Automated Secure Computing for Next‐Generation Systems 2023
DOI: 10.1002/9781394213948.ch5
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence for Cyber Security

Meghna Manoj Nair,
Atharva Deshmukh,
Amit Kumar Tyagi
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 48 publications
0
1
0
Order By: Relevance
“…Cybersecurity experts face new hurdles due to AIdriven attacks and the possibility of illegal access to devices that are connected. A proactive and flexible approach to cybersecurity becomes essential as technology develops (Nair, M. M., et al 2024) [48] . Resilient defense against constant and changing cyber threats requires thorough risk assessments, frequent security protocol changes, and continuous education initiatives.…”
Section: Analysis Of Cybersecurity Issues and Data Privacy Challengesmentioning
confidence: 99%
“…Cybersecurity experts face new hurdles due to AIdriven attacks and the possibility of illegal access to devices that are connected. A proactive and flexible approach to cybersecurity becomes essential as technology develops (Nair, M. M., et al 2024) [48] . Resilient defense against constant and changing cyber threats requires thorough risk assessments, frequent security protocol changes, and continuous education initiatives.…”
Section: Analysis Of Cybersecurity Issues and Data Privacy Challengesmentioning
confidence: 99%
“…Most of the cryptographic encryption algorithms are used in digital marketing, commercial electronic commerce, entrepreneurship, online banking transactions, and small and medium-sized enterprises' ledger security. As we already mentioned in the list of algorithms above, the description of such schemes is as follows [55]- [57]: (i) Most of the cryptographic algorithms work on blocks, which means a block of ciphertext encrypts and decrypts as plaintext accordingly at a single time, and (ii) value encoding is done with a stream cipher of multi-characters conversion, which is completed in a single operation.…”
Section: A Re-encryption and Policiesmentioning
confidence: 99%
“…The ethical standards should be in place to deal with this unfairness. Unbiased and just results are the main concerns of cybersecurity (5).…”
Section: Ai Ethics and Its Relevance To Cybersecuritymentioning
confidence: 99%