Näytä suppeat kuvailutiedot

dc.contributor.authorVähäkainu, Petri
dc.contributor.authorLehto, Martti
dc.contributor.editorvan der Waag-Cowling, Noëlle
dc.contributor.editorLeenen, Louise
dc.date.accessioned2020-01-14T13:20:21Z
dc.date.available2020-01-14T13:20:21Z
dc.date.issued2019
dc.identifier.citationVähäkainu, P., & Lehto, M. (2019). Artificial intelligence in the cyber security environment. In N. van der Waag-Cowling, & L. Leenen (Eds.), <i>ICCWS 2019 : Proceedings of the 14th International Conference on Cyber Warfare and Security</i> (pp. 431-440). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security.
dc.identifier.otherCONVID_30945638
dc.identifier.otherTUTKAID_81669
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67298
dc.description.abstractArtificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its environment and takes actions that maximize its chance of success at some goal may be defined as AI. The family of AI research is rich and varied. For example, cognitive computing is a comprehensive set of capabilities based on technologies such as deep learning, machine learning, natural language processing, reasoning and decision technologies, speech and vision technologies, human interface technologies, semantic technology, dialog and narrative generation, among other technologies. Artificial intelligence and robotics have steadily growing roles in our lives and have the potential to transform vital functions of the society. Organizations benefit from the ability of cognitive systems to improve their expertise quickly and from sharing it to all those who need it. The know-how of top experts is quickly made available to all, when their subject matter expertise is taught to a cognitive system. Through repeated use, the system will provide increasingly accurate responses, eventually eclipsing the accuracy of human experts. With artificial intelligence, comprehension can be outsourced. As the intelligence of machines improve, they will use deep learning to understand the collective information of humankind. With the use of digital sensor data, equipment based on artificial intelligence can used to develop smart advisors, teachers or assistants. As artificial intelligence technology is helping society to advance, there are risks associated with its use, found in the operating systems, hardware, algorithms, system management, ethics and liability, and privacy. The study focuses on artificial intelligence threats and risks and how AI may help to solve cyber security problems. This study uses taxonomy classification principle to classify 12 the most crucial areas of cyber security. Research method of this study was to gather 11 AI solutions that were divided into seven different categories of the crucial areas of cyber security represented in introduction chapter. AI solutions gathered uses artificial intelligence in detecting and predicting information security threats and anomalies and blocking them. The purpose of this study is to classify AI-based cyber security solutions gathered and provide information what they can offer in solving problems in the field of cyber security.fi
dc.format.extent679
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofICCWS 2019 : Proceedings of the 14th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the ... international conference on cyber warfare and security
dc.rightsIn Copyright
dc.subject.otheranomaly
dc.subject.othercognitive abilities
dc.subject.othersupervised machine learning
dc.subject.otherunsupervised machine learning
dc.titleArtificial intelligence in the cyber security environment
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001081077
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2020-01-08T07:15:23Z
dc.relation.isbn978-1-912764-11-2
dc.description.reviewstatuspeerReviewed
dc.format.pagerange431-440
dc.relation.issn2048-9870
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s), 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysotekoäly
dc.subject.ysokoneoppiminen
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright