Applications of AI in cybersecurity

Hofstetter, Matthias; Riedl, Reinhard; Gees, Thomas; Koumpis, Adamantios; Schaberreiter, Thomas (September 2020). Applications of AI in cybersecurity In: 2020 Second International Conference on Transdisciplinary AI (TransAI) (pp. 1-8). IEEE Computer Society Conference Publishing Services (CPS) 10.1109/TransAI49837.2020.00007

[img] Text
869900a138.pdf - Published Version
Restricted to registered users only
Available under License Publisher holds Copyright.

Download (221kB) | Request a copy

Issues related to digital security are, there is no doubt for this, of utmost importance in the development of methods and support measures for organisations to successfully prepare for as well as realise their digital transformation. While big organisations and businesses may afford to buy services or develop their own in-house know-how and tools, small and medium-sized businesses are not having the means for this, be them financial resources, human resources or technology itself. This dystopic situation may on the other hand offer an unexpected and – as of today – yet unprecedented chance for innovations in terms of bridging the gap and addressing the need with use of AI technologies and services. In the paper we elaborate on a scenario that we have been developing as part of a European project that is part of the European Horizons 2020 project CSAWARE.

Item Type:

Conference or Workshop Item (Paper)

Division/Institute:

Business School > Institute for Digital Enabling

Name:

Hofstetter, Matthias;
Riedl, Reinhard;
Gees, Thomas;
Koumpis, Adamantios and
Schaberreiter, Thomas

Subjects:

T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering

ISBN:

978-1-7281-8699-3

Publisher:

IEEE Computer Society Conference Publishing Services (CPS)

Language:

English

Submitter:

Adamantios Koumpis

Date Deposited:

01 Oct 2020 13:45

Last Modified:

21 Sep 2021 02:18

Publisher DOI:

10.1109/TransAI49837.2020.00007

Uncontrolled Keywords:

cybersecurity Artificial Intelligence Machine Learning anomaly patterns detection

ARBOR DOI:

10.24451/arbor.12950

URI:

https://arbor.bfh.ch/id/eprint/12950

Actions (login required)

View Item View Item
Provide Feedback