[PDF][PDF] AI in Cybersecurity Risk Mitigation: Tools for Testing and Validation

R Joshi, RS Maan - … on" Advances in Electrical Computing & …, 2022 - researchgate.net
The landscape of cybersecurity is continually evolving, with threats becoming more
sophisticated and diverse. This review paper explores the pivotal role of artificial intelligence …

[PDF][PDF] AI in Cybersecurity Policy Compliance: A Comprehensive Overview

I Gupta, R Joshi - … on" Advances in Electrical Computing & …, 2022 - researchgate.net
As the digital landscape evolves, the integration of artificial intelligence (AI) in cybersecurity
policy compliance has become imperative. This paper provides an extensive review of the …

House price prediction using machine learning algorithm

S Sharma, D Arora, G Shankar… - 2023 7th …, 2023 - ieeexplore.ieee.org
Houses are one of the fundamental needs in human society. Good and peaceful
surroundings where people feel comfortable are called houses. Hence, to have a good and …

Facial and Emotional Identification using Artificial Intelligence

H Arora, M Kumar, T Rasool… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Facial identification has been an easy task for humans for a very long interval of time but
facial expressions with emotions are quite challenging nowadays. With the great success of …

Big data and ML: Interaction & Challenges

P Sen, R Jain, V Bhatnagar… - 2022 6th International …, 2022 - ieeexplore.ieee.org
A broad variety of applications are making use of machine learning (ML). In recent years, it's
been pushed to the forefront because of the advertising of big data. In the face of massive …

Sentiments Analysis using Machine Learning Algorithms

V Joshi, S Patel, R Agarwal… - 2023 Second International …, 2023 - ieeexplore.ieee.org
The analysis of the sentiments can be determined if a piece of message or text or comment
has a decent, negative or neutral feeling or sentiment. Analysis of sentiments is a subtype of …

[PDF][PDF] Artificial Intelligence: A Game Changer in Cyber Security

R Sharma, S Vashistha, S Sharma - researchgate.net
In the modern digital landscape, cyber security is a critical concern due to the increasing
sophistication of cyber threats. Traditional cyber security measures often struggle to keep …

[PDF][PDF] Is Two Factor Authentication Enough to Secure your System: A Study

M Lamba - jmeonline.in
In this study, we explore the significance of constantly enhancing authentication methods to
combatthe increasing cyber risks. As cybercrimes continue to soar, safeguarding online …

[PDF][PDF] A Review on Artificial Intelligence

MR Joshi, S Kumawat, S Soni, V Anuragi - researchgate.net
Artificial intelligence is exhibited by artificial entity. The inventor of the artificial intelligence is
“John Mcmarthy”. We have to discuss bioartificial intelligence goals likelogical reasoning …

[PDF][PDF] Airlines Management System Using Salesforce

K Jangid - ijgst.com
The Airlines Management System (AMS) including Salesforce is a finished response for the
flight business, engaging capable management of client associations, bargains, exhibiting …