Next Generation AI-Based Firewalls: A Comparative Study

S Ahmadi - International Journal of Computer (IJC), 2023 - hal.science
Cybersecurity is a critical concern in the digital age, demanding innovative approaches to
safeguard sensitive information and systems. This paper conducts a thorough examination …

IoT in energy: a comprehensive review of technologies, applications, and future directions

O Arshi, A Rai, G Gupta, JK Pandey… - Peer-to-Peer Networking …, 2024 - Springer
Abstract The integration of IoT (Internet of Things) in the energy sector has the potential to
transform the way it generates, distributes, and consumes energy. IoT can enable real-time …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Beyond the Code: Bridging Ethical and Practical Gaps in Data Privacy for AI-Enhanced Healthcare Systems

A Gambhir, N Jain, M Pandey, Simran - Recent Trends in Artificial …, 2024 - Springer
Artificial Intelligence (AI) has the potential to revolutionize healthcare in the current digital
environment by providing hitherto unheard-of gains in patient care, operational efficiency …

Can Windows 11 Stop Well-Known Ransomware Variants? An Examination of Its Built-in Security Features

YM Al-Awadi, A Baydoun, H Ur Rehman - Applied Sciences, 2024 - mdpi.com
The ever-evolving landscape of cyber threats, with ransomware at its forefront, poses
significant challenges to the digital world. Windows 11 Pro, Microsoft's latest operating …

IoT Security Model for Smart Cities based on a Metamodeling Approach

DZ Alotaibe - Engineering, Technology & Applied Science Research, 2024 - etasr.com
Security solutions for the Internet of Things (IoT) in smart cities are complex and require a
comprehensive approach to success. Several models and frameworks have been …

Threat Hunting and Behaviour Analysis

SR Sindiramutty, NZ Jhanjhi… - Utilizing Generative AI for …, 2024 - books.google.com
Cybersecurity-the core of operations is represented by threat hunting and behaviour
analysis that help shield digital assets from the constantly defined cyberattacks. Looking for …

AI-powered strategies for advanced malware detection and prevention

SI Ansarullah, AW Wali, I Rasheed… - The Art of Cyber …, 2024 - taylorfrancis.com
As the digital world continue to progress, the threat of malware grows large, hence
demanding innovative approaches to strengthen information systems. Preventing and …

IoT-Based Electrical Appliances

B Ahmed, Z Abbas, A Akbar, UH Ahmad… - … Intelligence in Power …, 2024 - taylorfrancis.com
The goal of this project is to control electrical appliances via the internet in real-time to
operate them from a remote location. IoT-based electrical appliance control (automation …