Results for ' Automated Threat Mitigation'

979 found
Order:
  1.  24
    Automating Network Security with Ansible: A Guide to Secure Network Automation.Bellamkonda Srikanth - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (9):2722-2730.
    The increasing complexity of modern networks has amplified the challenges associated with ensuring robust and scalable security. With the rapid evolution of cyber threats, traditional methods of network security management are often inadequate, leading to inefficiencies and vulnerabilities. Automation has emerged as a transformative approach to streamline network operations, enhance security postures, and reduce the margin of human error. This study explores the integration of Ansible, a powerful open-source automation tool, into network security workflows to deliver a comprehensive framework for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  43
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based security solutions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Deception in Autonomous Transport Systems. Threats, Impacts, and Mitigation Policies.S. Parkinson, A. Nikitas & M. Vallati (eds.) - 2024 - Cham: Springer.
    Download  
     
    Export citation  
     
    Bookmark  
  4.  32
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  23
    AI-Powered Cybersecurity: Leveraging Deep Learning for Real-Time Threat Detection in Financial Services.Tripathi Praveen - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (8):10540-10542.
    The rise in cyber threats targeting financial institutions has led to the adoption of artificial intelligence (AI) and deep learning models to mitigate risks and detect fraud in real-time. This paper explores AI-powered cybersecurity frameworks that enhance fraud detection, risk analytics, and compliance automation in financial transactions.
    Download  
     
    Export citation  
     
    Bookmark  
  6.  30
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify potential (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  7.  12
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-5.
    : The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviour.F. Fossa, Luca Paparusso & Francesco Braghin - 2024 - In S. Parkinson, A. Nikitas & M. Vallati, Deception in Autonomous Transport Systems. Threats, Impacts, and Mitigation Policies. Cham: Springer. pp. 147-162.
    Download  
     
    Export citation  
     
    Bookmark  
  10. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent Threats (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  11.  32
    The Role of AI in Automated Threat Hunting.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-10.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The Role of Artificial Intelligence in Enhancing Automated Threat Hunting 1Mr.Sidharth Sharma.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-6.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses by leveraging machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with Signature-Based Methods. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  64
    Generative AI in Digital Insurance: Redefining Customer Experience, Fraud Detection, and Risk Management.Adavelli Sateesh Reddy - 2024 - International Journal of Computer Science and Information Technology Research 5 (2):41-60.
    This abstract summarizes, in essence, what generative AI means to the insurance industry. The kind of promise generated AI offers to insurance is huge: in risk assessment, customer experience, and operational efficiency. Natural disaster impact, financial market volatility, and cyber threat are augmented with techniques of real time scenario generation and modeling as well as predictive simulation based on synthetic data. One of the challenges that stand in the way of deploying these AI methods, however, is data privacy, model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve the accuracy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, case studies, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  18.  93
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with Signature-Based Methods. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  57
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  48
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key challenges associated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  40
    Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI.Adavelli Sateesh Reddy - 2023 - International Journal of Computer Science and Information Technology Research 4 (2):29-52.
    By integration with cloud computing, cybersecurity and generative AI, the insurance industry is being transformed from high efficiency, low cost, and better customer service. However, these advanced technologies can also be used by insurers to automate and streamline processes like claims handling, underwriting, and policy generation, which are majorly time consuming and error prone. In predictive analytics, fraud detection, and personalized customer experience, generative AI makes it possible for insurers to mitigate risks and, at the same time, provide more personalized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  17
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key challenges associated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  10
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  49
    The Future of Cybersecurity: Emerging Threats and Mitigation Strategies.Swapna V. Sneha P. - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 8 (12):1306-1312.
    As technology rapidly advances, the landscape of cybersecurity faces increasingly complex and evolving threats. This paper explores the future of cybersecurity, focusing on emerging threats and the corresponding mitigation strategies. Key threats include AI-driven attacks, ransomware evolution, quantum computing vulnerabilities, IoT security risks, cloud security challenges, and supply chain attacks. These threats have the potential to disrupt organizations and compromise sensitive data on an unprecedented scale. To address these challenges, the paper outlines effective mitigation strategies such as leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  17
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying every request for access, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Automated Dam Operation System.K. Amani - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-13.
    This project focuses on estimating reservoir inflows by integrating rainfall data, soil moisture levels in the catchment area, and releases from upstream reservoirs, coupled with an automated gate control system to prevent flooding in the basin. Utilizing hydrological models, the methodology predicts runoff from rainfall, adjusted for current soil moisture to enhance accuracy. Real-time data from upstream releases further refines inflow predictions. The automated system leverages predictive analytics and real-time monitoring to optimize gate operations, ensuring moderate water releases (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  26
    Cloud-Native Security Frameworks: AIDriven Risk Mitigation Strategies for MultiCloud Environments.Tripathi Praveen - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (11):13144-13146.
    The growing adoption of cloud computing has necessitated the development of AI-driven security frameworks to address threats in multi-cloud environments. This paper presents a cloud-native security model leveraging AI and zero-trust principles to enhance compliance, risk monitoring, and threat mitigation.
    Download  
     
    Export citation  
     
    Bookmark  
  28.  63
    Advanced Threat Detection Using AI-Driven Anomaly Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Meaningful Work and Achievement in Increasingly Automated Workplaces.W. Jared Parmer - 2024 - The Journal of Ethics 28 (3):527-551.
    As automating technologies are increasingly integrated into workplaces, one concern is that many of the human workers who remain will be relegated to more dull and less positively impactful work. This paper considers two rival theories of meaningful work that might be used to evaluate particular implementations of automation. The first is achievementism, which says that work that culminates in achievements to workers’ credit is especially meaningful; the other is the practice view, which says that work that takes the form (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  29
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  32.  61
    Threat Zone of An Explosion Particularly in Oil and Gas Industries or Refineries.Sahoo Prasantha Kumar - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-10.
    The project aims to address the critical need for a robust explosion risk assessment tool in the oil and gas industry, particularly in oil and gas refinery environments where safety is paramount. Traditional methods of threat assessment are often manual, subjective, and limited in their capacity to provide real-time insights, which poses significant challenges for industry professionals in managing potential hazards. Our project leverages real-time weather data and machine learning algorithms to develop an advanced web application designed to identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Climate Change and the Threat of Disaster: The Moral Case for Taking Out Insurance at Our Grandchildren's Expense.Matthew Rendall - 2011 - Political Studies 59 (4):884-99.
    Is drastic action against global warming essential to avoid impoverishing our descendants? Or does it mean robbing the poor to give to the rich? We do not yet know. Yet most of us can agree on the importance of minimising expected deprivation. Because of the vast number of future generations, if there is any significant risk of catastrophe, this implies drastic and expensive carbon abatement unless we discount the future. I argue that we should not discount. Instead, the rich countries (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  35.  38
    Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify patterns, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. MITIGATING THE IMPACT OF NATURAL HAZARDS: A HOTEL PREPAREDNESS AND RESPONSE STRATEGIES.Marchie L. Garcia, Jelene P. Abellera, Kaithleen C. Aguzar, Janice Grace T. Magahis, Claire Andrey G. Uriarte & Jowenie A. Mangarin - 2024 - Get International Research Journal 2 (2):81-105.
    This study investigates strategies for hotels situated near Taal Volcano to lessen the impact of natural disasters, specifically volcanic eruptions. The hospitality industry in this region faces a unique threat due to the volcano's activity. This research addressed a critical gap by implementing effective preparedness and response plans. A qualitative multiple case study design was employed by the researchers. Seven (7) hotel executives from different hotels situated in Batangas who had directly encountered and navigated the impacts of natural disasters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. (1 other version)Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and inherently (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  39. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  40. India's Efforts in Coping the threats of Climate Change.Sanjay Kumar Dwivedi - 2013 - SOCRATES 1 (1):43-57.
    The global Climate Change has unprecedented consequences in terms of scale and severity over human life. The accumulation of greenhouse gases and CFCs has increased environmental deterioration which is called global warming. Erratic changes in weather, brutal blizzards and floods, vicious heat wave etc. are only some of the effects of climate change. But the most dangerous effect of climate change is the melting of ice caps on the poles due to which sea levels are rising dangerously and life at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  15
    Application Security in the OSI Model: Protecting the Application Layer from Emerging Threats.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (5):8120-8126.
