Artificial Intelligence Techniques in Cybersecurity Management

Mercy Dapel, Mary Asante, Chijioke Dike Uba, Michael Opoku Agyeman*

*Corresponding author for this work

Research output: Contribution to Book/ReportConference Contributionpeer-review


The rapid development in internet services led to a significant increase in cyberattacks. The need to secure systems and operations has become appar-ent as cybersecurity has become a national concern. Cybersecurity involves techniques that protect and control systems, networks, hardware, software, and electronic data from unauthorised access. Developing an effective and innovative defensive mechanism is an urgent requirement as traditional cy-bersecurity solutions are becoming inadequate in safeguarding information against cyber threats. There is a need for cybersecurity methods that are ca-pable of making real-time decisions and respond to cyberattacks. To sup-port this, researchers are focusing on approaches like Artificial Intelligence (AI) to improve cyber defence. This study provides an overview of existing research on cybersecurity using AI technologies. AI technologies made a remarkable contribution in combating cybercrimes with significant im-provement in anomaly intrusion detection.
Original languageEnglish
Title of host publicationCybersecurity in the Age of Smart Societies
Place of PublicationCham
Number of pages15
ISBN (Electronic)978-3-031-20160-8
ISBN (Print)978-3-031-20159-2
Publication statusPublished - 3 Jan 2023
EventInternational Conference on Global Security, Safety and Sustainability (ICGS3) -
Duration: 7 Sept 202210 Sept 2022

Publication series

NameAdvanced Sciences and Technologies for Security Applications
PublisherSpringer Nature
ISSN (Print)1613-5113


ConferenceInternational Conference on Global Security, Safety and Sustainability (ICGS3)
Internet address


  • artificial intelligence
  • AI
  • AI for Business
  • cybersecurity
  • Management


Dive into the research topics of 'Artificial Intelligence Techniques in Cybersecurity Management'. Together they form a unique fingerprint.

Cite this