The Influence and Limitations of AI in Cybersecurity Domain
Keywords:
Cybersecurity, AI, Machine learning, ThreatsAbstract
The use of artificial intelligence (AI) is creating new opportunities for creating value in businesses, industries, communities, and society as a whole. As technology has become increasingly relevant in many aspects of the world, it has been integrated into various industries, including cybersecurity. With the growing importance of information technology in businesses, cybersecurity has become crucial to protect data and information. AI has been heavily influencing cybersecurity on a large scale, and machine learning has been increasingly used in recent technologies supporting cybersecurity. This research paper reviews literature on the impact of AI on cybersecurity.
References
Álvarez López, José Antonio. “Case Studies of Real AI Applications.” Artificial Intelligence for Business: Innovation, Tools and Practices. Cham: Springer International Publishing, 2022. 141-157.
Kuzlu, Murat, Corinne Fair, and Ozgur Guler. “Role of artificial intelligence in the Internet of Things (IoT) cybersecurity.” Discover Internet of things 1 (2021): 1-14.
Kaloudi, Nektaria, and Jingyue Li. “The ai-based cyber threat landscape: A survey.” ACM Computing Surveys (CSUR) 53.1 (2020): 1-34.
Stevens, Tim. “Knowledge in the grey zone: AI and cybersecurity.” Digital War 1 (2020): 164-170.
Trappe, W., and J. Straub. “Cybersecurity: A New Open Access Journal. Cybersecurity, 1 (1), 1.” (2018).
Stoianov, Nikolai, and Andrey Ivanov. “Public Key Generation Principles Impact Cybersecurity.” Information & Security 47.2 (2020): 249-260.
Vlassis, Nikos. “A concise introduction to multiagent systems and distributed artificial intelligence.” Synthesis Lectures on Artificial Intelligence and Machine Learning 1.1 (2007): 1-71.
Perols, R. R., and U. S. Murthy. “The impact of cybersecurity risk management examinations and cybersecurity incidents on investor perceptions.” SSRN Electronic Journal. https://doi. org/10.2139/ssrn 3112872 (2018).
Hamilton, William L. “Graph representation learning.” Synthesis Lectures on Artifical Intelligence and Machine Learning 14.3 (2020): 1-159.
Wood, Trevor, et al. “Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection.” arXiv preprint arXiv:2204.13054 (2022).
Szepesvári, Csaba. “Algorithms for reinforcement learning.” Synthesis lectures on artificial intelligence and machine learning 4.1 (2010): 1-103.
Truong, Thanh Cong, et al. “Artificial intelligence and cybersecurity: Past, presence, and future.” Artificial intelligence and evolutionary computations in engineering systems. Springer Singapore, 2020.
De Raedt, Luc, et al. “Statistical relational artificial intelligence: logic, probability and computation.” (2017).
Mengidis, Notis, et al. “Blockchain and AI for the next generation energy grids: cybersecurity challenges and opportunities.” Information & Security 43.1 (2019): 21-33.
Raghavan, Vijay V., et al. Cognitive computing: Theory and applications. Elsevier, 2016.
Marda, Vidushi. “Artificial intelligence policy in India: a framework for engaging the limits of data-driven decision-making.” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376.2133 (2018): 20180087.
Qasaimeh, Ghazi M., and Hussam Eddin Jaradeh. “The impact of artificial intelligence on the effective applying of cyber governance in jordanian commercial banks.” International Journal of Technology, Innovation and Management (IJTIM) 2.1 (2022).
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
User Rights
Under the Creative Commons Attribution-NonCommercial 4.0 International (CC-BY-NC), the author (s) and users are free to share (copy, distribute and transmit the contribution).
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.








