References

References

Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D. and Tran, T., 2019. Grand challenge: applying artificial intelligence and machine learning to cybersecurity. Computer, 52(12), pp.45-52. https://www.academia.edu/download/67931950/08909930.pdf

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B. and Anderson, H., 2018. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228. https://arxiv.org/abs/1802.07228

Cheatham, B., Javanmardian, K. and Samandari, H., 2019. Confronting the risks of artificial intelligence. McKinsey Quarterly, 2, p.38. https://www.cognitivescale.com/wp-content/uploads/2019/06/Confronting_AI_risks_-_McKinsey.pdf

Chehri, A., Fofana, I. and Yang, X., 2021. Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence. Sustainability, 13(6), p.3196. https://www.mdpi.com/2071-1050/13/6/3196/pdf

Glock, C., 2022. Systematic literature reviews in purchasing and supply management research: A tertiary study – Scientific Figure on ResearchGate. Available from: https://www.researchgate.net/figure/Taxonomy-of-Literature-Reviews_tbl1_264439617 [accessed 17 Oct, 2022]

Groshev, M., Guimarães, C., Martín-Pérez, J. and de la Oliva, A., 2021. Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence. IEEE Communications Magazine, 59(8), pp.14-20. https://e-archivo.uc3m.es/bitstream/handle/10016/33912/Towards_CM_2021_ps.pdf?sequence=1

Samtani, S., Kantarcioglu, M. and Chen, H., 2020. Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap. ACM Transactions on Management Information Systems (TMIS), 11(4), pp.1-19. https://dl.acm.org/doi/pdf/10.1145/3430360

Soni, V.D., 2019. Role of Artificial Intelligence in Combating Cyber Threats in Banking. International Engineering Journal For Research & Development, 4(1), pp.7-7. https://www.academia.edu/download/63947012/1020200717-18417-d6nki8.pdf

Tao, F., Akhtar, M.S. and Jiayuan, Z., 2021. The future of artificial intelligence in cybersecurity: a comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28), pp.e3-e3. https://publications.eai.eu/index.php/ct/article/download/1418/1227

Tmobile (b), T., 2022. 4 simple ways to fight cybercriminals. [online] Tmobile. Available at: <https://www.t-mobile.com/business/solutions/security/secure-ai> [Accessed 17 October 2022].

Tmobile (c), T., 2022. 4 robust ways to fight cybercriminals. [online] Tmobile. Available at: <https://www.t-mobile.com/business/solutions/security/secure-ai> [Accessed 17 October 2022].

Tmobile, T., 2022. Secure AI | AI Security with Endpoint Detection & Response | T-Mobile for Business. [online] T-mobile.com. Available at: <https://www.t-mobile.com/business/solutions/security/secure-ai> [Accessed 17 October 2022].

Truong, T.C., Zelinka, I., Plucar, J., Čandík, M. and Šulc, V., 2020. Artificial intelligence and cybersecurity: Past, presence, and future. In Artificial intelligence and evolutionary computations in engineering systems (pp. 351-363). Springer, Singapore. Available at https://www.researchgate.net/profile/Srinivasan-Rajendran/publication/342638144_Book_Series_springerfeb_2020/links/5efde532458515505084b739/Book-Series-springerfeb-2020.pdf#page=359

Wirkuttis, N. and Klein, H., 2017. Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), pp.103-119. https://www.academia.edu/download/52464497/Artificial_Intelligence_in_Cybersecurity.pdf