A Game Theory for Resource-Constrained Tactical Cyber Operations DOI
Jonathan Goohs, Josiah Dykstra, Anthony Melaragno

и другие.

MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM), Год журнала: 2024, Номер unknown, С. 1052 - 1057

Опубликована: Окт. 28, 2024

Язык: Английский

Ethical ChatGPT: Concerns, Challenges, and Commandments DOI Open Access
Jianlong Zhou, Heimo Müller, Andreas Holzinger

и другие.

Electronics, Год журнала: 2024, Номер 13(17), С. 3417 - 3417

Опубликована: Авг. 28, 2024

Large language models, e.g., Chat Generative Pre-Trained Transformer (also known as ChatGPT), are currently contributing enormously to making artificial intelligence even more popular, especially among the general population. However, such chatbot models were developed tools support natural communication between humans. Problematically, it is very much a “statistical correlation machine” (correlation instead of causality), and there indeed ethical concerns associated with use AI including ChatGPT, bias, privacy, abuse. This paper highlights specific about ChatGPT articulates key challenges when used in various applications. Practical recommendations for different stakeholders also proposed that can serve checklist guidelines those applying their These best practice examples expected motivate ChatGPT.

Язык: Английский

Процитировано

29

Workplace security and privacy implications in the GenAI age: A survey DOI Creative Commons
Abebe Diro, Shahriar Kaisar, Akanksha Saini

и другие.

Journal of Information Security and Applications, Год журнала: 2025, Номер 89, С. 103960 - 103960

Опубликована: Янв. 7, 2025

Язык: Английский

Процитировано

1

Security Considerations in Generative AI for Web Applications DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 281 - 332

Опубликована: Июль 26, 2024

Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.

Язык: Английский

Процитировано

4

AI evaluation of ChatGPT and human generated image/textual contents by bipolar generalized fuzzy hypergraph DOI Creative Commons
Abbas Amini, Narjes Firouzkouhi, Wael Farag

и другие.

Artificial Intelligence Review, Год журнала: 2025, Номер 58(3)

Опубликована: Янв. 8, 2025

Язык: Английский

Процитировано

0

Text Mining Approaches for Exploring Research Trends in the Security Applications of Generative Artificial Intelligence DOI Creative Commons
J.Y. Kim,

Byeongsoo Koo,

Moonju Nam

и другие.

Applied Sciences, Год журнала: 2025, Номер 15(6), С. 3355 - 3355

Опубликована: Март 19, 2025

This study examines the security implications of generative artificial intelligence (GAI), focusing on models such as ChatGPT. As GAI technologies are increasingly integrated into industries like healthcare, education, and media, concerns growing regarding vulnerabilities, ethical challenges, potential for misuse. not only synthesizes existing research but also conducts an original scientometric analysis using text mining techniques. To address these concerns, this analyzes 1047 peer-reviewed academic articles from SCOPUS database methods, including Term Frequency–Inverse Document Frequency (TF-IDF) analysis, keyword centrality Latent Dirichlet Allocation (LDA) topic modeling. The results highlight significant contributions countries United States, China, India, with leading institutions Chinese Academy Sciences National University Singapore driving security. In “ChatGPT” emerged a highly central term, reflecting its prominence in discourse. However, despite frequent mention, showed lower proximity than terms “model” “AI”. suggests that while ChatGPT is broadly associated other key themes, it has less direct connection to specific subfields. Topic modeling identified six major AI language models, data processing, risk management. emphasizes need robust frameworks technical ensure responsibility, manage risks safe deployment systems. These must incorporate solutions accountability, regulatory compliance, continuous underscores importance interdisciplinary integrates technical, legal, perspectives responsible secure technologies.

Язык: Английский

Процитировано

0

Do geopolitical risks induce a butterfly effect on cybersecurity? DOI
Khalid Khan, Adnan Khurshid, Javier Cifuentes‐Faura

и другие.

Information Development, Год журнала: 2025, Номер unknown

Опубликована: Апрель 1, 2025

Cyberspace war is a new domain that complements conventional warfare as means of dominating opponents in resource management and international relations. The geopolitical rivalry has extended into cyberspace, with states engaging cyberattacks to influence Consequently, countries have increasingly viewed cybersecurity an arms race, developing cyber capabilities. This study examines the relationship between risks during 2005:01-2023:12 using wavelet analysis. results indicate are correlated across several sub-sample periods. Furthermore, findings show risk primarily influenced by periods turmoil, when strategic competition, on critical infrastructure. It noted, however, introducing energy security impacts medium long run, which indicates more likely be established permanently. Geopolitical cybersecurity, particular focus infrastructure, should monitored evaluated policymakers.

Язык: Английский

Процитировано

0

AI-Powered Contract Security DOI

Dilshad Ahmad Mhia-Alddin,

Akram Mahmoud Hussein

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 37 - 64

Опубликована: Апрель 8, 2025

The rapid advancement of artificial intelligence (AI) has transformed contract security, offering innovative solutions for managing expiry, ensuring compliance, and mitigating risks. Traditional management systems often struggle with scalability, accuracy, adaptability, leading to inefficiencies potential legal vulnerabilities. This chapter explores how deep learning large language models (LLMs) enhance security by automating review, expiration tracking, regulatory compliance assessment. By leveraging natural processing (NLP) predictive analytics, AI-driven can proactively identify risks, flag anomalies, ensure adherence contractual obligations. Furthermore, this discusses key challenges such as bias in AI models, data privacy concerns, the need robust frameworks. Through case studies experimental results, we demonstrate AI-powered improves efficiency, reduces human errors, enhances organizational risk management.

Язык: Английский

Процитировано

0

Enhancing SDN Security DOI
S. Singaravelan,

S. Briskline Kiruba,

S. Agnes Joshy

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 255 - 278

Опубликована: Фев. 7, 2025

Software-Defined Networking (SDN) has ushered in a new era of network architecture, offering unparalleled flexibility and adaptability. Also exposes SDN to security vulnerabilities, including Distributed Denial Service (DDoS) attacks. Detecting mitigating DDoS attacks within environments is an imperative challenge. This work introduces innovative detection scheme harnessing the power Echo State Networks (ESN) tailored for SDN, augmented by Convolutional Neural Network (CNN) based feature extraction. Through series simulation experiments, we meticulously evaluate proposed scheme. The results conclusively establish scheme's effectiveness accurately identifying attacks, achieving impressive average success rate 97.78%. research marks significant advancement fortifying networks, shielding them from disruptive threats, emphasizes potential as valuable tools field cybersecurity.

Язык: Английский

Процитировано

0

Machine learning- and deep learning-based anomaly detection in firewalls: a survey DOI

Hanen Dhrir,

Maha Charfeddine, Nesrine Tarhouni

и другие.

The Journal of Supercomputing, Год журнала: 2025, Номер 81(6)

Опубликована: Апрель 20, 2025

Язык: Английский

Процитировано

0

Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey DOI Creative Commons
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar

и другие.

Frontiers in Computer Science, Год журнала: 2024, Номер 6

Опубликована: Июнь 10, 2024

The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed combat malicious attacks. However, IDSs still struggle with accuracy, false alarms, detecting new intrusions. Therefore, organizations are using Machine Learning (ML) Deep (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview IDS, including its classes methods, the detected attacks as well dataset, metrics, performance indicators used. A thorough examination recent publications on IDS-based solutions is conducted, evaluating their strengths weaknesses, a discussion potential implications, research challenges, trends. We believe that this comprehensive review covers most advances developments ML DL-based also facilitates future into emerging Artificial Intelligence (AI) address growing complexity cybersecurity challenges.

Язык: Английский

Процитировано

3