2017
DOI: 10.1145/3057729
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security and the Role of Intelligent Systems in Addressing its Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 48 publications
0
14
0
1
Order By: Relevance
“…Interestingly, several cybersecurity tasks can be performed using machine learning. These tasks include anomaly detection, spam filtering, user monitoring, risk analysis, and zero-day exploit identification [16]. Machine learning algorithms have been used widely in developing intrusion detection systems for IoT networks.…”
Section: B Intrusion Detection Systems In the Internet Of Things (Iot)mentioning
confidence: 99%
“…Interestingly, several cybersecurity tasks can be performed using machine learning. These tasks include anomaly detection, spam filtering, user monitoring, risk analysis, and zero-day exploit identification [16]. Machine learning algorithms have been used widely in developing intrusion detection systems for IoT networks.…”
Section: B Intrusion Detection Systems In the Internet Of Things (Iot)mentioning
confidence: 99%
“…AI is the process of recognizing something it has never seen before and predict the future, by extracting patterns in the past (Harel, Gal & Elovici, 2017;Bali, Garg & Bali, 2019). AI deals with the study and design of intelligent based agents which maintains the environment, takes actions which increases the chance for occurring success.…”
Section: Ai and Multi Agent Based Systemsmentioning
confidence: 99%
“…Framework was designed by [24] using fuzzy logic. [37] Highlight the role of intelligent system and artificial intelligences in addressing the challenges of cyber security but they didn't illustrate the framework on how to implement the system. In [33] they presented a general review on the malware detection in mobile devices based on parallel and distributed network.…”
Section: Machine Learning Algorithms Applied To System Securitymentioning
confidence: 99%