Artificial Intelligence in Cyber Security

15 Pages Posted: 18 Jan 2024

Md Fazley Rafy

West Virginia University - Benjamin M. Statler College of Engineering and Mineral Resources

Date Written: January 1, 2024

The unprecedented pace of technology has been significantly influenced by the integration of Artificial Intelligence (AI). The ubiquity of AI spans various domains, garnering both criticism and acclaim. Its growing application presents both advantages and drawbacks in cybersecurity, as it becomes a standard component in the development and operational phases of contemporary technologies. This paper provides a comprehensive overview of AI utilization in cybersecurity, exploring its benefits, challenges, and potential negative impacts. In addition to that, it explores AI-based models that enhance or compromise security across various infrastructures and cyber networks. The paper critically examines the role of AI in developing cybersecurity applications, proposes strategies for leveraging emerging technologies to counteract AI-generated threats and vulnerabilities, and addresses the socio-economic repercussions of the involvement of AI in cybersecurity.

Keywords: Artificial Intelligence, Machine Learning, Deep Learning, Neural Networks, Expert Systems, Natural Language Processing, Threat Detection, Real-time Mitigation, Social Media Security, AI-driven Threat Intelligence, Predictive Analytics, Adversarial Attacks, Privacy Concerns, Ethical Considerations

Suggested Citation: Suggested Citation

Md Fazley Rafy (Contact Author)

West virginia university - benjamin m. statler college of engineering and mineral resources ( email ).

United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, artificial intelligence ejournal.

Subscribe to this fee journal for more curated articles on this topic

Cybersecurity, Privacy, & Networks eJournal

Cybersecurity & data privacy law & policy ejournal, computer science education ejournal, electrical engineering ejournal, psychology research methods ejournal.

Share this page:

Artificial Intelligence in CyberSecurity

Submission Deadline: 30 July 2019

IEEE Access invites manuscript submissions in the area of Artificial Intelligence in CyberSecurity.

Recent studies show that Artificial Intelligence (AI) has resulted in advances in many scientific and technological fields, i.e., AI-based medicine, AI-based transportation, and AI-based finance. It can be imagined that the era of AI will be coming to us soon. The Internet has become the largest man-made system in human history, which has a great impact on people’s daily life and work. Security is one of the most significant concerns in the development of a sustainable, resilient and prosperous Internet ecosystem. Cyber security faces many challenging issues, such as intrusion detection, privacy protection, proactive defense, anomalous behaviors, advanced threat detection and so on. What’s more, many threat variations emerge and spread continuously. Therefore, AI-assisted, self-adaptable approaches are expected to deal with these security issues. Joint consideration of the interweaving nature between AI and cyber security is a key factor for driving future secure Internet.

The use of AI in cybersecurity creates new frontiers for security research. Specifically, the AI analytic tools, i.e., reinforcement learning, big data, machine learning and game theory, make learning increasingly important for real-time analysis and decision making for quick reactions to security attacks. On the other hand, AI technology itself also brings some security issues that need to be solved. For example, data mining and machine learning create a wealth of privacy issues due to the abundance and accessibility of data. AI-based cyber security has a great impact on different industrial applications if applied in appropriate ways, such as self-driving security, secure vehicular networks, industrial control security, smart grid security, etc. This Special Section in IEEE Access will focus on AI technologies in cybersecurity and related issues. We also welcome research on AI-related theory analysis for security and privacy.

The topics of interest include, but are not limited to:

  • Reinforcement learning for cybersecurity
  • Machine learning for proactive defense
  • Big data analytics for security
  • Big data anonymization
  • Big data-based hacking incident forecasting
  • Big data analytics for secure network management
  • AI-based intrusion detection and prevention
  • AI approaches to trust and reputation
  • AI-based anomalous behavior detection
  • AI-based privacy protection
  • AI for self-driving security
  • AI for IoT security
  • AI for industrial control security
  • AI for smart grid security
  • AI for security in innovative networking
  • AI security applications

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor:    Chi-Yuan Chen, National Ilan University, Taiwan

Guest Editors:

  • Wei Quan, Beijing Jiaotong University, China
  • Nan Cheng, University of Toronto, Canada
  • Shui Yu, Deakin University, Australia
  • Jong-Hyouk Lee, Sangmyung University, Republic of Korea
  • Gregorio Martinez Perez, University of Murcia (UMU), Spain
  • Hongke Zhang, Beijing Jiaotong University, China
  • Shiuhpyng Shieh, National Chiao Tung University, Taiwan

Relevant IEEE Access Special Sections:

  • Artificial Intelligence and Cognitive Computing for Communications and Networks
  • Smart Caching, Communications, Computing and Cybersecurity for Information-Centric Internet of Things
  • Cyber-Physical Systems

IEEE Access Editor-in-Chief:   Prof. Derek Abbott, University of Adelaide

Paper submission: Contact Associate Editor and submit manuscript to: http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact:  [email protected] .

At a Glance

  • Journal: IEEE Access
  • Format: Open Access
  • Frequency: Continuous
  • Submission to Publication: 4-6 weeks (typical)
  • Topics: All topics in IEEE
  • Average Acceptance Rate: 27%
  • Impact Factor: 3.4
  • Model: Binary Peer Review
  • Article Processing Charge: US $1,995

Featured Articles

research paper on artificial intelligence in cyber security

Randomized Rank-Revealing QLP for Low-Rank Matrix Decomposition

View in IEEE Xplore

research paper on artificial intelligence in cyber security

Scalable Empirical Dynamic Modeling With Parallel Computing and Approximate k-NN Search

research paper on artificial intelligence in cyber security

Toward Precise Ambiguity-Aware Cross-Modality Global Self-Localization

Submission guidelines.

© 2024 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE TERMS AND CONDITIONS.

A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

AWARD RULES:

NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING.

These rules apply to the “2024 IEEE Access Best Video Award Part 2″ (the “Award”).

  • Sponsor: The Sponsor of the Award is The Institute of Electrical and Electronics Engineers, Incorporated (“IEEE”) on behalf of IEEE Access , 445 Hoes Lane, Piscataway, NJ 08854-4141 USA (“Sponsor”).
  • Eligibility: Award is open to residents of the United States of America and other countries, where permitted by local law, who are the age of eighteen (18) and older. Employees of Sponsor, its agents, affiliates and their immediate families are not eligible to enter Award. The Award is subject to all applicable state, local, federal and national laws and regulations. Entrants may be subject to rules imposed by their institution or employer relative to their participation in Awards and should check with their institution or employer for any relevant policies. Void in locations and countries where prohibited by law.
  • Agreement to Official Rules : By participating in this Award, entrants agree to abide by the terms and conditions thereof as established by Sponsor. Sponsor reserves the right to alter any of these Official Rules at any time and for any reason.  All decisions made by Sponsor concerning the Award including, but not limited to the cancellation of the Award, shall be final and at its sole discretion. 
  • How to Enter: This Award opens on July 1, 2024 at 12:00 AM ET and all entries must be received by 11:59 PM ET on December 31, 2024 (“Promotional Period”).

Entrant must submit a video with an article submission to IEEE Access . The video submission must clearly be relevant to the submitted manuscript.  Only videos that accompany an article that is accepted for publication in IEEE Access will qualify.  The video may be simulations, demonstrations, or interviews with other experts, for example.  Your video file should not exceed 100 MB.

Entrants can enter the Award during Promotional Period through the following method:

  • The IEEE Author Portal : Entrants can upload their video entries while submitting their article through the IEEE Author Portal submission site .
  • Review and Complete the Terms and Conditions: After submitting your manuscript and video through the IEEE Author Portal, entrants should then review and sign the Terms and Conditions .

Entrants who have already submitted a manuscript to IEEE Access without a video can still submit a video for inclusion in this Award so long as the video is submitted within 7 days of the article submission date.  The video can be submitted via email to the article administrator.  All videos must undergo peer review and be accepted along with the article submission.  Videos may not be submitted after an article has already been accepted for publication. 

