2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE),
Journal Year:
2023,
Volume and Issue:
unknown, P. 1 - 6
Published: Dec. 30, 2023
In
this
paper,
we
address
the
growing
concern
of
cyberattacks
due
to
low
awareness
among
computer
users.
Many
organizations
have
started
implementing
workshops
and
training
programs
educate
their
employees
users
about
cybersecurity.
However,
some
these
lack
sufficient
knowledge
fail
engage
participants
effectively.
To
overcome
limitations,
present
a
novel
system
called
CyberSafe,
developed
using
Unity
game
engine.
CyberSafe
comprises
multiple
levels
training,
each
focusing
on
an
important
aspect
cybersecurity
that
commonly
encounter
in
daily
lives.
A
player
can
choose
one
follow
Nova
AI's
instructions.
By
providing
hands-on
learning
experience,
aims
increase
users'
equip
them
with
necessary
skills
navigate
internet
safely
mitigate
risk
falling
victim
cyberattacks.
We
conducted
pre-
post-tests
who
interacted
system,
results
demonstrate
significant
improvement
ability
detect
different
types
attacks.
Moreover,
offers
flexible,
user-friendly,
enjoyable
approach
enhancing
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 329 - 356
Published: May 1, 2025
Ransomware
has
become
a
formidable
cyber
threat,
especially
with
the
rise
of
generative
AI.
By
leveraging
AI's
capacity
for
adaptive
code,
automated
vulnerability
detection,
and
personalized
spear-phishing,
attackers
create
highly
effective,
stealthy,
evolving
ransomware
campaigns.
Deepfake
technology
adds
powerful
layer
psychological
manipulation,
increasing
likelihood
victim
compliance.
This
chapter
explores
how
AI-infused
bypasses
traditional
security
measures
through
polymorphism,
targeted
social
engineering,
exploit
development.
It
offers
real-world
case
studies
theoretical
scenarios
illustrating
severity
these
threats
outlines
countermeasures
spanning
AI-based
incident
response,
policy
recommendations,
threat
intelligence
sharing.
merging
insights
from
AI
research
cybersecurity
practice,
stakeholders
can
better
anticipate
mitigate
escalating
AI-driven
risks.
Advances in digital crime, forensics, and cyber terrorism book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 235 - 286
Published: Sept. 12, 2024
Cyber
threats
are
becoming
more
advanced,
and
so
is
cybersecurity,
which
getting
intellectual
better
at
hiding
its
presence.
The
requirement
to
achieve
the
balance
between
proactive
resistive
threat-hunting
measures
in
this
dynamic
environment
very
high.
Part
four
outlines
how
new
AI
techniques
enable
design
of
existing
processes
for
hunting
potential
threats.
main
objective
digress
into
core
principles
threat
hunting,
starting
from
being
including
scenarios
deducing
clues
based
on
hypothesis.
Then,
authors
will
highlight
limitations
conventional
methods
detecting
gimmicks
that
fool
even
skilled
hunters
with
an
unseen
smoking
hiddenly
a
never-ending
evolutionary
process.
Two
well-studied
approaches
tackling
these
challenges
generative
models
like
adversarial
networks
(GANs)
variational
autoencoders
(VAEs).
Informatics,
Journal Year:
2024,
Volume and Issue:
11(3), P. 45 - 45
Published: July 11, 2024
ChatGPT,
a
Large
Language
Model
(LLM)
utilizing
Natural
Processing
(NLP),
has
caused
concerns
about
its
impact
on
job
sectors,
including
cybersecurity.
This
study
assesses
ChatGPT’s
impacts
in
non-managerial
cybersecurity
roles
using
the
NICE
Framework
and
Technological
Displacement
theory.
It
also
explores
potential
to
pass
top
certification
exams.
Findings
reveal
promise
streamline
some
jobs,
especially
those
requiring
memorization.
Moreover,
this
paper
highlights
challenges
limitations,
such
as
ethical
implications,
LLM
Artificial
Intelligence
(AI)
security.
The
suggests
that
LLMs
like
ChatGPT
could
transform
landscape,
causing
losses,
skill
obsolescence,
labor
market
shifts,
mixed
socioeconomic
impacts.
A
shift
focus
from
memorization
critical
thinking,
collaboration
between
developers
professionals,
is
recommended.
Information,
Journal Year:
2024,
Volume and Issue:
15(8), P. 443 - 443
Published: July 29, 2024
Advancements
in
artificial
intelligence,
machine
learning,
and
natural
language
processing
have
culminated
sophisticated
technologies
such
as
transformer
models,
generative
AI
chatbots.
