Five ways to use AI to prevent cyber attacks

被引:0
|
作者
Pearson D. [1 ]
机构
[1] Knownhost
关键词
D O I
10.12968/S1353-4858(23)70043-3
中图分类号
学科分类号
摘要
Artificial intelligence has the potential to plug the gaps in your website defences. At a time of limited budgets, constrained resources and a global skills shortage, AI is capable of taking over many previously labour-intensive tasks and of providing insight into threats and weaknesses. This article looks at five key ways in which AI offers a boost to your web security. © 2023 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [31] SILENCE CYBER ATTACKS
    不详
    FORTUNE, 2016, 173 (06) : 66 - 74
  • [32] Attributing Cyber Attacks
    Rid, Thomas
    Buchanan, Ben
    JOURNAL OF STRATEGIC STUDIES, 2015, 38 (1-2) : 4 - 37
  • [33] Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI
    Wan, Bingjun
    Xu, Chengwei
    Mahapatra, Rajendra Prasad
    Selvaraj, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1207 - 1224
  • [34] Modeling cyber attacks
    Hansen, E
    Hansen, J
    Rubin, SH
    Richardson, C
    CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 57 - 62
  • [35] Countering cyber attacks
    Wagner, Cynthia G.
    FUTURIST, 2007, 41 (03) : 16 - 16
  • [36] Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
    Abri, Faranak
    Gutierrez, Luis Felipe
    Kulkarni, Chaitra T.
    Namin, Akbar Siami
    Jones, Keith S.
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 1703 - 1710
  • [37] Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review
    Singh, Rinki
    Kukreja, Deepika
    Sharma, Deepak Kumar
    FRONTIERS IN BIG DATA, 2023, 5
  • [38] Artificial intelligence based optimization for mapping IP addresses to prevent cyber-based attacks
    Kalai chelvi T.
    Gnanaprakasam C.
    Indumathy M.
    Khilar R.
    Sathish Kumar P.J.
    Measurement. Sens.,
  • [39] Cyber Social Disruption due to Cyber Attacks
    Barbosa, Jorge
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 817 - 826
  • [40] Predicting Cyber-Attacks Through the Use of Deep Learning Algorithms
    Chowdhury, Subrata
    Purushotham, E.
    Srinivasan, A.
    Sreeraman, Y.
    2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,