Artificial Intelligence Role in Cybersecurity Infrastructures
Author(s): OANCEA, Cristian-Vlad
Author(s) keywords: Artificial Intelligence, cyber threats, cybersecurity, Cyberwarfare, information security, Machine Learning
Reference keywords: artificial intelligence, cyber threats, information security
Abstract:
The information technology domain advances and at the same time criminals are using new methods to commit cybercrimes. Cyber infrastructures are vulnerable to threats and other intrusions. Physical or virtual appliances and the human intervention are not sufficient for preventing, monitoring and protect all of these infrastructures. This situation implies a considerable automation and can be handled by applying methods of artificial intelligence that provide flexibility and learning capability for detection, prevention and combating cyber-attacks.
References:
[1]. P. Norvig, and S. Russell, Artificial Intelligence: Modern Approach. Prentice Hall, 2000.
[2]. E. Tyugu, Algorithms and Architectures of Artificial Intelligence, IOS Press. 2007.
[3]. Elon Musk Artificial Intelligence Mit (2015, Apr. 11) [Online] Available: http://www.businessinsider.com/elon-musk-artificial-intelligence-mit-2014-10? IR=T
[4]. Lynn Explains U.S. Cybersecurity Strategy, (2015, Apr. 19) [Online] Available: http://www.defense.gov/news/newsarticle.aspx?id=60869
[5]. Cybersecurity Fundamentals Study Guide, ISACA, 2014.
[6]. European Cybersecurity Implementation: Assurance, ISACA, 2014.
[7]. EU Cybersecurity Dashboard, A Path to a Secure European Cyberspace, Galexia, 2014.
[8]. T.J. Mowbray, Cybersecurity: Managing Systems, Conducting Testing and Investigating Intrusions, Thomas J. Mowbray, John Wiley & Sons Inc., 2014.
Article Title: Artificial Intelligence Role in Cybersecurity Infrastructures
Author(s): OANCEA, Cristian-Vlad
Date of Publication: 2015-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2015.01.08
Issue: Volume 4, Issue 1, Year 2015
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 59-62 (4 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.