Samah Mohammed - Academia.edu (original) (raw)
Uploads
Papers by Samah Mohammed
IJSES, 2021
In light of the technical developments and the amount of data used and the sources available in t... more In light of the technical developments and the amount of data used and the sources available in the network and the various devices that expose it to a cyber attack, it has become necessary to use advanced technologies that have the ability to search for any threat and discovered it and prevent it from causing damage. The attack, which means that it may be used negatively to achieve damage, which makes it imperative for us to update and develop the methods used and databases. In this paper, the study was focused on the most important information about artificial intelligence, cyber attack and the advantages of artificial intelligence AI-Based approach for defending against cyberspace attacks and Defense Strategy For Artificial Intelligence Adversarial attack, and finally AI applications of security threats in cyberattack. It is a narrative review summarizes the findings of some existing literature for readers from outside the field who require a rapid and general summary in the role of artificial intelligence in cyber attacks.
IJSES, 2021
In light of the technical developments and the amount of data used and the sources available in t... more In light of the technical developments and the amount of data used and the sources available in the network and the various devices that expose it to a cyber attack, it has become necessary to use advanced technologies that have the ability to search for any threat and discovered it and prevent it from causing damage. The attack, which means that it may be used negatively to achieve damage, which makes it imperative for us to update and develop the methods used and databases. In this paper, the study was focused on the most important information about artificial intelligence, cyber attack and the advantages of artificial intelligence AI-Based approach for defending against cyberspace attacks and Defense Strategy For Artificial Intelligence Adversarial attack, and finally AI applications of security threats in cyberattack. It is a narrative review summarizes the findings of some existing literature for readers from outside the field who require a rapid and general summary in the role of artificial intelligence in cyber attacks.