The course studies the following topics: Definition of Artificial Intelligence and Machine Learning. The Role of AI in Cyber Security. AI Techniques Used in Cyber Security. The Application of AI in Cyber Attacks (Attack Preparation; Attack Execution; Post-Attack Activities). The Application of AI in Cyber Defense (Attack Detection; Attack Mitigation; Security Operations). The Application of LLMs (Large Language Models) in Cybersecurity. Applications of LLMs in Attacks and Defense; Risks of LLMs and Defense Measures.
The purpose of the course is to provide the students with knowledge, skills, and abilities (competencies) relevant to the development and application of artificial intelligence in cyber security tasks. The objectives of the course are defined as follows:
to provide students with fundamental and systematized knowledge about the approaches, models, and methods implemented in the modern framework of the AI branch;
to provide students with an understanding of basic AI-related technologies;
to develop students` analytical abilities to choose AI models and methods for solving cybersecurity-related tasks.
- What is Phishing? | IBM. Online. 17 May 2024. Available from: https://www.ibm.com/topics/phishing
- What is malware and how cybercriminals use it. Online. Available from: https://www.mcafee.com/en-ie/antivirus/malware.html
- What Is Ransomware? Online. Available from:https://www.trellix.com/security-awareness/ransomware/what-is-ransomware/
- What is a Data Breach? | IBM. Online. 24 May 2024. Available from: https://www.ibm.com/topics/data-breach
- What Is a DDoS Attack? | Microsoft Security. Online. Available from: https://www.microsoft.com/en-ie/security/business/security-101/what-is-a-ddos-attack
- What is a zero-day exploit? | IBM. Available from: https://www.ibm.com/topics/zero-day
- Types of Artificial Intelligence | IBM. Online. 14 August 2024. Available from: https://www.ibm.com/think/topics/artificial-intelligence-types
- What is Artificial Intelligence ? Online. 7 January 2020. Available from: https://www.datakeen.co/what-is-artificial-intelligence-3/
- JIANG, Fei, JIANG, Yong, ZHI, Hui, DONG, Yi, LI, Hao, MA, Sufeng, WANG, Yilong, DONG, Qiang, SHEN, Haipeng and WANG, Yongjun. Artificial intelligence in healthcare: past, present and future. Online. 1 December 2017. Vol. 2, no. 4, p. 230–243. DOI 10.1136/SVN-2017-000101.
- CAO, Longbing, YANG, Qiang and YU, Philip S. Data science and AI in FinTech: an overview. Springer International Publishing. Online. Available from: https://doi.org/10.1007/s41060-021-00278-w
- ADAMOPOULOU, Eleni and MOUSSIADES, Lefteris. Chatbots: History, technology, and applications. Machine Learning with Applications. Online. 15 December 2020. Vol. 2, p. 100006. DOI 10.1016/J.MLWA.2020.100006.
- BADUE, Claudine, GUIDOLINI, Rânik, CARNEIRO, Raphael V., AZEVEDO, Pedro, CARDOSO, Vinicius B., FORECHI, Avelino, JESUS, Luan F. R., BERRIEL, Rodrigo F., PAIXÃO, Thiago M., MUTZ, Filipe, VERONESE, Lucas de Paula, OLIVEIRA-SANTOS, Thiago and DE SOUZA, Alberto F. Self-driving cars: A survey. Expert Systems With Applications. Online. 1 March 2021. Vol. 165, p. 113816. DOI 10.1016/J.ESWA.2020.113816.
- What is Reinforcement Learning and How Does It Work (Updated 2024). Online. 21 February 2021. Available from: https://www.analyticsvidhya.com/blog/2021/02/introduction-to-reinforcement-learning-for-beginners/
- S. Dilek, H. Cakár, and M. Aydán, ‘‘Applications of artificial intelligence techniques to combating cyber crimes: A review,’’ Int. J. Artif. Intell. Appl., vol. 6, no. 1, pp. 21–39, Jan. 2015, doi: 10.5121/ijaia.2015.6102.
- Z. Cui, F. Xue, X. Cai, Y. Cao, G.-G. Wang, and J. Chen, ‘‘Detection of malicious code variants based on deep learning,’’ IEEE Trans. Ind. Informat., vol. 14, no. 7, pp. 3187–3196, Jul. 2018, doi: 10.1109/TII. 2018.2822680.
- J.-H. Li, ‘‘Cyber security meets artificial intelligence: A survey,’’ Frontiers Inf. Technol. Electron. Eng., vol. 19, no. 12, pp. 1462–1474, Dec. 2018, doi: 10.1631/FITEE.1800573.
- R.Kaur, D. Gabrijelčič, T. Klobuča “Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions” April 2023, Information Fusion, 97(6):101804, DOI:10.1016/j.inffus.2023.101804
- R. Kaur, D. Gabrijelčič, T. Klobučar., "AI in Cybersecurity: Literature Review and Future Research Directions," Information Fusion, vol. 97, 2023, Article ID 101804. doi: 10.1016/j.inffus.2023.101804.
- J. Nilkanth Welukar, "Artificial Intelligence in Cybersecurity: Benefits, Challenges, and Future Prospects," International Journal of Scientific Research in Science and Technology, vol. 8, no. 6, pp. 488–491, Nov.-Dec. 2021., doi: 10.32628/IJSRST218675
- S. Dilek, H. Çakır, and M. Aydın, "Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review," International Journal of Artificial Intelligence and Applications, vol. 6, no. 1, pp. 21–39, Jan. 2015, doi: 10.5121/ijaia.2015.6102.
- Okdem and S. Okdem, ‘‘Artificial Intelligence in Cybersecurity: A Review and a Case Study,’’ Applied Sciences, vol. 14, no. 22, p. 10487, Nov. 2024, doi: 10.3390/app142210487.