Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

02/28/2022
by   James Holt, et al.
0

The workshop will focus on the application of AI to problems in cyber security. Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities. Additionally, adversaries continue to develop new attacks. Hence, AI methods are required to understand and protect the cyber domain. These challenges are widely studied in enterprise networks, but there are many gaps in research and practice as well as novel problems in other domains. In general, AI techniques are still not widely adopted in the real world. Reasons include: (1) a lack of certification of AI for security, (2) a lack of formal study of the implications of practical constraints (e.g., power, memory, storage) for AI systems in the cyber domain, (3) known vulnerabilities such as evasion, poisoning attacks, (4) lack of meaningful explanations for security analysts, and (5) lack of analyst trust in AI solutions. There is a need for the research community to develop novel solutions for these practical issues.

READ FULL TEXT
research
02/07/2020

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2020

The workshop will focus on the application of artificial intelligence to...
research
08/19/2021

Proceedings of the 1st International Workshop on Adaptive Cyber Defense

The 1st International Workshop on Adaptive Cyber Defense was held as par...
research
05/23/2023

Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

In July 2022, the Center for Security and Emerging Technology (CSET) at ...
research
06/03/2021

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

To understand how end-users conceptualize consequences of cyber security...
research
08/18/2023

Proceedings of the 2nd International Workshop on Adaptive Cyber Defense

The 2nd International Workshop on Adaptive Cyber Defense was held at the...
research
07/04/2022

Cybersecurity: Past, Present and Future

The digital transformation has created a new digital space known as cybe...
research
10/30/2020

Evaluation of vulnerability reproducibility in container-based Cyber Range

A cyber range, a practical and highly educational information security e...

Please sign up or login with your details

Forgot password? Click here to reset