AI in Cybersecurity: Enhancements in Cybersecurity: Improving Threat Detection and Response
Keywords:
Artificial intelligence (AI), Cybersecurity, Threat detection, Response capabilities False positives, False negatives, Operational effectiveness, Real-time learning, Deep learning models.Abstract
The integration of artificial intelligence (AI) in cybersecurity promises enhanced threat detection and response capabilities, yet organizations encounter numerous challenges in optimizing AI solutions. These include managing the high incidence of false positives and negatives generated by AI systems, which can hamper operational effectiveness and strain security teams. Moreover, the dynamic nature of cyber threats necessitates continual learning and updating of AI models, constrained by limited real-time data availability and computational resources. Compounding these complexities is the absence of widely accepted frameworks for securely assessing and operationalizing AI in cybersecurity contexts. Addressing these issues is crucial for unleashing AI's potential in real-time threat detection and response, thereby fortifying organizational cyber defenses.
Downloads
References
Anderson, J., & White, P. (2021). Integration challenges of AI in cybersecurity infrastructures. Journal of Cybersecurity, 12(3), 345-367.
Brown, R., & Green, S. (2021). Managing alert fatigue in AI-driven cybersecurity systems. Cybersecurity Review, 8(2), 210-228.
Doe, J., Smith, A., & Johnson, B. (2023). AI in cybersecurity: Opportunities and challenges. Journal of Information Security, 15(1), 89-104.
Evans, K. (2020). Standardizing AI evaluations for cybersecurity. Information Security Journal, 9(4), 112-128.
Garcia, L., & Wang, H. (2023). Privacy-preserving AI techniques in cybersecurity. Data Protection Journal, 7(1), 56-78.
Johnson, B., Lee, H., & Kim, S. (2021). Advancements in AI algorithms for threat detection. Machine Learning in Security, 11(2), 134-152.
Jones, M., & Patel, R. (2020). The challenges of integrating AI in cybersecurity. International Journal of Cyber Studies, 10(2), 200-219.
Kim, S., & Lee, H. (2022). Optimizing AI for real-time threat detection. Cyber Threat Journal, 13(1), 78-95.
Li, Y., & Zhao, X. (2019). Cost and complexity of AI in cybersecurity. Journal of Security Studies, 5(3), 255-270.
Lopez, J., & Martinez, A. (2021). Frameworks for AI integration in cybersecurity. Security Infrastructure Journal, 14(4), 300-318.
Miller, D. (2019). Evaluating AI-based cybersecurity solutions. Journal of Information Technology, 8(1), 144-160.
Nguyen, T., Brown, C., & Green, D. (2022). Data sharing in AI-enhanced cybersecurity. Cyber Intelligence Journal, 6(3), 203-224.
Smith, A., Jones, M., & Patel, R. (2021). AI for large data processing in cybersecurity. Journal of Advanced Security, 4(2), 98-115.
Wilson, R., Anderson, J., & White, P. (2020). Real-time data input challenges in AI cybersecurity. Journal of Cyber Defense, 11(2), 123-140.
Taylor, K., & Harris, J. (2019). Data privacy challenges in AI cybersecurity. Privacy and Security Journal, 3(1), 78-94.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.