Kumar et al., 2024 - Google Patents
Leveraging Machine Learning Algorithms for Threat Detection Using AI-Enhanced Cybersecurity DatasetsKumar et al., 2024
- Document ID
- 9822901381931124516
- Author
- Kumar A
- Guleria K
- Publication year
- Publication venue
- 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS)
External Links
Snippet
This study uses an AI-enhanced cybersecurity events dataset to utilize the effectiveness of leveraging machine learning algorithms Logistic Regression, Decision Tree, and Random Forest for threat detection. The dataset includes cyber incidents, which preprocess and …
- 238000001514 detection method 0 title abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Srivastava et al. | XAI for cybersecurity: state of the art, challenges, open issues and future directions | |
| Alex-Omiogbemi et al. | Advances in cybersecurity strategies for financial institutions: A focus on combating E-Channel fraud in the Digital era | |
| Hephzipah et al. | An efficient cyber security system based on flow-based anomaly detection using Artificial neural network | |
| Perumal | Stacking ensemble-based XSS attack detection strategy using classification algorithms | |
| Amin et al. | Classification of cyber attacks based on rough set theory | |
| Alshammari et al. | Scalable and robust intrusion detection system to secure the IoT environments using software defined networks (SDN) enabled architecture | |
| Ajakaye et al. | Integrating Artificial Intelligence in organizational cybersecurity: Enhancing consumer data protection in the US Fintech Sector | |
| Salih et al. | Cyber security: performance analysis and challenges for cyber attacks detection | |
| Kshetri et al. | algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms | |
| Mghames et al. | Intrusion detection system for detecting distributed denial of service attacks using machine learning algorithms | |
| Kumari et al. | Mitigating Malvertising Threats: An Exploration of Machine Learning Classification Algorithms for Effective Detection | |
| Nazir et al. | A review on machine learning techniques for network security | |
| Sharon Femi et al. | Explainable Artificial Intelligence for Cybersecurity | |
| Sivasankar | The review of artificial intelligence in cyber security | |
| Raheema | Challenges and vulnerability assessment of cybersecurity in IoT-enabled SC | |
| Kumar et al. | Leveraging Machine Learning Algorithms for Threat Detection Using AI-Enhanced Cybersecurity Datasets | |
| George | Artificial Intelligence-Powered Cybersecurity: The Future of How Threats Are Detected and Responded | |
| Sharma et al. | Advances and challenges in cryptography using artificial intelligence | |
| Kathuria et al. | Automation Intercession: Cyber Security | |
| Anjani et al. | Evolving threats and ai solutions for modern hybrid cloud architectures | |
| Rahim et al. | A survey on anti-phishing techniques: From conventional methods to machine learning | |
| Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
| Kumar et al. | Prediction of probability of server intrusion using machine learning techniques | |
| Kumari et al. | Defending the Treasury: Deep Learning Strategies for Banking Security Against Trojan Threats | |
| Shivappa | An Approach for Integrating Behavioral Analytics and Machine Learning for Enhanced Cybersecurity |