The criteria for an article to be accepted for publication in IEEE Access are:

  • The article must be original writing that enhances the existing body of knowledge in the given subject area. Original review articles and surveys are acceptable even if new data/concepts are not presented.
  • Results reported must not have been submitted or published elsewhere (although expanded versions of conference publications are eligible for submission).
  • Experiments, statistics, and other analyses must be performed to a high technical standard and are described in sufficient detail.
  • Conclusions must be presented in an appropriate fashion and are supported by the data.
  • The article must be written in standard English with correct grammar.
  • Appropriate references to related prior published works must be included.
  • The article must fall within the scope of IEEE Access
  • Must be in compliance with the IEEE PSPB Operations Manual.
  • Completion of the required IEEE intellectual property documents for publication.
  • At the discretion of the IEEE Access Editor-in-Chief.
  • Disqualification: The following items will disqualify a video from being considered a valid submission:
  • The video is not original work.
  • A video that is not accompanied with an article submission.
  • The article and/or video is rejected during the peer review process.
  • The article and/or video topic does not fit into the scope of IEEE Access .
  • The article and/or do not follow the criteria for publication in IEEE Access .
  • Videos posted in a comment on IEEE Xplore .
  • Content ​is off-topic, offensive, obscene, indecent, abusive or threatening to others.
  • Infringes the copyright, trademark or other right of any third party.
  • Uploads viruses or other contaminating or destructive features.
  • Is in violation of any applicable laws or regulations.
  • Is not in English​.
  • Is not provided within the designated submission time.
  • Entrant does not agree and sign the Terms and Conditions document.

Entries must be original. Entries that copy other entries, or the intellectual property of anyone other than the Entrant, may be removed by Sponsor and the Entrant may be disqualified. Sponsor reserves the right to remove any entry and disqualify any Entrant if the entry is deemed, in Sponsor’s sole discretion, to be inappropriate.

  • Entrant’s Warranty and Authorization to Sponsor: By entering the Award, entrants warrant and represent that the Award Entry has been created and submitted by the Entrant. Entrant certifies that they have the ability to use any image, text, video, or other intellectual property they may upload and that Entrant has obtained all necessary permissions. IEEE shall not indemnify Entrant for any infringement, violation of publicity rights, or other civil or criminal violations. Entrant agrees to hold IEEE harmless for all actions related to the submission of an Entry. Entrants further represent and warrant, if they reside outside of the United States of America, that their participation in this Award and acceptance of a prize will not violate their local laws.
  • Intellectual Property Rights: Entrant grants Sponsor an irrevocable, worldwide, royalty free license to use, reproduce, distribute, and display the Entry for any lawful purpose in all media whether now known or hereinafter created. This may include, but is not limited to, the IEEE A ccess website, the IEEE Access YouTube channel, the IEEE Access IEEE TV channel, IEEE Access social media sites (LinkedIn, Facebook, Twitter, IEEE Access Collabratec Community), and the IEEE Access Xplore page. Facebook/Twitter/Microsite usernames will not be used in any promotional and advertising materials without the Entrants’ expressed approval.
  • Number of Prizes Available, Prizes, Approximate Retail Value and Odds of winning Prizes: Two (2) promotional prizes of $350 USD Amazon gift cards. One (1) grand prize of a $500 USD Amazon gift card. Prizes will be distributed to the winners after the selection of winners is announced. Odds of winning a prize depend on the number of eligible entries received during the Promotional Period. Only the corresponding author of the submitted manuscript will receive the prize.

The grand prize winner may, at Sponsor’ discretion, have his/her article and video highlighted in media such as the IEEE Access Xplore page and the IEEE Access social media sites.

The prize(s) for the Award are being sponsored by IEEE.  No cash in lieu of prize or substitution of prize permitted, except that Sponsor reserves the right to substitute a prize or prize component of equal or greater value in its sole discretion for any reason at time of award.  Sponsor shall not be responsible for service obligations or warranty (if any) in relation to the prize(s). Prize may not be transferred prior to award. All other expenses associated with use of the prize, including, but not limited to local, state, or federal taxes on the Prize, are the sole responsibility of the winner.  Winner(s) understand that delivery of a prize may be void where prohibited by law and agrees that Sponsor shall have no obligation to substitute an alternate prize when so prohibited. Amazon is not a sponsor or affiliated with this Award.

  • Selection of Winners: Promotional prize winners will be selected based on entries received during the Promotional Period. The sponsor will utilize an Editorial Panel to vote on the best video submissions. Editorial Panel members are not eligible to participate in the Award.  Entries will be ranked based on three (3) criteria:
  • Presentation of Technical Content
  • Quality of Video

Upon selecting a winner, the Sponsor will notify the winner via email. All potential winners will be notified via their email provided to the sponsor. Potential winners will have five (5) business days to respond after receiving initial prize notification or the prize may be forfeited and awarded to an alternate winner. Potential winners may be required to sign an affidavit of eligibility, a liability release, and a publicity release.  If requested, these documents must be completed, signed, and returned within ten (10) business days from the date of issuance or the prize will be forfeited and may be awarded to an alternate winner. If prize or prize notification is returned as undeliverable or in the event of noncompliance with these Official Rules, prize will be forfeited and may be awarded to an alternate winner.

  • General Prize Restrictions:  No prize substitutions or transfer of prize permitted, except by the Sponsor. Import/Export taxes, VAT and country taxes on prizes are the sole responsibility of winners. Acceptance of a prize constitutes permission for the Sponsor and its designees to use winner’s name and likeness for advertising, promotional and other purposes in any and all media now and hereafter known without additional compensation unless prohibited by law. Winner acknowledges that neither Sponsor, Award Entities nor their directors, employees, or agents, have made nor are in any manner responsible or liable for any warranty, representation, or guarantee, express or implied, in fact or in law, relative to any prize, including but not limited to its quality, mechanical condition or fitness for a particular purpose. Any and all warranties and/or guarantees on a prize (if any) are subject to the respective manufacturers’ terms therefor, and winners agree to look solely to such manufacturers for any such warranty and/or guarantee.

11.Release, Publicity, and Privacy : By receipt of the Prize and/or, if requested, by signing an affidavit of eligibility and liability/publicity release, the Prize Winner consents to the use of his or her name, likeness, business name and address by Sponsor for advertising and promotional purposes, including but not limited to on Sponsor’s social media pages, without any additional compensation, except where prohibited.  No entries will be returned.  All entries become the property of Sponsor.  The Prize Winner agrees to release and hold harmless Sponsor and its officers, directors, employees, affiliated companies, agents, successors and assigns from and against any claim or cause of action arising out of participation in the Award. 

Sponsor assumes no responsibility for computer system, hardware, software or program malfunctions or other errors, failures, delayed computer transactions or network connections that are human or technical in nature, or for damaged, lost, late, illegible or misdirected entries; technical, hardware, software, electronic or telephone failures of any kind; lost or unavailable network connections; fraudulent, incomplete, garbled or delayed computer transmissions whether caused by Sponsor, the users, or by any of the equipment or programming associated with or utilized in this Award; or by any technical or human error that may occur in the processing of submissions or downloading, that may limit, delay or prevent an entrant’s ability to participate in the Award.

Sponsor reserves the right, in its sole discretion, to cancel or suspend this Award and award a prize from entries received up to the time of termination or suspension should virus, bugs or other causes beyond Sponsor’s control, unauthorized human intervention, malfunction, computer problems, phone line or network hardware or software malfunction, which, in the sole opinion of Sponsor, corrupt, compromise or materially affect the administration, fairness, security or proper play of the Award or proper submission of entries.  Sponsor is not liable for any loss, injury or damage caused, whether directly or indirectly, in whole or in part, from downloading data or otherwise participating in this Award.

Representations and Warranties Regarding Entries: By submitting an Entry, you represent and warrant that your Entry does not and shall not comprise, contain, or describe, as determined in Sponsor’s sole discretion: (A) false statements or any misrepresentations of your affiliation with a person or entity; (B) personally identifying information about you or any other person; (C) statements or other content that is false, deceptive, misleading, scandalous, indecent, obscene, unlawful, defamatory, libelous, fraudulent, tortious, threatening, harassing, hateful, degrading, intimidating, or racially or ethnically offensive; (D) conduct that could be considered a criminal offense, could give rise to criminal or civil liability, or could violate any law; (E) any advertising, promotion or other solicitation, or any third party brand name or trademark; or (F) any virus, worm, Trojan horse, or other harmful code or component. By submitting an Entry, you represent and warrant that you own the full rights to the Entry and have obtained any and all necessary consents, permissions, approvals and licenses to submit the Entry and comply with all of these Official Rules, and that the submitted Entry is your sole original work, has not been previously published, released or distributed, and does not infringe any third-party rights or violate any laws or regulations.

