Results for ' Machine Learning in Cybersecurity'

984 found
Order:
  1.  31
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  2.  38
    Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Real-Time Malware Detection Using Machine Learning Algorithms.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-8.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  53
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  21
    Survey of Artificial Intelligence Applications In Cybersecurity.Harsh Khandve Sonu Velgekar - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (5):4289-4296.
    Artificial intelligence refers to the idea of programming computers to have human-like intelligence and the ability to imitate human behaviour. Machines show characteristics correlated with the human mind, such as learning and problem-solving. The current security systems are slow and insufficient. Artificial intelligence may aid in the improvement of these factors, as well as the detection rate of intrusion detection and prevention systems (IDPS).With the successful use of AI, the system would be more efficient and fast but this also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Machine learning in bail decisions and judges’ trustworthiness.Alexis Morin-Martel - 2023 - AI and Society:1-12.
    The use of AI algorithms in criminal trials has been the subject of very lively ethical and legal debates recently. While there are concerns over the lack of accuracy and the harmful biases that certain algorithms display, new algorithms seem more promising and might lead to more accurate legal decisions. Algorithms seem especially relevant for bail decisions, because such decisions involve statistical data to which human reasoners struggle to give adequate weight. While getting the right legal outcome is a strong (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. Machine learning in scientific grant review: algorithmically predicting project efficiency in high energy physics.Vlasta Sikimić & Sandro Radovanović - 2022 - European Journal for Philosophy of Science 12 (3):1-21.
    As more objections have been raised against grant peer-review for being costly and time-consuming, the legitimate question arises whether machine learning algorithms could help assess the epistemic efficiency of the proposed projects. As a case study, we investigated whether project efficiency in high energy physics can be algorithmically predicted based on the data from the proposal. To analyze the potential of algorithmic prediction in HEP, we conducted a study on data about the structure and outcomes of HEP experiments (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  11
    Cybersecurity and Network Engineering: Bridging the Gap for Optimal Protection.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):2701-2706.
    : In the digital age, cybersecurity and network engineering are two integral disciplines that must operate in unison to safeguard information and ensure the resilience of modern systems. While network engineering focuses on designing, implementing, and maintaining infrastructure, cybersecurity emphasizes protecting this infrastructure and its data from threats. This research explores the intricate relationship between these domains, advocating for a unified approach to achieve optimal protection in an increasingly interconnected world. The study highlights the evolving threat landscape characterized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  12
    AI-Powered Phishing Detection: Protecting Enterprises from Advanced Social Engineering Attacks.Bellamkonda Srikanth - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (1):12-20.
    Phishing, a prevalent form of social engineering attack, continues to threaten enterprises by exploiting human vulnerabilities and targeting sensitive information. With the increasing sophistication of phishing schemes, traditional detection methods often fall short in identifying and mitigating these threats. As attackers employ advanced techniques, such as highly personalized spear-phishing emails and malicious links, enterprises require innovative solutions to safeguard their digital ecosystems. This research explores the application of artificial intelligence (AI) in enhancing phishing detection and response, with a specific focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  32
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Explanatory Role of Machine Learning in Molecular Biology.Fridolin Gross - forthcoming - Erkenntnis:1-21.
    The philosophical debate around the impact of machine learning in science is often framed in terms of a choice between AI and classical methods as mutually exclusive alternatives involving difficult epistemological trade-offs. A common worry regarding machine learning methods specifically is that they lead to opaque models that make predictions but do not lead to explanation or understanding. Focusing on the field of molecular biology, I argue that in practice machine learning is often used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  54
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-208.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  49
    The Future of Cybersecurity: Emerging Threats and Mitigation Strategies.Swapna V. Sneha P. - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 8 (12):1306-1312.
    As technology rapidly advances, the landscape of cybersecurity faces increasingly complex and evolving threats. This paper explores the future of cybersecurity, focusing on emerging threats and the corresponding mitigation strategies. Key threats include AI-driven attacks, ransomware evolution, quantum computing vulnerabilities, IoT security risks, cloud security challenges, and supply chain attacks. These threats have the potential to disrupt organizations and compromise sensitive data on an unprecedented scale. To address these challenges, the paper outlines effective mitigation strategies such as leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  33
    The Role of Machine Learning in Transforming Data-Driven Decision Making.Banumathi P. - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):335-340.
    Machine learning (ML) has emerged as a powerful tool for transforming data-driven decision-making across various industries. By leveraging large volumes of data and advanced algorithms, machine learning models can uncover insights, make predictions, and enable businesses to make more informed decisions. This paper explores how machine learning is revolutionizing decision-making processes, enhancing efficiency, accuracy, and predictive capabilities. It also examines the key challenges, opportunities, and future directions for the integration of machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  12
    Machine Learning Meets Network Management and Orchestration in Edge-Based Networking Paradigms": The Integration of Machine Learning for Managing and Orchestrating Networks at the Edge, where Real-Time Decision-Making is C.Odubade Kehinde Santhosh Katragadda - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (4):1635-1645.
