For the past decades, cyber threats have been increasing significantly and are designed in a sophisticated way that is tough to detect using traditional protection tools. As a result, privacy and sensitive personal information such as credit card numbers are being continuously compromised. Therefore, it is time to find a solution that can stand against the spreading of such threats. Artificial intelligence, machine learning, and deep learning could be among the top methods of detecting cyber threats. These methods could help to improve the detection technologies and engines for computer network defense. This chapter mainly focuses on artificial intelligence in cybersecurity. The main goal of this chapter is to highlight the drawbacks of the...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods ...
Cyber threats and network attacks are becoming more sophisticated each day. The number of daily atta...
In the Industrial Internet of Things (IIoT), mobile devices can be used to remotely monitor and cont...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Artificial intelligence techniques have grown rapidly in recent years, and their applications in pra...
Cyber security is one of the key challenges in the age of information technology, which is particula...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human ...
The next generation of Artificial Intelligence (AI) and Machine Learning (ML) are increasingly incor...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
As we all know that, the data that is been generated every second is increasing exponentially, as th...
Cyber attacks are estimated to cost the global economy $6 trillion annually by 2021. To combat these...
Cyberthreats have increased extensively during the last decade. Cybercriminals have become more soph...
As a result of the expansion of the internet of things and linked devices, professionals in the fiel...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods ...
Cyber threats and network attacks are becoming more sophisticated each day. The number of daily atta...
In the Industrial Internet of Things (IIoT), mobile devices can be used to remotely monitor and cont...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Artificial intelligence techniques have grown rapidly in recent years, and their applications in pra...
Cyber security is one of the key challenges in the age of information technology, which is particula...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human ...
The next generation of Artificial Intelligence (AI) and Machine Learning (ML) are increasingly incor...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
As we all know that, the data that is been generated every second is increasing exponentially, as th...
Cyber attacks are estimated to cost the global economy $6 trillion annually by 2021. To combat these...
Cyberthreats have increased extensively during the last decade. Cybercriminals have become more soph...
As a result of the expansion of the internet of things and linked devices, professionals in the fiel...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods ...
Cyber threats and network attacks are becoming more sophisticated each day. The number of daily atta...