12.Disputes:  EACH ENTRANT AGREES THAT: (1) ANY AND ALL DISPUTES, CLAIMS, AND CAUSES OF ACTION ARISING OUT OF OR IN CONNECTION WITH THIS AWARD, OR ANY PRIZES AWARDED, SHALL BE RESOLVED INDIVIDUALLY, WITHOUT RESORTING TO ANY FORM OF CLASS ACTION, PURSUANT TO ARBITRATION CONDUCTED UNDER THE COMMERCIAL ARBITRATION RULES OF THE AMERICAN ARBITRATION ASSOCIATION THEN IN EFFECT, (2) ANY AND ALL CLAIMS, JUDGMENTS AND AWARDS SHALL BE LIMITED TO ACTUAL OUT-OF-POCKET COSTS INCURRED, INCLUDING COSTS ASSOCIATED WITH ENTERING THIS AWARD, BUT IN NO EVENT ATTORNEYS’ FEES; AND (3) UNDER NO CIRCUMSTANCES WILL ANY ENTRANT BE PERMITTED TO OBTAIN AWARDS FOR, AND ENTRANT HEREBY WAIVES ALL RIGHTS TO CLAIM, PUNITIVE, INCIDENTAL, AND CONSEQUENTIAL DAMAGES, AND ANY OTHER DAMAGES, OTHER THAN FOR ACTUAL OUT-OF-POCKET EXPENSES, AND ANY AND ALL RIGHTS TO HAVE DAMAGES MULTIPLIED OR OTHERWISE INCREASED. ALL ISSUES AND QUESTIONS CONCERNING THE CONSTRUCTION, VALIDITY, INTERPRETATION AND ENFORCEABILITY OF THESE OFFICIAL RULES, OR THE RIGHTS AND OBLIGATIONS OF ENTRANT AND SPONSOR IN CONNECTION WITH THE AWARD, SHALL BE GOVERNED BY, AND CONSTRUED IN ACCORDANCE WITH, THE LAWS OF THE STATE OF NEW JERSEY, WITHOUT GIVING EFFECT TO ANY CHOICE OF LAW OR CONFLICT OF LAW, RULES OR PROVISIONS (WHETHER OF THE STATE OF NEW JERSEY OR ANY OTHER JURISDICTION) THAT WOULD CAUSE THE APPLICATION OF THE LAWS OF ANY JURISDICTION OTHER THAN THE STATE OF NEW JERSEY. SPONSOR IS NOT RESPONSIBLE FOR ANY TYPOGRAPHICAL OR OTHER ERROR IN THE PRINTING OF THE OFFER OR ADMINISTRATION OF THE AWARD OR IN THE ANNOUNCEMENT OF THE PRIZES.

  • Limitation of Liability:  The Sponsor, Award Entities and their respective parents, affiliates, divisions, licensees, subsidiaries, and advertising and promotion agencies, and each of the foregoing entities’ respective employees, officers, directors, shareholders and agents (the “Released Parties”) are not responsible for incorrect or inaccurate transfer of entry information, human error, technical malfunction, lost/delayed data transmissions, omission, interruption, deletion, defect, line failures of any telephone network, computer equipment, software or any combination thereof, inability to access web sites, damage to a user’s computer system (hardware and/or software) due to participation in this Award or any other problem or error that may occur. By entering, participants agree to release and hold harmless the Released Parties from and against any and all claims, actions and/or liability for injuries, loss or damage of any kind arising from or in connection with participation in and/or liability for injuries, loss or damage of any kind, to person or property, arising from or in connection with participation in and/or entry into this Award, participation is any Award-related activity or use of any prize won. Entry materials that have been tampered with or altered are void. If for any reason this Award is not capable of running as planned, or if this Award or any website associated therewith (or any portion thereof) becomes corrupted or does not allow the proper playing of this Award and processing of entries per these rules, or if infection by computer virus, bugs, tampering, unauthorized intervention, affect the administration, security, fairness, integrity, or proper conduct of this Award, Sponsor reserves the right, at its sole discretion, to disqualify any individual implicated in such action, and/or to cancel, terminate, modify or suspend this Award or any portion thereof, or to amend these rules without notice. In the event of a dispute as to who submitted an online entry, the entry will be deemed submitted by the authorized account holder the email address submitted at the time of entry. “Authorized Account Holder” is defined as the person assigned to an email address by an Internet access provider, online service provider or other organization responsible for assigning email addresses for the domain associated with the email address in question. Any attempt by an entrant or any other individual to deliberately damage any web site or undermine the legitimate operation of the Award is a violation of criminal and civil laws and should such an attempt be made, the Sponsor reserves the right to seek damages and other remedies from any such person to the fullest extent permitted by law. This Award is governed by the laws of the State of New Jersey and all entrants hereby submit to the exclusive jurisdiction of federal or state courts located in the State of New Jersey for the resolution of all claims and disputes. Facebook, LinkedIn, Twitter, G+, YouTube, IEEE Xplore , and IEEE TV are not sponsors nor affiliated with this Award.
  • Award Results and Official Rules: To obtain the identity of the prize winner and/or a copy of these Official Rules, send a self-addressed stamped envelope to Kimberly Rybczynski, IEEE, 445 Hoes Lane, Piscataway, NJ 08854-4141 USA.

Inside Cybersecurity

August 8, 2024

CISA, DARPA officials see cyber advantages among the risks posed by artificial intelligence

LAS VEGAS. Senior officials from the Cybersecurity and Infrastructure Security Agency and the Pentagon’s advanced research agency discussed the beneficial roles artificial intelligence can play for securing data and systems, as well as concerns over a “rush to market” with AI products that haven’t been fully vetted for security weaknesses, in presentations at the AI Summit at Black Hat.

The Tuesday AI summit featured discussions with Lisa Einstein, the new chief AI officer at CISA, and Kathleen Fisher, director of...

Log in to access this content.

  • Create new account
  • Request new password

Not a subscriber? Sign up for 30 days free access to exclusive news and analysis on cybersecurity regulations and more.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Investigating the applications of artificial intelligence in cyber security

  • Published: 09 September 2019
  • Volume 121 , pages 1189–1211, ( 2019 )

Cite this article

research paper on artificial intelligence in cyber security

  • Naveed Naeem Abbas 1 , 2 ,
  • Tanveer Ahmed 3 ,
  • Syed Habib Ullah Shah 1 , 4 ,
  • Muhammad Omar   ORCID: orcid.org/0000-0002-7071-5760 1 &
  • Han Woo Park 5  

6011 Accesses

29 Citations

6 Altmetric

Explore all metrics

Artificial Intelligence (AI) provides instant insights to pierce through the noise of thousands of daily security alerts. The recent literature focuses on AI’s application to cyber security but lacks visual analysis of AI applications. Structural changes have been observed in cyber security since the emergence of AI. This study promotes the development of theory about AI in cyber security, helps researchers establish research directions, and provides a reference that enterprises and governments can use to plan AI applications in the cyber security industry. Many countries, institutions and authors are densely connected through collaboration and citation networks. Artificial neural networks, an AI technique, gave birth to today’s research on cloud cyber security. Many research hotspots such as those on face recognition and deep neural networks for speech recognition may create future hotspots on emerging technology, such as on artificial intelligence systems for security. This study visualizes the structural changes, hotspots and emerging trends in AI studies. Five evaluation factors are used to judge the hotspots and trends of this domain and a heat map is used to identify the areas of the world that are generating research on AI applications in cyber security. This study is the first to provide an overall perspective of hotspots and trends in the research on AI in the cyber security domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research paper on artificial intelligence in cyber security

Similar content being viewed by others

research paper on artificial intelligence in cyber security

Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation

research paper on artificial intelligence in cyber security

The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace

research paper on artificial intelligence in cyber security

AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions

Aghion, P., Jones, B. F., & Jones, C. I. (2017). Artificial intelligence and economic growth. NBER Working Paper Series . https://doi.org/10.3386/w23928 .

Article   Google Scholar  

Byres, E. (2004). The myths and facts behind cyber security risks for industrial control systems. Proceedings of the VDE Kongress . https://rampages.us/keckjw/wp-content/uploads/sites/2169/2014/11/Myths-and-Facts-for-Control-System-Cyber-security.pdf

Chen, C. (2006). CiteSpace II: Detecting and visualizing emerging trends and transient patterns in scientific literature. Journal of the American Society for Information Science and Technology . https://doi.org/10.1002/asi.20317 .

