Samah Mohammed - Profile on Academia.edu (original) (raw)

Samah Mohammed

IJSES Editor related author profile picture

Sitalakshmi Venkatraman related author profile picture

Jollanda Shara related author profile picture

Arif Siddiqi related author profile picture

jiaming li related author profile picture

Dr. Iqbal H. Sarker related author profile picture

Roderick Arthur related author profile picture

Dr. Roderick N . Arthur related author profile picture

Stephen Gulliver related author profile picture

Thanh Thi Nguyen related author profile picture

Uploads

Papers by Samah Mohammed

Research paper thumbnail of Defense by Artificial Intelligence in Cyber Attack

IJSES, 2021

In light of the technical developments and the amount of data used and the sources available in t... more In light of the technical developments and the amount of data used and the sources available in the network and the various devices that expose it to a cyber attack, it has become necessary to use advanced technologies that have the ability to search for any threat and discovered it and prevent it from causing damage. The attack, which means that it may be used negatively to achieve damage, which makes it imperative for us to update and develop the methods used and databases. In this paper, the study was focused on the most important information about artificial intelligence, cyber attack and the advantages of artificial intelligence AI-Based approach for defending against cyberspace attacks and Defense Strategy For Artificial Intelligence Adversarial attack, and finally AI applications of security threats in cyberattack. It is a narrative review summarizes the findings of some existing literature for readers from outside the field who require a rapid and general summary in the role of artificial intelligence in cyber attacks.

Research paper thumbnail of Defense by Artificial Intelligence in Cyber Attack

IJSES, 2021

In light of the technical developments and the amount of data used and the sources available in t... more In light of the technical developments and the amount of data used and the sources available in the network and the various devices that expose it to a cyber attack, it has become necessary to use advanced technologies that have the ability to search for any threat and discovered it and prevent it from causing damage. The attack, which means that it may be used negatively to achieve damage, which makes it imperative for us to update and develop the methods used and databases. In this paper, the study was focused on the most important information about artificial intelligence, cyber attack and the advantages of artificial intelligence AI-Based approach for defending against cyberspace attacks and Defense Strategy For Artificial Intelligence Adversarial attack, and finally AI applications of security threats in cyberattack. It is a narrative review summarizes the findings of some existing literature for readers from outside the field who require a rapid and general summary in the role of artificial intelligence in cyber attacks.

Log In