Artículos de revistas sobre el tema "AI security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "AI security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Texto completoPoongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.
Texto completoChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Texto completoChen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.
Texto completoAgrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.
Texto completoBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Texto completoAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Texto completoPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Texto completoGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Texto completoSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Texto completoReddy, Haritha Madhava. "Role of AI in Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.
Texto completoSengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–2. https://doi.org/10.55041/ijsrem40091.
Texto completoPrashant, Kailas Awasare. "Role of Artificial Intelligence in Identity and Access Management." International Journal of Advance and Applied Research S6, no. 23 (2025): 261–65. https://doi.org/10.5281/zenodo.15195212.
Texto completoTaherdoost, Hamed, Tuan-Vinh Le, and Khadija Slimani. "Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review." Cryptography 9, no. 1 (2025): 17. https://doi.org/10.3390/cryptography9010017.
Texto completoRyzhov, Igor, and Petro Yashchuk. "Vital security: Rethinking human security in the context of hybrid peace." Revista Amazonia Investiga 13, no. 84 (2024): 167–82. https://doi.org/10.34069/ai/2024.84.12.10.
Texto completoOluwatosin Oladayo Aramide. "Zero trust in AI pipelines: Securing distributed model training and inference." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 194–204. https://doi.org/10.30574/wjaets.2025.16.1.1207.
Texto completoSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Texto completoIZUGBOEKWE, Chimezie Seth, Sonia Sim JOSHUA, Nasamu GAMBO, Sijibomi Victor OLUBODUN, and Blessing Onyemowo AMEH. "Artificial Intelligence and Business Security among SMEs in Abuja Metropolis." International Journal of Management Technology 11, no. 3 (2024): 17–41. https://doi.org/10.37745/ijmt.2013/vol11n31741.
Texto completoKim, Tae Min. "Development Tasks of AI-based Security Industry." Korean Society of Private Security 23, no. 1 (2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.
Texto completoSamijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE." Journal of Social Sciences and Humanities Research Fundamentals 3, no. 11 (2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.
Texto completoSujatha Lakshmi Narra. "Human-AI Collaboration in Identity Security: When Should AI Decide?" Journal of Computer Science and Technology Studies 7, no. 7 (2025): 191–97. https://doi.org/10.32996/jcsts.2025.7.7.17.
Texto completoNallam, Madhuri. "AI Privacy Policies and Security." African Journal of Biological Sciences 6, Si4 (2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.
Texto completoFish, Ian. "Ethics in AI Security Implications." ITNOW 60, no. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.
Texto completoFarhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo, and Rushit Dave. "AI-Based Home Security System." International Journal of Computer Science and Information Technology 16, no. 2 (2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.
Texto completoEl-Hadi, Mohamed. "Generative AI Poses Security Risks." مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, no. 34 (2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.
Texto completoS R, Namrutha. "AI-Driven Security Operation Center." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3152–57. https://doi.org/10.22214/ijraset.2025.68883.
Texto completoRathod, Sachin Dashrath. "AI In Enhancing Cyber Security." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04063.
Texto completoOseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo, and Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust." International Journal of Engineering Research Updates 6, no. 2 (2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.
Texto completoNaveen Kumar Birru. "Secure AI Infrastructure: Building Trustworthy AI Systems in Distributed Environments." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2756–67. https://doi.org/10.30574/wjaets.2025.15.2.0748.
Texto completoBin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.
Texto completoRaakesh Dhanasekaran. "Generative AI Integration with Cloud Services: Revolutionizing Cybersecurity Frameworks." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1619–25. https://doi.org/10.30574/wjaets.2025.15.3.1086.
Texto completoKolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.
Texto completoPhijik, Dr B. "Blockchain And AI in Healthcare Data Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50040.
Texto completoVenkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.
Texto completoKharbanda, Varun, Seetharaman A, and Maddulety K. "Journal." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.
Texto completoLee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.
Texto completoVaradhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.
Texto completoOurzik, Victoria Yousra. "Security and safety concerns in the age of AI." International Conference on AI Research 4, no. 1 (2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.
Texto completoChernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska, and Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security." Revista Amazonia Investiga 12, no. 67 (2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.
Texto completoShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Texto completoNycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.
Texto completoSarku, Rebecca, Ulfia A. Clemen, and Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review." Agriculture 13, no. 10 (2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.
Texto completoLisovskyi, Kostiantyn, and Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE." Grail of Science, no. 27 (May 25, 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.
Texto completoBurdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.
Texto completoIsabirye Edward Kezron. "Securing the AI supply chain: Mitigating vulnerabilities in AI model development and deployment." World Journal of Advanced Research and Reviews 22, no. 2 (2024): 2336–46. https://doi.org/10.30574/wjarr.2024.22.2.1394.
Texto completoPidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein, and Tetyana Plazova. "Ukrainian policy in the field of information security." Revista Amazonia Investiga 11, no. 60 (2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.
Texto completoVereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar, and Pavlo Terpiak. "Regional (continental) security: emphases of 2022." Revista Amazonia Investiga 11, no. 54 (2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.
Texto completoBourair Al-Attar. "Network Security in AI-based healthcare systems." Babylonian Journal of Networking 2023 (November 30, 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.
Texto completoGrosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio, and Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.
Texto completoAvetisyan, Rafik. "THE EFFECT OF GLOBAL GEOPOLITICAL COMPETITION ON THE FORMATION OF THE SOUTH CAUCASUS SECURITY COMPLEX: THE STRATEGIC MODELING OF ARMENIA'S SECURITY POLICY." Armenological Issues 2, no. 28 (2025): 100–108. https://doi.org/10.46991/ai.2024.2.28.006.
Texto completo