Chen, C. (2016). How to use CiteSpace . British Columbia, Canada: Lean Publishing. Retrieved from https://leanpub.com/howtousecitespace .

Chen, C., Dubin, R., & Kim, M. C. (2014). Orphan drugs and rare diseases: A scientometric review (2000–2014). Expert Opinion on Orphan Drugs, 2 (7), 709–724. https://doi.org/10.1517/21678707.2014.920251 .

Chen, C., & Leydesdorff, L. (2013). Patterns of connections and movements in dual-map overlays: A new method of publication portfolio analysis. Journal of the American Society for Information Science and Technology . Retrieved from https://www.researchgate.net/publication/236039476_Patterns_of_Connections_and_Movements_in_Dual-Map_Overlays_A_New_Method_of_Publication_Portfolio_Analysis .

Chen, H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS Quarterly, 36 (4), 1165–1188. https://doi.org/10.1145/2463676.2463712 .

Dilek, S., Cakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. International Journal of Artificial Intelligence & Applications, 6 (1), 21–39. https://doi.org/10.5121/ijaia.2015.6102 .

Gautam, P. (2019). A bibliometric approach for department-level disciplinary analysis and science mapping of research output using multiple classification schemes. Journal of Contemporary Eastern Asia, 18 (1), 7–29. https://doi.org/10.17477/jcea.2019.18.1.007 .

Göztepe, K. (2012). Designing fuzzy rule based expert system for cyber security. International Journal of Information Security Science, 1 (1), 13–19.

Google Scholar  

Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA data mining software: An update. ACM SIGKDD Explorations Newsletter , 11 . Retrieved from https://dl.acm.org/citation.cfm?id=1656278 .

Hengstler, M., Enkel, E., & Duelli, S. (2016). Technological forecasting & social change applied artificial intelligence and trust—The case of autonomous vehicles and medical assistance devices. Technological Forecasting and Social Change, 105, 105–120. https://doi.org/10.1016/j.techfore.2015.12.014 .

Holmberg, K., & Park, H. W. (2018). An altmetric investigation of the online visibility of South Korea-based scientific journals. Scientometrics, 117 (1), 603–613.

Imran, M., Castillo, C., Lucas, J., Meier, P., & Vieweg, S. (2014). Aidr. In Proceedings of the 23rd international conference on world wide web — WWW’14 companion , (April) (pp. 159–162). https://doi.org/10.1145/2567948.2577034 .

Jan, N., & Ludo, V. E. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics . https://doi.org/10.1007/s11192-009-0146-3 .

Jha, S., & Topol, E. J. (2016). Adapting to artificial intelligence: Radiologists and pathologists as information specialists. JAMA Journal of the American Medical Association, 316 (22), 2353–2354. https://doi.org/10.1001/jama.2016.17438 .

Jin, Y., & Li, X. (2018). Visualizing the hotspots and emerging trends of multimedia big data through scientometrics. Multimedia Tools and Applications . https://doi.org/10.1007/s11042-018-6172-5 .

Kim, H. J., Jeong, Y. K., & Song, M. (2016). Content- and proximity-based author co-citation analysis using citation sentences. Journal of Informetrics, 10 (4), 954–966. https://doi.org/10.1016/j.joi.2016.07.007 .

Li, S., & Sun, Y. (2013). The application of weighted co‐occurring keywords time gram in academic research temporal sequence discovery. Proceedings of the American Society for Information Science and Technology , 50 (1), 1–10. https://doi.org/10.1002/meet.14505001037 .

Article   MathSciNet   Google Scholar  

Li, J., Xu, W. W., Wang, F., Chen, S., & Sun, J. (2018). Examining China’s internet policies through a bibliometric approach. Journal of Contemporary Eastern Asia, 17 (2), 237–253. https://doi.org/10.17477/jcea.2018.17.2.237 .

Litman, T. (2014). Autonomous vehicle implementation predictions implications for transport planning. Transportation Research Board Annual Meeting, 42 (January), 36–42. https://doi.org/10.1613/jair.301 .

Liu, S., Chen, C., Ding, K., Wang, B., Xu, K., & Lin, Y. (2014). Literature retrieval based on citation context. Scientometrics, 101 (2), 1293–1307. https://doi.org/10.1007/s11192-014-1233-7 .

Loebbecke, C., & Picot, A. (2015). Reflections on societal and business model transformation arising from digitization and big data analytics: A research agenda. Journal of Strategic Information Systems, 24 (3), 149–157. https://doi.org/10.1016/j.jsis.2015.08.002 .

Machine, P., & Tools, L. (n.d.). Datamining. Practical machine learning tools and technicals with java implementations.

Malav, A., Kadam, K., & Kamat, P. (2017). Prediction of heart disease using K-means and artificial neural network as hybrid approach to improve accuracy. International Journal of Engineering and Technology, 9 (4), 3081–3085. https://doi.org/10.21817/ijet/2017/v9i4/170904101 .

Ofli, F., Meier, P., Imran, M., Castillo, C., Tuia, D., Rey, N., et al. (2016). Combining human computing and machine learning to make sense of big (aerial) data for disaster response. Big Data, 4 (1), 47–59. https://doi.org/10.1089/big.2014.0064 .

Omar, M., Mehmood, A., Choi, G. S., & Park, H. W. (2017). Global mapping of artificial intelligence in Google and Google Scholar. Scientometrics, 113 (3), 1269–1305. https://doi.org/10.1007/s11192-017-2534-4 .

Pak Chung, W., Chen, C., Gorg, C., Shneiderman, B., Stasko, J., & Thomas, J. (2011). Graph analytics-lessons learned and challenges ahead. IEEE Computer Graphics and Applications, 31 (5), 18–29. https://doi.org/10.1109/MCG.2011.72 .

Pannu, A. (2015). Artificial intelligence and its application in different areas. Certified International Journal of Engineering and Innovative Technology, 4 (10), 79–84. https://doi.org/10.1155/2009/251652 .

Park, H. J., & Park, H. W. (2018). Two-side face of knowledge building using scientometric analysis. Quality & Quantity, 52 (6), 2815–2836.

Park, H. C., Youn, J. M., & Park, H. W. (2018). Global mapping of scientific information exchange using altmetric data. Quality & Quantity, 53 (2), 935–955.

Parkes, D. C., & Wellman, M. P. (2015). Economic reasoning and artificial intelligence. Science, 349 (6245), 267–272. https://doi.org/10.1126/science.aaa8403 .

Article   MathSciNet   MATH   Google Scholar  

Ramchurn, S. D., Huynh, T. D., Wu, F., Ikuno, Y., Flann, J., Moreau, L., et al. (2016). A disaster response system based on human-agent collectives. Journal of Artificial Intelligence Research, 57, 661–708. https://doi.org/10.1613/jair.5098 .

Saridakis, G., Benson, V., Ezingeard, J., & Tennakoon, H. (2015). Technological forecasting & social change individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change . https://doi.org/10.1016/j.techfore.2015.08.012 .

Small, H., & Greenlee, E. (1980). Citation context analysis of a co-citation cluster: Recombinant-DNA. Scientometrics, 2 (4), 277–301. https://doi.org/10.1007/BF02016349 .

Su, H. N., & Lee, P. C. (2010). Mapping knowledge structure by keyword co-occurrence: A first look at journal papers in Technology Foresight. Scientometrics, 85 (1), 65–79. https://doi.org/10.1007/s11192-010-0259-8 .

Wang, F. Y., Zheng, N. N., Cao, D., Martinez, C. M., Li, L., & Liu, T. (2017). Parallel driving in CPSS: A unified approach for transport automation and vehicle intelligence. IEEE/CAA Journal of Automatica Sinica, 4 (4), 577–587. https://doi.org/10.1109/JAS.2017.7510598 .

Zhou, Z. H., & Jiang, Y. (2003). Medical diagnosis with C4.5 Rule preceded by artificial neural network ensemble. IEEE Transactions on Information Technology in Biomedicine, 7 (1), 37–42. https://doi.org/10.1109/TITB.2003.808498 .

Download references

Acknowledgements

I wish to acknowledge someone who means a lot to me, my father (Mr. Irshad Hussain), for showing faith in me and giving me the liberty to make my own choices. I salute you for the selfless love, care, pain and sacrifice you offered to me in order to shape my life.

