Panda, 2022 - Google Patents
Cyber Intrusion Detection, Prevention, and Future IT StrategyPanda, 2022
View PDF- Document ID
- 3647537177392280829
- Author
- Panda S
- Publication year
- Publication venue
- International Research Journal of Engineering and Technology
External Links
Snippet
The issue of guarding information and data movement has been there since the start of information exchange. Different approaches have been identified to protect and move such information safely. Due to the widespread use of modern technology, such as wireless …
- 238000001514 detection method 0 title abstract description 80
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thuraisingham et al. | Data mining for security applications | |
Marotta et al. | Integrating a proactive technique into a holistic cyber risk management approach | |
Basholli et al. | Detection and prevention of intrusions into computer systems | |
Ambalavanan | Cyber threats detection and mitigation using machine learning | |
Tulkarm | A survey of social engineering attacks: Detection and prevention tools | |
Souley et al. | A captcha–based intrusion detection model | |
Basholli et al. | Possibility of protection against unauthorized interference in telecommunication systems | |
Younus et al. | A Survey on Network Security Monitoring: Tools and Functionalities | |
Bukht et al. | Analyzing cyber-attacks targeted on the Banks of Pakistan and their Solutions | |
Kolluri | REVOLUTIONARY RESEARCH ON THE AI SENTRY: AN APPROACH TO OVERCOME SOCIAL ENGINEERING ATTACKS USING MACHINE INTELLIGENCE | |
US20230252138A1 (en) | Cybersecurity workflow management using autodetection | |
Paddalwar et al. | Cyber threat mitigation using machine learning, deep learning, artificial intelligence, and blockchain | |
Panda | Cyber Intrusion Detection, Prevention, and Future IT Strategy | |
Kishore et al. | Intrusion Detection System a Need | |
MINNAAR | Cybercrime, cyberattacks, and problems of implementing organizational cybersecurity | |
Mynuddin et al. | Cyber Security System Using Fuzzy Logic | |
Mohd et al. | Using machine learning for cyber security enhancement | |
Mocanu | Management of cyber-espionage intrusions | |
Reddy et al. | Prevalent Cyber Attacks and Defense | |
Rohatgi et al. | Introduction to Artificial Intelligence and Cybersecurity for Industry | |
Aloffi | Real time network security intrusions and risk management: a survey | |
Axelsson | Aspects of the modelling and performance of intrusion detection | |
Divya et al. | Preventing web Application to avoid Illegal Entry of Hackers-a Review | |
Mishra | Intrusion Detection System Using Artificial Neural Network and Support Vector Machine: A Comparative Study | |
Nayak | Research on application of intrusion detection system in data mining |