Devineni et al., 2023 - Google Patents
Machine learning-powered anomaly detection: Enhancing data security and integrityDevineni et al., 2023
View PDF- Document ID
- 10505556353449501358
- Author
- Devineni S
- Kathiriya S
- Shende A
- Publication year
- Publication venue
- Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-198. DOI: doi. org/10.47363/JAICC/2023 (2)
External Links
Snippet
Anomaly detection is crucial for the integrity and security of data across various industries. The advent and evolution of machine learning (ML) has significantly enhanced the capabilities of anomaly detection systems, offering more effective, precise, and flexible …
- 238000001514 detection method 0 title abstract description 124
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sarker | Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects | |
Bello et al. | Artificial intelligence in fraud prevention: Exploring techniques and applications challenges and opportunities | |
Salitin et al. | The role of User Entity Behavior Analytics to detect network attacks in real time | |
Madhavram et al. | AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance | |
Devineni et al. | Machine learning-powered anomaly detection: Enhancing data security and integrity | |
Sharma | Behavioral analytics and zero trust | |
Parisa et al. | AI-Enabled Cloud Security Solutions: A Comparative Review of Traditional vs. Next-Generation Approaches | |
US20240305664A1 (en) | Cybersecurity operations mitigation management | |
Chowdhury | Utilizing business analytics to combat financial fraud and enhance economic integrity | |
Mahmud et al. | AI-Driven Cybersecurity in IT Project Management: Enhancing Threat Detection and Risk Mitigation | |
Nina et al. | AI-driven threat detection: Enhancing cloud security with cutting-edge technologies | |
Galla et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
Veeravalli | Proactive Threat Detection in CRM: Applying Salesforce Einstein AI and Event Monitoring to anomaly detection and fraud prevention | |
US20250047698A1 (en) | Cybersecurity ai-driven workflow modification | |
US20240414204A1 (en) | Cybersecurity ai-driven workflow generation using policies | |
Tarafdar | AI-Powered Cybersecurity Threat Detection in Cloud Environments | |
Adebayo et al. | Proactive Ransomware Defense Frameworks Using Predictive Analytics and Early Detection Systems for Modern Enterprises | |
Saabith et al. | A survey of machine learning techniques for anomaly detection in cybersecurity | |
Bolanle et al. | AI-Powered Cloud Security: Leveraging Advanced Threat Detection for Maximum Protection | |
Mokkapati et al. | An artificial intelligence enabled self replication system against cyber attacks | |
Nwoye et al. | AI-Driven Anomaly Detection for Proactive Cybersecurity and Data Breach Prevention | |
Owen et al. | AI-Powered Fraud Detection Systems: Creating a machine learning model to identify and prevent fraudulent transactions by analyzing patterns and anomalies in user data | |
Nwafor et al. | Leveraging Data Mining and Cybersecurity Techniques to Enhance Algorithmic Trading Performance and Forensic Investigations in Financial Markets | |
Edmund et al. | AI and machine learning in cybersecurity: Leveraging AI to predict, detect, and respond to threats more efficiently | |
Wisdom et al. | Improving Security of Business Intelligent Systems with AI and Machine Learning |