SlideShare a Scribd company logo
1 of 42
2
????????????
??????????
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Advancements in Artificial
Intelligence for Cybersecurity
3
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Hackers
using
AI
tools
4
WormGPT
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
 A new generative AI
cybercrime tool
 Underground forums as a
perfect tool for adversaries
to launch sophisticated
phishing campaigns and
business email compromise
(BEC) attacks.
 BEC cost 1.8 billion in 2020
For
Learning
only
5
TorGpt
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
For Learning
only
6
????????
7
Artificial Intelligence
From “Wireless Communications”
Edfors, Molisch, Tufvesson
According to the father of Artificial
Intelligence John McCarthy, it is
“The science and engineering of
making intelligent machines,
especially intelligent computer
programs”.
8
Agenda
d
Artificial Intelligence
Cybersecurity
AI & Cybersecurity
Tools
Ethical Considerations
9
Agenda
d
Artificial Intelligence
Cybersecurity
AI & Cybersecurity
Tools
Ethical Considerations
10
Artificial Intelligence
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
11
AI & ML & DL & FM
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
 AI is the broader concept of creating
intelligent machines.
 ML is a subset of AI focusing on learning
from data.
 DL is a subset of ML employing deep neural
networks for learning and modeling complex
patterns.
 FM Generative AI, any model that is trained
on broad data (generally using self-
supervision at scale)
AI
ML
DL
FM
12
AI & ML & DL & FM
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
13
AI Initialization
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Define the problem and collect data
Data preprocessing
Feature engineering
Model selection
Training the model
Evaluating the model & Hyper parameter tuning
Deploying the model
14
Measure the Performance
d
Confusion Matrix
Popular evaluation metric used to
describe the performance of a
classification model (or
"classifier").
 FP: lead to unnecessary alerts and operational., consuming valuable
resources and causing alert fatigue
 FN: can result in undetected security breaches.
15
AI & ML & DL
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Handle
False Positives
False Negative
Advanced
Analytics
Continuous
Learning
User
Input
Threshold
Tuning
Whitelisting
Contextual
Information
16
Agenda
d
Artificial Intelligence
Cybersecurity
AI & Cybersecurity
Tools
Ethical Considerations
17
Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
 Cybersecurity is the
practice of protecting
smart divices like
Mobile, computer
systems, networks, and
data from unauthorized
access, attacks, damage,
or theft.
18
Core Principles of Cybersecurity
 Confidentiality: Ensuring that sensitive
information is only accessible to
authorized individuals or systems.
 Integrity: Protecting data and
information from being altered without
authorization.
 Availability: Ensuring that systems and
data are available and accessible when
needed.
CIA
19
Agenda
d
Artificial Intelligence
Cybersecurity
AI & Cybersecurity
Tools
Ethical Considerations
20
AI & Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
 AI providing new
ways to detect
and prevent cyber
threats in real
time, and digital
forensics.
21
AI & Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Some key features of AI technology in cybersecurity include:
Real-time monitoring: AI continuously monitor
network sand systems for suspicious activity,
identifying and reacting to potential threats in real
time.
Behavior analytics: AI analyze user behavior
and detect anomalies that may indicate a security
breach or attempted attack.
Anomaly detection: AI can identify patterns that
may indicate a cyberattack, even in cases where
the attack may not fit a predefined threat profile.
22
AI & Cybersecurity
d
Real-time
monitoring
Behavior
analytics
Anomaly
detection
23
AI & Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Confidentiality
