Kurz se zabývá následujícími tématy: Definice umělé inteligence a strojového učení. Role umělé inteligence v kybernetické bezpečnosti. Techniky umělé inteligence používané v kybernetické bezpečnosti. Aplikace umělé inteligence v kybernetických útocích (příprava útoku; provedení útoku; aktivity po útoku). Aplikace umělé inteligence v kybernetické obraně (detekce útoků; zmírňování útoků; bezpečnostní operace). Aplikace LLM (Large Language Models) v kybernetické bezpečnosti. Aplikace LLM v útocích a obraně; rizika LLM a obranných opatření.
Cílem předmětu je poskytnout studentům znalosti, dovednosti a schopnosti (kompetence) důležité pro vývoj a použití umělé inteligence v úlohách kybernetické bezpečnosti. Cíle kurzu jsou definovány následovně:
poskytnout studentům základní a systematizované znalosti o přístupech, modelech a metodách implementovaných v moderním rámci oboru umělé inteligence;
poskytnout studentům porozumění základním technologiím souvisejícím s umělou inteligencí;
rozvíjet analytické schopnosti studentů při výběru modelů a metod AI pro řešení úloh souvisejících s kybernetickou bezpečností.
- What is Phishing? | IBM. Online. 17 May 2024. Available from: https://www.ibm.com/topics/phishing
- What is malware and how cybercriminals use it. Online. Available from: https://www.mcafee.com/en-ie/antivirus/malware.html
- What Is Ransomware? Online. Available from:https://www.trellix.com/security-awareness/ransomware/what-is-ransomware/
- What is a Data Breach? | IBM. Online. 24 May 2024. Available from: https://www.ibm.com/topics/data-breach
- What Is a DDoS Attack? | Microsoft Security. Online. Available from: https://www.microsoft.com/en-ie/security/business/security-101/what-is-a-ddos-attack
- What is a zero-day exploit? | IBM. Available from: https://www.ibm.com/topics/zero-day
- Types of Artificial Intelligence | IBM. Online. 14 August 2024. Available from: https://www.ibm.com/think/topics/artificial-intelligence-types
- What is Artificial Intelligence ? Online. 7 January 2020. Available from: https://www.datakeen.co/what-is-artificial-intelligence-3/
- JIANG, Fei, JIANG, Yong, ZHI, Hui, DONG, Yi, LI, Hao, MA, Sufeng, WANG, Yilong, DONG, Qiang, SHEN, Haipeng and WANG, Yongjun. Artificial intelligence in healthcare: past, present and future. Online. 1 December 2017. Vol. 2, no. 4, p. 230–243. DOI 10.1136/SVN-2017-000101.
- CAO, Longbing, YANG, Qiang and YU, Philip S. Data science and AI in FinTech: an overview. Springer International Publishing. Online. Available from: https://doi.org/10.1007/s41060-021-00278-w
- ADAMOPOULOU, Eleni and MOUSSIADES, Lefteris. Chatbots: History, technology, and applications. Machine Learning with Applications. Online. 15 December 2020. Vol. 2, p. 100006. DOI 10.1016/J.MLWA.2020.100006.
- BADUE, Claudine, GUIDOLINI, Rânik, CARNEIRO, Raphael V., AZEVEDO, Pedro, CARDOSO, Vinicius B., FORECHI, Avelino, JESUS, Luan F. R., BERRIEL, Rodrigo F., PAIXÃO, Thiago M., MUTZ, Filipe, VERONESE, Lucas de Paula, OLIVEIRA-SANTOS, Thiago and DE SOUZA, Alberto F. Self-driving cars: A survey. Expert Systems With Applications. Online. 1 March 2021. Vol. 165, p. 113816. DOI 10.1016/J.ESWA.2020.113816.
- What is Reinforcement Learning and How Does It Work (Updated 2024). Online. 21 February 2021. Available from: https://www.analyticsvidhya.com/blog/2021/02/introduction-to-reinforcement-learning-for-beginners/
- S. Dilek, H. Cakár, and M. Aydán, ‘‘Applications of artificial intelligence techniques to combating cyber crimes: A review,’’ Int. J. Artif. Intell. Appl., vol. 6, no. 1, pp. 21–39, Jan. 2015, doi: 10.5121/ijaia.2015.6102.
- Z. Cui, F. Xue, X. Cai, Y. Cao, G.-G. Wang, and J. Chen, ‘‘Detection of malicious code variants based on deep learning,’’ IEEE Trans. Ind. Informat., vol. 14, no. 7, pp. 3187–3196, Jul. 2018, doi: 10.1109/TII. 2018.2822680.
- J.-H. Li, ‘‘Cyber security meets artificial intelligence: A survey,’’ Frontiers Inf. Technol. Electron. Eng., vol. 19, no. 12, pp. 1462–1474, Dec. 2018, doi: 10.1631/FITEE.1800573.
- R.Kaur, D. Gabrijelčič, T. Klobuča “Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions” April 2023, Information Fusion, 97(6):101804, DOI:10.1016/j.inffus.2023.101804
- R. Kaur, D. Gabrijelčič, T. Klobučar., "AI in Cybersecurity: Literature Review and Future Research Directions," Information Fusion, vol. 97, 2023, Article ID 101804. doi: 10.1016/j.inffus.2023.101804.
- J. Nilkanth Welukar, "Artificial Intelligence in Cybersecurity: Benefits, Challenges, and Future Prospects," International Journal of Scientific Research in Science and Technology, vol. 8, no. 6, pp. 488–491, Nov.-Dec. 2021., doi: 10.32628/IJSRST218675
- S. Dilek, H. Çakır, and M. Aydın, "Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review," International Journal of Artificial Intelligence and Applications, vol. 6, no. 1, pp. 21–39, Jan. 2015, doi: 10.5121/ijaia.2015.6102.
- Okdem and S. Okdem, ‘‘Artificial Intelligence in Cybersecurity: A Review and a Case Study,’’ Applied Sciences, vol. 14, no. 22, p. 10487, Nov. 2024, doi: 10.3390/app142210487.