Articles de revues sur le sujet « AI security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « AI security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Texte intégralPoongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.
Texte intégralChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Texte intégralChen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.
Texte intégralAgrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.
Texte intégralBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Texte intégralAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Texte intégralPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Texte intégralGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Texte intégralSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Texte intégralReddy, Haritha Madhava. "Role of AI in Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.
Texte intégralSengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–2. https://doi.org/10.55041/ijsrem40091.
Texte intégralPrashant, Kailas Awasare. "Role of Artificial Intelligence in Identity and Access Management." International Journal of Advance and Applied Research S6, no. 23 (2025): 261–65. https://doi.org/10.5281/zenodo.15195212.
Texte intégralTaherdoost, Hamed, Tuan-Vinh Le, and Khadija Slimani. "Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review." Cryptography 9, no. 1 (2025): 17. https://doi.org/10.3390/cryptography9010017.
Texte intégralSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Texte intégralRyzhov, Igor, and Petro Yashchuk. "Vital security: Rethinking human security in the context of hybrid peace." Revista Amazonia Investiga 13, no. 84 (2024): 167–82. https://doi.org/10.34069/ai/2024.84.12.10.
Texte intégralIZUGBOEKWE, Chimezie Seth, Sonia Sim JOSHUA, Nasamu GAMBO, Sijibomi Victor OLUBODUN, and Blessing Onyemowo AMEH. "Artificial Intelligence and Business Security among SMEs in Abuja Metropolis." International Journal of Management Technology 11, no. 3 (2024): 17–41. https://doi.org/10.37745/ijmt.2013/vol11n31741.
Texte intégralSamijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE." Journal of Social Sciences and Humanities Research Fundamentals 3, no. 11 (2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.
Texte intégralKim, Tae Min. "Development Tasks of AI-based Security Industry." Korean Society of Private Security 23, no. 1 (2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.
Texte intégralNallam, Madhuri. "AI Privacy Policies and Security." African Journal of Biological Sciences 6, Si4 (2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.
Texte intégralFish, Ian. "Ethics in AI Security Implications." ITNOW 60, no. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.
Texte intégralFarhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo, and Rushit Dave. "AI-Based Home Security System." International Journal of Computer Science and Information Technology 16, no. 2 (2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.
Texte intégralEl-Hadi, Mohamed. "Generative AI Poses Security Risks." مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, no. 34 (2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.
Texte intégralS R, Namrutha. "AI-Driven Security Operation Center." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3152–57. https://doi.org/10.22214/ijraset.2025.68883.
Texte intégralRathod, Sachin Dashrath. "AI In Enhancing Cyber Security." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04063.
Texte intégralOseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo, and Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust." International Journal of Engineering Research Updates 6, no. 2 (2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.
Texte intégralNaveen Kumar Birru. "Secure AI Infrastructure: Building Trustworthy AI Systems in Distributed Environments." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2756–67. https://doi.org/10.30574/wjaets.2025.15.2.0748.
Texte intégralBin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.
Texte intégralRaakesh Dhanasekaran. "Generative AI Integration with Cloud Services: Revolutionizing Cybersecurity Frameworks." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1619–25. https://doi.org/10.30574/wjaets.2025.15.3.1086.
Texte intégralKolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.
Texte intégralPhijik, Dr B. "Blockchain And AI in Healthcare Data Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50040.
Texte intégralVenkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.
Texte intégralKharbanda, Varun, Seetharaman A, and Maddulety K. "Journal." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.
Texte intégralLee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.
Texte intégralVaradhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.
Texte intégralOurzik, Victoria Yousra. "Security and safety concerns in the age of AI." International Conference on AI Research 4, no. 1 (2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.
Texte intégralChernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska, and Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security." Revista Amazonia Investiga 12, no. 67 (2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.
Texte intégralShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Texte intégralSarku, Rebecca, Ulfia A. Clemen, and Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review." Agriculture 13, no. 10 (2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.
Texte intégralLisovskyi, Kostiantyn, and Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE." Grail of Science, no. 27 (May 25, 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.
Texte intégralNycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.
Texte intégralIsabirye Edward Kezron. "Securing the AI supply chain: Mitigating vulnerabilities in AI model development and deployment." World Journal of Advanced Research and Reviews 22, no. 2 (2024): 2336–46. https://doi.org/10.30574/wjarr.2024.22.2.1394.
Texte intégralBourair Al-Attar. "Network Security in AI-based healthcare systems." Babylonian Journal of Networking 2023 (November 30, 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.
Texte intégralBurdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.
Texte intégralGrosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio, and Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.
Texte intégralPidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein, and Tetyana Plazova. "Ukrainian policy in the field of information security." Revista Amazonia Investiga 11, no. 60 (2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.
Texte intégralVereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar, and Pavlo Terpiak. "Regional (continental) security: emphases of 2022." Revista Amazonia Investiga 11, no. 54 (2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.
Texte intégralHu, Yupeng, Wenxin Kuang, Zheng Qin, et al. "Artificial Intelligence Security: Threats and Countermeasures." ACM Computing Surveys 55, no. 1 (2023): 1–36. http://dx.doi.org/10.1145/3487890.
Texte intégralSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "AI-driven security for next-generation data centers: Conceptualizing autonomous threat detection and response in cloud-connected environments." GSC Advanced Research and Reviews 15, no. 2 (2023): 162–72. https://doi.org/10.30574/gscarr.2023.15.2.0136.
Texte intégralAkhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.
Texte intégral