. This article highlights overlooked distinctions and explored their impact on concerns about how AI technology affects privacy threats. It implies that security, rather than the fundamentals of privacy, is frequently brought up when individuals voice concerns about privacy with regard to artificial intelligen
APA, Harvard, Vancouver, ISO, and other styles
23

Fish, Ian. "Ethics in AI Security Implications." ITNOW 60, no. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Farhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo, and Rushit Dave. "AI-Based Home Security System." International Journal of Computer Science and Information Technology 16, no. 2 (2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.

Full text
Abstract:
Home security is of paramount importance in today's world, where we rely more on technology, home security is crucial. Using technology to make homes safer and easier to control from anywhere is important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost, AI based model home security system. The system has a user-friendly interface, allowing users to start model training and face detection with simple keyboard commands. Our goal is to introduce an innovative home security system using facial recognition technology. Unlike traditional systems, this
APA, Harvard, Vancouver, ISO, and other styles
25

El-Hadi, Mohamed. "Generative AI Poses Security Risks." مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, no. 34 (2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

S R, Namrutha. "AI-Driven Security Operation Center." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3152–57. https://doi.org/10.22214/ijraset.2025.68883.

Full text
Abstract:
Cyber threats such as malware, phishing, and DDoS attacks are becoming increasingly sophisticated, necessitating advanced detection mechanisms. This paper presents an AI-driven cybersecurity system that integrates machine learning models for real-time detection of cyber threats, network intrusions, phishing URLs, and email phishing. The system employs NLP for malware analysis, anomaly detection for intrusion detection, and classification models for phishing prevention. Developed using FastAPI for real-time inference and SQLite for secure logging, the system ensures efficient threat identificat
APA, Harvard, Vancouver, ISO, and other styles
27

Rathod, Sachin Dashrath. "AI In Enhancing Cyber Security." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04063.

Full text
Abstract:
Abstract:- Artificial intelligence( AI) is a important technology that helps cybersecurity armies automate repetitive tasks, accelerate trouble discovery and response, and meliorate the delicacy of their conduct to strengthen the security posture against various security issues and cyberattacks. This composition presents a regular literature review and a detailed analysis of AI use cases for cybersecurity provisioning. The review reacted in 2395 studies, of which 236 were linked as primary. This composition classifies the linked AI use cases predicated on a NIST cybersecurity frame using a the
APA, Harvard, Vancouver, ISO, and other styles
28

Oseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo, and Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust." International Journal of Engineering Research Updates 6, no. 2 (2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.

Full text
Abstract:
AI-driven biometrics is revolutionizing the security landscape in the financial technology (FinTech) sector, enhancing safety measures and fostering trust among users. This review explores the role of AI-driven biometrics in securing FinTech operations, highlighting its benefits and implications. AI-driven biometrics refers to the use of artificial intelligence (AI) algorithms to analyze biological data for authentication purposes. This technology has gained significant traction in the FinTech sector due to its ability to provide a higher level of security than traditional authentication metho
APA, Harvard, Vancouver, ISO, and other styles
29

Naveen Kumar Birru. "Secure AI Infrastructure: Building Trustworthy AI Systems in Distributed Environments." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2756–67. https://doi.org/10.30574/wjaets.2025.15.2.0748.

Full text
Abstract:
As enterprises increasingly deploy artificial intelligence to drive customer experiences, business intelligence, and automation, ensuring the security of AI infrastructure has become paramount. Distributed AI systems must not only be scalable and performant they must also be trustworthy, protecting sensitive data and model integrity across dynamic, cloud-native environments. This article explores critical components of secure AI infrastructure, highlighting strategies and technologies for building resilient systems that withstand sophisticated threats. From securing data pipelines with encrypt
APA, Harvard, Vancouver, ISO, and other styles
30

Bin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.