    Integrating machine learning (ML) into network management and orchestration has revolutionized edgebased networking paradigms, where real-time decision-making is critical. Traditional network management approaches often struggle with edge environments' dynamic and resource-constrained nature. By leveraging ML algorithms, networks at the edge can achieve enhanced efficiency, automation, and adaptability in areas such as traffic prediction, resource allocation, and anomaly detection (Wang et al., 2021). Supervised and unsupervised learning techniques facilitate proactive network optimization, reducing latency and improving quality of service (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  19
    Utilizing Machine Learning for Automated Data Normalization in Supermarket Sales Databases.Gopinathan Vimal Raja - 2025 - International Journal of Advanced Research in Education and Technology(Ijarety) 10 (1):9-12.
    Data normalization is a crucial step in database management systems (DBMS), ensuring consistency, minimizing redundancy, and enhancing query performance. Traditional methods of normalization in supermarket sales databases often demand significant manual effort and domain expertise, making the process time-consuming and prone to errors. This paper introduces an innovative machine learning (ML)-based framework to automate data normalization in supermarket sales databases. The proposed approach utilizes both supervised and unsupervised ML techniques to identify functional dependencies, detect anomalies, and suggest optimal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  21
    Just-in-Time Access for Databases: Harnessing AI for Smarter, Safer Permissions.Attaluri Vivekchowdary - 2023 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 12 (4):4702-4712.
    In the evolving landscape of data security, traditional access control mechanisms often fall short in addressing dynamic and context-specific requirements. As data breaches become more sophisticated, organizations require more adaptive and intelligent access control strategies. This paper explores the integration of Artificial Intelligence (AI) into Just-in-Time (JIT) access control models to enhance database security. By leveraging AI, we aim to create adaptive, context-aware permission systems that grant access precisely when needed, reducing the attack surface and mitigating unauthorized access risks. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Reliability in Machine Learning.Thomas Grote, Konstantin Genin & Emily Sullivan - 2024 - Philosophy Compass 19 (5):e12974.
    Issues of reliability are claiming center-stage in the epistemology of machine learning. This paper unifies different branches in the literature and points to promising research directions, whilst also providing an accessible introduction to key concepts in statistics and machine learning – as far as they are concerned with reliability.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26.  27
    Machine Learning for Autonomous Systems: Navigating Safety, Ethics, and Regulation In.Madhu Aswathy - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):458-463.
    Autonomous systems, powered by machine learning (ML), have the potential to revolutionize various industries, including transportation, healthcare, and robotics. However, the integration of machine learning in autonomous systems raises significant challenges related to safety, ethics, and regulatory compliance. Ensuring the reliability and trustworthiness of these systems is crucial, especially when they operate in environments with high risks, such as self-driving cars or medical robots. This paper explores the intersection of machine learning and autonomous systems, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  15
    Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced security framework designed to protect organizations' (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Big Data Analytics in Healthcare: Exploring the Role of Machine Learning in Predicting Patient Outcomes and Improving Healthcare Delivery.Federico Del Giorgio Solfa & Fernando Rogelio Simonato - 2023 - International Journal of Computations Information and Manufacturing (Ijcim) 3 (1):1-9.
    Healthcare professionals decide wisely about personalized medicine, treatment plans, and resource allocation by utilizing big data analytics and machine learning. To guarantee that algorithmic recommendations are impartial and fair, however, ethical issues relating to prejudice and data privacy must be taken into account. Big data analytics and machine learning have a great potential to disrupt healthcare, and as these technologies continue to evolve, new opportunities to reform healthcare and enhance patient outcomes may arise. In order to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of (...)
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  30.  38
    Comprehensive Detection of Malware and Trojans in Power Sector Software: Safeguarding Against Cyber Threats.A. Sai Lochan - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The increasing reliance on digital technologies within the power sector has introduced considerable cybersecurity risks, especially from malware and trojans. These threats can disrupt essential operations, manipulate grid functions, and compromise the integrity of energy systems, thereby endangering both economic stability and national security. This research aims to create a detection framework tailored to the specific challenges of the power sector. The proposed framework utilizes advanced methods such as behaviour based anomaly detection, machine learning algorithms, and both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Human Induction in Machine Learning: A Survey of the Nexus.Petr Spelda & Vit Stritecky - 2021 - ACM Computing Surveys 54 (3):1-18.
