dc.contributor.author | Yamin, Muhammad Mudassar | |
dc.contributor.author | Ullah, Mohib | |
dc.contributor.author | Ullah, Habib | |
dc.contributor.author | Katt, Basel | |
dc.date.accessioned | 2022-09-26T06:28:03Z | |
dc.date.available | 2022-09-26T06:28:03Z | |
dc.date.created | 2021-01-05T11:44:08Z | |
dc.date.issued | 2021 | |
dc.identifier.issn | 2214-2134 | |
dc.identifier.uri | https://hdl.handle.net/11250/3021130 | |
dc.description.abstract | Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies for offensive purposes has begun to appear in the world. These attacks vary from tampering with medical images using adversarial machine learning for false identification of cancer to the generation of adversarial traffic signals for influencing the safety of autonomous vehicles. In this research, we investigated recent cyberattacks that utilize AI-based techniques and identified various mitigation strategies that are helpful in handling such attacks. Further, we identified existing methods and techniques that are used in executing AI-based cyberattacks and what probable future scenarios will be plausible to control such attacks by identifying existing trends in AI-based cyberattacks. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Elsevier | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/deed.no | * |
dc.title | Weaponized AI for cyber attacks | en_US |
dc.type | Journal article | en_US |
dc.type | Peer reviewed | en_US |
dc.description.version | acceptedVersion | en_US |
dc.rights.holder | This article will not be available until March 2023 due to publisher embargo - This accepted manuscript is made available under the CC-BY-NC-ND 4.0 license | en_US |
dc.source.volume | 57 | en_US |
dc.source.journal | Journal of Information Security and Applications | en_US |
dc.identifier.doi | 10.1016/j.jisa.2020.102722 | |
dc.identifier.cristin | 1865423 | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |