ARTIFICIAL INTELLIGENCE IN CYBER DEFENCE
DOI:
https://doi.org/10.61841/y2t66f53Keywords:
Safeguard, Digital Protection, Computerization, Fake brain, Mental Fortitude.Abstract
The speed of cycles and how much information to be utilized in protecting the internet can’t be taken off by people without significant computerization. Nonetheless, it is challenging to foster programming with ordinary fixed calculation (permanently set up rational on dynamic level) for really protecting against the progressively developing assaults in network. This paper presents a concise overview of computerized reasoning application in digital protection (Disc) and examines the possibilities of upgrading the digital safeguard capacities through expanding the mental fortitude of the safeguard frameworks. Reasoning application in album, we can presume that helpful application as of now exist. They have a place, most importantly, to use fake brain nets in border safeguard and a few other compact regions.
Downloads
References
1. Destré, E. (2018). Risks and Advantages in Using Artificial Intelligence on Cyber Defence and Cyber Attack. In Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures (pp. 27-37). IOS Press.
2. Destré, E. (2018). Risks and Advantages in Using Artificial Intelligence on Cyber Defence and Cyber Attack. In Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures (pp. 27-37). IOS Press.
3. Kumar, G., Kaushik, M. and Purohit, R. (2018) “Reliability analysis of software with three types of errors and imperfect debugging using Markov model,” International journal of computer applications in technology, 58(3), p.
241. doi: 10.1504/ijcat.2018.095763.
4. Sharma, R. and Kumar, G. (2017) “Availability improvement for the successive K-out-of-N machining system using standby with multiple working vacations,” International journal of reliability and safety, 11(3/4), p. 256. doi: 10.1504/ijrs.2017.089710.
5. Gireesh, K., Manju, K. and Preeti (2016) “Maintenance policies for improving the availability of a software-hardware system,” in 2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS). IEEE.
6. Johnson, J. (2019). The AI-cyber nexus: implications for military escalation, deterrence and strategic stability. Journal of Cyber Policy, 4(3), 442-460.
7. Taddeo, M., &Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race.
8. Grant, T. (2018, March). Speeding up planning of cyber-attacks using AI techniques: State of the art. In Proceedings, 13th International Conference on Cyber Warfare & Security (ICCWS), National Defense University, Washington DC (pp. 235-244).
9. Koch, R., & Golling, M. (2018, May). The cyber decade: cyber defence at a x-ing point. In 2018 10th International Conference on Cyber Conflict (CyCon) (pp. 159-186). IEEE.
10. Kreinbrink, J. L. (2019). Analysis of artificial intelligence (AI) enhanced technologies in support of cyber defense: Advantages, challenges, and considerations for future deployment (Doctoral dissertation, Utica College).
11. Masombuka, M., Grobler, M., & Watson, B. (2018, June). Towards an artificial intelligence framework to actively defend cyberspace. In European Conference on Cyber Warfare and Security (pp. 589-XIII). Academic Conferences International Limited.
12. R. K. Kaushik Anjali and D. Sharma, "Analyzing the Effect of Partial Shading on Performance of Grid Connected Solar PV System", 2018 3rd International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE), pp. 1-4, 2018.
13. R. Kaushik, O. P. Mahela, P. K. Bhatt, B. Khan, S. Padmanaban and F. Blaabjerg, "A Hybrid Algorithm for Recognition of Power Quality Disturbances," in IEEE Access, vol. 8, pp. 229184-229200, 2020.
14. Kaushik, R. K. "Pragati. Analysis and Case Study of Power Transmission and Distribution." J Adv Res Power Electro Power Sys 7.2 (2020): 1-3.
15. Dimitrov, K. (Ed.). (2018). Cyber Defence in Industry 4.0 systems and related logistics and IT infrastructures (Vol. 51). IOS Press.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
