Downloads provided by UsageCounts
Due to the expansion of the internet of things and connected devices, cyber security professionals in the modern digital world face a significant number of challenges. Experts require all available resources in order to both respond to attacks and prevent further security breaches. Due to factors such as heavy traffic, an increase in the number of security attack vectors, security vulnerabilities, and many others, the number of connected workplaces renders it impossible for humans to govern cyberspace without significant automation. However, designing software systems with conventionally mounted algorithms (decision-making logic that is hardwired) can be difficult. These algorithms are necessary to provide an effective defence against the growing number of network hazards. It is now common knowledge that adopting problem-solving strategies based on artificial intelligence is the key to effectively addressing the vast majority of cyber security issues currently being addressed. This article provides a concise analysis of cyber security applications for computers. In addition, it investigates the perspectives on how to enhance cyber security capabilities by providing applications that utilise artificial intelligence, in addition to the current methods.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 10 | |
| downloads | 12 |

Views provided by UsageCounts
Downloads provided by UsageCounts