Author information

Authors and affiliations.

Department of Computer Science and IT, The Islamia University of Bahawalpur, Bahawalpur, Pakistan

Naveed Naeem Abbas, Syed Habib Ullah Shah & Muhammad Omar

H/No. 39-A, Jamal-E-Sarwar Colony, Chowk Churratah, Dera Ghazi Khan, Pakistan

Naveed Naeem Abbas

Department of Computer Science, COMSATS University, Islamabad, Pakistan

Tanveer Ahmed

H/No. 2147, Block 18, College Chowk, Dera Ghazi Khan, Pakistan

Syed Habib Ullah Shah

Department of Media and Communication, Interdisciplinary Program of Digital Convergence Business, YeungNam University, 214-1, Dae-dong, Gyeongsan-si, Gyeongsangbuk-do, 712-749, South Korea

Han Woo Park

You can also search for this author in PubMed   Google Scholar

Corresponding authors

Correspondence to Muhammad Omar or Han Woo Park .

Rights and permissions

Reprints and permissions

About this article

Abbas, N.N., Ahmed, T., Shah, S.H.U. et al. Investigating the applications of artificial intelligence in cyber security. Scientometrics 121 , 1189–1211 (2019). https://doi.org/10.1007/s11192-019-03222-9

Download citation

Received : 16 June 2019

Published : 09 September 2019

Issue Date : November 2019

DOI : https://doi.org/10.1007/s11192-019-03222-9

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Artificial intelligence
  • Cyber security
  • Scientometric
  • Visualization
  • Emerging trend
  • Research hotspot
  • Find a journal
  • Publish with us
  • Track your research
  • Choose your language...
  • English (English)
  • Spanish (Español)
  • French (Français)
  • German (Deutsch)
  • Italian (Italiano)
  • Portuguese (Português)
  • Japanese (日本語)
  • Chinese (中文)
  • Korean (한국어)
  • Taiwan (繁體中文)
  • Organization Size
  • Hybrid Cloud
  • Zero Trust & Least Privilege
  • Developer Security & Operations
  • IoT Security Solutions
  • Anti-Ransomware

...

See how use cases come to life through Check Point's customer stories.

  • Financial Services
  • Federal Government
  • State & Local Government
  • Telco Service Provider
  • Small & Medium Business
  • Infinity Platform
  • Secure the Network
  • Secure the Cloud
  • Secure the Workspace
  • Security Operations and AI
  • Platform Overview
  • Infinity Core Services
  • Infinity Portal Access Infinity Portal
  • Infinity Platform Agreement Predictable cyber-security environments through a platform agreement

...

AI-Powered Threat Prevention

  • Next Generation Firewall (NGFW) Security Gateway Industry-leading AI powered security gateways for modern enterprises
  • SD-WAN Software Defined Wide Area networks converging security with networking
  • Security Policy and Threat Management Manage firewall and security policy on a unified platform for on-premises and cloud networks
  • Operational Technology and Internet of Things (IoT) Autonomous IoT/OT threat prevention with zero-trust profiling, virtual patching and segmentation
  • Remote Access VPN Secure, seamless remote access to corporate networks
  • Cloud Network Security Industry-leading threat prevention through cloud-native firewalls
  • Cloud Native Application Protection Platform Cloud native prevention first security
  • Code Security Developer centric code security
  • Web Application and API Security Automated application and API security
  • Email and Collaboration Security Email security including office & collaboration apps
  • Endpoint Security Comprehensive endpoint protection to prevent attacks & data compromise
  • Mobile Security Complete protection for the mobile workforce across all mobile devices
  • SASE Unifying security with optimized internet and network connectivity
  • Managed Prevention & Response Service SOC operations as a service with Infinty MDR/MPR
  • Extended Prevention & Response AI-Powered, Cloud-Delivered Security Operations with Infinity XDR/XPR
  • Secure Automation and Collaboration Automate response playbooks with Infinity Playblocks
  • Unified Security Events and Logs as a Service Infinity Events cloud-based analysis, monitoring and reporting
  • AI Powered Teammate Automated Security Admin & Incident Response with AI Copilot
  • ThreatCloud AI The Brain behind Check Point’s threat prevention
  • Cyber Security Risk Assessment Assess cyber security maturity and plan actionable goals
  • Penetration Testing Evaluate security defenses against potential cyber attacks and threats
  • Security Controls Gap Analysis (NIST CIST) Analyze technology gaps and plan solutions for improved security and ROI
  • Threat Intelligence Analyzed data on cyber threats, aiding proactive security measures
  • See All Infinity Global Services >

...

Learn hackers inside secrets and beat them at their own game

  • Security Deployment & Optimization Strategic deployment and refinement of security for optimal protection
  • Advanced Technical Account Management Proactive service delivered by highly skilled Cyber Security professionals
  • Lifecycle Management Services Effectively maintain the lifecycle of security products and services
  • Certifications & Accreditations Comprehensive cyber security training and certification programs
  • CISO Training Globally recognized training for Chief Information Security Officers
  • Security Awareness Empower employees with cyber security skills for work and home
  • Cyber Range Simulated gamification environment for security training
  • Mind Check Point Cyber Security and Awareness Programs training hub
  • Incident Response Manage and mitigate security incidents with systematic response services
  • Managed Detection and Response Prioritize prevention, delivering comprehensive SOC operations as a service
  • Digital Forensics Comprehensive investigation and analysis of cyber incidents and attacks
  • MXDR with Managed SIEM
  • Managed Firewalls
  • EDR with Agent Management
  • Managed CNAPP
  • Managed CSPM
  • Support Programs Programs designed to help maximize security technology utilization
  • Check Point PRO Proactive monitoring of infrastructure program offerings
  • Contact Support
  • Infinity Portal
  • Infinity Platform Agreement
  • Next Generation Firewall (NGFW) Security Gateway
  • Security Policy and Threat Management
  • Operational Technology and Internet of Things (IoT)
  • Remote Access VPN
  • Cloud Network Security
  • Cloud Native Application Protection Platform
  • Code Security
  • Web Application and API Security
  • Email and Collaboration Security
  • Endpoint Security
  • Mobile Security
  • Managed Prevention & Response Service
  • Extended Prevention & Response
  • Secure Automation and Collaboration
  • Unified Security Events and Logs as a Service
  • AI Powered Teammate
  • ThreatCloud AI
  • Cyber Security Risk Assessment
  • Penetration Testing
  • Security Controls Gap Analysis (NIST CIST)
  • Threat Intelligence
  • Security Deployment & Optimization
  • Advanced Technical Account Management
  • Lifecycle Management Services
  • Certifications & Accreditations
  • CISO Training
  • Security Awareness
  • Cyber Range
  • Incident Response
  • Managed Detection and Response
  • Digital Forensics
  • Support Programs
  • Check Point PRO
  • Find a Partner
  • Channel Partners
  • Technology Partners
  • MSSP Partners
  • Azure Cloud
  • Partner Portal

...

Check Point is 100% Channel. Grow Your Business with Us!

  • Investor Relations
  • Resource Center
  • Customer Stories
  • Events & Webinars
  • Check Point Research
  • Cyber Talk for Executives
  • CheckMates Community

...

Unlock the Power of GenAI with Check Point Software Technologies

author image

The GenAI Revolution is Already Here

Generative AI applications like ChatGPT and Gemini are here to stay. But as they make users’ lives much simpler, they also make your organization’s life much harder.

While some organizations have outright banned GenAI applications, according to a Check Point and Vason Bourne study , 92% of organizations allow their employees to use GenAI tools yet are concerned about security and data leakage. In fact, one estimate says 55% of data leakage events are a direct result of GenAI usage.

As tasks like debugging code and refining text can now be completed in a fraction of the time, without the right tools, these very same tasks can put your business data and compliance at risk.

C onventional Tools Fail to address GenAI Risks

Conventional data protection solutions are not designed to detect and prevent data leakage in generative AI applications, as they rely on static predefined keywords and patterns. They fail to understand the context of unstructured data typical of GenAI prompts, which are inherently conversational.

In fact, to address GenAI risks , you need a GenAI-based solution.

