Journal articles on the topic 'AI security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AI security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Full textPoongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.
Full textChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Full textChen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.
Full textAgrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Full textPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Full textGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Full textSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Full textReddy, Haritha Madhava. "Role of AI in Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.
Full textSengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–2. https://doi.org/10.55041/ijsrem40091.
Full textPrashant, Kailas Awasare. "Role of Artificial Intelligence in Identity and Access Management." International Journal of Advance and Applied Research S6, no. 23 (2025): 261–65. https://doi.org/10.5281/zenodo.15195212.
Full textTaherdoost, Hamed, Tuan-Vinh Le, and Khadija Slimani. "Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review." Cryptography 9, no. 1 (2025): 17. https://doi.org/10.3390/cryptography9010017.
Full textSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Full textRyzhov, Igor, and Petro Yashchuk. "Vital security: Rethinking human security in the context of hybrid peace." Revista Amazonia Investiga 13, no. 84 (2024): 167–82. https://doi.org/10.34069/ai/2024.84.12.10.
Full textIZUGBOEKWE, Chimezie Seth, Sonia Sim JOSHUA, Nasamu GAMBO, Sijibomi Victor OLUBODUN, and Blessing Onyemowo AMEH. "Artificial Intelligence and Business Security among SMEs in Abuja Metropolis." International Journal of Management Technology 11, no. 3 (2024): 17–41. https://doi.org/10.37745/ijmt.2013/vol11n31741.
Full textSamijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE." Journal of Social Sciences and Humanities Research Fundamentals 3, no. 11 (2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.
Full textKim, Tae Min. "Development Tasks of AI-based Security Industry." Korean Society of Private Security 23, no. 1 (2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.
Full textNallam, Madhuri. "AI Privacy Policies and Security." African Journal of Biological Sciences 6, Si4 (2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.
Full textFish, Ian. "Ethics in AI Security Implications." ITNOW 60, no. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.
Full textFarhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo, and Rushit Dave. "AI-Based Home Security System." International Journal of Computer Science and Information Technology 16, no. 2 (2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.
Full textEl-Hadi, Mohamed. "Generative AI Poses Security Risks." مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, no. 34 (2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.
Full textS R, Namrutha. "AI-Driven Security Operation Center." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3152–57. https://doi.org/10.22214/ijraset.2025.68883.
Full textRathod, Sachin Dashrath. "AI In Enhancing Cyber Security." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04063.
Full textOseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo, and Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust." International Journal of Engineering Research Updates 6, no. 2 (2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.
Full textNaveen Kumar Birru. "Secure AI Infrastructure: Building Trustworthy AI Systems in Distributed Environments." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2756–67. https://doi.org/10.30574/wjaets.2025.15.2.0748.
Full textBin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.
Full textRaakesh Dhanasekaran. "Generative AI Integration with Cloud Services: Revolutionizing Cybersecurity Frameworks." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1619–25. https://doi.org/10.30574/wjaets.2025.15.3.1086.
Full textKolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.
Full textPhijik, Dr B. "Blockchain And AI in Healthcare Data Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50040.
Full textVenkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.
Full textKharbanda, Varun, Seetharaman A, and Maddulety K. "Journal." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.
Full textLee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.
Full textVaradhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.
Full textOurzik, Victoria Yousra. "Security and safety concerns in the age of AI." International Conference on AI Research 4, no. 1 (2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.
Full textChernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska, and Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security." Revista Amazonia Investiga 12, no. 67 (2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.
Full textShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Full textSarku, Rebecca, Ulfia A. Clemen, and Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review." Agriculture 13, no. 10 (2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.
Full textLisovskyi, Kostiantyn, and Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE." Grail of Science, no. 27 (May 25, 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.
Full textNycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.
Full textIsabirye Edward Kezron. "Securing the AI supply chain: Mitigating vulnerabilities in AI model development and deployment." World Journal of Advanced Research and Reviews 22, no. 2 (2024): 2336–46. https://doi.org/10.30574/wjarr.2024.22.2.1394.
Full textBourair Al-Attar. "Network Security in AI-based healthcare systems." Babylonian Journal of Networking 2023 (November 30, 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.
Full textBurdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.
Full textGrosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio, and Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.
Full textPidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein, and Tetyana Plazova. "Ukrainian policy in the field of information security." Revista Amazonia Investiga 11, no. 60 (2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.
Full textVereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar, and Pavlo Terpiak. "Regional (continental) security: emphases of 2022." Revista Amazonia Investiga 11, no. 54 (2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.
Full textHu, Yupeng, Wenxin Kuang, Zheng Qin, et al. "Artificial Intelligence Security: Threats and Countermeasures." ACM Computing Surveys 55, no. 1 (2023): 1–36. http://dx.doi.org/10.1145/3487890.
Full textSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "AI-driven security for next-generation data centers: Conceptualizing autonomous threat detection and response in cloud-connected environments." GSC Advanced Research and Reviews 15, no. 2 (2023): 162–72. https://doi.org/10.30574/gscarr.2023.15.2.0136.
Full textAkhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.
Full text