Results for 'Cybersecurity, cyberattack, malware, out-of-distribution detection'

982 found
Order:
  1.  83
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  99
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  98
    Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art approaches in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  91
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of Things (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  5.  66
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses by leveraging machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  85
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  52
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  35
    Comprehensive Detection of Malware and Trojans in Power Sector Software: Safeguarding Against Cyber Threats.A. Sai Lochan - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The increasing reliance on digital technologies within the power sector has introduced considerable cybersecurity risks, especially from malware and trojans. These threats can disrupt essential operations, manipulate grid functions, and compromise the integrity of energy systems, thereby endangering both economic stability and national security. This research aims to create a detection framework tailored to the specific challenges of the power sector. The proposed framework utilizes advanced methods such as behaviour based anomaly detection, machine learning algorithms, and both static (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  80
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  66
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  72
    Enhancing Malware Detection by Fusing Static and Dynamic Features Using Deep Neural Networks.Navas Garcia - manuscript
    Malware detection has been an ongoing challenge for cybersecurity experts due to the evolving nature of malicious software and the ability of malware to disguise itself. Traditional methods that rely solely on static features such as file signatures or dynamic analysis have had limitations in detecting new or obfuscated malware. This paper investigates the enhancement of malware detection by integrating both static and dynamic features and utilizing deep neural networks (DNNs) for more effective classification. By combining these feature (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  70
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, XGBoost, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  13
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  14
    Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (8):12040-12049.
    The digitization process has brought new opportunities in insurance industry operations and innovations but has also revealed major weaknesses. Since more and more actual insurers use Guidewire to handle claims, policies, and customer data, insurers become targets for cyber threats that target valuable information. The framework of Guidewire, along with cloud computing integrated API and third-party tools, is laden with numerous exposure points. These security gaps are utilized to execute phishing, spread malware and gain unauthorized access to customers and operational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  11
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  23
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (AI), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  94
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  15
    Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have liberated data analytics to run (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  10
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. The logic of distributive bilattices.Félix Bou & Umberto Rivieccio - 2011 - Logic Journal of the IGPL 19 (1):183-216.
    Bilattices, introduced by Ginsberg as a uniform framework for inference in artificial intelligence, are algebraic structures that proved useful in many fields. In recent years, Arieli and Avron developed a logical system based on a class of bilattice-based matrices, called logical bilattices, and provided a Gentzen-style calculus for it. This logic is essentially an expansion of the well-known Belnap–Dunn four-valued logic to the standard language of bilattices. Our aim is to study Arieli and Avron’s logic from the perspective of abstract (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  29. Review of Distributed Like Bread – Jonathan M. Ciraulo. [REVIEW]Steven Umbrello - 2024 - Homiletic and Pastoral Review.
    In Distributed Like Bread: Hans Urs von Balthasar Speaks to Seminarians, Jonathan Ciraulo engages with the theological insights of Hans Urs von Balthasar, especially as they pertain to the priesthood and seminary formation. This work not only introduces readers to Balthasar's complex and nuanced understanding of the priestly vocation but also serves as a guide for those discerning or living out this calling. Through a detailed examination of Balthasar’s life and writings, Ciraulo uncovers the profound notion that the priesthood is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  65
    Entropy in Physics using my Universal Formula.Angelito Malicse - manuscript
    -/- 1. Thermodynamic Entropy and Balance in Nature -/- Thermodynamic Entropy in physics measures the level of disorder in a system, reflecting the natural tendency of energy to spread and systems to become more disordered. -/- Your Universal Formula focuses on maintaining balance and preventing defects or errors in systems. -/- Integration: -/- Increasing thermodynamic entropy (e.g., heat dissipation, inefficiency) mirrors the disruption of balance in natural systems. -/- Preventing imbalance: To minimize entropy, systems must operate in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. In defence of gullibility: The epistemology of testimony and the psychology of deception detection.Kourken Michaelian - 2010 - Synthese 176 (3):399-427.
    Research in the psychology of deception detection implies that Fricker, in making her case for reductionism in the epistemology of testimony, overestimates both the epistemic demerits of the antireductionist policy of trusting speakers blindly and the epistemic merits of the reductionist policy of monitoring speakers for trustworthiness: folk psychological prejudices to the contrary notwithstanding, it turns out that monitoring is on a par (in terms both of the reliability of the process and of the sensitivity of the beliefs that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  33. Systemising Triage: COVID-19 Guidelines and Their Underlying Theories of Distributive Justice.Lukas J. Meier - 2022 - Medicine, Health Care and Philosophy 25 (4):703-714.
    The COVID-19 pandemic has been overwhelming public health-care systems around the world. With demand exceeding the availability of medical resources in several regions, hospitals have been forced to invoke triage. To ensure that this difficult task proceeds in a fair and organised manner, governments scrambled experts to draft triage guidelines under enormous time pressure. Although there are similarities between the documents, they vary considerably in how much weight their respective authors place on the different criteria that they propose. Since most (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Calibration dilemmas in the ethics of distribution.Jacob M. Nebel & H. Orri Stefánsson - 2023 - Economics and Philosophy 39 (1):67-98.
    This paper presents a new kind of problem in the ethics of distribution. The problem takes the form of several “calibration dilemmas,” in which intuitively reasonable aversion to small-stakes inequalities requires leading theories of distribution to recommend intuitively unreasonable aversion to large-stakes inequalities. We first lay out a series of such dilemmas for prioritarian theories. We then consider a widely endorsed family of egalitarian views and show that they are subject to even more forceful calibration dilemmas than prioritarian (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. Out of School Children in Vietnam: How Structural Adjustment Programs Have Reduced Capabilities for Vietnam’s Most Vulnerable.Aneesa Kara - 2023 - Medium.
    A pressing issue in Vietnam which is attracting attention from INGOs and the Vietnamese government is out-of-school-children (OOSC). Comparatively with other developing and middle-income countries, Vietnam hosts some of the most impressive educational attainment rates, on par with developed countries, comprising of almost equal gender parity rates, and ‘achieving’ Millennium Development Goal 4 (MDG), universal primary education, ahead of schedule. There are a wide range of historical, social, structural, cultural and economic factors outside the formal education setting which contribute to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  71
    Does the Gateway Process Allow Time Travel?Alexander Ohnemus - forthcoming - Elk Grove, California: Self-published.
    Neuralink could distribute artificial superintelligence to humans, thus allowing the homosapiens to synchronize the hemispheres of their brains, thereby transcending space-time, and potentially time traveling. While backwards time travel cannot change the past, due to paradoxes, the time traveler would probably share a soul with the alternate timeline self, thus providing closure for regrets, errors, injustice, etc. Plus, if one time travels with AI superintelligence, the time traveler may mend errors with greater ease. -/- Although other potential time travel methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  67
    Design of Cybersecurity Smart Controller For Grid Connected Microgrid.Soma Abhiram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-15.
    The research introduces to the design and implementation of the Cybersecurity Enabled Smart Controller for the grid connected microgrid which uses the combination of the Web technologies and the authentication mechanism which enables real time monitoring with help of the Dashboards built using Chart.js which is a framework of JavaScript. Due to the role and connection of the Microgrids with the critical infrastructure they are vulnerable to the cyber threats. This project leverages the use of HTML, CSS, JavaScript and MongoDB (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  39
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration of negative selection (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. CAREER GUIDANCE APPLICATION FOR STUDENTS – AI ASSISTED.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):609-619.
    The rapid advancement of artificial intelligence (AI) technologies has revolutionized various industries, including the realm of education and career guidance. This project endeavors to harness the power of AI to develop a sophisticated career guidance application that offers personalized and effective recommendations to students and job seekers. The primary objective of this project is to address the limitations of traditional career guidance methods, which often lack customization and fail to adapt to individual preferences, skills, and aspirations. Through the integration of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Minds in and out of time: memory, embodied skill, anachronism, and performance.Evelyn Tribble & John Sutton - 2012 - Textual Practice 26 (4):587-607.