Data
Encryption
Anomaly
Detection
Access
Control
Privacy-
Preserving
Technologies
Sensitive
Data
Redaction
Behavioral
Biometrics
24
Alogorithmes of AI in Cybersecurity
d
Fully Homomorphic
Encryption (FHE)
Long Short-Term Memory
(LSTM) Networks
Variational
Autoencoders (VAEs)
Natural Language Processing
(NLP) Models Graph Neural Networks
(GNNs)
25
AI & Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Integrity
Data
Integrity
Verification
Anomaly
Detection
Blockchain
Technology
Content
Verification
Data
Quality
Assurance
Tamper-
Resistant
Logging
26
Alogorithmes of AI in Cybersecurity
d
Merkle Trees
Secure Multi-Party Computation
(SMPC)
Differential Privacy
Zero-Knowledge Proofs
(ZKPs)
Integrity
27
AI & Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Availability
Predictive
Maintenance
Anomaly
Detection
Automated
Incident
Response
Dynamic
Resource
Allocation
Proactive
Capacity
Planning
Continuous
Monitoring
and
Optimization
28
Alogorithmes of AI in Cybersecurity
d
Recurrent Neural Networks
(RNNs)
Availability
Long Short-Term Memory (LSTM)
networks
Isolation Forests
Q-Learning
Streaming
Analytics
Generative Adversarial Networks (GANs)
29
Alogorithmes of AI in Cybersecurity
d
detect Deepfake
Facial Landmark
Detection
XceptionNet
FaceForensics++
Voice Biometrics
Fusion of Multiple
Modalities
30
AI & Cybersecurity Python Libraries
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
31
AI & Cybersecurity Python Libraries
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
32
Agenda
d
Artificial Intelligence
Cybersecurity
AI & Cybersecurity
Tools
Ethical Considerations
33
AI & Cybersecurity Tools
d
Top Tools
Intrusion Detection
Network Traffic Analysis
Malware Analysis
Data
Preprocessing
WEKA
Waikato Environment for Knowledge Analysis:
open-source software package with a wide range of
tools and algorithms for data preprocessing,
machine learning, and data mining tasks
Log Analysis
Threat Intelligence
Analysis
34
AI & Cybersecurity Tools
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Top Tools
AI platform designed for advanced cybersecurity
and penetration testing applications
Threat Detection
and Prevention
Vulnerability Assessment
Custom AI Solutions
Incident Response
35
AI & Cybersecurity Tools
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Top Tools
36
AI & Cybersecurity Tools using by HACKERS
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
37
Agenda
d
Artificial Intelligence
Cybersecurity
AI & Cybersecurity
Tools
Ethical Considerations
38
AI & Cybersecurity
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
Ethical Considerations in AI-Cybersecurity Integration
Bias: The data used to train AI models is
representative, diverse, and unbiased.
Transparency: Ensuring that AI
systems are explainable and
understandable can help prevent
suspicion and mistrust.
Accountability: It is important to
clearly define who is responsible for
errors or misuse of AI technology.
39
AI & Cybersecurity
d
The Role of Government Agencies
 In the United States, the Department of
Home land Security (DHS) Science
and Technology Directorate has
launched several initiatives aimed at
improving cybersecurity through AI.
 These initiatives include cybersecurity
research and development, technology
testing and evaluation, and technology
transition and commercialization.
40
AI & Cybersecurity
d
The Role of Government Agencies
 National Institute of Standards
and Technology (NIST)
developed a frame work for
improving critical infrastructure
cybersecurity.
 National Security Agency (NSA)
has created a Cybersecurity
Directorate to enhance the
agency’s cyber defense
capabilities.
 Academic institutions are
conducting cutting-edge
research in the field of AI
and cybersecurity.
41
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d
AI technology is playing a
critical role in safeguarding
sensitive information from data
breaches, theft, and manipulation.
42
From “Wireless Communications”
Edfors, Molisch, Tufvesson
d

