[go: up one dir, main page]

Mynuddin et al., 2023 - Google Patents

Cyber security system using fuzzy logic

Mynuddin et al., 2023

Document ID
14950805819630783999
Author
Mynuddin M
Hossain M
Khan S
Islam M
Ahad D
Tanvir M
Publication year
Publication venue
2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

External Links

Snippet

The use of the internet has made organizations and individuals vulnerable to outside attacks, making cybersecurity a global concern. Governments around the world have begun laying out plans to tackle cyber challenges. Various types of harmful assaults, such as email …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Chakraborty et al. Artificial intelligence for cybersecurity: Threats, attacks and mitigation
Srivastava et al. XAI for cybersecurity: state of the art, challenges, open issues and future directions
Tahboub et al. Data leakage/loss prevention systems (DLP)
Rajendran et al. Cyber security threat and its prevention through artificial intelligence technology
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Ramya et al. Advancing cybersecurity with explainable artificial intelligence: a review of the latest research
Sathya et al. Reinforcing cyber world security with deep learning approaches
Mynuddin et al. Cyber security system using fuzzy logic
Ebong et al. Comprehensive impact assessment of intrusion detection and mitigation strategies using support vector machine classification
Sendjaja et al. Cybersecurity in the digital age: Developing robust strategies to protect against evolving global digital threats and cyber attacks
Sfetcu Advanced persistent threats in cybersecurity–Cyber warfare
Karie et al. Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats
Hammad et al. Advancements in cybersecurity: Novel approaches to protecting against emerging threats and vulnerabilities
Shukla et al. AI-Enhanced Cybersecurity: Leveraging Artificial Intelligence for Threat Detection and Mitigation.
George Artificial Intelligence-Powered Cybersecurity: The Future of How Threats Are Detected and Responded
Satam et al. Zero-day attack detection and prevention
Kumar et al. Prediction of probability of server intrusion using machine learning techniques
Kant How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning
Minhaj STUDY OF ARTIFICIAL INTELLIGENCE IN CYBER SECURITY AND THE EMERGING THREAT OF AI-DRIVEN CYBER ATTACKS AND CHALLENGE
Vera et al. Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Andrés et al. Real-Time AI-Based Threat Intelligence for Cloud Security Enhancement
Chaudhary et al. Role of Machine Learning Applications in Enhancing Cyber Security Effectiveness: An Empirical Study
Gundoor et al. AI-Based Solutions for Malware Detection and Prevention
Hussien et al. Critical Analysis and Countermeasures Tactics, Techniques and Procedures (TTPs) that targeting civilians: A case study On Pegasus