Show simple item record

dc.contributor.authorVähäkainu, Petri
dc.contributor.authorLehto, Martti
dc.date.accessioned2020-01-14T13:20:21Z
dc.date.available2020-01-14T13:20:21Z
dc.date.issued2019fi
dc.identifier.citationVähäkainu, P., & Lehto, M. (2019). Artificial intelligence in the cyber security environment. In N. van der Waag-Cowling, & L. Leenen (Eds.), <em>ICCWS 2019 : Proceedings of the 14th International Conference on Cyber Warfare and Security</em> (pp. 431-440). Academic Conferences International.fi
dc.identifier.otherTUTKAID_81669
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67298
dc.description.abstractArtificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its environment and takes actions that maximize its chance of success at some goal may be defined as AI. The family of AI research is rich and varied. For example, cognitive computing is a comprehensive set of capabilities based on technologies such as deep learning, machine learning, natural language processing, reasoning and decision technologies, speech and vision technologies, human interface technologies, semantic technology, dialog and narrative generation, among other technologies. Artificial intelligence and robotics have steadily growing roles in our lives and have the potential to transform vital functions of the society. Organizations benefit from the ability of cognitive systems to improve their expertise quickly and from sharing it to all those who need it. The know-how of top experts is quickly made available to all, when their subject matter expertise is taught to a cognitive system. Through repeated use, the system will provide increasingly accurate responses, eventually eclipsing the accuracy of human experts. With artificial intelligence, comprehension can be outsourced. As the intelligence of machines improve, they will use deep learning to understand the collective information of humankind. With the use of digital sensor data, equipment based on artificial intelligence can used to develop smart advisors, teachers or assistants. As artificial intelligence technology is helping society to advance, there are risks associated with its use, found in the operating systems, hardware, algorithms, system management, ethics and liability, and privacy. The study focuses on artificial intelligence threats and risks and how AI may help to solve cyber security problems. This study uses taxonomy classification principle to classify 12 the most crucial areas of cyber security. Research method of this study was to gather 11 AI solutions that were divided into seven different categories of the crucial areas of cyber security represented in introduction chapter. AI solutions gathered uses artificial intelligence in detecting and predicting information security threats and anomalies and blocking them. The purpose of this study is to classify AI-based cyber security solutions gathered and provide information what they can offer in solving problems in the field of cyber security.fi
dc.format.extent679
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofICCWS 2019 : Proceedings of the 14th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the ... international conference on cyber warfare and security
dc.rightsIn Copyright
dc.subject.otherkyberturvallisuusfi
dc.subject.othertekoälyfi
dc.subject.otherkoneoppiminenfi
dc.subject.otheranomalyfi
dc.subject.otherartificial intelligencefi
dc.subject.othercognitive abilitiesfi
dc.subject.othercyber securityfi
dc.subject.othersupervised machine learningfi
dc.subject.otherunsupervised machine learningfi
dc.titleArtificial intelligence in the cyber security environmentfi
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001081077
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2020-01-08T07:15:23Z
dc.relation.isbn978-1-912764-11-2
dc.description.reviewstatuspeerReviewed
dc.format.pagerange431-440
dc.relation.issn2048-9870
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s), 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.format.contentfulltext
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright