A Review on Various Techniques of AI Defender
Abstract
Recent years, computer works on Artificial intelligence. In simple word, Artificial intelligence is an entirely automated technology, which works all work is done from automatically like a self-driving car, provide automatic protection from attackers for the system. AI protect from a known or unknown attack in the form of spam, spy, phishing and communication filtration. This all know, or unknown attack use collects data of the user, which is very harmful. AI understandably use to reduce applications of black-box, an adversarial attack. Artificial intelligence can use in robotics which is used in military power. The robot is more efficient than human, and it is very secure to find land mine and to use the proper attack on the enemy camp. Furthermore, it can reduce terrorism in any country. In the present time, the cybercrime is dangerous for every user under the network. Digitalization security, geographical security, browser security, and protection from all type of problem.
How to cite this article:
Gautam K, Sharma PK, Samriya M et al. A Review on Various Methods of AI Defender. J Adv Res Appl Arti Intel Neural Netw 2020; 4(1): 1-6.
References
[2]. Y. XIao-yang, "Study on Development of Information Security and Artificial Intelligence," 2011 Fourth International Conference on Intelligent Computation Technology and Automation, Shenzhen, Guangdong, 2011, pp. 248-250.
[3]. Qinghua Meng, "An immune-neuroendocrine-inspired inspired artificial homeostatic security-coordination model for E-Government system," 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), Dengleng, 2011, pp. 6960-6963.
[4]. Y. Azan Basallo, V. Estrada Senti and N. Martinez Sanchez, "Artificial intelligence techniques for information security risk assessment," in IEEE Latin America Transactions, vol. 16, no. 3, pp. 897-901, March 2018.
[5]. D. M. Isaacson, "The ODNI-OUSD(I) xpress challenge: An experimental application of artificial intelligence techniques to National Security Decision Support," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2018, pp. 104-109.
[6]. M. Dhingra, M. Jain and R. S. Jadon, "Role of artificial intelligence in enterprise information security: A review," 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, 2016, pp. 188-191.
[7]. A. D. Wahyudi Sumari, A. S. Ahmad and C. Artificial, "The application of cognitive artificial intelligence within C4ISR framework for national resilience," 2017 Fourth Asian Conference on Defence Technology - Japan (ACDT), Tokyo, 2017, pp. 1-8.
[8]. N. Kumar, N. Kharkwal, R. Kohli and S. Choudhary, "Ethical aspects and future of artificial intelligence," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 111-114.
[9]. R. Trifonov, O. Nakov and V. Mladenov, "Artificial Intelligence in Cyber Threats Intelligence," 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Plaine Magnien, 2018, pp. 1-4.
[10]. V. Mavroeidis and S. Bromander, "Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence," 2017 European Intelligence and Security Informatics Conference (EISIC), Athens, 2017, pp. 91-98.
[11]. P. Aggarwal, Z. Maqbool, A. Grover, V. S. C. Pammi, S. Singh and V. Dutt, "Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games," 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, 2015, pp. 1-8.
[12]. D. W. Casbeer, E. Garcia, Z. E. Fuchs and M. Pachter, "Cooperative target defense differential game with a constrained-maneuverable Defender," 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, 2015, pp. 1713-1718.
[13]. G. A. Fink and Y. Shulga, "Helping IT and OT Defenders Collaborate," 2018 IEEE International Conference on Industrial Internet (ICII), Seattle, WA, 2018, pp. 188-194.
[14]. N. Bhargava, A.K. Sharma, A. K. and P. S. Rathoe, "An adaptive method for edge preserving denoising", 2017 2nd International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 2017, pp. 600-604.
[15]. S. Sharma and A. K. Sharma, “An adaptive approach for Decomposition of Space Variant Blur and It’s Restoration using Blind Deconvolution” INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOG, vol. 7, issue-4, pp. 492-496, April, 2017.