MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM), Год журнала: 2024, Номер unknown, С. 1052 - 1057
Опубликована: Окт. 28, 2024
Язык: Английский
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM), Год журнала: 2024, Номер unknown, С. 1052 - 1057
Опубликована: Окт. 28, 2024
Язык: Английский
Electronics, Год журнала: 2024, Номер 13(17), С. 3417 - 3417
Опубликована: Авг. 28, 2024
Large language models, e.g., Chat Generative Pre-Trained Transformer (also known as ChatGPT), are currently contributing enormously to making artificial intelligence even more popular, especially among the general population. However, such chatbot models were developed tools support natural communication between humans. Problematically, it is very much a “statistical correlation machine” (correlation instead of causality), and there indeed ethical concerns associated with use AI including ChatGPT, bias, privacy, abuse. This paper highlights specific about ChatGPT articulates key challenges when used in various applications. Practical recommendations for different stakeholders also proposed that can serve checklist guidelines those applying their These best practice examples expected motivate ChatGPT.
Язык: Английский
Процитировано
29Journal of Information Security and Applications, Год журнала: 2025, Номер 89, С. 103960 - 103960
Опубликована: Янв. 7, 2025
Язык: Английский
Процитировано
1Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 281 - 332
Опубликована: Июль 26, 2024
Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.
Язык: Английский
Процитировано
4Artificial Intelligence Review, Год журнала: 2025, Номер 58(3)
Опубликована: Янв. 8, 2025
Язык: Английский
Процитировано
0Applied Sciences, Год журнала: 2025, Номер 15(6), С. 3355 - 3355
Опубликована: Март 19, 2025
This study examines the security implications of generative artificial intelligence (GAI), focusing on models such as ChatGPT. As GAI technologies are increasingly integrated into industries like healthcare, education, and media, concerns growing regarding vulnerabilities, ethical challenges, potential for misuse. not only synthesizes existing research but also conducts an original scientometric analysis using text mining techniques. To address these concerns, this analyzes 1047 peer-reviewed academic articles from SCOPUS database methods, including Term Frequency–Inverse Document Frequency (TF-IDF) analysis, keyword centrality Latent Dirichlet Allocation (LDA) topic modeling. The results highlight significant contributions countries United States, China, India, with leading institutions Chinese Academy Sciences National University Singapore driving security. In “ChatGPT” emerged a highly central term, reflecting its prominence in discourse. However, despite frequent mention, showed lower proximity than terms “model” “AI”. suggests that while ChatGPT is broadly associated other key themes, it has less direct connection to specific subfields. Topic modeling identified six major AI language models, data processing, risk management. emphasizes need robust frameworks technical ensure responsibility, manage risks safe deployment systems. These must incorporate solutions accountability, regulatory compliance, continuous underscores importance interdisciplinary integrates technical, legal, perspectives responsible secure technologies.
Язык: Английский
Процитировано
0Information Development, Год журнала: 2025, Номер unknown
Опубликована: Апрель 1, 2025
Cyberspace war is a new domain that complements conventional warfare as means of dominating opponents in resource management and international relations. The geopolitical rivalry has extended into cyberspace, with states engaging cyberattacks to influence Consequently, countries have increasingly viewed cybersecurity an arms race, developing cyber capabilities. This study examines the relationship between risks during 2005:01-2023:12 using wavelet analysis. results indicate are correlated across several sub-sample periods. Furthermore, findings show risk primarily influenced by periods turmoil, when strategic competition, on critical infrastructure. It noted, however, introducing energy security impacts medium long run, which indicates more likely be established permanently. Geopolitical cybersecurity, particular focus infrastructure, should monitored evaluated policymakers.
Язык: Английский
Процитировано
0Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 37 - 64
Опубликована: Апрель 8, 2025
The rapid advancement of artificial intelligence (AI) has transformed contract security, offering innovative solutions for managing expiry, ensuring compliance, and mitigating risks. Traditional management systems often struggle with scalability, accuracy, adaptability, leading to inefficiencies potential legal vulnerabilities. This chapter explores how deep learning large language models (LLMs) enhance security by automating review, expiration tracking, regulatory compliance assessment. By leveraging natural processing (NLP) predictive analytics, AI-driven can proactively identify risks, flag anomalies, ensure adherence contractual obligations. Furthermore, this discusses key challenges such as bias in AI models, data privacy concerns, the need robust frameworks. Through case studies experimental results, we demonstrate AI-powered improves efficiency, reduces human errors, enhances organizational risk management.
Язык: Английский
Процитировано
0Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 255 - 278
Опубликована: Фев. 7, 2025
Software-Defined Networking (SDN) has ushered in a new era of network architecture, offering unparalleled flexibility and adaptability. Also exposes SDN to security vulnerabilities, including Distributed Denial Service (DDoS) attacks. Detecting mitigating DDoS attacks within environments is an imperative challenge. This work introduces innovative detection scheme harnessing the power Echo State Networks (ESN) tailored for SDN, augmented by Convolutional Neural Network (CNN) based feature extraction. Through series simulation experiments, we meticulously evaluate proposed scheme. The results conclusively establish scheme's effectiveness accurately identifying attacks, achieving impressive average success rate 97.78%. research marks significant advancement fortifying networks, shielding them from disruptive threats, emphasizes potential as valuable tools field cybersecurity.
Язык: Английский
Процитировано
0The Journal of Supercomputing, Год журнала: 2025, Номер 81(6)
Опубликована: Апрель 20, 2025
Язык: Английский
Процитировано
0Frontiers in Computer Science, Год журнала: 2024, Номер 6
Опубликована: Июнь 10, 2024
The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed combat malicious attacks. However, IDSs still struggle with accuracy, false alarms, detecting new intrusions. Therefore, organizations are using Machine Learning (ML) Deep (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview IDS, including its classes methods, the detected attacks as well dataset, metrics, performance indicators used. A thorough examination recent publications on IDS-based solutions is conducted, evaluating their strengths weaknesses, a discussion potential implications, research challenges, trends. We believe that this comprehensive review covers most advances developments ML DL-based also facilitates future into emerging Artificial Intelligence (AI) address growing complexity cybersecurity challenges.
Язык: Английский
Процитировано
3