Nothing Special   »   [go: up one dir, main page]

Panda, 2022 - Google Patents

Cyber Intrusion Detection, Prevention, and Future IT Strategy

Panda, 2022

View PDF
Document ID
3647537177392280829
Author
Panda S
Publication year
Publication venue
International Research Journal of Engineering and Technology

External Links

Snippet

The issue of guarding information and data movement has been there since the start of information exchange. Different approaches have been identified to protect and move such information safely. Due to the widespread use of modern technology, such as wireless …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Thuraisingham et al. Data mining for security applications
Marotta et al. Integrating a proactive technique into a holistic cyber risk management approach
Basholli et al. Detection and prevention of intrusions into computer systems
Ambalavanan Cyber threats detection and mitigation using machine learning
Tulkarm A survey of social engineering attacks: Detection and prevention tools
Souley et al. A captcha–based intrusion detection model
Basholli et al. Possibility of protection against unauthorized interference in telecommunication systems
Younus et al. A Survey on Network Security Monitoring: Tools and Functionalities
Bukht et al. Analyzing cyber-attacks targeted on the Banks of Pakistan and their Solutions
Kolluri REVOLUTIONARY RESEARCH ON THE AI SENTRY: AN APPROACH TO OVERCOME SOCIAL ENGINEERING ATTACKS USING MACHINE INTELLIGENCE
US20230252138A1 (en) Cybersecurity workflow management using autodetection
Paddalwar et al. Cyber threat mitigation using machine learning, deep learning, artificial intelligence, and blockchain
Panda Cyber Intrusion Detection, Prevention, and Future IT Strategy
Kishore et al. Intrusion Detection System a Need
MINNAAR Cybercrime, cyberattacks, and problems of implementing organizational cybersecurity
Mynuddin et al. Cyber Security System Using Fuzzy Logic
Mohd et al. Using machine learning for cyber security enhancement
Mocanu Management of cyber-espionage intrusions
Reddy et al. Prevalent Cyber Attacks and Defense
Rohatgi et al. Introduction to Artificial Intelligence and Cybersecurity for Industry
Aloffi Real time network security intrusions and risk management: a survey
Axelsson Aspects of the modelling and performance of intrusion detection
Divya et al. Preventing web Application to avoid Illegal Entry of Hackers-a Review
Mishra Intrusion Detection System Using Artificial Neural Network and Support Vector Machine: A Comparative Study
Nayak Research on application of intrusion detection system in data mining