Full text
Abstract:
The increasing integration of Artificial Intelligence (AI) within Security Information Systems (SIS) presents a significant shift in digital governance, where governments rely heavily on secure digital infrastructures to manage public services. The escalating threat landscape has necessitated a proactive approach to cybersecurity, and AI is proving crucial in enhancing threat detection, automating responses, and minimizing human error. However, many governments, particularly in developing nations, are struggling to bridge the gap between their current security measures and the complex challeng
APA, Harvard, Vancouver, ISO, and other styles
31

Raakesh Dhanasekaran. "Generative AI Integration with Cloud Services: Revolutionizing Cybersecurity Frameworks." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1619–25. https://doi.org/10.30574/wjaets.2025.15.3.1086.

Full text
Abstract:
The integration of generative artificial intelligence with cloud computing has fundamentally transformed cybersecurity frameworks, enabling unprecedented capabilities in threat detection and automated incident response. This technological convergence allows organizations to shift from reactive to proactive security postures through sophisticated anomaly detection and predictive analytics. Major cloud providers have embedded AI-driven security tools that analyze vast datasets to identify subtle patterns indicative of potential threats before they materialize into breaches. While delivering sign
APA, Harvard, Vancouver, ISO, and other styles
32

Kolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.

Full text
Abstract:
This study examines the dual role of artificial intelligence (AI) in advancing and challenging global information governance and data security. By leveraging methodologies such as Hierarchical Cluster Analysis (HCA), Principal Component Analysis (PCA), Structural Equation Modeling (SEM), and Multi-Criteria Decision Analysis (MCDA), the study investigates AI-specific vulnerabilities, governance gaps, and the effectiveness of compliance frameworks. Data from the MITRE ATT&amp;CK Framework, AI Incident Database, Global Cybersecurity Index (GCI), and National Vulnerability Database (NVD) form the
APA, Harvard, Vancouver, ISO, and other styles
33

Phijik, Dr B. "Blockchain And AI in Healthcare Data Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50040.

Full text
Abstract:
Abstract— Data security and integrity are two essential concepts in the modern era but there are some sectors, which are more sensitive when controlling data. With this project, “Securing Data with Blockchain and AI”, it is possible to develop efficient data management by incorporating blockchain and artificial intelligence technology. The healthcare domain in particular is highlighted to demonstrate the practical use of the project focusing on the protection of patient’s data. Every transaction creates a hash that is attached to the transaction. Some of the notable features included: hospital
APA, Harvard, Vancouver, ISO, and other styles
34

Venkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.

Full text
Abstract:
As cyber threats continue to evolve in complexity and scale, traditional security measures have become insufficient. Aegis AI (AAI): Intelligent Cyber Resilience presents a cutting-edge approach that integrates artificial intelligence (AI) and machine learning (ML) to strengthen cybersecurity defenses. This study explores the role of AI-driven threat intelligence, automated incident response, and adaptive learning in combating cyberattacks. The proposed AAI framework utilizes deep learning, anomaly detection, and reinforcement learning techniques to predict and mitigate threats in real time. B
APA, Harvard, Vancouver, ISO, and other styles
35

Kharbanda, Varun, Seetharaman A, and Maddulety K. "Journal." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.

Full text
Abstract:
Artificial intelligence (AI) has emerged as the most widely applicable field across varied industries. Being an evolving technology, it may be quite useful in sensitive areas such as cyber security where there is a dire need for implementation of AI technologies, such as expert systems, neural networks, intelligent agents, and artificial immune systems. The primary reason for AI fitment to cyber security area is its ability to detect anomalies proactively and predictively in the network, thereby working towards securing the network before the damage related to loss of data and/or reputation is
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Varadhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ourzik, Victoria Yousra. "Security and safety concerns in the age of AI." International Conference on AI Research 4, no. 1 (2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.

