dc.contributor.author |
Nyale, Duncan |
|
dc.contributor.author |
Angolo, Shem Mbandu |
|
dc.date.accessioned |
2023-11-28T08:35:50Z |
|
dc.date.available |
2023-11-28T08:35:50Z |
|
dc.date.issued |
2022 |
|
dc.identifier.citation |
International Journal of Computer Applications Technology and Research Volume 11–Issue 12, 474-477, 2022 |
en_US |
dc.identifier.issn |
2319–8656 |
|
dc.identifier.other |
DOI:10.7753/IJCATR1112.1014 |
|
dc.identifier.uri |
https://ijcat.com/archieve/volume11/issue12/ijcatr11121014.pdf |
|
dc.identifier.uri |
https://repository.cuk.ac.ke/handle/123456789/1154 |
|
dc.description |
A research article published in International Journal of Computer Applications Technology and Research |
en_US |
dc.description.abstract |
Artificial intelligence (AI) and cyber security are two emerging technologies in the modern world. Machine learning (ML)
models serve as the cornerstone of AI. Access control, user authentication, user behaviour analysis, spam, malware, and botnet
identification are all areas where AI is crucial. The security issues of today, however, are many. Users now face substantial security
threats due to the increasing use of apps like WhatsApp and Viber, social media, mobile devices, cloud computing, and social media.
We will explain how artificial intelligence (AI) can be used to handle cyber security concerns and cyber threats in this essay. Since the
past decade, the field of cyber security has expanded significantly. Thus, both the number of applications and the number of risks are
continuously increasing. Artificial intelligence's applications in cyber security are covered in this essay. With a primary focus on
studies between 2018 and 2022, the study technique involved online desk research. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
International Journal of Computer Applications Technology and Research |
en_US |
dc.subject |
Artificial Intelligence |
en_US |
dc.subject |
Cyber Security |
en_US |
dc.subject |
Cyber-threats, Block chain |
en_US |
dc.title |
A Survey of Artificial Intelligence in Cyber Security |
en_US |
dc.type |
Article |
en_US |