@article { author = {Naser, Shaymaa and Ali, Yossra}, title = {Systematic Review on Cyber-Security Applications}, journal = {IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING}, volume = {22}, number = {4}, pages = {28-36}, year = {2022}, publisher = {University of Technology-Iraq}, issn = {1811-9212}, eissn = {2617-3352}, doi = {https://doi.org/10.33103/uot.ijccce.22.4.3}, abstract = {Cybersecurity systems have been taken into account in modern information systems and methods. This is due to the increase in electronic attacks on storage information in terms of transmission, reception and storage. Therefore, the need to produce such systems in a complete way to prevent their penetration into the network has increased. In addition, artificial intelligence (AI) methods are used in cybersecurity systems as classifiers, attack detectors, and components for predicting threats that surround the network. This requires more information about threats and vulnerabilities to be covered to avoid any errors. In this paper, a systematic review is conducted to cover cybersecurity used in various applications, including systems based on wireless, cloud, and mobile sensor networks (WSN). The systematic review approach is adopted on a two-way basis to produce a clear view of the research work to date and to provide a field that can be used for future work.}, keywords = {WSN,Cyber-Security,Cyber Applications,AI}, url = {https://ijccce.uotechnology.edu.iq/article_178350.html}, eprint = {https://ijccce.uotechnology.edu.iq/article_178350_e8393a890f959ae5d3ee81032d8c7ee3.pdf} }