Study of Blended Learning of Artificial Intelligence in Cyber Security

[{“box”:0,”content”:”

n

Year : August 23, 2023 | Volume : 01 | Issue : 02 | Page : 1-7

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Manjunatha B.N., Ananda Babu J., M.S. Rekha, Shreya Kulkarni

  1. [/foreach]

    n

n

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Associate Professor, Associate Professor, Assistant Professor, UG Student, Department of Computer Science and Engineering, R.L Jalappa Institute of Technology, Doddaballapur, Department of Information Science and Engineering, Malnad College of Engineering, Hassan, Department of Computer Science and Engineering, R.L. Jalappa Institute of Technology, Doddaballapur, Department of Computer Science and Engineering, R.L. Jalappa Institute of Technology, Doddaballapur, Karnataka, Karnataka, Karnataka, Karnataka, India, India, India, India
  2. n[/if 1175][/foreach]

n

n

Abstract

nNowadays there are huge applications of IOT, cyberattack is extremely affecting all over world. To avoid cyberattacks, designing cyber security approach is today’s basic need. Artificial Intelligence (AI) has appeared as a powerful tool in the domain of cyber-security and can be accustomed to deal with cyber-security and cyber-threats. Cyber security is an incredibly growing field since last decade, there are many applications based on cybersecurity, eventually threats are accelerating. The paper will deliberate about the utilization of AI and implementation in cyber-security and annotate on the disadvantages.

n

n

n

Keywords: Artificial intelligence, cyber security, cyber- threats, block chain

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Information Security Engineering(ijise)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Information Security Engineering(ijise)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Manjunatha B.N., Ananda Babu J., M.S. Rekha, Shreya Kulkarni Study of Blended Learning of Artificial Intelligence in Cyber Security ijise August 23, 2023; 01:1-7

n

How to cite this URL: Manjunatha B.N., Ananda Babu J., M.S. Rekha, Shreya Kulkarni Study of Blended Learning of Artificial Intelligence in Cyber Security ijise August 23, 2023 {cited August 23, 2023};01:1-7. Available from: https://journals.stmjournals.com/ijise/article=August 23, 2023/view=0/

nn


nn[if 992 equals=”Open Access”] Full Text PDF[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘ijise’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Jenis Nilkanth Welukar, Gagan Prashant Bajoria, “Artificial Intelligence in Cyber Security – A Review”, International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 8 Issue 6, pp. 488-491, November-December
  2. Jagadeeshwar Podishetti and Kadapala Anjaiah, “Role of Artificial Intelligence in Cyber Security”, International Journal of Research in Advanced Computer Science Engineering, Volume No:3, Issue No:3 (August-2017), ISSN No : 2454-423X
  3. Ghosh, A. K., Michael, C., & Schatz, M. (2000). A real-time intrusion detection system based on learning program behavior. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1907, 93–109.
  4. Shitharth, S.; Prasad, K.M.; Sangeetha, K.; Kshirsagar, P.R.; Babu, S.; Alhelou, H.H. An Enriched RPCO BCNN Mechanisms for Attack Detection and Classification in SCADA Systems. IEEE Access 2021, 9, 156297– 156312
  5. Akojwar, ; Kshirsagar, P. A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems. Wseas Trans. Electron. 2016, 7, 79–84.
  6. Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin Kshirsagar, undefined BaruDebtera, “An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques”, Computational Intelligence and Neuroscience, vol. 2022, Article ID 5061059, 13 pages, 2022.
  7. Jude, A.B., Singh, D., Islam, S. et al. An Artificial Intelligence Based Predictive Approach for Smart Waste Management. Wireless Pers Commun (2021).
  8. Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin Kshirsagar, undefined BaruDebtera, “An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques”, Computational Intelligence and Neuroscience, vol. 2022, Article ID 5061059, 13 pages, 2022.
  9. R. Chandan, P. R. Kshirsagar, H. Manoharan et al., “Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor,” International Journal of Computers Communications & Control, vol. 17, no. 3, 2022.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

Regular Issue Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 01
Issue 02
Received July 20, 2023
Accepted July 30, 2023
Published August 23, 2023

n

n

n

[if 1190 not_equal=””]n

Editor

n

[foreach 1188]n

n[/foreach]

n[/if 1190] [if 1177 not_equal=””]n

Reviewer

n

[foreach 1176]n

n[/foreach]

n[/if 1177]

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n n function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]