More Related Content

Similar to [DSC MENA 24] Ramy_Agieb_-_Advancements_in_Artificial_Intelligence_for_Cybersecurity-Ramy_Agieb_19-4-V1.pptx

Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxRykaBhatt
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...ijaia
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

Similar to [DSC MENA 24] Ramy_Agieb_-_Advancements_in_Artificial_Intelligence_for_Cybersecurity-Ramy_Agieb_19-4-V1.pptx (20)

Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
Emerging Technologies 3.0
Emerging Technologies 3.0Emerging Technologies 3.0
Emerging Technologies 3.0
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 

More from DataScienceConferenc1

[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf
[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf
[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdfDataScienceConferenc1
 
[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...
[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...
[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...DataScienceConferenc1
 
[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf
[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf
[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdfDataScienceConferenc1
 
[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf
[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf
[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdfDataScienceConferenc1
 
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdfDataScienceConferenc1
 
[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx
[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx
[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptxDataScienceConferenc1
 
[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf
[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf
[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdfDataScienceConferenc1
 
[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...
[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...
[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...DataScienceConferenc1
 
[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf
[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf
[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdfDataScienceConferenc1
 
[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...
[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...
[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...DataScienceConferenc1
 
[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...
[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...
[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...DataScienceConferenc1
 
[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf
[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf
[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdfDataScienceConferenc1
 
[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx
[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx
[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptxDataScienceConferenc1
 
[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...
[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...
[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...DataScienceConferenc1
 
[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx
[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx
[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptxDataScienceConferenc1
 
[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...
[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...
[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...DataScienceConferenc1
 
[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx
[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx
[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptxDataScienceConferenc1
 
[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx
[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx
[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptxDataScienceConferenc1
 
[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf
[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf
[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdfDataScienceConferenc1
 
[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx
[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx
[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptxDataScienceConferenc1
 

More from DataScienceConferenc1 (20)

[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf
[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf
[DSC MENA 24] Mostafa_Essa_-_Ai_and_cloud.pdf
 
[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...
[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...
[DSC MENA 24] Yasser_El_Bendary - How NLP & LLMs model can excel in comprehen...
 
[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf
[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf
[DSC MENA 24] Medhat_Kandil - Empowering Egypt's AI & Biotechnology Scenes.pdf
 
[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf
[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf
[DSC MENA 24] Youssef_Kamal - Data governance and quality.pdf
 
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
 
[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx
[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx
[DSC MENA 24] Asmaa_Eltaher_-_Innovation_Beyond_Brainstorming.pptx
 
[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf
[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf
[DSC MENA 24] Muhammad_Ezzat_-_Sustianable_Growth_Empowerment.pdf
 
[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...
[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...
[DSC MENA 24] Basma_Rady_-_Building_a_Data_Driven_Culture_in_Your_Organizatio...
 
[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf
[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf
[DSC MENA 24] Ahmed_Muselhy_-_Unveiling-the-Secrets-of-AI-in-Hiring.pdf
 
[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...
[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...
[DSC MENA 24] Ziad_Diab_-_Data-Driven_Disruption_-_The_Role_of_Data_Strategy_...
 
[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...
[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...
[DSC MENA 24] Mohammad_Essam_- Leveraging Scene Graphs for Generative AI and ...
 
[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf
[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf
[DSC MENA 24] Ahmed_Fahmy - Navigating the Future.pdf
 
[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx
[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx
[DSC MENA 24] Hany_Saad_Gheit_-_Azure_OpenAI_service.pptx
 
[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...
[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...
[DSC MENA 24] Nezar_El_Kady_-_From_Turing_to_Transformers__Navigating_the_AI_...
 
[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx
[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx
[DSC MENA 24] Amira_Abdelaziz_-_AI_in_Financial_Services.pptx
 
[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...
[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...
[DSC MENA 24] Omar_Ossama - My Journey from the Field of Oil & Gas, to the Ex...
 