    Contemporary critical instincts, in early modern studies as elsewhere in literary theory, often dismiss invocations of mind and cognition as inevitably ahistorical, as performing a retrograde version of anachronism. Arguing that our experience of time is inherently anachronistic and polytemporal, we draw on the frameworks of distributed cognition and extended mind to theorize cognition as itself distributed, cultural, and temporal. Intelligent, embodied action is a hybrid process, involving the coordination of disparate neural, affective, cognitive, interpersonal, ecological, technological, and cultural resources. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  47
    Cybersecurity Portal for Effective Management of Servers and Firewall.G. Balram, - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-15.
    Existing systems often lack a centralized platform for managing server and firewall operations, leading to fragmented oversight and delayed responses to cyber threats. This gap frequently results in increased vulnerabilities and operational inefficiencies within organizations. To address this issue, we propose the development of the Cybersecurity Portal, designed to provide real-time monitoring, predictive analytics, and streamlined resource allocation for server and firewall management. The portal will offer comprehensive insights into system performance, potential vulnerabilities, and proactive threat detection. By equipping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify patterns, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Humeans Aren’t Out of their Minds.Brian Weatherson - 2007 - Noûs 41 (3):529–535.
    Humeanism is “the thesis that the whole truth about a world like ours supervenes on the spatiotemporal distribution of local qualities.” (Lewis, 1994, 473) Since the whole truth about our world contains truths about causation, causation must be located in the mosaic of local qualities that the Humean says constitute the whole truth about the world. The most natural ways to do this involve causation being in some sense extrinsic. To take the simplest possible Humean analysis, we might say (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  45. Distributed Cognition and Memory Research: History and Current Directions.Kourken Michaelian & John Sutton - 2013 - Review of Philosophy and Psychology 4 (1):1-24.
    According to the hypotheses of distributed and extended cognition, remembering does not always occur entirely inside the brain but is often distributed across heterogeneous systems combining neural, bodily, social, and technological resources. These ideas have been intensely debated in philosophy, but the philosophical debate has often remained at some distance from relevant empirical research, while empirical memory research, in particular, has been somewhat slow to incorporate distributed/extended ideas. This situation, however, appears to be changing, as we witness an increasing level (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  46.  19
    Survey of Artificial Intelligence Applications In Cybersecurity.Harsh Khandve Sonu Velgekar - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (5):4289-4296.
    Artificial intelligence refers to the idea of programming computers to have human-like intelligence and the ability to imitate human behaviour. Machines show characteristics correlated with the human mind, such as learning and problem-solving. The current security systems are slow and insufficient. Artificial intelligence may aid in the improvement of these factors, as well as the detection rate of intrusion detection and prevention systems (IDPS).With the successful use of AI, the system would be more efficient and fast but this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Why the de Broglie-Bohm theory is probably wrong.Shan Gao - manuscript
    We investigate the validity of the field explanation of the wave function by analyzing the mass and charge density distributions of a quantum system. It is argued that a charged quantum system has effective mass and charge density distributing in space, proportional to the square of the absolute value of its wave function. This is also a consequence of protective measurement. If the wave function is a physical field, then the mass and charge density will be distributed in space simultaneously (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The psychology of memory, extended cognition, and socially distributed remembering.John Sutton, Celia B. Harris, Paul G. Keil & Amanda J. Barnier - 2010 - Phenomenology and the Cognitive Sciences 9 (4):521-560.
    This paper introduces a new, expanded range of relevant cognitive psychological research on collaborative recall and social memory to the philosophical debate on extended and distributed cognition. We start by examining the case for extended cognition based on the complementarity of inner and outer resources, by which neural, bodily, social, and environmental resources with disparate but complementary properties are integrated into hybrid cognitive systems, transforming or augmenting the nature of remembering or decision-making. Adams and Aizawa, noting this distinctive complementarity argument, (...)
    Download  
     
    Export citation  
     
    Bookmark   125 citations  
  49.  31
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. On Unemployment: Volume I: A Micro-Theory of Distributive Justice.Mark R. Reiff - 2015 - Palgrave-Macmillan.
    Unemployment has been at historically high rates for an extended period, and while it has recently improved in certain countries, the unemployment that remains may be becoming structural. Aside from inequality, unemployment is accordingly the problem that is most likely to put critical pressure on our political institutions, disrupt the social fabric of our way of life, and even threaten the continuation of liberalism itself. Despite the obvious importance of the problem of unemployment, however, there has been a curious lack (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 982