Chatbots
are
software
applications
created
to
simulate
conversation
with
human
users.
surged
popularity
owing
their
versatility
user-friendly
nature,
which
made
them
indispensable
across
a
wide
range
of
tasks.
This
article
explores
the
dual
nature
chatbots
realm
cybersecurity
highlights
roles
both
defensive
tools
offensive
tools.
On
one
hand,
enhance
organizational
cyber
defenses
by
providing
real-time
threat
responses
fortifying
existing
security
measures.
other
adversaries
exploit
perform
advanced
cyberattacks,
since
lowered
technical
barrier
generate
phishing,
malware,
cyberthreats.
Despite
implementation
censorship
systems,
malicious
actors
find
ways
bypass
these
safeguards.
Thus,
this
paper
first
provides
an
overview
historical
development
large
models
(LLMs),
including
functionality,
applications,
societal
effects.
Next,
we
explore
dualistic
surveying
most
representative
works
on
attacks
involving
chatbots’
uses.
We
also
present
experimental
analyses
illustrate
evaluate
different
Finally,
open
issues
challenges
regarding
duality
highlighted
potential
future
research
directions
discussed
promote
responsible
usage
strategies.
The African Journal of Information and Communication (AJIC),
Journal Year:
2024,
Volume and Issue:
33, P. 1 - 21
Published: Aug. 31, 2024
The
prevalence
of
scams
proliferating
via
online
platforms
has
been
identified
as
an
emerging
societal
problem
resulting
in
large-scale
financial
losses
for
victims.
Online
typically
rely
their
success
on
the
generation
fake
but
convincing
user
profiles
to
conceal
identities
scammers
from
people
being
tricked
into
parting
with
money.
increasing
sophistication
generative
artificial
intelligence
(GenAI),
which
can
produce
outputs
indistinguishable
real
content,
thus
carries
risk
adopted
by
fraudsters
assist
enactment
scams.
This
article
considers
risks
potential
uptake
and
use
GenAI
applications
operating
sharing
economy,
a
focus
homestay-marketplace
and,
particular,
largest
such
platform,
Airbnb.
Nutrition and Health,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Nov. 6, 2024
Study
purpose
This
study
aims
to
critically
evaluate
ChatGPT's
impact
on
cybersecurity
in
healthcare
and
education
sectors.
Methods
employed
a
cross-sectional
survey
design,
collecting
data
from
educational
professionals
Saudi
Arabia
through
structured
questionnaire,
with
205
workers’
214
educators.
The
assessed
perceptions
of
opportunities
challenges,
analyzed
using
descriptive
statistics
ANOVA
explore
differences
across
professional
roles.
Results
Healthcare
viewed
artificial
intelligence
(AI)
more
favorably
(mean
scores
4.24
4.14)
than
those
education,
who
showed
moderate
enthusiasm
2.55
3.54).
Concerns
over
privacy
the
cost
securing
AI
were
significant,
high
mean
3.59
indicating
widespread
apprehension.
Conclusion
A
balanced
approach
integration
that
carefully
considers
ethical
implications,
privacy,
technology's
dual-use
potential
is
required.
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE),
Journal Year:
2023,
Volume and Issue:
unknown, P. 1 - 6
Published: Dec. 30, 2023
In
this
paper,
we
address
the
growing
concern
of
cyberattacks
due
to
low
awareness
among
computer
users.
Many
organizations
have
started
implementing
workshops
and
training
programs
educate
their
employees
users
about
cybersecurity.
However,
some
these
lack
sufficient
knowledge
fail
engage
participants
effectively.
To
overcome
limitations,
present
a
novel
system
called
CyberSafe,
developed
using
Unity
game
engine.
CyberSafe
comprises
multiple
levels
training,
each
focusing
on
an
important
aspect
cybersecurity
that
commonly
encounter
in
daily
lives.
A
player
can
choose
one
follow
Nova
AI's
instructions.
By
providing
hands-on
learning
experience,
aims
increase
users'
equip
them
with
necessary
skills
navigate
internet
safely
mitigate
risk
falling
victim
cyberattacks.
We
conducted
pre-
post-tests
who
interacted
system,
results
demonstrate
significant
improvement
ability
detect
different
types
attacks.
Moreover,
offers
flexible,
user-friendly,
enjoyable
approach
enhancing