[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx
[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx
[DSC MENA 24] Sohaila_Diab_-_Lets_Talk_Gen_AI_Presentation.pptx
 
[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx
[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx
[DSC MENA 24] Amal_Elgammal_-_QUALITOP_presentation.pptx
 
[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf
[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf
[DSC MENA 24] Abdelrahman_Sleem_-_AI_For_Marketing_DSC.pdf
 
[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx
[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx
[DSC MENA 24] Ahmed_Refaay_- Where to Start Your Data Analytics Journey.pptx
 

Recently uploaded

Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 

Recently uploaded (20)

Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 

[DSC MENA 24] Ramy_Agieb_-_Advancements_in_Artificial_Intelligence_for_Cybersecurity-Ramy_Agieb_19-4-V1.pptx

  • 1.
  • 2. 2 ???????????? ?????????? From “Wireless Communications” Edfors, Molisch, Tufvesson d Advancements in Artificial Intelligence for Cybersecurity
  • 3. 3 From “Wireless Communications” Edfors, Molisch, Tufvesson d Hackers using AI tools
  • 4. 4 WormGPT From “Wireless Communications” Edfors, Molisch, Tufvesson d  A new generative AI cybercrime tool  Underground forums as a perfect tool for adversaries to launch sophisticated phishing campaigns and business email compromise (BEC) attacks.  BEC cost 1.8 billion in 2020 For Learning only
  • 5. 5 TorGpt From “Wireless Communications” Edfors, Molisch, Tufvesson d For Learning only
  • 7. 7 Artificial Intelligence From “Wireless Communications” Edfors, Molisch, Tufvesson According to the father of Artificial Intelligence John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
  • 8. 8 Agenda d Artificial Intelligence Cybersecurity AI & Cybersecurity Tools Ethical Considerations
  • 9. 9 Agenda d Artificial Intelligence Cybersecurity AI & Cybersecurity Tools Ethical Considerations
  • 10. 10 Artificial Intelligence From “Wireless Communications” Edfors, Molisch, Tufvesson d
  • 11. 11 AI & ML & DL & FM From “Wireless Communications” Edfors, Molisch, Tufvesson d  AI is the broader concept of creating intelligent machines.  ML is a subset of AI focusing on learning from data.  DL is a subset of ML employing deep neural networks for learning and modeling complex patterns.  FM Generative AI, any model that is trained on broad data (generally using self- supervision at scale) AI ML DL FM
  • 12. 12 AI & ML & DL & FM From “Wireless Communications” Edfors, Molisch, Tufvesson d
  • 13. 13 AI Initialization From “Wireless Communications” Edfors, Molisch, Tufvesson d Define the problem and collect data Data preprocessing Feature engineering Model selection Training the model Evaluating the model & Hyper parameter tuning Deploying the model
  • 14. 14 Measure the Performance d Confusion Matrix Popular evaluation metric used to describe the performance of a classification model (or "classifier").  FP: lead to unnecessary alerts and operational., consuming valuable resources and causing alert fatigue  FN: can result in undetected security breaches.
  • 15. 15 AI & ML & DL From “Wireless Communications” Edfors, Molisch, Tufvesson d Handle False Positives False Negative Advanced Analytics Continuous Learning User Input Threshold Tuning Whitelisting Contextual Information
  • 16. 16 Agenda d Artificial Intelligence Cybersecurity AI & Cybersecurity Tools Ethical Considerations
  • 17. 17 Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d  Cybersecurity is the practice of protecting smart divices like Mobile, computer systems, networks, and data from unauthorized access, attacks, damage, or theft.
  • 18. 18 Core Principles of Cybersecurity  Confidentiality: Ensuring that sensitive information is only accessible to authorized individuals or systems.  Integrity: Protecting data and information from being altered without authorization.  Availability: Ensuring that systems and data are available and accessible when needed. CIA
  • 19. 19 Agenda d Artificial Intelligence Cybersecurity AI & Cybersecurity Tools Ethical Considerations
  • 20. 20 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d  AI providing new ways to detect and prevent cyber threats in real time, and digital forensics.
