• Matthew N. O. Sadiku Prairie View A&M University, Prairie View, TX, USA.
  • Omobayode Fagbohungbe Prairie View A&M University, Prairie View, TX, USA.
  • Sarhan M. Musa Prairie View A&M University, Prairie View, TX, USA.



Cyber security, Cyber-attacks, Artificial Intelligence


Cybersecurity is the process of protecting computer networks from cyber attacks or unintended unauthorized access.  It is the need of the hour. Organizations, businesses, and governments need cybersecurity solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. By combining the strength of artificial intelligence with cybersecurity, security experts are more capable to defend vulnerable networks and data from cyber attackers. This paper provides an introduction to the use of artificial intelligence in cybersecurity.


“Eliminating the complexity in cybersecurity with artificial intelligence,”

Y. Zhang, “Cybersecurity and reliability of electric power grids in an interdependent cyber-physical environment,” Doctoral Dissertation, University of Toledo, 2015.

M. N. O. Sadiku, S. Alam, S. M. Musa, and C. M. Akujuobi,” A primer on cybersecurity,” International Journal of Advances in Scientific Research and Engineering, vol. 3, no. 8, Sept. 2017, pp. 71-74.

M. N. O. Sadiku, T. J. Ashaolu, and S. M. Musa,” Artificial Intelligence in medicine: A primer,” International Journal of Trend in Research and Development, vol. 6, no. 1, Jan.-Feb. 2019, pp. 270-272.

Y. Mintz and R. Brodie, “Introduction to artificial intelligence in medicine,” Minimally Invasive Therapy & Allied Technologies, vol. 28, no. 2, 2019, pp. 73-81.

R. O. Mason, “Ethical issues in artificial intelligence,” Encyclopedia of Information Systems, vol 2, 2003, pp. 239-258.

A. N. Rames et al., “Artificial intelligence in medicine,” Annals of the Royal College of Surgeons of England, vol. 86, 2004, pp. 334–338.

M. N. O. Sadiku, Y. Zhou, and S. M. Musa, “Natural language processing in healthcare,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, no. 5, May 2018, pp. 39-42.

“No longer science fiction, AI and robotics are transforming healthcare,”

F. Jiang et al., “Artificial intelligence in healthcare: Past, present and future,” Stroke and Vascular Neurology, 2017.

“Quantum computing,”

S. Dilek, H. Çakır, and M. Aydın, “Applications of artificial intelligence techniques to combating cyber crimes: A review,” International Journal of Artificial Intelligence & Applications, vol. 6, no. 1, January 2015, pp. 21-39.

C. Crane, “Artificial intelligence in cyber security: The savior or enemy of your business?” July 2019,

“The role of AI in cyber security,”

“Artificial intelligence for a smarter kind of cyber security,”

M. Taddeo, T. McCutcheon, and L. Floridi , “Trusting artificial intelligence in cybersecurity is a double-edged sword,” Nature Machine Intelligence, vol. 1, November 2019, pp. 557–560.

Unknown source.

D. Palmer, “AI is changing everything about cybersecurity, for better and for worse. Here's what you need to know,” March 2020,

N. J. Daras and M. T. Rassias (eds.), Computation, Cryptography, and Network Security. Springer, 2015.

A. Parisi, Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies.

Packt Publishing, 2019.

S. Halder and S. Ozdemir, Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem. Packt Publishing, 2018.

M. Gilbert (ed.), Artificial Intelligence for Autonomous Networks. Boca Raton, FL: CRC Press, 2018.

B. B. Gupta and Q. Z. Sheng, Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Boca Raton, FL: CRC Press, 2019.



How to Cite

Matthew N. O. Sadiku, Fagbohungbe, O., & Sarhan M. Musa. (2020). ARTIFICIAL INTELLIGENCE IN CYBERSECURITY. International Journal of Engineering Research and Advanced Technology - IJERAT (ISSN: 2454-6135), 6(5), 1-7.