scholarly journals The main areas of artificial intelligence technologies in cybersecurity

2020 ◽  
Vol 44 (4) ◽  
Author(s):  
V. A. Savchenko ◽  
◽  
O. D. Shapovalenko

The article examines the key technologies of artificial intelligence in order to use them to ensure the protection of information. It is shown that currently there is no general concept of artificial intelligence in cybersecurity, the most important methods of artificial intelligence that can be used in cybersecurity are not defined, and the role that these methods can play to protect organizations in cyberspace has not been established. As a key idea for the use of artificial intelligence in cybersecurity, the use of technologies and methods that facilitate the detection and response to threats using cyber attack statistics sets has been proposed. Priority areas for the use of artificial intelligence are network security and data protection.

Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Razvan Nicolescu ◽  
Michael Huth ◽  
Omar Santos

AbstractThis paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspective. First, literature published between 2010 and 2021 is reviewed, and compared with the results of a qualitative empirical study that correlates world leading Industry 4.0 frameworks. Second, the study establishes the present and future techniques for increased automation in cyber-physical systems. We present the cybersecurity requirements as they are changing with the integration of artificial intelligence and internet of things in cyber-physical systems. The grounded theory methodology is applied for analysis and modelling the connections and interdependencies between edge components and automation in cyber-physical systems. In addition, the hierarchical cascading methodology is used in combination with the taxonomic classifications, to design a new integrated framework for future cyber-physical systems. The study looks at increased automation in cyber-physical systems from a technical and social level.


2020 ◽  
pp. 1-22
Author(s):  
Jiafu Wan ◽  
Xiaomin Li ◽  
Hong-Ning Dai ◽  
Andrew Kusiak ◽  
Miguel Martinez-Garcia ◽  
...  

2021 ◽  
Vol 64 (2) ◽  
pp. 557-563
Author(s):  
Piyush Pandey ◽  
Hemanth Narayan Dakshinamurthy ◽  
Sierra N. Young

HighlightsRecent research and development efforts center around developing smaller, portable robotic weeding systems.Deep learning methods have resulted in accurate, fast, and robust weed detection and identification.Additional key technologies under development include precision actuation and multi-vehicle planning. Keywords: Artificial intelligence, Automated systems, Automated weeding, Weed control.


Author(s):  
Martin Schmidt-Kessel ◽  
Carmen Langhanke ◽  
Isabel Gläser ◽  
Hannah Kathrin Herden

AbstractWith its decision in the Google-case, the Court has put essential ground rules of EU data protection law in concrete terms. It has thereby deviated in several ways from leading opinions in legal writing which may partly be due to the fact that these are not free of personal involvement. More importantly though seems the conclusion that this decision underlines in many respects that theoretical patterns of EU private law are different from those of the traditional national law - and this divergence also holds true for major parts of the public law and, of course, data protection law. The Court has interpreted the responsibility with regard to data protection law and also the criteria in Art. 4 of the Directive very broadly, which has not met with general approval before. The ECJ strictly orientated itself by the general concept that even the search engine operator requires a permit for the processing of data. This in mind, it has given the fundamental right of data protection an important role in its considering in contrast to the user’s interest in respect of use of the service and the economic interests of the operator


2020 ◽  
Vol 11 (2) ◽  
pp. 41-47
Author(s):  
Amandeep Kaur ◽  
Madhu Dhiman ◽  
Mansi Tonk ◽  
Ramneet Kaur

Artificial Intelligence is the combination of machine and human intelligence, which are in research trends from the last many years. Different Artificial Intelligence programs have become capable of challenging humans by providing Expert Systems, Neural Networks, Robotics, Natural Language Processing, Face Recognition and Speech Recognition. Artificial Intelligence brings a bright future for different technical inventions in various fields. This review paper shows the general concept of Artificial Intelligence and presents an impact of Artificial Intelligence in the present and future world.


2019 ◽  
Vol 5 (2) ◽  
pp. 75-91
Author(s):  
Alexandre Veronese ◽  
Alessandra Silveira ◽  
Amanda Nunes Lopes Espiñeira Lemos

The article discusses the ethical and technical consequences of Artificial intelligence (hereinafter, A.I) applications and their usage of the European Union data protection legal framework to enable citizens to defend themselves against them. This goal is under the larger European Union Digital Single Market policy, which has concerns about how this subject correlates with personal data protection. The article has four sections. The first one introduces the main issue by describing the importance of AI applications in the contemporary world scenario. The second one describes some fundamental concepts about AI. The third section has an analysis of the ongoing policies for AI in the European Union and the Council of Europe proposal about ethics applicable to AI in the judicial systems. The fourth section is the conclusion, which debates the current legal mechanisms for citizens protection against fully automated decisions, based on European Union Law and in particular the General Data Protection Regulation. The conclusion will be that European Union Law is still under construction when it comes to providing effective protection to its citizens against automated inferences that are unfair or unreasonable.


Author(s):  
D.A. Kurmanova ◽  
◽  
D.R. Sultangareev ◽  
L.R. Khabibullina ◽  
◽  
...  

Cyber incidents continue to move up in the rating of possible threats and occupy the second position in the ranking of risks in the activities of companies (40 %). Five years ago, they were on the fifteenth line. Like a natural disaster or pandemic, a cyber attack can have a negative impact on hundreds of companies, and the number of such incidents is growing. So-called "cyber incidents",when hackers interfere with the activities of a large number of companies, using the dependencies of their shared Internet infrastructure, occur more often. This reflects the fact that today's world of risk management is more volatile than ever. At the same time, with the upcoming entry into force of the General data protection regulation (GDPR), which has been in effect throughout Europe since may 2018, the prospects of imposing more and larger fines on companies that do not comply with it have already become real. Actions taken by the company in light of a data integrity violation directly affect the final cost of such a violation. Reputational damage is inevitable if the response to a cyber incident is inadequate. New risks require new tools to respond to their potential impacts and mitigate them. This article discusses the possible risks of financial technologies, draws attention to cyber threats, the frequency of which is increasing, and offers a model for identifying and evaluating cyber risks.


Sign in / Sign up

Export Citation Format

Share Document