  • 21. 21 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Some key features of AI technology in cybersecurity include: Real-time monitoring: AI continuously monitor network sand systems for suspicious activity, identifying and reacting to potential threats in real time. Behavior analytics: AI analyze user behavior and detect anomalies that may indicate a security breach or attempted attack. Anomaly detection: AI can identify patterns that may indicate a cyberattack, even in cases where the attack may not fit a predefined threat profile.
  • 23. 23 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Confidentiality Data Encryption Anomaly Detection Access Control Privacy- Preserving Technologies Sensitive Data Redaction Behavioral Biometrics
  • 24. 24 Alogorithmes of AI in Cybersecurity d Fully Homomorphic Encryption (FHE) Long Short-Term Memory (LSTM) Networks Variational Autoencoders (VAEs) Natural Language Processing (NLP) Models Graph Neural Networks (GNNs)
  • 25. 25 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Integrity Data Integrity Verification Anomaly Detection Blockchain Technology Content Verification Data Quality Assurance Tamper- Resistant Logging
  • 26. 26 Alogorithmes of AI in Cybersecurity d Merkle Trees Secure Multi-Party Computation (SMPC) Differential Privacy Zero-Knowledge Proofs (ZKPs) Integrity
  • 27. 27 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Availability Predictive Maintenance Anomaly Detection Automated Incident Response Dynamic Resource Allocation Proactive Capacity Planning Continuous Monitoring and Optimization
  • 28. 28 Alogorithmes of AI in Cybersecurity d Recurrent Neural Networks (RNNs) Availability Long Short-Term Memory (LSTM) networks Isolation Forests Q-Learning Streaming Analytics Generative Adversarial Networks (GANs)
  • 29. 29 Alogorithmes of AI in Cybersecurity d detect Deepfake Facial Landmark Detection XceptionNet FaceForensics++ Voice Biometrics Fusion of Multiple Modalities
  • 30. 30 AI & Cybersecurity Python Libraries From “Wireless Communications” Edfors, Molisch, Tufvesson d
  • 31. 31 AI & Cybersecurity Python Libraries From “Wireless Communications” Edfors, Molisch, Tufvesson d
  • 32. 32 Agenda d Artificial Intelligence Cybersecurity AI & Cybersecurity Tools Ethical Considerations
  • 33. 33 AI & Cybersecurity Tools d Top Tools Intrusion Detection Network Traffic Analysis Malware Analysis Data Preprocessing WEKA Waikato Environment for Knowledge Analysis: open-source software package with a wide range of tools and algorithms for data preprocessing, machine learning, and data mining tasks Log Analysis Threat Intelligence Analysis
  • 34. 34 AI & Cybersecurity Tools From “Wireless Communications” Edfors, Molisch, Tufvesson d Top Tools AI platform designed for advanced cybersecurity and penetration testing applications Threat Detection and Prevention Vulnerability Assessment Custom AI Solutions Incident Response
  • 35. 35 AI & Cybersecurity Tools From “Wireless Communications” Edfors, Molisch, Tufvesson d Top Tools
  • 36. 36 AI & Cybersecurity Tools using by HACKERS From “Wireless Communications” Edfors, Molisch, Tufvesson d
  • 37. 37 Agenda d Artificial Intelligence Cybersecurity AI & Cybersecurity Tools Ethical Considerations
  • 38. 38 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Ethical Considerations in AI-Cybersecurity Integration Bias: The data used to train AI models is representative, diverse, and unbiased. Transparency: Ensuring that AI systems are explainable and understandable can help prevent suspicion and mistrust. Accountability: It is important to clearly define who is responsible for errors or misuse of AI technology.
  • 39. 39 AI & Cybersecurity d The Role of Government Agencies  In the United States, the Department of Home land Security (DHS) Science and Technology Directorate has launched several initiatives aimed at improving cybersecurity through AI.  These initiatives include cybersecurity research and development, technology testing and evaluation, and technology transition and commercialization.
  • 40. 40 AI & Cybersecurity d The Role of Government Agencies  National Institute of Standards and Technology (NIST) developed a frame work for improving critical infrastructure cybersecurity.  National Security Agency (NSA) has created a Cybersecurity Directorate to enhance the agency’s cyber defense capabilities.  Academic institutions are conducting cutting-edge research in the field of AI and cybersecurity.
  • 41. 41 From “Wireless Communications” Edfors, Molisch, Tufvesson d AI technology is playing a critical role in safeguarding sensitive information from data breaches, theft, and manipulation.