    As our epistemic ambitions grow, the common and scientific endeavours are becoming increasingly dependent on Machine Learning (ML). The field rests on a single experimental paradigm, which consists of splitting the available data into a training and testing set and using the latter to measure how well the trained ML model generalises to unseen samples. If the model reaches acceptable accuracy, an a posteriori contract comes into effect between humans and the model, supposedly allowing its deployment to target (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Egalitarian Machine Learning.Clinton Castro, David O’Brien & Ben Schwan - 2023 - Res Publica 29 (2):237–264.
    Prediction-based decisions, which are often made by utilizing the tools of machine learning, influence nearly all facets of modern life. Ethical concerns about this widespread practice have given rise to the field of fair machine learning and a number of fairness measures, mathematically precise definitions of fairness that purport to determine whether a given prediction-based decision system is fair. Following Reuben Binns (2017), we take ‘fairness’ in this context to be a placeholder for a variety of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  33. The Use of Machine Learning Methods for Image Classification in Medical Data.Destiny Agboro - forthcoming - International Journal of Ethics.
    Integrating medical imaging with computing technologies, such as Artificial Intelligence (AI) and its subsets: Machine learning (ML) and Deep Learning (DL) has advanced into an essential facet of present-day medicine, signaling a pivotal role in diagnostic decision-making and treatment plans (Huang et al., 2023). The significance of medical imaging is escalated by its sustained growth within the realm of modern healthcare (Varoquaux and Cheplygina, 2022). Nevertheless, the ever-increasing volume of medical images compared to the availability of imaging (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. Machine Learning-Based Diabetes Prediction: Feature Analysis and Model Assessment.Fares Wael Al-Gharabawi & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (9):10-17.
    This study employs machine learning to predict diabetes using a Kaggle dataset with 13 features. Our three-layer model achieves an accuracy of 98.73% and an average error of 0.01%. Feature analysis identifies Age, Gender, Polyuria, Polydipsia, Visual blurring, sudden weight loss, partial paresis, delayed healing, irritability, Muscle stiffness, Alopecia, Genital thrush, Weakness, and Obesity as influential predictors. These findings have clinical significance for early diabetes risk assessment. While our research addresses gaps in the field, further work is needed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  35. Machine Learning, Misinformation, and Citizen Science.Adrian K. Yee - 2023 - European Journal for Philosophy of Science 13 (56):1-24.
    Current methods of operationalizing concepts of misinformation in machine learning are often problematic given idiosyncrasies in their success conditions compared to other models employed in the natural and social sciences. The intrinsic value-ladenness of misinformation and the dynamic relationship between citizens' and social scientists' concepts of misinformation jointly suggest that both the construct legitimacy and the construct validity of these models needs to be assessed via more democratic criteria than has previously been recognized.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. (1 other version)Machine Learning and Irresponsible Inference: Morally Assessing the Training Data for Image Recognition Systems.Owen C. King - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich, On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 265-282.
    Just as humans can draw conclusions responsibly or irresponsibly, so too can computers. Machine learning systems that have been trained on data sets that include irresponsible judgments are likely to yield irresponsible predictions as outputs. In this paper I focus on a particular kind of inference a computer system might make: identification of the intentions with which a person acted on the basis of photographic evidence. Such inferences are liable to be morally objectionable, because of a way in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  47
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, expand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  17
    Optimized Machine Learning Algorithms for Real-Time ECG Signal Analysis in IoT Networks.P. Selvaprasanth - 2024 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 8 (1):1-7.
    Electrocardiogram (ECG) signal analysis is a critical task in healthcare for diagnosing cardiovascular conditions such as arrhythmias, heart attacks, and other heart-related diseases. With the growth of Internet of Things (IoT) networks, real-time ECG monitoring has become possible through wearable devices and sensors, providing continuous patient health monitoring. However, real-time ECG signal analysis in IoT environments poses several challenges, including data latency, limited computational power of IoT devices, and energy constraints. This paper proposes a framework for Optimized Machine (...) Algorithms designed to analyze ECG signals in real time within IoT networks. The proposed system leverages lightweight machine learning models, including support vector machines (SVM) and convolutional neural networks (CNNs), optimized to run efficiently on low-power IoT devices while maintaining high accuracy. The system addresses the computational limitations of IoT devices by employing edge computing techniques that distribute the processing load between IoT devices and edge servers. Additionally, data compression and feature extraction techniques are applied to reduce the size of the data transmitted over the network, thereby minimizing latency and bandwidth usage. This paper reviews the current advancements in real-time ECG analysis, explores the challenges posed by IoT environments, and presents the optimized machine learning algorithms that enhance real-time monitoring of heart health. The system is evaluated for its performance in terms of accuracy, energy efficiency, and data transmission speed, showing promising results in improving real-time ECG signal analysis in resource-constrained IoT networks. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Understanding from Machine Learning Models.Emily Sullivan - 2022 - British Journal for the Philosophy of Science 73 (1):109-133.
