Mynuddin et al., 2023 - Google Patents
Cyber security system using fuzzy logicMynuddin et al., 2023
- Document ID
- 14950805819630783999
- Author
- Mynuddin M
- Hossain M
- Khan S
- Islam M
- Ahad D
- Tanvir M
- Publication year
- Publication venue
- 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)
External Links
Snippet
The use of the internet has made organizations and individuals vulnerable to outside attacks, making cybersecurity a global concern. Governments around the world have begun laying out plans to tackle cyber challenges. Various types of harmful assaults, such as email …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chakraborty et al. | Artificial intelligence for cybersecurity: Threats, attacks and mitigation | |
| Srivastava et al. | XAI for cybersecurity: state of the art, challenges, open issues and future directions | |
| Tahboub et al. | Data leakage/loss prevention systems (DLP) | |
| Rajendran et al. | Cyber security threat and its prevention through artificial intelligence technology | |
| Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
| Ramya et al. | Advancing cybersecurity with explainable artificial intelligence: a review of the latest research | |
| Sathya et al. | Reinforcing cyber world security with deep learning approaches | |
| Mynuddin et al. | Cyber security system using fuzzy logic | |
| Ebong et al. | Comprehensive impact assessment of intrusion detection and mitigation strategies using support vector machine classification | |
| Sendjaja et al. | Cybersecurity in the digital age: Developing robust strategies to protect against evolving global digital threats and cyber attacks | |
| Sfetcu | Advanced persistent threats in cybersecurity–Cyber warfare | |
| Karie et al. | Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats | |
| Hammad et al. | Advancements in cybersecurity: Novel approaches to protecting against emerging threats and vulnerabilities | |
| Shukla et al. | AI-Enhanced Cybersecurity: Leveraging Artificial Intelligence for Threat Detection and Mitigation. | |
| George | Artificial Intelligence-Powered Cybersecurity: The Future of How Threats Are Detected and Responded | |
| Satam et al. | Zero-day attack detection and prevention | |
| Kumar et al. | Prediction of probability of server intrusion using machine learning techniques | |
| Kant | How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning | |
| Minhaj | STUDY OF ARTIFICIAL INTELLIGENCE IN CYBER SECURITY AND THE EMERGING THREAT OF AI-DRIVEN CYBER ATTACKS AND CHALLENGE | |
| Vera et al. | Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| Andrés et al. | Real-Time AI-Based Threat Intelligence for Cloud Security Enhancement | |
| Chaudhary et al. | Role of Machine Learning Applications in Enhancing Cyber Security Effectiveness: An Empirical Study | |
| Gundoor et al. | AI-Based Solutions for Malware Detection and Prevention | |
| Hussien et al. | Critical Analysis and Countermeasures Tactics, Techniques and Procedures (TTPs) that targeting civilians: A case study On Pegasus |