Abstract
Researchers aim to apply artificial intelligence and machine-learning methods to take cybersecurity to a new, higher, and better level.
- Tamersoy, A., Roundy, K., and Chau, D.H. Guilt by Association: Large Scale Malware Detection by Mining File-relation Graphs. College of Computing, Georgia Institute of Technology. KDD'14, August 24-27, 2014, New York, NY, USA. http://www.cc.gatech.edu/~dchau/papers/14_kdd_aesop.pdf Google ScholarDigital Library
- Saravanan, P., Clarke, S., Chau, DH., and Zha, H. LatentGesture: Active User Authentication through Background Touch Analysis. College of Computing, Georgia Institute of Technology. Chinese CHI '14, April 26-27, 2014, Toronto, ON, Canada http://www.cc.gatech.edu/~dchau/papers/LatentGesture.pdf Google ScholarDigital Library
- Morel, B. Artificial Intelligence and the Future of Cybersecurity. In Proceedings of the 4th ACM workshop on Security and artificial intelligence (AISec '11). 2011. ACM, New York, NY, USA, 93-98. DOI. http://dx.doi.org/10.1145/2046684.2046699 Google ScholarDigital Library
- Xing Fang; Koceja, N.; Zhan, J.; Dozier, G.; and Dipankar, D. An Artificial Immune System for Phishing Detection, Evolutionary Computation (CEC), 2012 IEEE Congress, vol., no., pp.1-7, 10-15 June 2012. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6256518&isnumber=6252855Google ScholarCross Ref
Index Terms
- Cybersecurity gets smart
Recommendations
Cybersecurity challenges in IoT-based smart renewable energy
AbstractThe Internet of Things (IoT) makes it possible to collect data from, and issue commands to, devices via the Internet, eliminating the need for humans in the process while increasing productivity, accuracy, and economic value. Therefore, the ...
Comments