0% found this document useful (0 votes)
96 views18 pages

BUS610 Assessment 3 Final Report

Uploaded by

Ujjwal Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views18 pages

BUS610 Assessment 3 Final Report

Uploaded by

Ujjwal Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

ASSESSMENT 3: FINAL REPORT

REVOLUTIONISING CYBERSECURITY: EXPLORING THE


IMPACT OF ARTIFICIAL INTELLIGENCE ON INDUSTRY
DEFENCE STRATEGIES

Unit Code: BUS610/ ICT610


Unit Name: Applied Project
MBUS Specialisation:
Name of Supervisor:
Executive Summary

The report investigates the impact of artificial intelligence (AI) on cybersecurity defence
strategies. In the current trend, AI plays a significant role in analysing cybersecurity threats
and providing appropriate solutions for mitigating them and hence, it can be considered an
effective defence strategy for companies all over the nation. The background of the research
shows that AI developed machine learning to reduce external threats and attacks from online
procedures in Companies. Besides, AI improves the intelligence systems for maintaining
digital safety and provides an accurate result beyond human capabilities. The literature
context shows that AI is used efficiently in military planning to improve its decision-making
procedure and to make defence plans for resolving concerns relating to cyber security threats.
In the report, the involvement of technology in revolutionizing cybersecurity has been
discussed. The research also emphasized AI’s role in today’s landscape where there has been
a requirement of advanced defence mechanisms for cyber threats. According to various
reports, AI has enhanced threat detection and automated response mechanisms, but it has also
led to various new vulnerabilities. Different methodologies for threat detection have also
been discussed. The report also helps in gaining more insight and data on cybersecurity to
enhance the defence strategy.

1
Table of Contents
2. Introduction.........................................................................................................................3

Nature of Project.....................................................................................................................3

Demonstration of Background and Previous Work................................................................3

Motivation for Undertaking the Research..............................................................................3

3. Literature Review................................................................................................................3

The Context for the Research.................................................................................................3

Extended Literature Review and Findings.............................................................................4

The Research Fits the Existing Body of Knowledge and Theory Related to the Disciplinary
Area........................................................................................................................................5

4. Problem Statement and Contexts of the Study...................................................................5

Context of the Study...............................................................................................................5

Purpose of the Study...............................................................................................................6

Research Questions and Hypothesis Based on the Selected Methodology............................6

5. Methodology.......................................................................................................................6

Demonstration of the Research Methodology........................................................................6

Description Of the Data Collection Method and Analysis.....................................................6

6. Selection of Research Context............................................................................................7

Context Selection....................................................................................................................7

Analysis of the Methods Applied Based on the Research Perspective..................................7

7. Data and Context Analysis..................................................................................................8

Analysis of the Information for Answering the Research Questions.....................................8

Findings and Contribution of the Information........................................................................9

8. Convincing Arguments.....................................................................................................10

Arguments with Findings.....................................................................................................10

Conclusion............................................................................................................................11

9. Limitations and Delimitations...........................................................................................11

2
10. Significance of the Study..................................................................................................11

11. Role of the Research in Refining, Revising or Extending Existing Knowledge in the
Investigation Area....................................................................................................................12

Recommendations for Future Research................................................................................12

12. References.......................................................................................................................13

3
2. Introduction
Nature of Project
The nature of the project is to investigate the role of Artificial Intelligence (AI) in enhancing
and transforming cybersecurity measures across different companies in the nation (Alhayani
et al. 2021). The interdisciplinary activity of cybersecurity, AI and computer science helps to
address the growing difficulty and sophistication of various cyber threats effectively. The
research will demonstrate how defence techniques are maintained by using the vast amount
of real-time data through AI to identify potential threats and anomalous behaviour more
efficiently than traditional ones. The research will also explore the problems opportunities
and traits of using AI technology in defence. To illustrate AI’s predictive capabilities, the
report will also explore the way companies can anticipate upcoming cyber threats and
implement AI in their defence mechanism.
Demonstration of Background and Previous Work
Previous work regarding the role of AI in business defence and cybersecurity illustrates that
for building defence strategies AI is used in developing machine learning algorithms that
reduce external attacks and threats. The capability of AI in mitigating and identifying threads
in real-time has significantly reduced the rate of vulnerability for target systems in industries
(Naik et al. 2022). However, recently AI has been used as a primary asset for companies in
improving their performance along with protecting their data and information. The current
research will provide a digital analysis regarding the impact of AI as an industry defence
technique. The study will also provide critical insight regarding the intersection of AI and
cyber security in the industrial context by gathering information from existing research
materials.
Motivation for Undertaking the Research
In the current trend, industries use AI to improve security in businesses and to develop
advanced predictive analytics, threat detection and automated incident response systems that
can reduce cyber security attacks. The primary motivation for undertaking this research is to
illustrate the role of artificial intelligence as a transformative opportunity for enhancing cyber
security measures of industries across the nation (Hutter and Hutter, 2021). The ethical
imperative of AI in addressing data privacy issues and algorithm bias in industries has also
been considered a motivating factor for conducting this research.
3. Literature Review
The Context for the Research

4
Recent studies highlight the impact of artificial intelligence in the current digital landscape
for acting as a defence system for industries to reduce cyber threats and attacks. In today's
environment, most companies have relied on digital infrastructure which has increased the
rate of cybercriminal attacks and they are more prone to frequent cyber threats. In this
situation, AI acts as a powerful technology tool that predicts potential threats and detects
anomalies to increase cyber security among industries (Raimundo and Rosário, 2021). The
current research aims to analyse the potential of AI in developing advanced defence strategies
for companies that overall enhance security posture and reduce cyber security challenges
effectively.
Extended Literature Review and Findings
According to Kumar et al. (2023), the application of AI is used as a revolutionary instrument
that detects threats and maintains vulnerability management and asset prioritisation that
provide accurate results beyond that of human capabilities. AI also enhance intelligence
systems to maintain digital safety which overall developed cyber security capabilities among
companies. Besides, the findings of the study suggest that the application of AI is effectively
useful in maintaining cyber security. It also illustrates that by maintaining potential ethical
concerns and following the government structure, the resources successfully illustrate the
transparent and responsible use of artificial intelligence in cyber security.
Manoharan and Sarker (2023) illustrate that currently, cybersecurity is considered a critical
concern in the technological landscape and thus, by using AI, companies can analyse
behavioural patterns, spot anomalies and predict potential threats. According to this study,
AI is used for extracting valuable threats by linking with natural language processing and
revealing complex patterns for automated threat detection and providing appropriate
responses on that. The findings of this study illustrate that AI maintained great promises in
the cybersecurity field by providing a multifaceted approach that involves stakeholders such
as policymakers, technologists and legal experts and combines technology with traditional
methods. It also illustrates that the border landscape of AI applications in cyber security
approaches creates a holistic perspective in responding, preventing and identifying cyber
threats effectively.
According to Jimmy (2021), the recent advancement in technology has enhanced the impact
of cyber security by increasing sophisticated threats and creating issues for the companies
that approach the nation. Thus, by using AI, companies can reduce the negative impact of
Cyber threats by detecting threats, maintaining prevention and providing incident responses
at that appropriate time. The research also illustrates the limitations and challenges related to

5
the AI-powered cyber security system that affected the technical quandaries. However, the
findings of the study suggested that AI has transformative potential to manage cybersecurity
protocols efficiently. Moreover, the findings also suggested that by collaborating with
policymakers and cyber security practitioners, the company can easily introduce refined AI
defence solutions that create a digital ecosystem against malicious attacks of cyber threats
and create resonance in the realm of cyber security.
In the opinion of Iqbal et al. (2023), artificial intelligence is used in defence and security to
prevent cyberwarfare, surveillance, predictive analytics and autonomous weapon systems.
The study illustrates that AI is used effectively in military planning by enabling the decision-
making procedure to be efficient, agile and accurate. However, the findings of the study
suggest that AI influences security policy that helps the military sector to make the defence
plan for resolving concerns relating to transparency and accountability. Another finding of
the study is that AI helps to maintain security for the defence industries through their
technology and revolutions on ethical, geo-political and strategic aspects. It is also illustrated
that the introduction of AI in security and defence creates a potential aspect to improve
security measures by modifying compact practices and alternating international power
structures. The application of AI in defence has improved human capabilities along with
offering effective solutions to persistent cyber security problems.
The Research Fits the Existing Body of Knowledge and Theory Related to the
Disciplinary Area
The “machine learning theory” demonstrates the fundamental principles of learning the
tenable computers to adopt immediate human-like behaviour. By using this theoretical model,
the researchers can apply AI in cybersecurity by involving algorithms that enable the system
to improve over time and learn from data without being explicitly programmed (Karpunina et
al. 2020). Besides, “complex system theory” is another framework that enables AI developers
to understand the advancement of responsive AI systems for appropriate maintenance of the
machines to search for cyber threats. The theoretical model also underpins that AI can help in
managing the complexity of cyber security by adapting to evolve in threats and providing
automatic responses (Crawford, 2020).
4. Problem Statement and Contexts of the Study
Context of the Study

It would be quite apparent that in response to the growing complexity of cyber threats,
cybersecurity tactics have advanced significantly with the inclusion of Artificial Intelligence

6
(AI). The ability of AI to analyse large amounts of real-time data improves the effectiveness
and accuracy of identifying possible risks and aberrant behaviour compared to conventional
approaches (Al-Suqri and Gillani, 2022). The aim of the present paper is to look at the
involvement of this technology in revolutionising cybersecurity in a number of different
industries, with a particular emphasis on many important factors like enhanced threat
perception, predictive analysis, and the development of automated response mechanisms.
According to research conducted, AI-driven methods could prove essential for preserving
strong cybersecurity frameworks in the face of a changing vulnerability scenario (Khan et al.
2021).

Purpose of the Study


The primary purpose of the research is to critically examine the role of AI as a
revolutionising cybersecurity defence system in companies.
Research Questions and Hypothesis Based on the Selected Methodology
● What are the factors responsible for the revolutionising of cybersecurity as an
industry's defence strategy?
● What is the significance of having revolutionised cybersecurity in current trends?
● What are the issues related to using AI Technology as the industry's defence strategy?
● What are the strategies for mitigating the issues associated with the implementation of
AI technology in cybersecurity?

5. Methodology
Demonstration of the Research Methodology
The "Positive Social Science (PSS)" methodology is used by the researcher for conducting
the chosen study topic of analysing the role of AI technology as a defence strategy for
companies. By using this methodology, the researchers collected scientific evidence to
support the impact of AI technology in reducing companies (Ansari et al. 2022). The
researchers also examine social facts to demonstrate the benefits of revolutionised
cybersecurity in the current business environment. Moreover, by using this methodology the
researchers have also illustrated the challenges associated with using transformative AI
Technology along with the factors that can mitigate the issues associated with the
implementation (Drew, 2016). Furthermore, the researchers have also used secondary data
analysis methods to provide information regarding the role of Companies in introducing AI
technology in their business operations.

7
Description Of the Data Collection Method and Analysis
For this research secondary data collection method has been used by the researchers to gather
consistent and relevant from reliable and credible sources. The researchers have collected
creditable and reliable information from various databases such as “Google Scholar” and
“EBSCO”. By using the secondary data collection method, the research collects appropriate
information that supports the study topic. The perception of various scholars has been
gathered from secondary data which helps the researchers to illustrate that AI plays a
significant role in preventing companies from cybersecurity attacks (Nickerson, 2022).
Besides, the "qualitative data analysis" method has been used in this research for gathering
data and information regarding the study topic. The method helps the researchers to profile
themes that support the role of AI in enhancing the defence security network of companies all
over the nation (Graue, 2015).
6. Selection of Research Context
Context Selection

Proper context setting is very important to avoid unnecessary delays and to pinpoint the
relevant aim of the paper. Against this backdrop, if we talk about the study's setting, it would
take into account the constantly shifting and advancing cybersecurity environment, wherein
conventional defence techniques are becoming understandably outdated against increasingly
complicated and pervasive cyber threats. Other overly complex dimensions wherein the
attention goes is how different cybersecurity strategies and roadmaps in different national
industries may employ AI tools to navigate this issue.

The establishment of AI-driven cybersecurity apps and their efficacy in identifying threats,
prediction, and response are attempted to be critically examined. Furthermore, the study
suggests tactical methods for utilising cutting-edge AI technology to lessen risks and
weaknesses brought forth by AI. It also discusses the important underlying considerations of
wider socioeconomic effects of AI in cybersecurity, such as how it can affect jobs, privacy,
and various ethical issues. The study, thus, seeks to provide a full understanding of the
manner in which AI is revolutionising cybersecurity and defining the evolution of digital
defence systems in the face of escalating cyber threats by placing the investigation within this
complex framework.

Analysis of the Methods Applied Based on the Research Perspective

8
The present investigation investigates how AI affects cybersecurity using a number of distinct
approaches. The research utilizes detection methodologies to scrutinize actual network
activity (Buczak & Guven, 2016). Another important aspect that was considered important
was that, in order to assess the socioeconomic effects of AI in cybersecurity, the research also
includes a meta-analysis of the body of literature, combining the results of several studies to
present a thorough summary (Sarker et al. 2020). When combined, these techniques allow for
a thorough evaluation of AI’s contribution to strengthening cybersecurity defences and
tackling new threats and weaknesses.

Figure 1: Proposed Taxonomy of AI Techniques in the Cybersecurity Domain

(Source: Researchgate.net, 2023)

7. Data and Context Analysis


Analysis of the Information for Answering the Research Questions

If we look at the findings of a multitude of studies done in the relevant area of our research, it
would be clear that information on the effects of artificial intelligence (AI) on cybersecurity
is revealed by the data and context analysis. The following image shows the market size of
Artificial intelligence in the military which is expected to reach approx. USD “22.62 billion”
by the year 2032.

9
Fig. 2. Artificial Intelligence in Military Market Size

(Source: Precedenceresearch.com, 2024)

Proactive defence tactics and prediction threat identification are made easier by employing
machine learning algorithms’ efficient analysis of previous cyberattack data
(Shanmugavadivu and Nagarajan, 2023). Another important observation that the analysis
showed was that real-time network traffic monitoring is made possible by anomaly detection
algorithms, which can quickly identify and address possible security breaches (Cali et al.
2024). Artificial intelligence (AI) simulation models facilitate strategic choice-making and
allocation of resources by providing insightful information on the efficacy of various
cybersecurity tactics (Arockiasamy, 2023).

Moreover, the meta-analysis emphasises the socioeconomic effects of AI in cybersecurity,


including worries about employment displacement and ethical issues. Considering all things,
the data and context analysis highlight how important AI is to improving cybersecurity
measures while also addressing many opportunities and challenges it brings.

Findings and Contribution of the Information

This research analysis presents new and potentially vital information regarding the
correlation between cybersecurity and artificial intelligence, building upon previously

10
published findings. It includes both anticipated and unforeseen outcomes. The comprehension
of AI's dual function in enhancing cybersecurity defenses and simultaneously posing new
problems through AI-generated attacks is a noteworthy advancement. Furthermore,
contemporary AI-based technologies not only have the ability to bring out new and
unparalleled capabilities in detecting and responding to attacks, but they also possess the
potential to expose complicated and difficult-to-understand vulnerabilities that attackers from
unknown locations can exploit. This paradox clearly emphasizes the necessity for a
comprehensive comprehension of the impact of AI on cybersecurity and the creation of
flexible protection methods.

The study emphasizes the significance of employing and executing experimental solutions,
such as those involving deceptive tactics and advanced adversarial machine learning, to
effectively combat these ever-changing online threats. Moreover, the research highlights the
importance of human expertise while utilizing AI-powered security.

This study elucidates the correlation between cybersecurity and artificial intelligence.
Furthermore, it offers valuable guidance for firms seeking to enhance their defensive tactics
against emerging threats and effectively navigate the always changing industry.

8. Convincing Arguments
Arguments with Findings

Arguments derived from outcomes

The intricate nature of neural fuzzing, limited availability of data sets, and financial
limitations all hinder the widespread adoption of AI as a security tool. The objective is to
provide a common approach for implementing technology, with the aim of closing the divide
between ethical and unethical hackers. The integration of AI systems with cyber-attacks is
transforming the utilization of online social media platforms. This system effectively
manages multiple potential points of attack and communication methods, automates the
process of identifying threats, and enhances the ability to detect potential threats. Therefore, it
is crucial to examine how AI might be utilized to fulfill fundamental human requirements and
enhance the development of cybersecurity protocols.

In the present era, individuals reside in a virtual realm where all data is stored in digital or
online formats. The data may pertain to intellectual property, financial transactions, personal

11
issues, or any other significant government information. The combination of this technology
has led to substantial advancements in cybersecurity protection. AI has proven its ability to
navigate the complex landscape of modern cyber threats by using improved threat
intelligence, increased anomaly detection, and optimized incident response.

Conclusion

It is important to thoroughly evaluate the research findings and recommendations while


exploring the possible uses of artificial intelligence (AI) in cybersecurity. Prioritizing current
research and AI models is essential for enhancing AI in industrial defense strategies. In order
to ensure responsible and accountable deployment of AI, it is imperative to combine
technological breakthroughs with ethical frameworks. Furthermore, international
collaboration in establishing regulatory standards is essential for ensuring effective protection
against security hazards.

9. Limitations and Delimitations

The utilization of AI as a defensive tactic for industry has presented numerous constraints and
drawbacks alongside its benefits. The frequency of cyberthreats is steadily rising in tandem
with the rapid progress of cybersecurity technology. The findings of this study, as well as
those of any other study, may fast become obsolete due to the rapid advancement of AI
technology and the emergence of cyber dangers.

Moreover, the recent advancements in this technology may pose significant privacy and
security hazards. Nevertheless, these risks can be effectively controlled by the use of diverse
cyber security techniques and enhancements, provided they are executed in a comprehensive
and integrated manner.

Furthermore, the newly formed socio-economic system may face possible issues arising from
ethical concerns around biases and transparency in the utilization of AI in cybersecurity.
These limitations and regulations operate as a reminder of the necessity to strictly follow
research protocols, foster collaboration among different fields of study, and consistently
adapt in order to comprehensively investigate the intricate aspects of AI's influence on
cybersecurity.

10. Significance of the Study

12
Data security, particularly for sensitive or personal data, is currently of utmost importance.
Cybercriminals are continuously enhancing their intelligence and creativity in abusing
susceptible information, institutions, and governmental bodies. Every day, new instances of
data breaches, cyberattacks, data intoxication, hacking attempts, and crashes are being
revealed. Organizations, enterprises, and governments that utilize networks of computers face
a significant threat from cyber thieves. Cyber-attacks have been classified among the top five
probable origins of risks on a worldwide scale. Network breaches are increasing in
complexity while thieves are continuously enhancing their skills. Organizations and other
consumers of computing systems are compelled to prioritize network safety and security.

11. Role of the Research in Refining, Revising or Extending Existing Knowledge in


the Investigation Area

This research is crucial in enhancing, modifying, and expanding current knowledge in the
field of inquiry by offering complete insights into the transformative influence of AI on
cybersecurity. Conducting thorough analysis and employing novel approaches actively
contributes to the advancement of knowledge and also, at the same time, paves the way for
the development of future strategies in cybersecurity by advocating constant revision in both
policies and data analysis methodologies.

Recommendations for Future Research

Future research can create a path for the advocation of improvement in cooperation among
legislators, technical professionals, and important corporate leaders to more effectively
examine, prevent, and reduce the potentially harmful applications of AI in cyberspace. The
cooperation can benefit from the insights gained from regulating cybercrime and bioethics.

Promoting Cyber Security Data

Promoting the exchange of cybersecurity-related data, such as data used to train models based
on acknowledged best practices. In order to promote the transmission of expertise across
borders, it is important to encourage cooperation in the private sector. This can be done by
offering incentives and establishing an organizational structure that ensures legal certainty
when exchanging data. Emphasizing the enhancement of the dependability of AI, instead of
improving its credibility, in standards and certification processes.

13
Standardisation of Cyber Security in Defence Systems

Developing certification standards for AI defence systems can lead to much better
performance and security. Various research methods for evaluating the effectiveness of AI in
defence systems can be used. The research methods can include factors like robustness,
unbiased analysis, and other factors.

14
12. References
Alhayani, B., Mohammed, H.J., Chaloob, I.Z. and Ahmed, J.S., 2021. Effectiveness of
artificial intelligence techniques against cyber security risks apply of IT industry. Materials
Today: Proceedings, 531.
https://www.academia.edu/download/66000244/1_s2.0_S2214785321016722_main.pdf
Al-Suqri, M.N. and Gillani, M., 2022. A comparative analysis of information and artificial
intelligence toward national security. IEEE Access, 10, pp.64420-64434.
https://ieeexplore.ieee.org/abstract/document/9797706
Ansari, M.F., Dash, B., Sharma, P. and Yathiraju, N., 2022. The impact and limitations of
artificial intelligence in cybersecurity: a literature review. International Journal of Advanced
Research in Computer and Communication Engineering.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4323317
Arockiasamy, K., 2023. The Role of Artificial Intelligence in Cyber Security. In AI Tools for
Protecting and Preventing Sophisticated Cyber Attacks (pp. 1-24). IGI Global.
https://www.igi-global.com/chapter/the-role-of-artificial-intelligence-in-cyber-security/
328592
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2),
pp.1153-1176. https://ieeexplore.ieee.org/abstract/document/7307098/
Cali, U., Catak, F.O. and Halden, U., Trustworthy Cyber-Physical Power Systems Using Ai:
Dueling Algorithms for Pmu Anomaly Detection and Cybersecurity. Available at SSRN
4695936. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4695936
Crawford, T.H., 2020. Actor-network theory. In Oxford research encyclopedia of literature.
https://oxfordre.com/literature/display/10.1093/acrefore/9780190201098.001.0001/acrefore-
9780190201098-e-965
Drew, R., 2016. Technological determinism. A companion to popular culture, pp.165-183.
https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118883341.ch10
Graue, C., 2015. Qualitative data analysis. International Journal of Sales, Retailing &
Marketing, 4(9), pp.5-14.
https://www.circleinternational.co.uk/wp-content/uploads/2021/01/IJSRM4-9.pdf#page=9
Hutter, R. and Hutter, M., 2021. Chances and Risks of Artificial Intelligence—A Concept of
Developing and Exploiting Machine Intelligence for Future Societies. Applied System
Innovation, 4(2), p.37. https://www.mdpi.com/2571-5577/4/2/37

15
Iqbal, S., Rizvi, S.W.A., Haider, M.H. and Raza, S., 2023. Artificial Intelligence in Security
and Defense: Explore the integration of AI in military strategies, security policies, and its
implications for global power dynamics. INTERNATIONAL JOURNAL OF HUMAN AND
SOCIETY, 3(4), pp.341-353. https://ijhs.com.pk/index.php/IJHS/article/view/337
Jimmy, F., 2021. Emerging Threats: The Latest Cybersecurity Risks and the Role of
Artificial Intelligence in Enhancing Cybersecurity Defenses. Valley International Journal
Digital Library, pp.564-574. https://vipublisher.com/index.php/vij/article/view/292
Johhson, E. and Sylvia, M.L., 2018. Secondary data collection. Critical Analytics and Data
Management for the DNP, p.61. https://books.google.com/books?
hl=en&lr=&id=dvtIDwAAQBAJ&oi=fnd&pg=PA61&dq=Secondary+data+collection.
+Critical+Analytics+and+Data+Management+&ots=bZOKtOYPNH&sig=n7sZ2CcCgV9apS
Fh_z7t8gbvcwA
Karpunina, E.K., Dedov, S.V., Kholod, M.V., Ponomarev, S.V. and Gorlova, E.A., 2020.
Artificial intelligence and its impact on economic security: Trends, estimates and forecasts. In
Scientific and Technical Revolution: Yesterday, Today and Tomorrow (pp. 213-225).
Springer International Publishing. https://link.springer.com/chapter/10.1007/978-3-030-
47945-9_23
Khan, S.U., Eusufzai, F., Azharuddin Redwan, M., Ahmed, M. and Sabuj, S.R., 2022.
Artificial intelligence for cyber security: performance analysis of network intrusion detection.
In Explainable artificial intelligence for cyber security: Next generation artificial
intelligence (pp. 113-139). Cham: Springer International Publishing.
https://link.springer.com/chapter/10.1007/978-3-030-96630-0_6
Kumar, S., Gupta, U., Singh, A.K. and Singh, A.K., 2023. Artificial intelligence:
revolutionizing cyber security in the digital era. Journal of Computers, Mechanical and
Management, 2(3), pp.31-42. https://jcmm.co.in/index.php/jcmm/article/view/64
Manoharan, A. and Sarker, M., 2023. Revolutionizing Cybersecurity: Unleashing the Power
of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection.
https://www.researchgate.net/profile/Mithun-Sarker-4/publication/379044498_Revolutionizin
g_Cybersecurity_Unleashing_the_Power_of_Artificial_Intelligence_and_Machine_Learning
_for_Next-Generation_Threat_Detection/links/65f8525e1f0aec67e2a65bb9/Revolutionizing-
Cybersecurity-Unleashing-the-Power-of-Artificial-Intelligence-and-Machine-Learning-for-
Next-Generation-Threat-Detection.pdf

16
Naik, B., Mehta, A., Yagnik, H. and Shah, M., 2022. The impacts of artificial intelligence
techniques in augmentation of cybersecurity: a comprehensive review. Complex & Intelligent
Systems, 8(2), pp.1763-1780. https://link.springer.com/article/10.1007/s40747-021-00494-8
Nickerson, C., 2022. Positivism in sociology: definition, theory & examples. Simply
Psychology. https://www.simplypsychology.org/positivism-in-sociology-definition-theory-
examples.html
Precedenceresearch.com, (2024), artificial-intelligence-in-military-market. Available at:
https://www.precedenceresearch.com/artificial-intelligence-in-military-market [Accessed on:
23-05-2024]
Raimundo, R. and Rosário, A., 2021. The impact of artificial intelligence on data system
security: a literature review. Sensors, 21(21), p.7029. https://www.mdpi.com/1424-
8220/21/21/7029
Researchgate.net, (2023), Proposed-taxonomy-of-AI-techniques-in-the-cybersecurity-domain.
Available at: https://www.researchgate.net/figure/Proposed-taxonomy-of-AI-techniques-in-
the-cybersecurity-domain_fig2_369885804#:~:text=The%20key%20AI%20frameworks
%20considered,cybersecurity%20and%20ensuring%20operational%20effectiveness
[Accessed on: 23-05-2024]
Sarker, I.H., Kayes, A.S.M. and Watters, P., 2019. Effectiveness analysis of machine learning
classification models for predicting personalized context-aware smartphone usage. Journal of
Big Data, 6(1), pp.1-28. https://link.springer.com/article/10.1186/s40537-019-0219-y
Shanmugavadivu, R. and Nagarajan, N., 2011. Network intrusion detection system using
fuzzy logic. Indian Journal of Computer Science and Engineering (IJCSE), 2(1), pp.101-111.
https://citeseerx.ist.psu.edu/document?
repid=rep1&type=pdf&doi=87614275882023d81b0c8814c4f7a13f6ba4cb7b

17

You might also like