Acta Scientific Computer Sciences

Research Article Volume 6 Issue 6

Enhancing Data Collection Efficiency in Underwater Wireless Sensor Networks: A Contention-Free Pipelined Scheduling (CFPS) MAC Protocol

Girish Chhabra1* and Prableen Kaur2

1Senior Software Engineer, IBM, USA
2Software Engineer, Service Now, USA

*Corresponding Author: Girish Chhabra, Senior Software Engineer, IBM, USA.

Received: April 26, 2024; Published: May 23, 2024


This article explores the transformative impact of Artificial Intelligence (AI) on the security domain, encompassing both cybersecurity and physical security systems. It presents a comprehensive overview of the current applications of AI in enhancing security measures through automated threat detection, fraud prevention, and advanced surveillance technologies. The discussion extends into future projections where AI could operate autonomously, contributing to national defense and predictive policing. However, the advancement of AI technologies also introduces significant ethical considerations, such as privacy concerns, potential biases, and the need for effective oversight. The article emphasizes the necessity for a balanced approach that safeguards fundamental rights while leveraging AI's capabilities to improve security. It concludes with a call for ongoing dialogue among stakeholders to address these challenges and steer AI developments in security towards ethically aligned outcomes.

Keywords: Artificial Intelligence (AI); Cybersecurity


  1. Akhtar N. “Threat of adversarial attacks on deep learning in computer vision: A survey”. IEEE Access 6 (2018): 14410-14430.
  2. Anh T T., et al. "Efficient training management for mobile crowd-machine learning: A deep reinforcement learning approach”. IEEE Wireless Communications Letters 5 (2019): 1345-1348.
  3. Blum A L and Langley P. “Selection of relevant features and examples in machine learning”. Artificial Intelligence 1-2 (1997): 245-271.
  4. Carlini N and Wagner D. “Towards evaluating the robustness of neural networks”. 2017 IEEE Symposium on Security and Privacy (2017): 39-57.
  5. Louis JM Aslett., et al. "A review of homomorphic encryption and software tools for encrypted statistical machine learning”. Stat 1050 (2015): 26.
  6. Jimmy Ba and Rich Caruana. “Do deep nets really need to be deep?”. In Advances in neural information processing systems (2014): 2654–2662.
  7. Ho Bae., et al. "Security and privacy issues in deep learning”. arXiv preprint arXiv:1807.11655 (2018).
  8. Oleksii Skitsko., et al. "THREATS AND RISKS OF THE USE OF ARTIFICIAL INTELLIGENCE". Cybersecurity: Education, Science, Technique 6 (2023).
  9. Mohammed Balfaqih and Zain Balfagih. "AI-Enhanced Engineering Education". AI-Enhanced Teaching Methods (2024):


Citation: Girish Chhabra and Prableen Kaur. “The Future of Artificial Intelligence in Security: A Comprehensive Overview".Acta Scientific Computer Sciences 6.6 (2024): 29-30.


Copyright: © 2024 Girish Chhabra and Prableen Kaur. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 30, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US