    Simple idealized models seem to provide more understanding than opaque, complex, and hyper-realistic models. However, an increasing number of scientists are going in the opposite direction by utilizing opaque machine learning models to make predictions and draw inferences, suggesting that scientists are opting for models that have less potential for understanding. Are scientists trading understanding for some other epistemic or pragmatic good when they choose a machine learning model? Or are the assumptions behind why minimal models (...)
    Download  
     
    Export citation  
     
    Bookmark   67 citations  
  41.  10
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, expand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. An Introduction to Artificial Psychology Application Fuzzy Set Theory and Deep Machine Learning in Psychological Research using R.Farahani Hojjatollah - 2023 - Springer Cham. Edited by Hojjatollah Farahani, Marija Blagojević, Parviz Azadfallah, Peter Watson, Forough Esrafilian & Sara Saljoughi.
    Artificial Psychology (AP) is a highly multidisciplinary field of study in psychology. AP tries to solve problems which occur when psychologists do research and need a robust analysis method. Conventional statistical approaches have deep rooted limitations. These approaches are excellent on paper but often fail to model the real world. Mind researchers have been trying to overcome this by simplifying the models being studied. This stance has not received much practical attention recently. Promoting and improving artificial intelligence helps mind researchers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  21
    Machine Learning-Based Real-Time Biomedical Signal Processing in 5G Networks for Telemedicine.S. Yoheswari - 2024 - International Journal of Science, Management and Innovative Research (Ijsmir) 8 (1).
    : The integration of Machine Learning (ML) in Real-Time Biomedical Signal Processing has unlocked new possibilities in the field of telemedicine, especially when combined with the high-speed, low-latency capabilities of 5G networks. As telemedicine grows in importance, particularly in remote and underserved areas, real-time processing of biomedical signals such as ECG, EEG, and EMG is essential for accurate diagnosis and continuous monitoring of patients. Machine learning algorithms can be used to analyze large volumes of biomedical data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  52
    Machine Learning for Characterization and Analysis of Microstructure and Spectral Data of Materials.Venkataramaiah Gude - 2023 - International Journal of Intelligent Systems and Applications in Engineering 12 (21):820 - 826.
    In the contemporary world, there is lot of research going on in creating novel nano materials that are essential for many industries including electronic chips and storage devices in cloud to mention few. At the same time, there is emergence of usage of machine learning (ML) for solving problems in different industries such as manufacturing, physics and chemical engineering. ML has potential to solve many real world problems with its ability to learn in either supervised or unsupervised means. (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  45.  12
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Diachronic and synchronic variation in the performance of adaptive machine learning systems: the ethical challenges.Joshua Hatherley & Robert Sparrow - 2023 - Journal of the American Medical Informatics Association 30 (2):361-366.
    Objectives: Machine learning (ML) has the potential to facilitate “continual learning” in medicine, in which an ML system continues to evolve in response to exposure to new data over time, even after being deployed in a clinical setting. In this article, we provide a tutorial on the range of ethical issues raised by the use of such “adaptive” ML systems in medicine that have, thus far, been neglected in the literature. -/- Target audience: The target audiences for (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Should the use of adaptive machine learning systems in medicine be classified as research?Robert Sparrow, Joshua Hatherley, Justin Oakley & Chris Bain - 2024 - American Journal of Bioethics 24 (10):58-69.
    A novel advantage of the use of machine learning (ML) systems in medicine is their potential to continue learning from new data after implementation in clinical practice. To date, considerations of the ethical questions raised by the design and use of adaptive machine learning systems in medicine have, for the most part, been confined to discussion of the so-called “update problem,” which concerns how regulators should approach systems whose performance and parameters continue to change even (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  48.  38
    Machine Learning Meets Ecology: Golden Eagle Recognition with Particle Swarm in Natural Environments.R. Karthcik - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):1-14.
    Results indicate significant accuracy improvements over traditional machine learning approaches, demonstrating the potential of deep learning in species identification. This project holds promise for applications in wildlife monitoring, ecological research, and educational tools, promoting awareness and conservation efforts. Future work may include integrating the system into mobile applications or deploying it for real-time bird species identification in field conditions.
    Download  
     
    Export citation  
     
    Bookmark  
  49.  57
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  17
    Transforming Edge Computing With Machine Learning: Real-Time Analytics for IoT In.Priya U. Hari - 2024 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 11 (6):9367-9372.
    Edge computing, combined with machine learning (ML), is emerging as a transformative paradigm for handling the data deluge generated by the Internet of Things (IoT) devices. Traditional cloud computing is often inadequate for the low-latency, high-throughput demands of IoT applications, especially in real-time analytics. By processing data locally at the edge of the network, edge computing reduces latency, enhances privacy, and alleviates the bandwidth burden on centralized cloud servers. The integration of ML algorithms into edge devices further augments (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984