Editor's Notes

  1. Advancements in Artificial Intelligence for Cybersecurity
  2. 51 detection/34 prediction/18 response
  3. Data Encryption, Anomaly Detection, Access Control, Privacy-Preserving Technologies, Sensitive Data Redaction, Behavioral Biometrics
  4. Genetic algorithms: encryption configurations and select the most suitable solutions based on predefined fitness criteria.
  5. Data Integrity Verification, Anomaly Detection, Blockchain Technology, Content Verification, Data Quality Assurance, Tamper-Resistant Logging
  6. Genetic algorithms: encryption configurations and select the most suitable solutions based on predefined fitness criteria.
  7. Predictive Maintenance,, Anomaly Detection, Automated Incident Response, Dynamic Resource Allocation, Proactive Capacity Planning, Continuous Monitoring and Optimization
  8. Genetic algorithms: encryption configurations and select the most suitable solutions based on predefined fitness criteria.
  9. XceptionNet
  10. hese are some AI Automation Tools (Free/Paid) for Ethical Hacking 1. 0dAI : Copilot for unparalleled Cybersec assistance. 2. Microsoft Security Copilot : Improved Cybersecurity defense and automation. 3. Suzan : Prevents data leaks during generative modeling. 4. Crowd Strike : Provides endpoint protection for business Cybersecurity 5. Otto-bot : World's top security and compliance expert. 6. Ethiack : Vulnerability detection and attach surface management. 7. INSiNTO : Online threat analysis and harmful content detection. 8. Securitybulldog :Threat detection and remediation for Cybersecurity. 9. Navalon : Enhanced security for SMEs with budget solution.
  11. hese are some AI Automation Tools (Free/Paid) for Ethical Hacking 1. 0dAI : Copilot for unparalleled Cybersec assistance. 2. Microsoft Security Copilot : Improved Cybersecurity defense and automation. 3. Suzan : Prevents data leaks during generative modeling. 4. Crowd Strike : Provides endpoint protection for business Cybersecurity 5. Otto-bot : World's top security and compliance expert. 6. Ethiack : Vulnerability detection and attach surface management. 7. INSiNTO : Online threat analysis and harmful content detection. 8. Securitybulldog :Threat detection and remediation for Cybersecurity. 9. Navalon : Enhanced security for SMEs with budget solution.
  12. hese are some AI Automation Tools (Free/Paid) for Ethical Hacking 1. 0dAI : Copilot for unparalleled Cybersec assistance. 2. Microsoft Security Copilot : Improved Cybersecurity defense and automation. 3. Suzan : Prevents data leaks during generative modeling. 4. Crowd Strike : Provides endpoint protection for business Cybersecurity 5. Otto-bot : World's top security and compliance expert. 6. Ethiack : Vulnerability detection and attach surface management. 7. INSiNTO : Online threat analysis and harmful content detection. 8. Securitybulldog :Threat detection and remediation for Cybersecurity. 9. Navalon : Enhanced security for SMEs with budget solution.
  13. hese are some AI Automation Tools (Free/Paid) for Ethical Hacking 1. 0dAI : Copilot for unparalleled Cybersec assistance. 2. Microsoft Security Copilot : Improved Cybersecurity defense and automation. 3. Suzan : Prevents data leaks during generative modeling. 4. Crowd Strike : Provides endpoint protection for business Cybersecurity 5. Otto-bot : World's top security and compliance expert. 6. Ethiack : Vulnerability detection and attach surface management. 7. INSiNTO : Online threat analysis and harmful content detection. 8. Securitybulldog :Threat detection and remediation for Cybersecurity. 9. Navalon : Enhanced security for SMEs with budget solution.