Automated cyber defence: A review

S Vyas, J Hannay, A Bolton, PP Burnap - arxiv preprint arxiv:2303.04926, 2023 - arxiv.org
Within recent times, cybercriminals have curated a variety of organised and resolute cyber
attacks within a range of cyber systems, leading to consequential ramifications to private and …

Adapt and overcome: Perceptions of adaptive autonomous agents for human-AI teaming

AI Hauptman, BG Schelble, NJ McNeese… - Computers in Human …, 2023 - Elsevier
Rapid advances in AI technologies have caused teams to explore the use of AI agents as
full, active members of the team. The complex environments that teams occupy require …

Empirically understanding the potential impacts and process of social influence in human-AI teams

C Flathmann, W Duan, NJ Mcneese… - Proceedings of the …, 2024 - dl.acm.org
In the coming years, Artificial Intelligence (AI) will be applied as a teammate that works
alongside and collaborates with humans. Prior research in teaming and CSCW has shown …

[HTML][HTML] Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter

N Pattnaik, S Li, JRC Nurse - Computers & Security, 2023 - Elsevier
Many researchers have studied non-expert users' perspectives of cyber security and privacy
aspects of computing devices at home, but their studies are mostly small-scale empirical …

A compendium and evaluation of taxonomy quality attributes

M Unterkalmsteiner, W Abdeen - Expert Systems, 2023 - Wiley Online Library
Introduction Taxonomies capture knowledge about a particular domain in a succinct manner
and establish a common understanding among peers. Researchers use taxonomies to …

Data-driven intelligence can revolutionize today's cybersecurity world: A position paper

IH Sarker, H Janicke, L Maglaras… - … Conference on Advanced …, 2023 - Springer
As cyber threats evolve and grow progressively more sophisticated, cyber security is
becoming a more significant concern in today's digital era. Traditional security measures …

Detecting cyber security related Twitter accounts and different sub-groups: A multi-classifier approach

MI Mahaini, S Li - Proceedings of the 2021 IEEE/ACM International …, 2021 - dl.acm.org
Many cyber security experts, organizations, and cyber criminals are active users on online
social networks (OSNs). Therefore, detecting cyber security related accounts on OSNs and …

An End-to-End Framework for Cybersecurity Taxonomy and Ontology Generation and Updating

A Kougioumtzidou, A Papoutsis… - … on Cyber Security …, 2024 - ieeexplore.ieee.org
Effective cyber-defense practices often require the use of structured knowledge
representations, such as taxonomies and ontologies, to organise vast amounts of data and …

A review for cyber security challenges on big data using machine learning techniques

S Mandal, AS Sabitha, D Mehrotra - ICT and Data Sciences, 2022 - taylorfrancis.com
With the rapid changes in technology, almost everything is digitalized; the number of users
has also increased rapidly, and with this, the threat to data security has increased. Security …

The Human Side of Adaptive Autonomy: Design Considerations for Adaptive Autonomous Teammates

A Hauptman - 2024 - search.proquest.com
Ground-breaking advances in artificial intelligence (AI) have led to the possibility of AI
agents operating not just as useful tools for teams, but also as full-fledged team members …