SUNʼIY INTELLEKT, ROBOTOTEXNIKA VA HUQUQ: SUNʼIY INTELLEKTNING XAVFSIZ KIBERXAVFSIZLIK TIZIMLARIGA TAʼSIRI
Kalit so'zlar
https://doi.org/10.47390/SPR1342V5I1Y2025N47Kalit so'zlar
maʼlumotlarni himoya qilish, kiberxavfsizlik, sunʼiy intellekt, kiberhujumlar, maʼlumotlarga kirish, kirishni aniqlash.Annotasiya
Bugungi kunda maʼlumotlar dunyoni boshqarmoqda, shu sababli kiberhujumlardan maʼlumotlarni
himoya qilish muhim ahamiyatga egadir. Shuningdek, internet tarmoqlari, dasturiy taʼminotlar va texnik vositalar
kiberxavfsizlik tizimlari bilan himoyalangan, ammo, kibermakonda tahdidlarning kundan-kunga ortib borishi
natijasida ularga qarshi anʼanaviy algoritmlar samarasiz boʻlib bormoqda. Bundan tashqari, kiberhujumlarning
koʻpayishi yanada aqlli va mustahkamroq boʻlgan ilgʻor kiberxavfsizlik usullarini yaratishni zaruratga aylantirdi.
Kiberxavfsizlikning hozirgi holatini hisobga olsak, mutaxassislar sunʼiy intellektni anʼanaviy kiberxavfsizlik
texnikasidagi yutuqlarni qoʻllab-quvvatlashi mumkin boʻlgan potensial soha sifatida jiddiy qarashadi. Shuningdek,
sunʼiy intellektga asoslangan xulq-atvorni tahlil qilish usullari anormalliklarni va kutilgan xatti-harakatlardan
chetga chiqishni aniqlash orqali kirish tizimlarini yaxshilaydi. Sunʼiy intellekt orqali zararli dasturlarni aniqlash,
xavfni oldini olish va himoyani yuqori darajada taʼminlash usullari oʻrganiladi.
Manbalar
1. Samtani, S., Zhao, Z. and Krishnan, R., 2023. Secure Knowledge Management and
Cybersecurity in the Era of Artificial Intelligence. Information Systems Frontiers, 25(2),
pp.425- 429.
2. “Kiberjinoyatchilikka qarshi kurashishga oid milliy va xalqaro standartlar” N.S.Salayev,
R.N.Ro‘ziyev Toshkent – 2018 B-22.
3. “Kiberxavfsizlik asoslari”, S.K.Ganiev, A.A.Ganiev, Z.T.Xudoyqulov, Toshkent 2020 B.42.
4. Raximov, S. Sunʼiy intellekt va raqamli transformatsiya: Sanoatni rivojlantirishdagi yangi
imkoniyatlar. O‘zbekiston Texnologiyalar Ilmiy Jurnali. 2021-yil. 12(4). 78-89 bet.
5. Sun’iy intellekt javobgarligining axloqiy va huquqiy taomillari. Sardor Bozarov,
DOI:10.47689/2181-1415-vol3-iss3-pp48-56 License CC BY 4.0.
6. Rani, V., Kumar, M., Mittal, A. and Kumar, K., 2022. Artificial Intelligence for Cybersecurity:
Recent Advancements, Challenges and Opportunities. Robotics and AI for Cybersecurity
and Critical Infrastructure in Smart Cities, pp.73-88.
7. Turransky, A. and Amini, M.H., 2022. Artificial Intelligence and Cybersecurity: Tale of
Healthcare Applications. Cyberphysical Smart Cities Infrastructures: Optimal Operation
and Intelligent Decision Making, pp.1-11. applications of artificial intelligence in
cybersecurity. Minds and machines, 29, pp.187-191.
8. Alhayani, B., Mohammed, H.J., Chaloob, I.Z. and Ahmed, J.S., 2021. Effectiveness of artificial
intelligence techniques against cyber security risksapply of IT industry. Materials Today:
Proceedings, 531.
9. 9.Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D.and Tran, T., 2019. Grand challenge:
applying artificial intelligence and machine learning to cybersecurity. Computer, 52(12),
pp.45-52.
10. Taddeo, M., 2019. Three ethical challenges of applications of artificial intelligence in
cybersecurity. Minds and machines, 29, pp.187-191.
11. Kiberxavfsizlik, raqamli huquq va hisob gigiyena – kiberjinoyatchilikka qarshi muqobil
yechim. Javlon Zoilboyev. 2022 yil avgust Obshchestvo va innovatsii 3(6/S):12-24 DOI:
10.47689/2181-1415-vol3-iss6/S-pp12- LitsenziyaCC BY 4.0See discussions, stats, and
author profiles for this publication at:
https://www.researchgate.net/publication/362407860.
12. Ponemon Institute. (2019). Cost of Data Breach Study: Global Analysis. Retrieved from
https://www.ibm.com/security/data-breach.
13. International Telecommunication Union. (2020). Global Cybersecurity Index: Country
Rankings. Retrieved from https://www.itu.int/en/ITU-D/Cybersecurity/Pages/GCI.
14. Cybersecurity and Infrastructure Security Agency. (2021). Cyber Security Best Practices
Guide. Retrieved from https://www.cisa.gov/cybersecurity-best-practices.
15. Brenner, S. (2007). Cybercrime Jurisdiction. In Research Handbook on International Law
and Cyberspace (pp. 248-281). Edward Elgar Publishing.
16. DeNardis, L. (2014). The Global War for Internet Governance. Yale University Press.
17. Goldsmith, J., & Wu, T. (2006). Who Controls the Internet? Illusions of a Borderless World.
Oxford University Press.