Check Point lets you Adopt Generative AI Safely

Available as part of our Preview Program , Check Point’s GenAI security solution installs in minutes to discover the GenAI services used in your organization, assess their risk, and apply groundbreaking AI-powered data protection so you can adopt the latest services without the added risk.

The solution applies Check Point’s transformative AI-powered data analysis to accurately classify conversational data and intent within prompts. Our groundbreaking classification technology understands data context to deliver precision visibility and control, while avoiding the need to define cumbersome data-types.

For example, using its GenAI-powered DLP the solution can distinguish between low-risk, personal content like the acquisition of new running shoes, and high-risk content like the potential acquisition of a company.

research paper on artificial intelligence in cyber security

Figure 1: GenAI-based Data Classification in a Next Gen DLP

“Generative AI is boosting enterprise productivity by providing AI assistance in marketing, data analysis and even code development. Unfortunately, employees are exposing enterprises to cyber risk through data loss and intellectual property theft by including confidential information in GenAI apps. CISOs are looking for ways to securely manage the use of GenAI applications across the enterprise”, said Frank Dickson, Group Vice President, Security & Trust, IDC . “Through AI and automation, Check Point’s new GenAI security capabilities enable enterprises to safely adopt generative AI tools by discovering how GenAI apps are being used, analyze the data being shared, apply a security policy that prevents data loss in real time, and enable visibility and reporting for compliance.”

These new capabilities deliver immediate value, empowering organizations to:

#1 Discover and Assess GenAI Usage across your Enterprise  

Check Point’s GenAI security solution lets you uncover both sanctioned and shadow GenAI apps, and provides AI-based visibility into top GenAI use cases, such as coding and marketing, so you can make informed GenAI governance decisions. It also uncovers sources of data copied/pasted into prompts and provides a risk score to prioritize mitigation.

#2 Prevent Data Loss in Real-Time and Address Privacy Concerns  

The solution lets you enforce customizable policies to prevent data leakage. It even lets you enforce copy/paste restrictions to prevent the siphoning of data in source code repositories, CRM tools, corporate email and other sensitive applications.

# 3 Meet Regulations with Enterprise-grade Visibility  

Check Point’s new GenAI security solution delivers granular monitoring and visibility to facilitate regulatory compliance. It provides visibility into risky user prompts and high-risk AI applications (based on app-specific threat intelligence), and even specifies why a prompt was flagged as hazardous with a detailed description.

How Check Point’s Solution is Different

Unlike other solutions, Check Point lets you:

  • Get started in minutes, requiring only a simple browser extension to discover GenAI applications and start creating policies.
  • Uncover your top GenAI use cases with innovative AI-based intent discovery, e.g. coding, marketing and email drafting, so you can make informed GenAI governance decisions.
  • Leverage GenAI-powered data classification to accurately identify and block sensitive data in AI prompts.

Enhancing your Security with Yet Another Layer of AI 

With our latest offering, Check Point is enhancing enterprise security yet again by harnessing the power of AI, adding to AI Copilot which serves as a personal GenAI security assistant, AI Cloud Protect for protecting AI development in the cloud, and ThreatCloud AI for zero-day threat prevention.

GenAI is here to stay. Check Point is here to make it safe.

To learn more, visit: https://checkpoint.com/solutions/genai-security or check out these resources:

  • Solution Brief
  • Book a demo
  • Join the Preview Program
  • Join the CheckMates webinar

You may also like

research paper on artificial intelligence in cyber security

AI Market Research: The Pivotal Role of Generative AI in Cyber Security

research paper on artificial intelligence in cyber security

AI and Automation in the Race to Reduce Attack Dwell Time

research paper on artificial intelligence in cyber security

AI for Risk Discovery: 10 Ways to Make it Work For You

research paper on artificial intelligence in cyber security

Top GenAI Threats – and why Zero Trust AI Access is the Future

Big Data, Artificial Intelligence, and Financial Economics

The proliferation of large unstructured datasets along with advances in artificial intelligence (AI) technology provides researchers in financial economics with new opportunities for data analysis, and it also changes the set of subjects these researchers are studying. As AI becomes increasingly important in making decisions using financial market data, it becomes crucial to study how AI interacts with both data resources and with human decisionmakers. 

To promote research on emerging issues related to the methodology, applications, and socioeconomic implications of the growing availability of large datasets and AI tools, the National Bureau of Economic Research (NBER), with the generous support of the Office of Financial Research (OFR) and in collaboration with the Review of Financial Studies (RFS) , will convene a research conference on December 13, 2024. The program will be organized by RFS  Executive Editor Tarun Ramadorai of Imperial College London, and NBER Research Associates Itay Goldstein of the University of Pennsylvania, Chester Spatt of Carnegie Mellon University, and Mao Ye of Cornell University.

The organizers will consider submissions on topics including, but not limited to: 

 •  Unstructured Data Analysis and AI: The impact on financial markets of the growing use of AI technology to analyze unstructured data, such as text, images, audio, and video.

 •  Trading and AI: The impact of using AI in high-frequency trading, algorithmic trading, and the impacts of this use on financial markets.

 •  Big Data and AI in Investment: The rise of machines in asset management, particularly the growing analysis of high-dimensional datasets using machine learning techniques.

 •  Big Data and AI in Corporate Decisions: The impact of AI as well as other means of analyzing unstructured datasets and automating decision-making on corporate decisions, such as capital budgeting, working capital management, and regulatory compliance and reporting.

 •  Financial Institutions and Financial Intermediation: The impact of AI, fintech, and the analysis of large datasets on traditional financial institutions.

 •  AI and Regulation: The role of AI in detecting improper market conduct, the regulation of algorithms and winner-take-all markets, and strategies for ensuring accountability, fairness and transparency in AI models.

The organizers welcome submissions of both empirical and theoretical research papers and encourage submissions from scholars who are early in their careers, who are not NBER affiliates, and who are from under-represented groups in the financial economics profession.  Papers that are submitted for presentation at the conference may also be submitted to the RFS  under its dual review system at no extra cost. Papers that are rejected at any stage of this process are not considered to have been “rejected” at the RFS .  Authors may submit a future version of the same paper to the RFS , even if the paper is not selected for presentation at the conference. For a paper to be considered under the dual submission option, it may not be under review or invited revision at any journal, including the RFS, until the author has been notified of the outcome of the dual submission process. The details of the dual submission program may be found at http://sfs.org/dualsubmissionpolicy/. To be considered for inclusion on the program, papers must be uploaded by 11:59 pm EDT on Thursday, September 12, 2024 to one of the following sites:

For submissions to both the conference and the Review of Financial Studies

For submissions to the conference alone  

Please do not submit papers that have been accepted for publication or that will be published before the conference. Authors chosen to present papers will be notified in October, 2024. All presenters are expected to attend the meeting in person. The NBER will cover the travel and lodging cost of up to two presenters per paper. 

Questions about this conference may be addressed to  [email protected] .

Research on enterprise data asset management and disaster recovery backup

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, index terms.

Applied computing

Enterprise computing

Enterprise data management

Recommendations

Master data management & enterprise engineering, modern enterprise business intelligence and data management: a roadmap for it directors, managers, and architects, bp's multi-enterprise asset management system.

BP is one of the largest energy companies in the world with 2003 revenues of $233 billion. In this paper, we analyse its use of an innovative 'multi-enterprise asset management system' that supports and enables the asset management strategy of BP's ...

Information

Published in.

cover image ACM Other conferences

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates.

  • Research-article
  • Refereed limited

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 1 Total Downloads
  • Downloads (Last 12 months) 1
  • Downloads (Last 6 weeks) 1

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

HTML Format

View this article in HTML Format.

