It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
Without substantial automation, individuals cannot manage the complexity of operations and the scale of information to be utilized to secure cyberspace. Nonetheless, technology and software with traditional fixed implementations are difficult to build (hardwired decision-making logic) in order to successfully safeguard against security threats. This condition can be dealt with using machine simplicity and learning methods in AI. This paper provides a concise overview of AI implementations of various cybersecurity using artificial technologies and evaluates the prospects for expanding the cybersecurity capabilities by enhancing the defence mechanism. We may infer that valuable applications already exist after the review of current artificial intelligence software on cybersecurity. First of all, they are used to protect the periphery and many other cybersecurity areas with neural networks. On the other hand, it was clear that certain cybersecurity problems would only be overcome efficiently if artificial intelligence approaches are deployed. In strategic decision making, for example, comprehensive information is important, and logical decision assistance is one of the still unanswered cybersecurity issues.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Symbiosis Centre for Information Technology, Symbiosis International (Deemed University), Pune, Maharashtra, India