Artificial intelligence: revolutionizing cyber security in the digital era
S Kumar, U Gupta, AK Singh, AK Singh - Journal of Computers …, 2023 - jcmm.co.in
As we navigate the digital era of the 21st century, cyber security has grown into a pressing
societal issue that requires innovative, cutting-edge solutions. In response to this pressing …
societal issue that requires innovative, cutting-edge solutions. In response to this pressing …
Generative AI in Network Security and Intrusion Detection
SR Sindiramutty, KRV Prabagaran… - … With Generative AI …, 2025 - igi-global.com
Protecting virtual assets from cyber threats is essential as we live in a digitally advanced
world. Providing a responsible emphasis on proper network security and intrusion detection …
world. Providing a responsible emphasis on proper network security and intrusion detection …
Targeting Insider Threats and Zero-Day Vulnerabilities with Advanced Machine Learning and Behavioral Analytics
SR Wategaonkar, AT Shaki, AP Ali… - … in Technology and …, 2024 - ieeexplore.ieee.org
This study presents a revolutionary approach to cybersecurity that uses behavioural
analytics and machine learning in tandem to show how it is far better than the status quo …
analytics and machine learning in tandem to show how it is far better than the status quo …
Zero-Day Exploits and Vulnerability Management
IP Zengeni, M fadli Zolkipli - Borneo International Journal eISSN …, 2024 - majmuah.com
Zero-day vulnerabilities pose significant threats to enterprise cybersecurity, exploiting
unknown weaknesses in software before patches are available. This paper explores the …
unknown weaknesses in software before patches are available. This paper explores the …
Behavior and Characteristics of Ransomware-A Survey
NA Malik, AM Delshadi, M Ibrar… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Until a ransom is paid, ransomware, a crypto virology virus, tries to disclose or constantly
restrict access to the accused's confidential information. While simple ransomware may …
restrict access to the accused's confidential information. While simple ransomware may …
Ransomware Attacks: Tools and Techniques for Detection
Ransomware is a sort of crypto virology virus that attempts to expose or persistently limit
access to the accused's private information until a ransom payment is made. Although some …
access to the accused's private information until a ransom payment is made. Although some …
Zero-Day Exploits in Web Applications: Detection, Response, and Prevention
Cybercriminals are increasingly exploiting zero-day vulnerabilities in web applications to
compromise the security and integrity of online systems. These vulnerabilities were …
compromise the security and integrity of online systems. These vulnerabilities were …
Advanced Strategies for Detecting Ransomware Threats
H Santhi, N Sathish, DR Akash, VCA Sai… - 2024 9th …, 2024 - ieeexplore.ieee.org
Ransomware is one of the key threats that have been created to lock the important services
and data. New techniques like machine learning and blockchain are being used for …
and data. New techniques like machine learning and blockchain are being used for …
Enhancing Zero-Day Attack Detection with XAI-Driven ML Models and SMOTE Analysis
CK Sruthi, A Ravikumar… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Zero-day attacks, which are defined by their abrupt appearance without any previous
detection mechanisms, present a substantial obstacle in the field of network security. To …
detection mechanisms, present a substantial obstacle in the field of network security. To …
Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis
This paper discusses the performance and reliability of different strategies for database
backup and recovery within a controlled environment, focusing on the comparison between …
backup and recovery within a controlled environment, focusing on the comparison between …