Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. DETAILED INVESTIGATION ABOUT CYBER SECURITY IN RECENT TIMES ON ARTIFICIAL INTELLIGENCE
    Mohit Tiwari*, Amrita Ticku*, Amrita Ticku*, Vani Jain*, Ritik Kumar Chaudhary, Vaijayanthi Sambath Kumar
    Journal of Data Acquisition and Processing, 2023, 38 (1): 17-25. 

    Abstract

    As a result of the expansion of the internet of things and linked devices, professionals in the field of cyber security are facing a significant number of challenges in the modern digital world. The professionals need any and all support that is at their disposal in order to both respond to attacks and prevent other breaches in security. Due to factors such as heavy traffic, a growth in the number of security attack vectors, security breaches, and a great deal more, the number of connected workplaces makes it impossible for humans to govern the cyber space in the absence of considerable automation. However, designing software systems with conventional mounted algorithms (hard-wired logic on the level where decisions are made) may be challenging. These algorithms are required in order to provide an efficient defense against the ever-increasing number of threats that networks face. It is now general information that the adoption of problem-solving approaches based on artificial intelligence is the key to effectively addressing the bulk of the cyber security concerns that are currently being tackled. This article provides a brief analysis of computer applications that are used for cyber security. Additionally, it investigates the perspectives on how to improve cyber security capabilities by offering applications that make use of artificial intelligence, in addition to the methods that are currently in use.

    Keyword

    Expert systems, Artificial Intelligence, Cybersecurity, Neural nets, and Challenges


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved