Razavi et al., 2025 - Google Patents
AI-Driven Cybersecurity: Revolutionizing Threat Detection and Defence SystemsRazavi et al., 2025
- Document ID
- 11899571102697552042
- Author
- Razavi H
- Ouaissa M
- Ouaissa M
- Nakouri H
- Abdelgawad A
- Publication year
External Links
Snippet
This book delves into the revolutionary ways in which AI-driven innovations are enhancing every aspect of cybersecurity, from threat detection and response automation to risk management and endpoint protection. As AI continues to evolve, the synergy between …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sun et al. | Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives | |
| Hashmi et al. | Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security | |
| Radanliev | Digital security by design | |
| KR20180105688A (en) | Computer security based on artificial intelligence | |
| Kolade et al. | Artificial intelligence and information governance: Strengthening global security, through compliance frameworks, and data security | |
| Asmar et al. | Integrating machine learning for sustaining cybersecurity in digital banks | |
| Redhu et al. | Deep learning-powered malware detection in cyberspace: a contemporary review | |
| Mahmood et al. | Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection | |
| Ali et al. | An automated compliance framework for critical infrastructure security through Artificial Intelligence | |
| Mateus-Coelho et al. | Exploring cyber criminals and data privacy measures | |
| Sebestyen et al. | A literature review on security in the Internet of Things: Identifying and analysing critical categories | |
| Kapoor et al. | Platform and Model Design for Responsible AI | |
| Goswami et al. | Exploring the impact of artificial intelligence integration on cybersecurity: A comprehensive analysis | |
| Huang et al. | Utilizing prompt engineering to operationalize cybersecurity | |
| Kumar et al. | Machine Learning in Cybersecurity: A Comprehensive Survey of Data Breach Detection, Cyber-Attack Prevention, and Fraud Detection | |
| Karunaratne | Machine learning and big data approaches to enhancing e-commerce anomaly detection and proactive defense strategies in cybersecurity | |
| Ofili et al. | Threat intelligence and predictive analytics in USA cloud security: mitigating AI-driven cyber threats | |
| Nitz et al. | On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features | |
| Van Hoang | Human expertise and machine learning in collaborative intelligence frameworks for robust cybersecurity solutions | |
| Jones et al. | A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models | |
| Kolosnjaji et al. | Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization | |
| Razavi et al. | AI-Driven Cybersecurity: Revolutionizing Threat Detection and Defence Systems | |
| Allen Samuel | A literature review on business analytics and cybersecurity: Integrating data-driven insights with risk management | |
| Riza et al. | Leveraging Machine Learning and AI to Combat Modern Cyber Threats | |
| veria Hoseini et al. | Threat modeling AI/ML with the Attack Tree |