Dhiman et al., 2024 - Google Patents
Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and TechniquesDhiman et al., 2024
- Document ID
- 561917414874667718
- Author
- Dhiman D
- Bisht A
- Thakur G
- Garg A
- Publication year
- Publication venue
- Advanced Techniques and Applications of Cybersecurity and Forensics
External Links
Snippet
Due to growing dangers and cybercriminals' ongoing efforts to elude law enforcement, the field of cybersecurity has experienced considerable growth over the past ten years. Although cybercriminals' tactics have advanced over time, their initial motivations for conducting hacks …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kafi et al. | Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection | |
| Kamruzzaman et al. | A comprehensive review of endpoint security: Threats and defenses | |
| Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
| Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
| Almaiah et al. | Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems. | |
| Beretas | Information systems security, detection and recovery from cyber attacks | |
| Dhiman et al. | Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques | |
| Rayhan | Cybersecurity in the digital age: Assessing threats and strengthening defenses | |
| US20230252138A1 (en) | Cybersecurity workflow management using autodetection | |
| Perumal et al. | Cybercrime issues in smart cities networks and prevention using ethical hacking | |
| Antwi | Threat Detection in Multi-Cloud Environments | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Gudepu et al. | Data Discovery and Security: Protecting Sensitive Information | |
| Naik | Implementation of techniques to avoid cyber attacks | |
| Asija et al. | Cyber security: Emerging trends best practices | |
| Kadhim | Techniques to protect against cyber attacks | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| Chopra et al. | PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD | |
| Javed et al. | Study on cybersecurity: Trending challenges, emerging trends, and threats | |
| Hlatshwayo | Cybersecurity in the digital space | |
| Oksiiuk et al. | Authentication process threats in the cloud technologies | |
| Kumar et al. | Empowering Cloud Security Through Advanced Monitoring and Analytics Techniques | |
| Rawal et al. | Cybersecurity for Beginners | |
| Gottipati | A proposed cybersecurity model for cryptocurrency exchanges | |
| Salim et al. | A Literature Review of Challenges and Solutions in Cloud Security |