AI Powered Correlation Technique to Detect Virtual Machine Attacks in Private Cloud Environment

KJL Kumar, Y Hariprasad, KS Ramesh… - AI Embedded Assurance …, 2023 - Springer
The efficacy of cyber forensic systems primarily depends on the real-time discovery and the
analysis of the threats in a timely manner. This process requires the development of smart …

Log Necropsy: Web-Based Log Analysis Tool

A Kamal, AI Hajamydeen… - 2022 IEEE 10th …, 2022 - ieeexplore.ieee.org
Modern IT systems rely heavily on event logging and event logs. Many applications,
operating systems, network devices, and other system components can log events to a local …

An Optimized Cyber Security Framework for Network Applications

B Veerasamy, D Nageswari, SN Kumar… - … Conference on Frontiers …, 2023 - Springer
The evolution of computer networks and Internet of Things (IoT) in various fields increases
the privacy, and security concerns. The increased usage of network-related applications …

[PDF][PDF] Considerations On Artificial Intelligence And Cybernetic Risks, A New Paradigm Of The Banking Financial System

LC Stoica - Journal of Smart Economic Growth, 2022 - jseg.ro
CONSIDERATIONS ON ARTIFICIAL INTELLIGENCE AND CYBERNETIC RISKS, A NEW
PARADIGM OF THE BANKING FINANCIAL SYSTEM Page 1 JOURNAL OF SMART …

Ready For The Next Cyber Threat? Indispensable Assets For Digital Business Organisations

E Nichifor, G Brătucu - Journal of Smart Economic Growth, 2022 - jseg.ro
By intensifying the digital activity of organisations, the cybersecurity has been placed in
special lights when decision-making processes are carried out. Cyber risks are considered …