An intellectual methodology for secure health record mining and risk forecasting using clustering and graph-based classification

D Shiny Irene, V Surya, D Kavitha… - Journal of Circuits …, 2021 - World Scientific
The objective of the research work is to analyze and validate health records and securing
the personal information of patients is a challenging issue in health records mining. The risk …

Enhancing detection of R2L attacks by multistage clustering based outlier detection

JR Beulah, M Nalini, DS Irene… - Wireless Personal …, 2022 - Springer
The modern society is greatly benefited by the advancement of Internet. The contemporary
humanity is significantly profited by the Internet. The ease of access to the Internet have …

Detection of cyber attacks using machine learning

N Vadivelan, K Bhargavi, S Kodati… - AIP Conference …, 2022 - pubs.aip.org
Cyber security professionals pay greater regard to risk evaluation and propose techniques
for mitigating. Throughout the area of cyber defense, designing successful strategies was a …

Secure internet of battlefield from malicious software using deep eigenspace learning

K Bhargavi, N Vadivelan, S Kodati… - AIP Conference …, 2022 - pubs.aip.org
In military cases, the Internet of Things (IoT) is normally made of a variety and nodes for the
Internet (eg Portable military jackets as well as diagnostic equipment). This IoT system and …

[PDF][PDF] Iris Recognition: A Machine Learning Approach with Advanced Classifiers

B Govardhan, EA Babu - ijte.uk
A Security Information and Event Management framework is set up to work on the different
safeguard advances and banner admonitions for security episodes to safeguard an …

[PDF][PDF] A User-Centric Deep Learning Agenda for Cyber Security Operations applicant

MM Rao, K Ramakrishna, NRK Sri - zkginternational.com
A SIEM (Security Information and Event Management) framework is set up to work on the
different safeguard advances and banner admonitions for security episodes to safeguard an …

[PDF][PDF] Deep Learning-Based User-Centric Agenda for Cyber Security Operations Applicant

SM RAFI, C VINOD, YY BABU - ijte.uk
A Security Information and Event Management framework is set up to work on the different
safeguard advances and banner admonitions for security episodes to safeguard an …

[PDF][PDF] Cyber Security Operations Centre: A User-Cantered Machine Learning Framework

S Nalanagula, A Roy - academia.edu
To guarantee an organization's Internet security, SIEM (Security Information and Event
Management) framework is about up to disentangle the different preventive advances and …

[PDF][PDF] Detection of Cyber Attacks Using Machine Learning Techniques

AN Rejy, SK Mishra - ijirtm.com
Professionals in cyber security give risk assessment more consideration and provide ways
to mitigate it. Designing effective methods was a goal established for the field of cyber …