Full text
Abstract:
Artificial Intelligence (AI) is transforming industries at an astonishing rate, reshaping how we live, work, and interact with technology. Yet, as AI becomes more pervasive, it brings urgent questions about security and safety. This article explores these critical issues, drawing a clear distinction between AI security and AI safety—two concepts that are often misunderstood but are crucial for responsible AI deployment. AI security focuses on protecting systems from external threats like data breaches, adversarial attacks, and unauthorized access. As AI systems increasingly handle sensitive da
APA, Harvard, Vancouver, ISO, and other styles
39

Chernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska, and Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security." Revista Amazonia Investiga 12, no. 67 (2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.

Full text
Abstract:
The purpose of the article is to define and justify the conceptual foundations of the implementation of the state policy on ensuring the information security of critical infrastructure objects, as a component of guaranteeing the national security of Ukraine. The methodological basis of the study was a set of general scientific and special methods of scientific knowledge: dialectical-phenomenological, systemic analysis and synthesis, structural-functional, deduction and induction, etc. According to the results of the research: the author's definition of the concepts «information security of cri
APA, Harvard, Vancouver, ISO, and other styles
40

Shinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (2021): 189. http://dx.doi.org/10.3390/joitmc7030189.

Full text
Abstract:
Nowadays, open innovations such as intelligent automation and digitalization are being adopted by every industry with the help of powerful technology such as Artificial Intelligence (AI). This evolution drives systematic running processes, involves less overhead of managerial activities and increased production rate. However, it also gave birth to different kinds of attacks and security issues at the data storage level and process level. The real-life implementation of such AI-enabled intelligent systems is currently plagued by the lack of security and trust levels in system predictions. Block
APA, Harvard, Vancouver, ISO, and other styles
41

Nycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.

Full text
Abstract:
&lt;p&gt;This article is addressed in most part to people dealing with security of web servers. This paper begins with presenting the statistical dimension of the issue of data security in the modern Internet. This paper begins with presenting statistics dealing with issues of data security on the modern World Wide Web. The authors main focus in this work is presenting the challenges of dealing with security and protection of web communication. The work analyses the security of implementing SSL/TLS (Secure Socket Layer/Transport Layer Security) protocol and proposes a new method of increasing
APA, Harvard, Vancouver, ISO, and other styles
42

Sarku, Rebecca, Ulfia A. Clemen, and Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review." Agriculture 13, no. 10 (2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.

Full text
Abstract:
Emerging technologies associated with Artificial Intelligence (AI) have enabled improvements in global food security situations. However, there is a limited understanding regarding the extent to which stakeholders are involved in AI modelling research for food security purposes. This study systematically reviews the existing literature to bridge the knowledge gap in AI and food security, focusing on software modelling perspectives. The study found the application of AI models to examine various indicators of food security across six continents, with most studies conducted in sub-Saharan Africa
APA, Harvard, Vancouver, ISO, and other styles
43

Lisovskyi, Kostiantyn, and Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE." Grail of Science, no. 27 (May 25, 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.

Full text
Abstract:
Artificial intelligence (AI) is transforming a number of business functions, including enterprise security systems. Recent years have seen an increase in the use of AI in security systems to detect and mitigate security threats. The purpose of this study is to investigate the use of AI in enterprise security systems. The study aims to identify the novelties in the application of AI to enterprise security systems, the research voids in the existing literature, and the benefits of AI to enterprise security systems. Existing research on the applicability of AI in enterprise security systems will
APA, Harvard, Vancouver, ISO, and other styles
44

Burdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.

Full text
Abstract:
There is a new meaningful interpretation of the concept of "integrated economic security of industrial enterprise"; the problems of analyzing complex economic security are substantiated. Based on the study of the regulatory and legal and methodological support of the process of managing economic security in modern economic and political conditions, generalizations and analysis of existing practice in Russia and abroad, the main shortcomings in approaches to assessing the integrated economic security of industrial enterprises have been identified. The article examines the methods for assessing
APA, Harvard, Vancouver, ISO, and other styles
45

Isabirye Edward Kezron. "Securing the AI supply chain: Mitigating vulnerabilities in AI model development and deployment." World Journal of Advanced Research and Reviews 22, no. 2 (2024): 2336–46. https://doi.org/10.30574/wjarr.2024.22.2.1394.

