Cyber security: A review of cyber crimes, security challenges and measures to control

A Verma, C Shri - Vision, 2022 - journals.sagepub.com
The proliferation of the Internet's interconnections has led to a substantial increase in
cyberattack incidents, often with devastating and grave consequences for the organizations …

A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection

A Salih, ST Zeebaree, S Ameen… - … & Innovation amid …, 2021 - ieeexplore.ieee.org
With the growing internet services, cybersecurity becomes one of the major research
problems of the modern digital era. Cybersecurity involves techniques to protect and control …

A novel approach to predict chronic kidney disease using machine learning algorithms

B Gudeti, S Mishra, S Malik… - 2020 4th …, 2020 - ieeexplore.ieee.org
A staggering 63,538 cases have been registered according to India's health statistics on
Chronic Kidney Disease (CKD). The average age of nephropathy for humans lies between …

[图书][B] Factors Influencing the Adoption of Machine Learning Algorithms to Detect Cyber Threats in the Banking Industry

H Gonaygunta - 2023 - search.proquest.com
Cyber attacks have evolved, making predicting and preventing their occurrence difficult. The
complexity of cyber threats has contributed to the development of technology-intensive …

[PDF][PDF] Cyber security: performance analysis and challenges for cyber attacks detection

AA Salih, MB Abdulrazzaq - Indonesian Journal of Electrical …, 2023 - academia.edu
Nowadays, with the occurrence of new attacks and raised challenges have been facing the
security of computer systems. Cyber security techniques have become essential for …

Comparative Analysis of Machine and Deep Learning for Cyber Security

H Maryam, SZN Zukhraf, R Ullah - Cyber Security for Next …, 2024 - taylorfrancis.com
Cyber crime is a growing problem that exploits various vulnerabilities in computing
environments due to the widespread Internet applications, Internet-connected systems, and …

Vanet FDIA Solutions using Blockchain Based IPFS-Trust Management System with ML SVR Model

P Grover, SK Prasad - 2023 - researchsquare.com
Abstract The Internet of Vehicles (IoV) is the next phase in the evolution of vehicular ad hoc
networks (VANETs). Multiple types of Smart Networks exists in our surrounding. ie, Wireless …

[PDF][PDF] Cyber Attack Detection using Deep Learning

A Kumar, A Kumar, MK Singh, P Kumari - 2023 - researchgate.net
Intrusion detection refers to the process of identifying unauthorized or malicious activities
within a computer network or system. It involves monitoring network traffic, analyzing system …

Multi-level Predictive with Training Framework (MP with TF) for ranking machine learning algorithms

TF Fernandez, M Pradeep - … Conference on I-SMAC (IoT in …, 2020 - ieeexplore.ieee.org
Machine learning algorithms differ from conventional ones in a way that they adjust
themselves to perform better when exposed to surplus data. Huge volumes of data were …

Maneuvered Network Traffic Profiling

C Aravindan, TF Fernandez… - Handbook of Research …, 2022 - taylorfrancis.com
The significance of network technology rise with the users exigencies upon cyberspace.
Internet Traffic Management (ITM) system is responsible for monitoring and analyzing the …