[go: up one dir, main page]

Devineni et al., 2023 - Google Patents

Machine learning-powered anomaly detection: Enhancing data security and integrity

Devineni et al., 2023

View PDF
Document ID
10505556353449501358
Author
Devineni S
Kathiriya S
Shende A
Publication year
Publication venue
Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-198. DOI: doi. org/10.47363/JAICC/2023 (2)

External Links

Snippet

Anomaly detection is crucial for the integrity and security of data across various industries. The advent and evolution of machine learning (ML) has significantly enhanced the capabilities of anomaly detection systems, offering more effective, precise, and flexible …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Sarker Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects
Bello et al. Artificial intelligence in fraud prevention: Exploring techniques and applications challenges and opportunities
Salitin et al. The role of User Entity Behavior Analytics to detect network attacks in real time
Madhavram et al. AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance
Devineni et al. Machine learning-powered anomaly detection: Enhancing data security and integrity
Sharma Behavioral analytics and zero trust
Parisa et al. AI-Enabled Cloud Security Solutions: A Comparative Review of Traditional vs. Next-Generation Approaches
US20240305664A1 (en) Cybersecurity operations mitigation management
Chowdhury Utilizing business analytics to combat financial fraud and enhance economic integrity
Mahmud et al. AI-Driven Cybersecurity in IT Project Management: Enhancing Threat Detection and Risk Mitigation
Nina et al. AI-driven threat detection: Enhancing cloud security with cutting-edge technologies
Galla et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
Veeravalli Proactive Threat Detection in CRM: Applying Salesforce Einstein AI and Event Monitoring to anomaly detection and fraud prevention
US20250047698A1 (en) Cybersecurity ai-driven workflow modification
US20240414204A1 (en) Cybersecurity ai-driven workflow generation using policies
Tarafdar AI-Powered Cybersecurity Threat Detection in Cloud Environments
Adebayo et al. Proactive Ransomware Defense Frameworks Using Predictive Analytics and Early Detection Systems for Modern Enterprises
Saabith et al. A survey of machine learning techniques for anomaly detection in cybersecurity
Bolanle et al. AI-Powered Cloud Security: Leveraging Advanced Threat Detection for Maximum Protection
Mokkapati et al. An artificial intelligence enabled self replication system against cyber attacks
Nwoye et al. AI-Driven Anomaly Detection for Proactive Cybersecurity and Data Breach Prevention
Owen et al. AI-Powered Fraud Detection Systems: Creating a machine learning model to identify and prevent fraudulent transactions by analyzing patterns and anomalies in user data
Nwafor et al. Leveraging Data Mining and Cybersecurity Techniques to Enhance Algorithmic Trading Performance and Forensic Investigations in Financial Markets
Edmund et al. AI and machine learning in cybersecurity: Leveraging AI to predict, detect, and respond to threats more efficiently
Wisdom et al. Improving Security of Business Intelligent Systems with AI and Machine Learning