Full Text:   <329>

Suppl. Mater.: 

CLC number: 

On-line Access: 2023-01-04

Received: 2022-07-21

Revision Accepted: 2022-12-11

Crosschecked: 0000-00-00

Cited: 0

Clicked: 268

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
Open peer comments

Journal of Zhejiang University SCIENCE C 1998 Vol.-1 No.-1 P.

http://doi.org/10.1631/FITEE.2200314


AI algorithms for cyberspace security applications: a technological and status review


Author(s):  Jie CHEN, Dandan WU, Ruiyun XIE

Affiliation(s):  Northwestern Polytechnical University, Xi’ more

Corresponding email(s):   chenjie1900@mail.nwpu.edu.cn

Key Words:  Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), Optimization Algorithm, Hybrid methods, Cyberspace security


Jie CHEN, Dandan WU, Ruiyun XIE. AI algorithms for cyberspace security applications: a technological and status review[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .

@article{title="AI algorithms for cyberspace security applications: a technological and status review",
author="Jie CHEN, Dandan WU, Ruiyun XIE",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200314"
}

%0 Journal Article
%T AI algorithms for cyberspace security applications: a technological and status review
%A Jie CHEN
%A Dandan WU
%A Ruiyun XIE
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200314

TY - JOUR
T1 - AI algorithms for cyberspace security applications: a technological and status review
A1 - Jie CHEN
A1 - Dandan WU
A1 - Ruiyun XIE
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200314


Abstract: 
Three technical problems should be solved urgently in cyberspace security: the timeliness and accuracy of network attack detection, the credibility assessment and prediction of the security situation, and the effectiveness of security defense strategies optimization. artificial Intelligence (AI) algorithms have become the core means to increase the chances of security and to improve confrontation ability in the application of cyberspace security. Recently, the breakthrough and application of AI technology have provided a series of advanced approaches for further enhancing network defense ability. This work presents a comprehensive overview of AI technology articles for cyberspace security applications, mainly from 2017 to 2022, the papers are selected from a variety of journals and conferences, 52.68% are from Elsevier, Springer, and IEEE journals and 25% are from international conferences. With a specific focus on the latest approaches in machine Learning (ML), deep Learning (DL), and some popular optimization Algorithms, the characteristics of the algorithmic models, performance results, datasets, potential benefits, and limitations are analyzed, and some of the existing challenges are highlighted. This work is intended to provide technical guidance for researchers who would like to obtain the potential of AI technical methods for cyberspace security and to provide tips for the later resolution of specific cyberspace security issues, and a mastery of the current development trends of technology and application, hot issues in the field of network security. It also indicates certain existing challenges and gives directions for addressing them effectively.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2023 Journal of Zhejiang University-SCIENCE