scholarly journals Artificial Intelligence Techniques for Enhancing Smartphone Application Development on Mobile Computing

Author(s):  
S.V Manikanthan ◽  
T Padmapriya ◽  
Azham Hussain ◽  
E Thamizharasi

<p>Nowadays, Artificial Intelligence is being integrated into the modern innovations, including mobile, Electronic gadgets and as well as our daily lives. The smartphones are becoming a crucial and indistinguishable part of modern life. Whether that be in terms of speech, prototype, efficiency, features, quality and so forth, together all system requirements are provided in one machine. Researchers and innovations analysts are making advances in mobile computing with the excellent technologies. While Artificial Intelligence as a commercial product has been directly accessible. In this, both corporations and violent offenders take benefit of emerging technologies and advances. Cyber-security specialists and authorities have predicted there have been high possibilities of cyber-attacks. There's really, besides that, a need to improve quite advanced and powerful data security processes and software to protect all fraudulent activities and threats. The objective of this study is to introduce latest developments of implementing Methodologies to mobile computing, to prove how such techniques could become an efficient resource for data security and protocols, and to provide scope for future research.</p>

2021 ◽  
Vol 12 (1) ◽  
pp. 80-89
Author(s):  
Muskan Kumari ◽  

Cyber Security has become an arising challenge for business information system in current era. AI (Artificial Intelligence) is broadly utilized in various field, however it is still generally new in cyber security. Nonetheless, the applications in network protection are significant for everybody`s day by day life. In this paper, we present the current status of AI in cyber security field, and afterward portray a few contextual investigations and uses of AI to help the community including engineering managers, teachers, educators, business people, and understudies to more readily comprehend this field, for example, the difficulties and uncertain issues of AI in online protection. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Cyber security is a vital danger for any business as the quantity of attacks is expanding. Developing of attacks on cyber security is undermining our reality. AI (Artificial Intelligence) and ML (Machine Leaning) can help identify dangers and give proposals to cyber Analyst. Advancement of appropriation of AI/ML applied to cyber security requires banding together of industry, the scholarly community, and government on a worldwide scale. We also discuss future research opportunities associated with the development of AI techniques in the cyber security ?eld across a scope of utilization areas.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


2021 ◽  
Author(s):  
Jide Ebenezer Taiwo Akinsola ◽  
Samuel Akinseinde ◽  
Olamide Kalesanwo ◽  
Moruf Adeagbo ◽  
Kayode Oladapo ◽  
...  

In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions.


Author(s):  
Thanh Thi Nguyen

Artificial intelligence (AI) has been applied widely in our daily lives in a variety of ways with numerous successful stories. AI has also contributed to dealing with the coronavirus disease (COVID-19) pandemic, which has been happening around the globe. This paper presents a survey of AI methods being used in various applications in the fight against the COVID-19 outbreak and outlines the crucial roles of AI research in this unprecedented battle. We touch on a number of areas where AI plays as an essential component, from medical image processing, data analytics, text mining and natural language processing, the Internet of Things, to computational biology and medicine. A summary of COVID-19 related data sources that are available for research purposes is also presented. Research directions on exploring the potentials of AI and enhancing its capabilities and power in the battle are thoroughly discussed. We highlight 13 groups of problems related to the COVID-19 pandemic and point out promising AI methods and tools that can be used to solve those problems. It is envisaged that this study will provide AI researchers and the wider community an overview of the current status of AI applications and motivate researchers in harnessing AI potentials in the fight against COVID-19.


Information ◽  
2022 ◽  
Vol 13 (1) ◽  
pp. 22
Author(s):  
Mohamed Amine Ben Farah ◽  
Elochukwu Ukwandu ◽  
Hanan Hindy ◽  
David Brosset ◽  
Miroslav Bures ◽  
...  

The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of the Global Navigation Satellite System (GNSS) have been given particular consideration since it is a critical subcategory of many maritime infrastructures and, consequently, a target for cyber attacks. Recent research confirms that the dramatic proliferation of cyber crimes is fueled by increased levels of integration of new enabling technologies, such as IoT and Big Data. The trend to greater systems integration is, however, compelling, yielding significant business value by facilitating the operation of autonomous vessels, greater exploitation of smart ports, a reduction in the level of manpower and a marked improvement in fuel consumption and efficiency of services. Finally, practical challenges and future research trends have been highlighted.


2020 ◽  
Vol 13 (1) ◽  
pp. 103-128 ◽  
Author(s):  
Shipra Pandey ◽  
Rajesh Kumar Singh ◽  
Angappa Gunasekaran ◽  
Anjali Kaushik

Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.


Author(s):  
Kirti Raj Bhatele ◽  
Harsh Shrivastava ◽  
Neha Kumari

Cyber security has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. The challenges have always been endless in inventing right controls and procedures and implementing them with acute perfection for tackling with cyber attacks and crimes. The ever-increasing risk of cyber attacks and crimes grew exponentially with recent advancements in artificial intelligence. It has been applied in almost every field of sciences and engineering. From healthcare to robotics, AI has created a revolution. This ball of fire couldn't be kept away from cyber criminals, and thus, the “usual” cyber attacks have now become “intelligent” cyber attacks. In this chapter, the authors discuss specific techniques in artificial intelligence that are promising. They cover the applications of those techniques in cyber security. They end the discussion talking about the future scope of artificial intelligence and cyber security.


2017 ◽  
Vol 12 (5) ◽  
pp. 1039-1039
Author(s):  
Kenji Watanabe

As our daily lives and socioeconomic activities have increasingly come to depend on information systems and networks, the impact of disruptions to these systems and networks have also become more complex and diversified. In urban areas, where people, goods, money, and information are highly concentrated, the possibility of chain failures and confusion beyond our expectations and experience is especially high. The vulnerabilities in our systems and networks on have become the targets of cyber attacks, which have come to cause socioeconomic problems with increasing likelihood. To counter these attacks, technological countermeasures alone are insufficient, and countermeasures such as the development of professional skills and organizational response capabilities as well as the implementation of cyber security schemes based on public-private partnerships (PPP) at the national level must be carried out as soon as possible. In this JDR mini special issue on Cyber Security, I have tried to expand the scope of traditional cyber security discussions with mainly technological aspects. I have also succeeded in including non-technological aspects to provide feasible measures that will help us to prepare for, respond to, and recover from socioeconomic damage caused by advancing cyber attacks. Finally, I am truly grateful for the authors’ insightful contributions and the referees’ acute professional advice, which together make this JDR mini special issue a valuable contribution to making our society more resilient to incoming cyber attacks.


Sign in / Sign up

Export Citation Format

Share Document