References
Abbas, T. N. A., Hameed, R., Kadhim, A. A., and Qasim, N. H. (2024). Artificial intelligence and criminal liability: exploring the legal implications of ai-enabled crimes.
Encuentros. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico., (22 ), 140-159.
https://doi.org/:10.5281/zenodo.13386675
Adel, A., Mohammed, A., Daoguo, Y., and Abdulrahman, A. (2023). Advanced techniques for cyber threat intelligence-based APT detection and mitigation in cloud environments.
Proc. SPIE.
https://doi.org/:10.1117/12.2681627.
Ali, S., Abusabha, O., Ali, F., Imran, M., and Abuhmed, T. (2023). Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis.
IEEE Transactions on Network and Service Management, 20 (2), 1199-1209.
https://doi.org/:10.1109/TNSM.2022.3200741
Almutlaq, S., Derhab, A., Hassan, M. M., and Kaur, K. (2023). Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks.
IEEE Transactions on Intelligent Transportation Systems, 24 (12), 15687-15701.
https://doi.org/:10.1109/TITS.2022.3202869
Alzahrani, A., and Aldhyani, T. H. H. (2022). Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks.
Electronics, 11 (22).
https://doi.org/:10.3390/electronics11223837.
Bhusal, D., Shin, R., Shewale, A. A., Veerabhadran, M. K. M., Clifford, M., Rampazzi, S., and Rastogi, N. (2023). SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability.
Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy.
https://doi.org/:10.1145/3600160.3600193
Dong, M., Yao, L., Wang, X., Benatallah, B., Zhang, S., and Sheng, Q. Z. (2023). Gradient Boosted Neural Decision Forest.
IEEE Transactions on Services Computing, 16 (1), 330-342.
https://doi.org/:10.1109/TSC.2021.3133673
Et al., N. K. (2023). AI in Cybersecurity: Threat Detection and Response with Machine Learning.
Tuijin Jishu/Journal of Propulsion Technology, 44, 38–46.
https://doi.org/:10.52783/tjjpt.v44.i3.237
He, N., Zhang, Z., Wang, X., and Gao, T. (2023). Efficient Privacy-Preserving Federated Deep Learning for Network Intrusion of Industrial IoT.
International Journal of Intelligent Systems, 2023 (1), 2956990.
https://doi.org/:10.1155/2023/2956990
Lee, H. W., Han, T. H., and Lee, T. J. (2023). Reference-Based AI Decision Support for Cybersecurity.
IEEE Access, 11, 143324-143339.
https://doi.org/:10.1109/ACCESS.2023.3342868
Li, H., Wu, J., Xu, H., Li, G., and Guizani, M. (2022). Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach.
IEEE Transactions on Dependable and Secure Computing, 19 (2), 757-775.
https://doi.org/:10.1109/TDSC.2021.3130944
Li, S., Chai, G., Wang, Y., Zhou, G., Li, Z., Yu, D., and Gao, R. (2023). CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM.
IEEE Access, 11, 92041-92054.
https://doi.org/:10.1109/ACCESS.2023.3307429
Li, Y., Wang, J., Fujiwara, T., and Ma, K.-L. (2023). Visual Analytics of Neuron Vulnerability to Adversarial Attacks on Convolutional Neural Networks.
ACM Trans. Interact. Intell. Syst., 13 (4), Article 20.
https://doi.org/:10.1145/3587470
Nameer, Q., Aqeel, J., and Muthana, M. (2023). The Usages of Cybersecurity in Marine Communications.
Transport Development, 3 (18).
https://doi.org/:10.33082/td.2023.3-18.05
Park, C., Lee, J., Kim, Y., Park, J. G., Kim, H., and Hong, D. (2023). An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks.
IEEE Internet of Things Journal, 10 (3), 2330-2345.
https://doi.org/:10.1109/JIOT.2022.3211346
Qasim, N., Shevchenko, Y.P., and Pyliavskyi, V. (2019). Analysis of methods to improve energy efficiency of digital broadcasting.
Telecommunications and Radio Engineering, 78 (16), 1457-1469.
https://doi.org/:10.1615/TelecomRadEng.v78.i16.40
Rao Sangarsu, R. (2023). Enhancing Cyber Security Using Artificial Intelligence: A Comprehensive Approach.
International Journal of Science and Research (IJSR), 12 (11), 8-13.
https://doi.org/:10.21275/SR231029092527
Rjoub, G., Bentahar, J., Wahab, O. A., Mizouni, R., Song, A., Cohen, R., Otrok, H., et al. (2023). A Survey on Explainable Artificial Intelligence for Cybersecurity.
IEEE Transactions on Network and Service Management, 20 (4), 5115-5140.
https://doi.org/:10.1109/TNSM.2023.3282740
Sagu, A., Gill, N. S., Gulia, P., Singh, P. K., and Hong, W.-C. (2023). Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment.
Sustainability, 15 (3).
https://doi.org/:10.3390/su15032204.
Salloum, S., Gaber, T., Vadera, S., and Shaalan, K. (2022). A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques.
IEEE Access, 10, 65703-65727.
https://doi.org/:10.1109/ACCESS.2022.3183083
Sauka, K., Shin, G.-Y., Kim, D.-W., and Han, M.-M. (2022). Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning.
Applied Sciences, 12 (13).
https://doi.org/:10.3390/app12136451.
Shanthi, R. R., Sasi, N. K., and Gouthaman, P. (2023). A New Era of Cybersecurity: The Influence of Artificial Intelligence. 2
023 International Conference on Networking and Communications (ICNWC), 5-6 April.
https://doi.org/:10.1109/ICNWC57852.2023.10127453.
Shashkov, A., Hemberg, E., Tulla, M., and O’Reilly, U.-M. (2023). Adversarial agent-learning for cybersecurity: a comparison of algorithms.
The Knowledge Engineering Review, 38, e3.
https://doi.org/:10.1017/S0269888923000012
Sugumaran, D., John, Y. M. M., C, J. S. M., Joshi, K., Manikandan, G., and Jakka, G. (2023). Cyber Defence Based on Artificial Intelligence and Neural Network Model in Cybersecurity.
2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), 6-7 April.
https://doi.org/:10.1109/ICONSTEM56934.2023.10142590.
Yousif, O., Dawood, M., Jassem, F. T., and Qasim, N. H. (2024). Curbing crypto deception: evaluating risks, mitigating practices and regulatory measures for preventing fraudulent transactions in the middle east.
Encuentros: Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico, (22), 311-334.
https://doi.org/:10.5281/zenodo.13732337