Akpan, Whyte Asukwo and Orazulume, Chikodili Martha and Essien, Godwin Daniel and Ohaeri, Ifeoma Ugochi and Inyang, Nsikakabasi Nsedu and Chikelu, Peter Okechukwu (2025) Artificial Intelligence vulnerability prevention for closed-loop control system. Global Journal of Engineering and Technology Advances, 23 (2). 025-030. ISSN 2582-5003
![GJETA-2025-0121.pdf [thumbnail of GJETA-2025-0121.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
GJETA-2025-0121.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Artificial intelligence has created much impact in so many scientific and engineering fields because of its ease, versatility and capability to be adopted to suit different applications. Concerns have arisen for online applications which can be exposed to cyber threats. The various benefits expected to be derived from online application of Artificial intelligence are so huge that these threats cannot be allowed to form a stumbling block to its utilization. Just like many technologies that may usually be faced with some initial challenges in its development and applications, priority should be on how to identify such possible cyber threats and then build up necessary cyber security measures to prevent these threats. It is in this wisdom that this research is focused to offer solutions that will accelerate its safe applications on closed-loop control systems environment. Prevention to AI based control loop vulnerability can be achieved by building strong security controls and zero trust procedures to prevent hackers, intruders, cyber-criminals and blind-cyber wanderers from penetrating into the system either internally or externally. With such protocols which is possible and achievable the objective of application of AI in online closed -loop control system is practicable and will improve the efficiency of the overall system.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/gjeta.2025.23.2.0121 |
Uncontrolled Keywords: | Closed-Loop; Control System; Vulnerability; Cyber-Attack; Security; AI |
Depositing User: | Editor Engineering Section |
Date Deposited: | 22 Aug 2025 09:09 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/5576 |