Full text
Abstract:
The rapid advancement and integration of Artificial Intelligence (AI) across critical sectors — including healthcare, finance, defense, and infrastructure — have exposed an often-overlooked risk: vulnerabilities within the AI supply chain. This research examines the security challenges and potential threats affecting AI model development and deployment, focusing on adversarial attacks, data poisoning, model theft, and compromised third-party components. By dissecting the AI supply chain into its core stages — data sourcing, model training, deployment, and maintenance — this study identifies ke
APA, Harvard, Vancouver, ISO, and other styles
46

Pidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein, and Tetyana Plazova. "Ukrainian policy in the field of information security." Revista Amazonia Investiga 11, no. 60 (2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.

Full text
Abstract:
The article analyzes the modern challenges of the time, which shape the information security policy of Ukraine. The paper analyzes the approaches to the definition of information security to understand this concept. Conclusions are made that information security is a constant movement, changeable, versatile concept, which cannot be stable. The article studies the information security of Ukraine as a component in the system of international information security. It is established that in the conditions of war, the role of information security of Ukraine in the international community has sharpl
APA, Harvard, Vancouver, ISO, and other styles
47

Vereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar, and Pavlo Terpiak. "Regional (continental) security: emphases of 2022." Revista Amazonia Investiga 11, no. 54 (2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.

Full text
Abstract:
The intensification of the processes of globalization, regionalization, geopoliticization and the desire of countries to integrate into the world financial, economic and social-political space lead to the emergence of new challenges and dangers and intensification of existing ones in the field of regional political and security cooperation. The strengthening of military activity on the territory of sovereign countries, the lack of a peaceful settlement of regional conflict situations, and the growth of tension and instability require regional cooperation in the fight against common threats on
APA, Harvard, Vancouver, ISO, and other styles
48

Bourair Al-Attar. "Network Security in AI-based healthcare systems." Babylonian Journal of Networking 2023 (November 30, 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.

Full text
Abstract:
With the fast integration of artificial intelligence (AI) in healthcare, boosting diagnostics, treatment tailoring, and predictive analytics, securing patient data, and ensuring system integrity have become key challenges. This research examines the network security concerns particular to AI-based healthcare systems, attempting to uncover main vulnerabilities and assess viable protection strategies. Through a mix of systematic review and experimental validation, we tested numerous machines learning models, including convolutional neural networks (CNN), support vector machines (SVM), and random
APA, Harvard, Vancouver, ISO, and other styles
49

Grosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio, and Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.

Full text
Abstract:
In contrast to vast academic efforts to study AI security, few real-world reports of AI security incidents exist. Released incidents prevent a thorough investigation of the attackers' motives, as crucial information about the company and AI application is missing. As a consequence, it often remains unknown how to avoid incidents. We tackle this gap and combine previous reports with freshly collected incidents to a small database of 32 AI security incidents. We analyze the attackers' target and goal, influencing factors, causes, and mitigations. Many incidents stem from non-compliance with best
APA, Harvard, Vancouver, ISO, and other styles
50

Avetisyan, Rafik. "THE EFFECT OF GLOBAL GEOPOLITICAL COMPETITION ON THE FORMATION OF THE SOUTH CAUCASUS SECURITY COMPLEX: THE STRATEGIC MODELING OF ARMENIA'S SECURITY POLICY." Armenological Issues 2, no. 28 (2025): 100–108. https://doi.org/10.46991/ai.2024.2.28.006.

Full text
Abstract:
This scientific article explores the intricate dynamics between global geopolitical competition and the formation of the South Caucasus security complex, with a specific focus on Armenia's security policy. After the 2020 Nagorno Karabakh war and the start of the Russian-Ukrainian war, the geopolitical significance of the South Caucasus is beginning to change. In the conditions of the deepening of the Ukrainian crisis, the global importance of the South Caucasus is highlighted as an important economic corridor of strategic communication in the "north-south" and "east-west" directions. The regio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!