Published: Oct. 22, 2024
Language: Английский
Published: Oct. 22, 2024
Language: Английский
ICT Express, Journal Year: 2024, Volume and Issue: 10(4), P. 935 - 958
Published: May 21, 2024
Digital twins (DTs) are an emerging digitalization technology with a huge impact on today's innovations in both industry and research. DTs can significantly enhance our society quality of life through the virtualization real-world physical system, providing greater insights about their operations assets, as well enhancing resilience real-time monitoring proactive maintenance. also pose significant security risks, intellectual property is encoded more accessible, continued synchronization to counterparts. The rapid proliferation dynamism cyber threats digital environments motivate development automated intelligent solutions. Today's industrial transformation relies heavily artificial intelligence (AI), including machine learning (ML) data-driven technologies that allow machines perform tasks such self-monitoring, investigation, diagnosis, future prediction, decision-making intelligently. However, effectively employ AI-based models context cybersecurity, human-understandable explanations, trustworthiness, factors when making decisions scenarios. This article provides extensive study explainable AI (XAI) based cybersecurity modeling taxonomy XAI methods assist analysts professionals comprehending system functions, identifying potential anomalies, ultimately addressing them DT manner. We discuss how these play key role solving contemporary issues various applications. conclude this paper by crucial challenges avenues for further research, directions researchers might approach model future-generation field.
Language: Английский
Citations
24Internet of Things and Cyber-Physical Systems, Journal Year: 2025, Volume and Issue: unknown
Published: Feb. 1, 2025
Language: Английский
Citations
3Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)
Published: Feb. 7, 2025
Intrusion detection systems are essential for securing wireless sensor networks (WSNs) and Internet of Things (IoT) environments against various threats. This study presents a novel hybrid machine learning (ML) model that integrates KMeans-SMOTE (KMS) data balancing principal component analysis (PCA) dimensionality reduction, evaluated using the WSN-DS TON-IoT datasets. The employs classifiers such as Decision Tree Classifier, Random Forest Classifier (RFC), gradient boosting techniques like XGBoost (XGBC) to enhance accuracy efficiency. proposed (KMS + PCA RFC) approach achieves remarkable performance, with an 99.94% f1-score on dataset. For dataset, it 99.97% 99.97%, outperforming traditional SMOTE TomekLink Generative Adversarial Network-based techniques. addresses class imbalance high-dimensionality challenges, providing scalable robust intrusion detection. Complexity reveals reduces training prediction times, making suitable real-time applications.
Language: Английский
Citations
1International Journal of Religion, Journal Year: 2024, Volume and Issue: 5(10), P. 4766 - 4782
Published: July 26, 2024
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate repetitive tasks, accelerate threat detection and response, improve the accuracy of their actions to strengthen security posture against various issues cyberattacks. This objective focuses on analysing how AI-based cyber (CS) solutions performance in financial transactions banking sectors. It also aims identify latest advancements AI-driven CS) research enhance operational efficiency sector. article presents systematic literature review detailed analysis AI use cases for transactions. The resulted 800 studies, which 225 articles remain. paper will provide readers with comprehensive overview potential identifies future opportunities examining application areas, advanced methods, data representation, development new infrastructures successful adoption might increase systems’ by increasing defence approaches machine learning deep learning, fraud detection, this makes sure secure safe transaction. study make safer security. highlights vital role evaluation continuous adaptation AI. In near future, topic should focus more collaboration among AI, security, system developers better secured outcomes.
Language: Английский
Citations
5Energy Strategy Reviews, Journal Year: 2025, Volume and Issue: 58, P. 101654 - 101654
Published: Feb. 5, 2025
Language: Английский
Citations
0Advanced sciences and technologies for security applications, Journal Year: 2025, Volume and Issue: unknown, P. 261 - 270
Published: Jan. 1, 2025
Language: Английский
Citations
0Published: March 29, 2025
Artificial intelligence (AI) has emerged as a key force in cybersecurity, including increased threat detection, automated response, and predictive analytics. However, AI becomes more incorporated into cybersecurity systems, the ethical implications of its use must be carefully evaluated. Business analysts, who have historicsally served liaisons between business stakeholders technical teams, play an important role ensuring that systems are implemented ethically within standards. This review examined roles analysts AI-powered governance, with emphasis on assuring deployment, legal compliance, alignment company values. Existing credible journals materials were explored investigated. Findings revealed to deployment critical. These included recognizing any concerns connected creating plans reduce these risks, making sure rules standards followed. can also assist bringing solutions line corporate principles social norms by fostering stakeholder communication, which will advance accountability, transparency, justice.
Language: Английский
Citations
0Journal of Decision System, Journal Year: 2025, Volume and Issue: 34(1)
Published: Jan. 2, 2025
Language: Английский
Citations
0Published: March 29, 2025
Artificial intelligence (AI) has emerged as a key force in cybersecurity, including increased threat detection, automated response, and predictive analytics. However, AI becomes more incorporated into cybersecurity systems, the ethical implications of its use must be carefully evaluated. Business analysts, who have historicsally served liaisons between business stakeholders technical teams, play an important role ensuring that systems are implemented ethically within standards. This review examined roles analysts AI-powered governance, with emphasis on assuring deployment, legal compliance, alignment company values. Existing credible journals materials were explored investigated. Findings revealed to deployment critical. These included recognizing any concerns connected creating plans reduce these risks, making sure rules standards followed. can also assist bringing solutions line corporate principles social norms by fostering stakeholder communication, which will advance accountability, transparency, justice.
Language: Английский
Citations
0Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 229 - 262
Published: Feb. 14, 2025
Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.
Language: Английский
Citations
0