Artificial intelligence: revolutionizing cyber security in the digital era

S Kumar, U Gupta, AK Singh, AK Singh - Journal of Computers …, 2023 - jcmm.co.in
As we navigate the digital era of the 21st century, cyber security has grown into a pressing
societal issue that requires innovative, cutting-edge solutions. In response to this pressing …

Generative AI in Network Security and Intrusion Detection

SR Sindiramutty, KRV Prabagaran… - … With Generative AI …, 2025 - igi-global.com
Protecting virtual assets from cyber threats is essential as we live in a digitally advanced
world. Providing a responsible emphasis on proper network security and intrusion detection …

Targeting Insider Threats and Zero-Day Vulnerabilities with Advanced Machine Learning and Behavioral Analytics

SR Wategaonkar, AT Shaki, AP Ali… - … in Technology and …, 2024 - ieeexplore.ieee.org
This study presents a revolutionary approach to cybersecurity that uses behavioural
analytics and machine learning in tandem to show how it is far better than the status quo …

Zero-Day Exploits and Vulnerability Management

IP Zengeni, M fadli Zolkipli - Borneo International Journal eISSN …, 2024 - majmuah.com
Zero-day vulnerabilities pose significant threats to enterprise cybersecurity, exploiting
unknown weaknesses in software before patches are available. This paper explores the …

Behavior and Characteristics of Ransomware-A Survey

NA Malik, AM Delshadi, M Ibrar… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Until a ransom is paid, ransomware, a crypto virology virus, tries to disclose or constantly
restrict access to the accused's confidential information. While simple ransomware may …

Ransomware Attacks: Tools and Techniques for Detection

K Khaliq, NZ Ab Rahim, K Hamid… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Ransomware is a sort of crypto virology virus that attempts to expose or persistently limit
access to the accused's private information until a ransom payment is made. Although some …

Zero-Day Exploits in Web Applications: Detection, Response, and Prevention

S Jena, A Soni, J Rout… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Cybercriminals are increasingly exploiting zero-day vulnerabilities in web applications to
compromise the security and integrity of online systems. These vulnerabilities were …

Advanced Strategies for Detecting Ransomware Threats

H Santhi, N Sathish, DR Akash, VCA Sai… - 2024 9th …, 2024 - ieeexplore.ieee.org
Ransomware is one of the key threats that have been created to lock the important services
and data. New techniques like machine learning and blockchain are being used for …

Enhancing Zero-Day Attack Detection with XAI-Driven ML Models and SMOTE Analysis

CK Sruthi, A Ravikumar… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Zero-day attacks, which are defined by their abrupt appearance without any previous
detection mechanisms, present a substantial obstacle in the field of network security. To …

Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis

M Ibrar, S Riaz, Y Khan, A Asif, K Hamid… - … Journal for Electronic …, 2024 - ijeci.lgu.edu.pk
This paper discusses the performance and reliability of different strategies for database
backup and recovery within a controlled environment, focusing on the comparison between …