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Mobile Menu Overlay

The White House 1600 Pennsylvania Ave NW Washington, DC 20500

FACT SHEET: Biden- ⁠ Harris Administration Announces New AI Actions and Receives Additional Major Voluntary Commitment on   AI

Nine months ago, President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI). This Executive Order built on the voluntary commitments he and Vice President Harris received from 15 leading U.S. AI companies last year. Today, the administration announced that Apple has signed onto the voluntary commitments, further cementing these commitments as cornerstones of responsible AI innovation. In addition, federal agencies reported that they completed all of the 270-day actions in the Executive Order on schedule, following their on-time completion of every other task required to date . Agencies also progressed on other work directed for longer timeframes. Following the Executive Order and a series of calls to action made by Vice President Harris as part of her major policy speech before the Global Summit on AI Safety, agencies all across government have acted boldly. They have taken steps to mitigate AI’s safety and security risks, protect Americans’ privacy, advance equity and civil rights, stand up for consumers and workers, promote innovation and competition, advance American leadership around the world, and more. Actions that agencies reported today as complete include the following: Managing Risks to Safety and Security: Over 270 days, the Executive Order directed agencies to take sweeping action to address AI’s safety and security risks, including by releasing vital safety guidance and building capacity to test and evaluate AI. To protect safety and security, agencies have:

  • Released for public comment new technical guidelines from the AI Safety Institute (AISI) for leading AI developers in managing the evaluation of misuse of dual-use foundation models. AISI’s guidelines detail how leading AI developers can help prevent increasingly capable AI systems from being misused to harm individuals, public safety, and national security, as well as how developers can increase transparency about their products.
  • Published final frameworks on managing generative AI risks and securely developing generative AI systems and dual-use foundation models. These documents by the National Institute of Standards and Technology (NIST) will provide additional guidance that builds on NIST’s AI Risk Management Framework, which offered individuals, organizations, and society a framework to manage AI risks and has been widely adopted both in the U.S. and globally. NIST also submitted a report to the White House outlining tools and techniques to reduce the risks from synthetic content.
  • Developed and expanded AI testbeds and model evaluation tools at the Department of Energy (DOE). DOE, in coordination with interagency partners, is using its testbeds to evaluate AI model safety and security, especially for risks that AI models might pose to critical infrastructure, energy security, and national security. DOE’s testbeds are also being used to explore novel AI hardware and software systems, including privacy-enhancing technologies that improve AI trustworthiness. The National Science Foundation (NSF) also launched an initiative to help fund researchers outside the federal government design and plan AI-ready testbeds.
  • Reported results of piloting AI to protect vital government software.  The Department of Defense (DoD) and Department of Homeland Security (DHS) reported findings from their AI pilots to address vulnerabilities in government networks used, respectively, for national security purposes and for civilian government. These steps build on previous work to advance such pilots within 180 days of the Executive Order.
  • Issued a call to action from the Gender Policy Council and Office of Science and Technology Policy to combat image-based sexual abuse, including synthetic content generated by AI. Image-based sexual abuse has emerged as one of the fastest growing harmful uses of AI to-date, and the call to action invites technology companies and other industry stakeholders to curb it. This call flowed from Vice President Harris’s remarks in London before the AI Safety Summit, which underscored that deepfake image-based sexual abuse is an urgent threat that demands global action.

Bringing AI Talent into Government Last year, the Executive Order launched a government-wide AI Talent Surge that is bringing hundreds of AI and AI-enabling professionals into government. Hired individuals are working on critical AI missions, such as informing efforts to use AI for permitting, advising on AI investments across the federal government, and writing policy for the use of AI in government.

  • To increase AI capacity across the federal government for both national security and non-national security missions, the AI Talent Surge has made over 200 hires to-date, including through the Presidential Innovation Fellows AI cohort and the DHS AI Corps .
  • Building on the AI Talent Surge 6-month report , the White House Office of Science and Technology Policy announced new commitments from across the technology ecosystem, including nearly $100 million in funding, to bolster the broader public interest technology ecosystem and build infrastructure for bringing technologists into government service.

Advancing Responsible AI Innovation President Biden’s Executive Order directed further actions to seize AI’s promise and deepen the U.S. lead in AI innovation while ensuring AI’s responsible development and use across our economy and society. Within 270 days, agencies have:

  • Prepared and will soon release a report on the potential benefits, risks, and implications of dual-use foundation models for which the model weights are widely available, including related policy recommendations. The Department of Commerce’s report draws on extensive outreach to experts and stakeholders, including hundreds of public comments submitted on this topic.
  • Awarded over 80 research teams’ access to computational and other AI resources through the National AI Research Resource (NAIRR) pilot —a national infrastructure led by NSF, in partnership with DOE, NIH, and other governmental and nongovernmental partners, that makes available resources to support the nation’s AI research and education community. Supported projects will tackle deepfake detection, advance AI safety, enable next-generation medical diagnoses and further other critical AI priorities.
  • Released a guide for designing safe, secure, and trustworthy AI tools for use in education. The Department of Education’s guide discusses how developers of educational technologies can design AI that benefits students and teachers while advancing equity, civil rights, trust, and transparency. This work builds on the Department’s 2023 report outlining recommendations for the use of AI in teaching and learning.
  • Published guidance on evaluating the eligibility of patent claims involving inventions related to AI technology,  as well as other emerging technologies. The guidance by the U.S. Patent and Trademark Office will guide those inventing in the AI space to protect their AI inventions and assist patent examiners reviewing applications for patents on AI inventions.
  • Issued a report on federal research and development (R&D) to advance trustworthy AI over the past four years. The report by the National Science and Technology Council examines an annual federal AI R&D budget of nearly $3 billion.
  • Launched a $23 million initiative to promote the use of privacy-enhancing technologies to solve real-world problems, including related to AI.  Working with industry and agency partners, NSF will invest through its new Privacy-preserving Data Sharing in Practice program in efforts to apply, mature, and scale privacy-enhancing technologies for specific use cases and establish testbeds to accelerate their adoption.
  • Announced millions of dollars in further investments to advance responsible AI development and use throughout our society. These include $30 million invested through NSF’s Experiential Learning in Emerging and Novel Technologies program—which supports inclusive experiential learning in fields like AI—and $10 million through NSF’s ExpandAI program, which helps build capacity in AI research at minority-serving institutions while fostering the development of a diverse, AI-ready workforce.

Advancing U.S. Leadership Abroad President Biden’s Executive Order emphasized that the United States lead global efforts to unlock AI’s potential and meet its challenges. To advance U.S. leadership on AI, agencies have:

  • Issued a comprehensive plan for U.S. engagement on global AI standards.  The plan, developed by the NIST, incorporates broad public and private-sector input, identifies objectives and priority areas for AI standards work, and lays out actions for U.S. stakeholders including U.S. agencies. NIST and others agencies will report on priority actions in 180 days. 
  • Developed guidance for managing risks to human rights posed by AI. The Department of State’s “Risk Management Profile for AI and Human Rights”—developed in close coordination with NIST and the U.S. Agency for International Development—recommends actions based on the NIST AI Risk Management Framework to governments, the private sector, and civil society worldwide, to identify and manage risks to human rights arising from the design, development, deployment, and use of AI. 
  • Launched a global network of AI Safety Institutes and other government-backed scientific offices to advance AI safety at a technical level. This network will accelerate critical information exchange and drive toward common or compatible safety evaluations and policies.
  • Launched a landmark United Nations General Assembly resolution . The unanimously adopted resolution, with more than 100 co-sponsors, lays out a common vision for countries around the world to promote the safe and secure use of AI to address global challenges.
  • Expanded global support for the U.S.-led Political Declaration on the Responsible Military Use of Artificial Intelligence and Autonomy.   Fifty-five nations now endorse the political declaration, which outlines a set of norms for the responsible development, deployment, and use of military AI capabilities.

The Table below summarizes many of the activities that federal agencies have completed in response to the Executive Order:

research paper on artificial intelligence in cyber security

Stay Connected

We'll be in touch with the latest information on how President Biden and his administration are working for the American people, as well as ways you can get involved and help our country build back better.

Opt in to send and receive text messages from President Biden.

IMAGES

  1. (PDF) The Role of Artificial Intelligence in Cyber Security

    research paper on artificial intelligence in cyber security

  2. Artificial Intelligence in Cyber Security Research Paper Writing

    research paper on artificial intelligence in cyber security

  3. (PDF) Practical Implementation of Artificial Intelligence in

    research paper on artificial intelligence in cyber security

  4. (PDF) Artificial Intelligence for Cybersecurity: Literature Review and

    research paper on artificial intelligence in cyber security

  5. (PDF) An overview of the applications of Artificial Intelligence in

    research paper on artificial intelligence in cyber security

  6. (PDF) Artificial Intelligence in Cyber Security

    research paper on artificial intelligence in cyber security

VIDEO

  1. Unleashing the Power of AI in Cybersecurity

  2. Defense Microelectronics Modernization Challenges and Opportunities

  3. Cybersecurity Responsibility

COMMENTS

  1. Artificial intelligence for cybersecurity: Literature review and future

    Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate repetitive tasks, accelerate threat detection and response, and improve the accuracy of their actions to strengthen the security posture against various security issues and cyberattacks. ... The article is a full research paper (i.e., not a ...

  2. (PDF) Artificial Intelligence in Cyber Security

    1. Artificial Intelligence in Cyber Security. Rammanohar Das and Raghav Sandhane*. Symbiosis Centre for Information Technology, Symbiosis International (Deemed. University), Pune, Maharashtra ...

  3. Artificial intelligence (AI) cybersecurity dimensions: a comprehensive

    As Artificial Intelligence (AI) rapidly advances and integrates into various domains, cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI technologies. This paper explores the multifaceted dimensions of AI-driven cyberattacks, offering insights into their implications, mitigation strategies, underlying motivations, and profound societal impacts. The ...

  4. (PDF) Enhancing cybersecurity: The power of artificial intelligence in

    This paper presents a systematic literature research to identify publications of artificial intelligence-based cyber-attacks and to analyze them for deriving cyber security measures.

  5. (PDF) Artificial Intelligence for Cybersecurity: Literature Review and

    The term cybersecurity refers to a set of technologies, processes and. practices to protect and defend networks, devices, software and data. from attack, damage or unauthorized access [1 ...

  6. Artificial intelligence in cyber security: research advances ...

    In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic ...

  7. AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling

    Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or unauthorized access. To intelligently solve today's various cybersecurity issues, popular AI techniques involving machine learning and deep learning methods, the concept of ...

  8. Artificial Intelligence in Cybersecurity

    Artificial Intelligence (AI) and cybersecurity interact in complex ways, with AI potentially significantly enhancing cybersecurity protocols. With a balanced understanding of AI's role in cybersecurity, its historical development, and practical manifestations, actionable recommendations can be formulated to effectively harness AI in a business environment. Throughout history, AI has often been ...

  9. Artificial intelligence in cyber security: research advances

    AbstractIn recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between ...

  10. Artificial Intelligence for Cyber Security Goals

    This paper aims at the interconnection between cyber security and artificial intelligence systems. In modern parlance, artificial intelligence systems are machine learning systems, the interpretation sometimes narrowed further to artificial neural networks. While machine learning increasingly penetrates into various spheres of information technology application, its intersection with cyber ...

  11. Full article: Current trends in AI and ML for cybersecurity: A state-of

    In recent years, many cybersecurity research papers have incorporated AI and ML (Santhosh Kumar et al., Citation 2023). Promising applications of AI and ML in cybersecurity include intrusion detection and response. ... Nachaat Mohamed As a vanguard in the cyber security and artificial intelligence domains, Dr. Nachaat has solidified his stature ...

  12. A Survey of Artificial Intelligence in Cybersecurity

    In this paper, we review the impact of AI in cybersecurity and summarize existing research in terms of benefits of AI in cybersecurity. Published in: 2020 International Conference on Computational Science and Computational Intelligence (CSCI) Date of Conference: 16-18 December 2020. Date Added to IEEE Xplore: 23 June 2021.

  13. The impact of artificial intelligence on organisational cyber security

    The aim of this research paper was to conduct a systematic literature review (SLR) to assess the impact of AI-based technologies on organisational cyber security and determine their effectiveness compared to traditional cyber security approaches. ... Artificial intelligence-based cyber security in the context of industry 4.0—a survey ...

  14. Artificial Intelligence in Cyber Security by Md Fazley Rafy

    This paper provides a comprehensive overview of AI utilization in cybersecurity, exploring its benefits, challenges, and potential negative impacts. In addition to that, it explores AI-based models that enhance or compromise security across various infrastructures and cyber networks. The paper critically examines the role of AI in developing ...

  15. Cyber security: State of the art, challenges and future directions

    Abstract. Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every individual and organization faces continually shifting cyber threats.

  16. (PDF) Artificial Intelligence in Cyber Security

    of processes, technologies, an d controls designed to p rotect. systems, networks, and data from cyber threats [1]. In such. a case, safeguarding means keeping cyber risks at a tolerable. level ...

  17. The Emerging Threat of Ai-driven Cyber Attacks: A Review

    Hence, this study investigates the emerging threat of AI-driven attacks and reviews the negative impacts of this sophisticated cyber weaponry in cyberspace. The paper is divided into five parts. The mechanism for offering the review process is presented in the next section. Section 3 contains the results.

  18. PDF Artificial intelligence in cyber security: research advances ...

    Articial intelligence in cyber security: research advances,… 1039. 1 3. Figure 3 shows a model that summarizes most of the research ideas in the eld of cyber security. This model deals with security issues through four steps, including data selection and acquisition, data feature extraction, model construction, and specic applications.

  19. Artificial Intelligence in CyberSecurity

    Submission Deadline: 30 July 2019. IEEE Access invites manuscript submissions in the area of Artificial Intelligence in CyberSecurity. Recent studies show that Artificial Intelligence (AI) has resulted in advances in many scientific and technological fields, i.e., AI-based medicine, AI-based transportation, and AI-based finance.

  20. CISA, DARPA officials see cyber advantages among the risks posed by

    LAS VEGAS. Senior officials from the Cybersecurity and Infrastructure Security Agency and the Pentagon's advanced research agency discussed the beneficial roles artificial intelligence can play for securing data and systems, as well as concerns over a "rush to market" with AI products that haven't been fully vetted for security weaknesses, in presentations at the AI Summit at

  21. Explainable Artificial Intelligence Applications in Cyber Security

    Although there are papers reviewing Artificial Intelligence applications in cyber security areas and the vast literature on applying XAI in many fields including healthcare, financial services, and criminal justice, the surprising fact is that there are currently no survey research articles that concentrate on XAI applications in cyber security.

  22. Cyber Fire 2025 Cybersecurity Science Research Program (CSRP)

    Contribute to the scholarly discourse through the publication of research papers or the presentation of findings via posters. LA-UR-23-30455 ... Cyber security mindset that spans hardware, software, and/or distributed systems ... Artificial Intelligence/Machine Learning Assurance & Security. Artificial Intelligence is playing an increasingly ...

  23. The Role of Artificial Intelligence in Cyber Security

    The Role of Artificial Intelligence in Cyber Security. January 2019. DOI: 10.4018/978-1-5225-8241-.ch009. In book: Countering Cyber Attacks and Preserving the Integrity and Availability of ...

  24. Tackling the deepfake problem

    By Jason Crawforth, CEO and founder of Swear. In an era of rapidly advancing artificial intelligence, the ability to create hyperrealistic counterfeit videos, audio, and images, known as deepfakes, poses a significant threat to our society.

  25. Investigating the applications of artificial intelligence in cyber security

    Artificial Intelligence (AI) provides instant insights to pierce through the noise of thousands of daily security alerts. The recent literature focuses on AI's application to cyber security but lacks visual analysis of AI applications. Structural changes have been observed in cyber security since the emergence of AI. This study promotes the development of theory about AI in cyber security ...

  26. Unlock the Power of GenAI with Check Point Software Technologies

    Enhancing your Security with Yet Another Layer of AI With our latest offering, Check Point is enhancing enterprise security yet again by harnessing the power of AI, adding to AI Copilot which serves as a personal GenAI security assistant, AI Cloud Protect for protecting AI development in the cloud, and ThreatCloud AI for zero-day threat prevention.

  27. Big Data, Artificial Intelligence, and Financial Economics

    The proliferation of large unstructured datasets along with advances in artificial intelligence (AI) technology provides researchers in financial economics with new opportunities for data analysis, and it also changes the set of subjects these researchers are studying. ... To promote research on emerging issues related to the methodology ...

  28. Research on enterprise data asset management and disaster recovery

    Based on this, this paper designs the data center architecture and data disaster recovery management architecture for enterprise data management, puts forward corresponding schemes from three aspects: data center construction, data asset classification management and data asset disaster recovery backup, and finally puts forward thoughts and ...

  29. Artificial Intelligence in Cyber Security

    In this paper we are going to discuss how Artificial Intelligence (AI) can be used to address cyber security issues and cyber-threats. Cyber security is a vast growing field since the last decade ...

  30. FACT SHEET: Biden-Harris Administration Announces New AI Actions and

    The Department of Defense (DoD) and Department of Homeland Security (DHS) reported findings from their AI pilots to address vulnerabilities in government networks used, respectively, for national ...