Show simple item record

dc.contributor.authorWiafe, Isaac
dc.contributor.authorKoranteng, Felix N.
dc.contributor.authorObeng, Emmanuel N.
dc.contributor.authorAssyne, Nana
dc.contributor.authorWiafe, Abigail
dc.contributor.authorGulliver, Stephen R.
dc.date.accessioned2021-01-20T12:52:10Z
dc.date.available2021-01-20T12:52:10Z
dc.date.issued2020
dc.identifier.citationWiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020). Artificial Intelligence for Cybersecurity : A Systematic Mapping of Literature. <i>IEEE Access</i>, <i>8</i>, 146598-146612. <a href="https://doi.org/10.1109/ACCESS.2020.3013145" target="_blank">https://doi.org/10.1109/ACCESS.2020.3013145</a>
dc.identifier.otherCONVID_41699923
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/73706
dc.description.abstractDue to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE Xplore). Using a systematic mapping, the articles were analyzed using quantitative and qualitative methods. It was observed that artificial intelligent methods have made remarkable contributions to combating cybercrimes with significant improvement in intrusion detection systems. It was also observed that there is a reduction in computational complexity, model training times and false alarms. However, there is a significant skewness within the domain. Most studies have focused on intrusion detection and prevention systems, and the most dominant technique used was support vector machines. The findings also revealed that majority of the studies were published in two journal outlets. It is therefore suggested that to enhance research in artificial intelligence for CyberSec, researchers need to adopt newer techniques and also publish in other related outlets.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartofseriesIEEE Access
dc.rightsCC BY 4.0
dc.subject.othermachine learning
dc.subject.otherprotocols
dc.subject.othercomputer crime
dc.subject.otherartificial intelligence
dc.subject.othercybersecurity
dc.subject.otherinformation security
dc.subject.othersystematic review
dc.titleArtificial Intelligence for Cybersecurity : A Systematic Mapping of Literature
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202101201170
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_dcae04bc
dc.description.reviewstatuspeerReviewed
dc.format.pagerange146598-146612
dc.relation.issn2169-3536
dc.relation.volume8
dc.type.versionpublishedVersion
dc.rights.copyright© Authors, 2020
dc.rights.accesslevelopenAccessfi
dc.subject.ysosystemaattiset kirjallisuuskatsaukset
dc.subject.ysotietoverkkorikokset
dc.subject.ysotekoäly
dc.subject.ysokyberrikollisuus
dc.subject.ysokirjallisuuskatsaukset
dc.subject.ysokoneoppiminen
dc.subject.ysotietoturva
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p29683
jyx.subject.urihttp://www.yso.fi/onto/yso/p27938
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p29491
jyx.subject.urihttp://www.yso.fi/onto/yso/p7595
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1109/ACCESS.2020.3013145
dc.type.okmA2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY 4.0
Except where otherwise noted, this item's license is described as CC BY 4.0