[go: up one dir, main page]

Dhiman et al., 2024 - Google Patents

Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques

Dhiman et al., 2024

Document ID
561917414874667718
Author
Dhiman D
Bisht A
Thakur G
Garg A
Publication year
Publication venue
Advanced Techniques and Applications of Cybersecurity and Forensics

External Links

Snippet

Due to growing dangers and cybercriminals' ongoing efforts to elude law enforcement, the field of cybersecurity has experienced considerable growth over the past ten years. Although cybercriminals' tactics have advanced over time, their initial motivations for conducting hacks …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Kafi et al. Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection
Kamruzzaman et al. A comprehensive review of endpoint security: Threats and defenses
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Almaiah et al. Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.
Beretas Information systems security, detection and recovery from cyber attacks
Dhiman et al. Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
Rayhan Cybersecurity in the digital age: Assessing threats and strengthening defenses
US20230252138A1 (en) Cybersecurity workflow management using autodetection
Perumal et al. Cybercrime issues in smart cities networks and prevention using ethical hacking
Antwi Threat Detection in Multi-Cloud Environments
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Gudepu et al. Data Discovery and Security: Protecting Sensitive Information
Naik Implementation of techniques to avoid cyber attacks
Asija et al. Cyber security: Emerging trends best practices
Kadhim Techniques to protect against cyber attacks
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Chopra et al. PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD
Javed et al. Study on cybersecurity: Trending challenges, emerging trends, and threats
Hlatshwayo Cybersecurity in the digital space
Oksiiuk et al. Authentication process threats in the cloud technologies
Kumar et al. Empowering Cloud Security Through Advanced Monitoring and Analytics Techniques
Rawal et al. Cybersecurity for Beginners
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Salim et al. A Literature Review of Challenges and Solutions in Cloud Security