[go: up one dir, main page]

Kumar et al., 2024 - Google Patents

Leveraging Machine Learning Algorithms for Threat Detection Using AI-Enhanced Cybersecurity Datasets

Kumar et al., 2024

Document ID
9822901381931124516
Author
Kumar A
Guleria K
Publication year
Publication venue
2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS)

External Links

Snippet

This study uses an AI-enhanced cybersecurity events dataset to utilize the effectiveness of leveraging machine learning algorithms Logistic Regression, Decision Tree, and Random Forest for threat detection. The dataset includes cyber incidents, which preprocess and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis

Similar Documents

Publication Publication Date Title
Srivastava et al. XAI for cybersecurity: state of the art, challenges, open issues and future directions
Alex-Omiogbemi et al. Advances in cybersecurity strategies for financial institutions: A focus on combating E-Channel fraud in the Digital era
Hephzipah et al. An efficient cyber security system based on flow-based anomaly detection using Artificial neural network
Perumal Stacking ensemble-based XSS attack detection strategy using classification algorithms
Amin et al. Classification of cyber attacks based on rough set theory
Alshammari et al. Scalable and robust intrusion detection system to secure the IoT environments using software defined networks (SDN) enabled architecture
Ajakaye et al. Integrating Artificial Intelligence in organizational cybersecurity: Enhancing consumer data protection in the US Fintech Sector
Salih et al. Cyber security: performance analysis and challenges for cyber attacks detection
Kshetri et al. algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms
Mghames et al. Intrusion detection system for detecting distributed denial of service attacks using machine learning algorithms
Kumari et al. Mitigating Malvertising Threats: An Exploration of Machine Learning Classification Algorithms for Effective Detection
Nazir et al. A review on machine learning techniques for network security
Sharon Femi et al. Explainable Artificial Intelligence for Cybersecurity
Sivasankar The review of artificial intelligence in cyber security
Raheema Challenges and vulnerability assessment of cybersecurity in IoT-enabled SC
Kumar et al. Leveraging Machine Learning Algorithms for Threat Detection Using AI-Enhanced Cybersecurity Datasets
George Artificial Intelligence-Powered Cybersecurity: The Future of How Threats Are Detected and Responded
Sharma et al. Advances and challenges in cryptography using artificial intelligence
Kathuria et al. Automation Intercession: Cyber Security
Anjani et al. Evolving threats and ai solutions for modern hybrid cloud architectures
Rahim et al. A survey on anti-phishing techniques: From conventional methods to machine learning
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Kumar et al. Prediction of probability of server intrusion using machine learning techniques
Kumari et al. Defending the Treasury: Deep Learning Strategies for Banking Security Against Trojan Threats
Shivappa An Approach for Integrating Behavioral Analytics and Machine Learning for Enhanced Cybersecurity