Applications of artificial intelligence techniques to combating cyber crimes: A review

S Dilek, H Çakır, M Aydın - arXiv preprint arXiv:1502.03552, 2015 - arxiv.org
With the advances in information technology (IT) criminals are using cyberspace to commit
numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other …

The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives

B Vignau, R Khoury, S Hallé, A Hamou-Lhadj - Journal of Systems …, 2021 - Elsevier
The past decade has seen a rapidly growing interest in IoT-connected devices. But as is
usually the case with computer systems and networks, malicious individuals soon realized …

Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance

D Arivudainambi, VK KA, P Visu - Computer Communications, 2019 - Elsevier
Code-driven systems have extent to more than half of the world's populations in ambient
data and connectivity, offering formerly unimagined opportunities and unexpected threats …

Artificial intelligence in cyber defense

E Tyugu - 2011 3rd International conference on cyber conflict, 2011 - ieeexplore.ieee.org
The speed of processes and the amount of data to be used in defending the cyber space
cannot be handled by humans without considerable automation. However, it is difficult to …

[图书][B] Software-Defined networking and security: from theory to practice

D Huang, A Chowdhary, S Pisharody - 2018 - taylorfrancis.com
This book provides readers insights into cyber maneuvering or adaptive and intelligent
cyber defense. It describes the required models and security supporting functions that …

Artificial intelligence in cyber security

R Das, R Sandhane - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Without substantial automation, individuals cannot manage the complexity of operations and
the scale of information to be utilized to secure cyberspace. Nonetheless, technology and …

Agent-based simulations of blockchain protocols illustrated via kadena's chainweb

T Chitra, M Quaintance, S Haber… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
While many distributed consensus protocols provide robust liveness and consistency
guarantees under the presence of malicious actors, quantitative estimates of how economic …

人工智能技术在网络空间安全防御中的应用

吴元立, 司光亚, 罗批 - 计算机应用研究, 2015 - cqvip.com
如何及时处理海量网络态势信息并有效应对动态演化的网络攻击是网络空间安全防御面临的
主要挑战, 人工智能技术由于具有传统方法所不具备的智能特性, 近年来在网络空间安全防御中 …

A systematic state-of-the-art analysis of multi-agent intrusion detection

IA Saeed, A Selamat, MF Rohani, O Krejcar… - IEEE …, 2020 - ieeexplore.ieee.org
Multi-agent architectures have been successful in attaining considerable attention among
computer security researchers. This is so, because of their demonstrated capabilities such …

From cyber terrorism to cyber peacekeeping: are we there yet?

M Papathanasaki, G Dimitriou, L Maglaras… - Proceedings of the 24th …, 2020 - dl.acm.org
In Cyberspace nowadays, there is a burst of information that everyone has access. However,
apart from the advantages the Internet offers, it also hides numerous dangers for both …