Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D. and Tran, T., 2019. Grand challenge: applying artificial intelligence and machine learning to cybersecurity. Computer, 52(12), pp.45-52.

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B. and Anderson, H., 2018. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.

Cheatham, B., Javanmardian, K. and Samandari, H., 2019. Confronting the risks of artificial intelligence. McKinsey Quarterly, 2, p.38.

Chehri, A., Fofana, I. and Yang, X., 2021. Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence. Sustainability, 13(6), p.3196.

Glock, C., 2022. Systematic literature reviews in purchasing and supply management research: A tertiary study – Scientific Figure on ResearchGate. Available from: [accessed 17 Oct, 2022]

Groshev, M., Guimarães, C., Martín-Pérez, J. and de la Oliva, A., 2021. Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence. IEEE Communications Magazine, 59(8), pp.14-20.

Samtani, S., Kantarcioglu, M. and Chen, H., 2020. Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap. ACM Transactions on Management Information Systems (TMIS), 11(4), pp.1-19.

Soni, V.D., 2019. Role of Artificial Intelligence in Combating Cyber Threats in Banking. International Engineering Journal For Research & Development, 4(1), pp.7-7.

Tao, F., Akhtar, M.S. and Jiayuan, Z., 2021. The future of artificial intelligence in cybersecurity: a comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28), pp.e3-e3.

Tmobile (b), T., 2022. 4 simple ways to fight cybercriminals. [online] Tmobile. Available at: <> [Accessed 17 October 2022].

Tmobile (c), T., 2022. 4 robust ways to fight cybercriminals. [online] Tmobile. Available at: <> [Accessed 17 October 2022].

Tmobile, T., 2022. Secure AI | AI Security with Endpoint Detection & Response | T-Mobile for Business. [online] Available at: <> [Accessed 17 October 2022].

Truong, T.C., Zelinka, I., Plucar, J., Čandík, M. and Šulc, V., 2020. Artificial intelligence and cybersecurity: Past, presence, and future. In Artificial intelligence and evolutionary computations in engineering systems (pp. 351-363). Springer, Singapore. Available at

Wirkuttis, N. and Klein, H., 2017. Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), pp.103-119.