Results for 'Cyber Security Detection Model '

973 found
Order:
  1.  56
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  73
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  50
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  88
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  43
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  53
    Automated Phishing Classification Model Utilizing Genetic Optimization and Dynamic Weighting Algorithms.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-530.
    The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced false positives. The proposed model outperformed traditional machine learning algorithms, showing promise for real-world deployment in phishing detection systems. We conclude with suggestions for future improvements, such as incorporating more behavioral data and deploying the system in realtime monitoring applications.
    Download  
     
    Export citation  
     
    Bookmark  
  7.  59
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  55
    Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  54
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  5
    A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  17
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  24
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  17
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  27
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information (...) governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p <= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29.  10
    Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  27
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Even good bots fight: the case of Wikipedia.Milena Tsvetkova, Ruth García-Gavilanes, Luciano Floridi & Taha Yasseri - 2017 - PLoS ONE 12 (2).
    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  66
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici și (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  31
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  49
    IT & C, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - It and C 3 (2).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Levering Data Science in the Detection of Advanced Persistent Threats Utilizarea științei datelor în detectarea amenințărilor persistente avansate -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Detecting Advanced Persistent Threats in Cyber Warfare – Academic Studies Detectarea amenințărilor persistente avansate în războiul cibernetic – Studii academice -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  36
    Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  66
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  66
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  97
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  26
    Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 973