Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Hasan Alkahtani and Theyazn H. H. Aldhyani, “Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices”, Sensors 2022, 22, 2268, doi.org/10.3390/s22062268 [2] Daniel Kant, Andreas Johannsen, “Evaluation of AI-based use cases for enhancing the cyber security defense of small and medium-sized companies (SMEs)”, 2022, Society for Imaging Science and Technology, doi.org/10.2352/EI.2022.34.3.MOBMU-38 [3] Zhimin Zhang, Huansheng Ning, Feifei Shi, Fadi Farha, Yang Xu, Jiabo Xu, Fan Zhang, Kim?Kwang Raymond Choo, “Artificial intelligence in cyber security: research advances, challenges, and opportunities”, 2021 Springer, doi.org/10.1007/s10462-021-09976-0 [4] Muhammed AbuOdeh, Christian Adkins, Omid Setayeshfar, Prashant Doshi, Kyu H. Lee, “A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots”, The Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI-21), 2021, Association for the Advancement of Artificial Intelligence [5] Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan and Seyit A. Camtepe, “A Markov Game Model for AI-based Cyber Security Attack Mitigation”, arXiv:2107.09258v1 [cs.GT] 20 Jul 2021 [6] Thanh Cong Truong, Quoc Bao Diep and Ivan Zelinka, “Artificial Intelligence in the Cyber Domain: Offense and Defense”, Symmetry 2020, 12, 410; doi:10.3390/sym12030410 [7] Jonghoon Lee, Jonghyun Kim, Ikkyun Kim, And Kijun Han, “Cyber Threat Detection based on Artificial Neural Networks using Event Profiles”, VOLUME 7, 2019, DOI 10.1109/ACCESS.2019.2953095, IEEE Access [8] A.M.S.N. Amarasinghe, W.A.C.H. Wijesinghe, D.L.A. Nirmana, Anuradha Jayakody, A.M.S. Priyankara, “AI Based Cyber Threats and Vulnerability Detection, Prevention and Prediction System”, 2019 International Conference on Advancements in Computing (ICAC), December 5-6, 2019. Malabe, Sri Lanka [9] Ozan Veranyurt, “Usage of Artificial Intelligence in DOS/DDOS Attack Detection”, International Journal of Basic and Clinical Studies (IJBCS) 2019; 8(1): 23-36, ISSN:2147-1428 [10] Ricardo Calderon, “The Benefits of Artificial Intelligence in Cyber security”, Economic Crime Forensics Capstones, 2019, doi: digitalcommons.lasalle.edu/ecf_capstones [11] Vishal Dineshkumar Soni, “Role Of Artificial Intelligence in Combating Cyber Threats in Banking”, International Engineering Journal For Research & Development, 4(1), 7, 2019, doi.org/10.17605/OSF.IO/JYPGX [12] Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi, “Preventing Poisoning Attacks on AI Based Threat Intelligence Systems”, 2019 IEEE, 978-1-7281-0824-7/19 [13] Gregory Falco, Arun Viswanathan, Carlos Caldera, And Howard Shrobe, “A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities”, 2018 IEEE ACCESS, doi:1 0.1109/ACCESS.2018.2867556 [14] Amaan Anwar & Syed Imtiyaz Hassan, “Applying Artificial Intelligence Techniques to Prevent Cyber Assaults”, International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 883-889 [15] Nadine Wirkuttis and Hadas Klein, “Artificial Intelligence in Cyber security”, Volume 1, No. 1, 2017, Academia
![]() | V9I1207.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|