Please use this identifier to cite or link to this item:
https://dspace.kmf.uz.ua/jspui/handle/123456789/5795Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Daria Hurtova | en |
| dc.contributor.author | Hanna Sorokun | en |
| dc.date.accessioned | 2026-01-26T15:37:23Z | - |
| dc.date.available | 2026-01-26T15:37:23Z | - |
| dc.date.issued | 2025 | - |
| dc.identifier.citation | In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 79-80. | en |
| dc.identifier.isbn | 978-617-8143-50-3 (puhatáblás) | - |
| dc.identifier.isbn | 978-617-8143-51-0 (PDF) | - |
| dc.identifier.uri | https://dspace.kmf.uz.ua/jspui/handle/123456789/5795 | - |
| dc.description | Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/ | en |
| dc.description.abstract | Abstract. Artificial intelligence continues to reshape security landscapes around the world, enabling systems that are more adaptive, predictive, and efficient than ever before. In recent months, several breakthroughs have highlighted both the opportunities and fresh threats posed by AI in the security domain. One unexpected vulnerability discovered in ChatGPT’s Deep Research agent, known as “ShadowLeak,” allows attackers to siphon sensitive information without any visible user interaction. This zero-click, server-side flaw underscores the fact that AI tools themselves can be weak links in enterprises’ security posture. At the same time, generative AI attacks are accelerating at an alarming rate. A Gartner report from September 2025 found that 29% of organizations experienced attacks targeting their AI application infrastructure within the past year. Deepfake incidents—through audio, voice biometric spoofing, or video—are growing in prevalence, introducing new vectors for disinformation and fraud. Another concern is that malware is now being developed that can evade even advanced protection tools. In one experiment, a malware strain trained via reinforcement learning managed to bypass Microsoft Defender’s security checks around 8% of the time after only three months of training, using a relatively small budget. This kind of AI-generated malware shows attackers’ growing ability to automate and refine their methods very quickly. | en |
| dc.language.iso | uk | en |
| dc.publisher | II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem | en |
| dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
| dc.subject | modern security technologies | en |
| dc.subject | AI vulnerabilities | en |
| dc.title | The role of artificial intelligence in modern security technologies | en |
| dc.type | dc.type.conferenceAbstract | en |
| Appears in Collections: | A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| The_role_artificial_intelligence_moder_technologies_2025.pdf | In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 79-80. | 10 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License



