[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery

J Yin, MJ Tang, J Cao, M You, H Wang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Coexploitation behavior, referring to multiple software vulnerabilities being exploited jointly
by one or more exploits, brings enormous challenges to the prevention and remediation of …

A knowledge graph empowered online learning framework for access control decision-making

M You, J Yin, H Wang, J Cao, K Wang, Y Miao… - World Wide Web, 2023 - Springer
Abstract Knowledge graph, as an extension of graph data structure, is being used in a wide
range of areas as it can store interrelated data and reveal interlinked relationships between …

Enhancing security in cloud computing using artificial intelligence (AI)

D Stutz, JT de Assis, AA Laghari… - … Analytics and Cyber …, 2024 - Wiley Online Library
Cloud computing (CC) technologies (viz artificial intelligence (AI), data science,
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …

A compact vulnerability knowledge graph for risk assessment

J Yin, W Hong, H Wang, J Cao, Y Miao… - ACM Transactions on …, 2024 - dl.acm.org
Software vulnerabilities, also known as flaws, bugs or weaknesses, are common in modern
information systems, putting critical data of organizations and individuals at cyber risk. Due …

Graph intelligence enhanced bi-channel insider threat detection

W Hong, J Yin, M You, H Wang, J Cao, J Li… - … Conference on Network …, 2022 - Springer
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …

[HTML][HTML] Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities

A Rostami, M Mohammadi, H Karimipour - International Journal of Electrical …, 2023 - Elsevier
This paper presents a reliability assessment technique for cyber-physical power systems
(CPPSs) that incorporates cybersecurity issues by considering non-normal random …

A survey on automated software vulnerability detection using machine learning and deep learning

NS Harzevili, AB Belle, J Wang, S Wang, Z Ming… - arxiv preprint arxiv …, 2023 - arxiv.org
Software vulnerability detection is critical in software security because it identifies potential
bugs in software systems, enabling immediate remediation and mitigation measures to be …

Real-time safety assessment for dynamic systems with limited memory and annotations

Z Liu, X He - IEEE Transactions on Intelligent Transportation …, 2023 - ieeexplore.ieee.org
Real-time safety assessment of dynamic systems has recently received increasing attention.
However, the performance of existing advanced approaches is often negatively affected by …

Elastic optimization for stragglers in edge federated learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …