Results for ' Enterprise Cybersecurity Solutions'

987 found
Order:
  1.  12
    AI-Powered Phishing Detection: Protecting Enterprises from Advanced Social Engineering Attacks.Bellamkonda Srikanth - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (1):12-20.
    Phishing, a prevalent form of social engineering attack, continues to threaten enterprises by exploiting human vulnerabilities and targeting sensitive information. With the increasing sophistication of phishing schemes, traditional detection methods often fall short in identifying and mitigating these threats. As attackers employ advanced techniques, such as highly personalized spear-phishing emails and malicious links, enterprises require innovative solutions to safeguard their digital ecosystems. This research explores the application of artificial intelligence (AI) in enhancing phishing detection and response, with a specific (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  3.  26
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  22
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-5.
    : The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  22
    Navigating SAP's Next-Generation ERP Solutions for Small and Medium-Sized Enterprises (SMES).Dawande Radhika - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research (Ijmserh) 13 (1):171-175.
    Small and medium-sized enterprises (SMEs) face unique challenges in managing their business processes effectively due to limited resources and the need for scalability. Enterprise Resource Planning (ERP) systems, such as SAP’s next-generation solutions, offer SMEs the tools they need to streamline operations, improve efficiency, and foster growth. SAP has developed tailored ERP systems like SAP Business One and SAP S/4HANA Cloud for SMEs, designed to cater specifically to the needs of smaller businesses by providing flexibility, affordability, and ease (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  22
    Future-Proofing Cloud Infrastructures:Analysing the Impact of Azure's Quantum Computing on Enterprise Solutions.Ramteke Rashmi - 2025 - International Journal of Advanced Research in Education and Technology(Ijarety) 12 (1):234-238.
    The rapid advancements in cloud computing are transforming enterprise solutions across industries. Among the most promising innovations is quantum computing, which holds the potential to revolutionize how businesses process data, optimize systems, and solve complex problems. Microsoft Azure, a leader in cloud infrastructure, has integrated quantum computing through Azure Quantum to offer scalable quantum solutions. This paper explores the impact of Azure's quantum computing capabilities on enterprise solutions, focusing on scalability, problem-solving efficiency, and future-proofing business (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  67
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  30
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  10.  37
    Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (8):12040-12049.
    The digitization process has brought new opportunities in insurance industry operations and innovations but has also revealed major weaknesses. Since more and more actual insurers use Guidewire to handle claims, policies, and customer data, insurers become targets for cyber threats that target valuable information. The framework of Guidewire, along with cloud computing integrated API and third-party tools, is laden with numerous exposure points. These security gaps are utilized to execute phishing, spread malware and gain unauthorized access to customers and operational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  32
    The Ethics of Cybersecurity: Balancing Privacy and Protection in the Digital Age.Lokhande Tina Kishor - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 12 (2):490-494.
    The increasing integration of digital technologies into every aspect of modern life has led to a growing concern over cybersecurity, particularly in the context of privacy. As organizations collect vast amounts of personal and sensitive data, the tension between securing this information and preserving individual privacy has become a critical ethical dilemma. This paper explores the ethical challenges faced by cybersecurity professionals, policymakers, and organizations when balancing the need for protection against the potential risks to personal privacy. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  59
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and improved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  68
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  57
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  55
    Building Scalable Data Warehouses for Financial Analytics in Large Enterprises.Vijayan Naveen Edapurath - 2024 - International Journal of Innovative Research and Creative Technology 10 (3):1-10.
    In today's digital era, large enterprises face the daunting task of managing and analyzing vast volumes of financial data to inform strategic decision-making and maintain a competitive edge. Traditional data warehousing solutions often fall short in addressing the scale, complexity, and performance demands of modern financial analytics. This paper explores the architectural principles, technological strategies, and best practices essential for building scalable data warehouses tailored to the needs of financial analytics in large organizations. It delves into data integration techniques, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  10
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  95
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  22
    SAP as a Foundation for Enterprise Integration: Connecting Diverse Systems and Data Streams in the Digital Age.Sanjay R. Rakshitha M. - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (2):1642-1645.
    In today's increasingly digital and interconnected business environment, organizations face significant challenges in managing multiple systems, applications, and data streams. SAP plays a central role in integrating these diverse systems and enabling seamless data flow across various platforms. Through solutions like SAP S/4HANA, SAP Cloud Platform, and SAP Integration Suite, businesses can create a unified digital ecosystem that connects onpremise, cloud-based, and third-party applications. These integration capabilities are critical for enhancing operational efficiency, improving decision-making, and fostering innovation. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  17
    Azure Integration with the Metaverse: Opportunities and Challenges for Future Enterprise Ecosystems.Magar Sanket - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 14 (2):458-464.
    The rise of the Metaverse as a virtual, interconnected world has captured significant attention in recent years. As businesses increasingly recognize the potential of the Metaverse to transform industries, Microsoft Azure stands out as a leading platform for integrating and scaling Metaverse solutions. This paper explores how Azure's cloud infrastructure, advanced computing capabilities, and digital transformation tools enable businesses to integrate with the Metaverse, opening new opportunities for collaboration, customer engagement, and innovation. Additionally, the paper discusses the challenges associated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  19
    AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Where Did Mill Go Wrong? Why the Capital-Managed Rather than the Labor-Managed Enterprise is the Predominant.Schwartz Justin - 2012 - Ohio State Law Journal 73:220-85.
    In this Article, I propose a novel law and economics explanation of a deeply puzzling aspect of business organization in market economies. Why are virtually all firms organized as capital-managed and -owned (capitalist) enterprises rather than as labor-managed and -owned cooperatives? Over 150 years ago, J.S. Mill predicted that efficiency and other advantages would eventually make worker cooperatives predominant over capitalist firms. Mill was right about the advantages but wrong about the results. The standard explanation is that capitalist enterprise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Role of external environmental factors in the failure of small enterprises in Angola.Mateus Vicente Justino & Robertson K. Tengeh - 2016 - Environmental Economics 7 (2):86-96.
    The high failure rate of new small enterprises in Angola calls to attention the fact that they are not equipped enough to meet the challenges of sustainable economic growth, equitable distribution of wealth and job creation. The worrying impact on the Angolan landscape, as a consequence, has had economists scrambling for solutions in recent years. Moving from on the assumption that the current business climate has been a contributing factor, this paper attempts to examine the role of external environmental (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  19
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  30
    Policy Center to the Cloud: An Analysis of AWS and Snowflake’s Role in Cloud-Based Policy Management Solutions.Adavelli Sateesh Reddy - 2021 - Esp Journal of Engineering and Technology Advancements 1 (1):253-261.
    Organizations are migrating their policy management systems from the ground to the cloud, changing how they manage, secure and scale their operations. This paper analyses how Amazon Web Services (AWS) and Snowflake support robust and efficient cloud-based policy management solutions. This marriage of sort of AWS, which has an almost panoply of cloud services, and Snowflake, which is very well known for its data warehousing and analytics capabilities, makes sense because it is an enterprise in which you will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  47
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  10
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for extremely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Management innovation in the system of modern business decisions.Igor Kryvovyazyuk - 2022 - Economic Forum 1 (1):127-134.
    This article summarizes the question of finding effective solutions to ensure the excellence of modern business through the introduction of managerial innovations. The main purpose of the study is to improve the theoretical and methodological approach to the implementation of managerial innovations in the system of modern business solutions. Systematization of literature sources and approaches to solving the problem of improving business management through the introduction of managerial innovations indicates the widespread use of methodological approaches and methods of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Understanding Scientific Progress: Aim-Oriented Empiricism.Nicholas Maxwell - 2017 - St. Paul, USA: Paragon House.
    "Understanding Scientific Progress constitutes a potentially enormous and revolutionary advancement in philosophy of science. It deserves to be read and studied by everyone with any interest in or connection with physics or the theory of science. Maxwell cites the work of Hume, Kant, J.S. Mill, Ludwig Bolzmann, Pierre Duhem, Einstein, Henri Poincaré, C.S. Peirce, Whitehead, Russell, Carnap, A.J. Ayer, Karl Popper, Thomas Kuhn, Imre Lakatos, Paul Feyerabend, Nelson Goodman, Bas van Fraassen, and numerous others. He lauds Popper for advancing beyond (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  36. The Metaphysics of Science and Aim-Oriented Empiricism: A Revolution for Science and Philosophy.Nicholas Maxwell - 2018 - Cham, Switzerland: Springer Nature.
    This book gives an account of work that I have done over a period of decades that sets out to solve two fundamental problems of philosophy: the mind-body problem and the problem of induction. Remarkably, these revolutionary contributions to philosophy turn out to have dramatic implications for a wide range of issues outside philosophy itself, most notably for the capacity of humanity to resolve current grave global problems and make progress towards a better, wiser world. A key element of the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  37. Non-Relational Intentionality.Justin D'Ambrosio - 2017 - Dissertation, Yale University
    This dissertation lays the foundation for a new theory of non-relational intentionality. The thesis is divided into an introduction and three main chapters, each of which serves as an essential part of an overarching argument. The argument yields, as its conclusion, a new account of how language and thought can exhibit intentionality intrinsically, so that representation can occur in the absence of some thing that is represented. The overarching argument has two components: first, that intentionality can be profi tably studied (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Climate Change, Moral Bioenhancement and the Ultimate Mostropic.Jon Rueda - 2020 - Ramon Llull Journal of Applied Ethics 11:277-303.
    Tackling climate change is one of the most demanding challenges of humanity in the 21st century. Still, the efforts to mitigate the current environmental crisis do not seem enough to deal with the increased existential risks for the human and other species. Persson and Savulescu have proposed that our evolutionarily forged moral psychology is one of the impediments to facing as enormous a problem as global warming. They suggested that if we want to address properly some of the most pressing (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. A Theory for Special Science Laws.Markus Schrenk - 2006 - In H. Bohse & S. Walter, Selected Papers Contributed to the Sections of GAP.6. mentis.
    This paper explores whether it is possible to reformulate or re-interpret Lewis’s theory of fundamental laws of nature—his “best system analysis”—in such a way that it becomes a useful theory for special science laws. One major step in this enterprise is to make plausible how law candidates within best system competitions can tolerate exceptions—this is crucial because we expect special science laws to be so called “ceteris paribus laws ”. I attempt to show how this is possible and also (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  40.  31
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  41. Propositions and higher-order attitude attributions.Kirk Ludwig - 2013 - Canadian Journal of Philosophy 43 (5):741-765.
    An important objection to sententialist theories of attitude reports is that they cannot accommodate the principle that one cannot know that someone believes that p without knowing what it is that he believes. This paper argues that a parallel problem arises for propositionalist accounts that has gone largely unnoticed, and that, furthermore, the usual resources for the propositionalist do not afford an adequate solution. While non-standard solutions are available for the propositionalist, it turns out that there are parallel (...) that are available for the sententialist. Since the difficulties raised seem to show that the mechanism by which sentential complements serve to inform us about attitudes and about sentence meaning does not depend on their referring to propositions, this casts doubt on whether talk of propositions should retain a significant theoretical role in the enterprise of understanding thought, language and communication. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  42. Responsible Innovation for Life: Five Challenges Agriculture Offers for Responsible Innovation in Agriculture and Food, and the Necessity of an Ethics of Innovation.Bart Gremmen, Vincent Blok & Bernice Bovenkerk - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):673-679.
    In this special issue we will investigate, from the perspective of agricultural ethics the potential to develop a Responsible Research and Innovation approach to agriculture, and the limitations to such an enterprise. RRI is an emerging field in the European research and innovation policy context that aims to balance economic, socio-cultural and environmental aspects in innovation processes. Because technological innovations can contribute significantly to the solution of societal challenges like climate change or food security, but can also have negative (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. What Kind of Inquiry Can Best Help Us Create a Good World?Nicholas Maxwell - 1992 - Science, Technology and Human Values 17:205-227.
    In order to create a good world, we need to learn how to do it - how to resolve our appalling problems and conflicts in more cooperative ways than at present. And in order to do this, we need traditions and institutions of learning rationally devoted to this end. When viewed from this standpoint, what we have at present - academic inquiry devoted to the pursuit of knowledge and technological know-how - is an intellectual and human disaster. We urgently need (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  45. Consciousness and the Philosophy of Signs: A New Précis.Marc Champagne - 2019 - American Journal of Semiotics 35 (3/4):443-462.
    I will be talking today about the limits of cognitive science. I won’t be talking about contingent shortcomings that could perhaps be remedied with, say, more time, resources, or ingenuity. Rather, I will be concerned with limitations that are “baked into” the very enterprise. The main blind spot, I will argue, is consciousness—but not for the reasons typically given. Current work in philosophy of mind can sometimes seem arcane, so my goal today will be to answer the question: why (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. The impoverishment problem.Amy Kind - 2024 - Synthese 203 (4):1-15.
    Work in philosophy of mind often engages in descriptive phenomenology, i.e., in attempts to characterize the phenomenal character of our experience. Nagel’s famous discussion of what it’s like to be a bat demonstrates the difficulty of this enterprise (1974). But while Nagel located the difficulty in our absence of an objective vocabulary for describing experience, I argue that the problem runs deeper than that: we also lack an adequate subjective vocabulary for describing phenomenology. We struggle to describe our own (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola, Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. The Practical Implementation Challenge: A Pragmatist Response to Deutsch’s Dilemma for Conceptual Engineers.Celine Henne - 2024 - In Piotr Stalmaszczyk, Conceptual Engineering: Methodological and Metaphilosophical Issues. Brill. pp. 69–92.
    According to Max Deutsch, conceptual engineers face a dilemma: either they target semantic meanings, in which case they are engaged in an infeasible activity (the “implementation challenge”), or they target speaker meanings, in which case they are engaged in a trivial enterprise (the “trivialization challenge”). Focusing on the first horn of the dilemma, I argue that the “transubstantiation version” of the implementation challenge only holds for representationalist approaches to conceptual engineering, according to which concepts are individuated by their representational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. ‘In Defence of Sententialism’.Giulia Felappi - 2014 - Dialectica 68 (4):581-603.
    Propositional attitude sentences, such as (1) Pierre believes that snow is white, have proved to be formidably difficult to account for in a semantic theory. It is generally agreed that the that-clause ‘that snow is white’ purports to refer to the proposition that snow is white, but no agreement has been reached on what this proposition is. Sententialism is a semantic theory which tries to undermine the very enterprise of understanding what proposition is referred to in (1): according to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Real-Time Malware Detection Using Machine Learning Algorithms.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-8.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987