    The application layer of the Open Systems Interconnection (OSI) model plays a critical role in enabling end-user interaction with network services, making it a primary target for cybersecurity threats. This paper reviews contemporary research on securing the application layer, addressing emerging threats such as injection attacks, malware, phishing, and zero-day vulnerabilities. Key strategies, including secure development practices, application firewalls, cryptographic protocols, and user education, are explored to mitigate these risks. The challenges of an evolving threat landscape and resource constraints (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  43. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham, Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44. AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A tragic coalition of the rational and irrational: a threat to collective responses to COVID-19.Marinus Ferreira, Marc Cheong, Colin Klein & Mark Alfano - 2022 - Philosophical Psychology (6).
    There is not as much resistance to COVID-19 mitigation as there seems, but there are structural features that make resistance seem worse than it is. Here we describe two ways that the problem seeming to be worse than it is can make it worse. First, visible hesitation to implement COVID-19 responses signals to the wider society that mitigation measures may not succeed, which undermines people’s conditional willingness to join in on those efforts. Second, our evaluations of others’ willingness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  33
    Data Visualization in Financial Crime Detection: Applications in Credit Card Fraud and Money Laundering.Palakurti Naga Ramesh - 2023 - International Journal of Management Education for Sustainable Development 6 (6).
    This research paper investigates the transformative applications of data visualization techniques in the realm of financial crime detection, with a specific emphasis on addressing the challenges posed by credit card fraud and money laundering. The abstract explores the intricate landscape of visualizing financial data to uncover patterns, anomalies, and potential illicit activities. Through a comprehensive review of existing methodologies and case studies, the paper illuminates the pivotal role data visualization plays in enhancing the efficiency and accuracy of fraud detection systems. (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  47. Will Life Be Worth Living in a World Without Work? Technological Unemployment and the Meaning of Life.John Danaher - 2017 - Science and Engineering Ethics 23 (1):41-64.
    Suppose we are about to enter an era of increasing technological unemployment. What implications does this have for society? Two distinct ethical/social issues would seem to arise. The first is one of distributive justice: how will the efficiency gains from automated labour be distributed through society? The second is one of personal fulfillment and meaning: if people no longer have to work, what will they do with their lives? In this article, I set aside the first issue and focus (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  48. Ontology of Intelligence.Nicolae Sfetcu - manuscript
    In intelligence, the ontological problem is related to the nature and characteristics of entities that threaten and are threatened. Developing a threat ontology requires a taxonomy. An ontology for threat analysis and action must be able to shape ontological distinctions between potential and viable threats. This provides a better understanding of how threats (ie intentions, capabilities, and opportunities) can exist and can be changed over time. Escalating threats from a state of potency to a state of viability could (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Relationship-scale Conservation.Jeffrey Brooks, Jeffrey J. Brooks, Robert Dvorak, Mike Spindler & Susanne Miller - 2015 - Wildlife Society Bulletin 39 (1):147-158.
    Conservation can occur anywhere regardless of scale, political jurisdiction, or landownership. We present a framework to help managers at protected areas practice conservation at the scale of relationships. We focus on relationships between stakeholders and protected areas and between managers and other stakeholders. We provide a synthesis of key natural resources literature and present a case example to support our premise and recommendations. The purpose is 4-fold: 1) discuss challenges and threats to conservation and protected areas; 2) outline a relationship-scale (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 979