[{“box”:0,”content”:”
n
n
- n t
n
Manjunatha B.N., Ananda Babu J., M.S. Rekha, Shreya Kulkarni
[/foreach]
n
n
n
- [foreach 286] [if 1175 not_equal=””]n t
- Associate Professor, Associate Professor, Assistant Professor, UG Student, Department of Computer Science and Engineering, R.L Jalappa Institute of Technology, Doddaballapur, Department of Information Science and Engineering, Malnad College of Engineering, Hassan, Department of Computer Science and Engineering, R.L. Jalappa Institute of Technology, Doddaballapur, Department of Computer Science and Engineering, R.L. Jalappa Institute of Technology, Doddaballapur, Karnataka, Karnataka, Karnataka, Karnataka, India, India, India, India
n[/if 1175][/foreach]
n
Abstract
nNowadays there are huge applications of IOT, cyberattack is extremely affecting all over world. To avoid cyberattacks, designing cyber security approach is today’s basic need. Artificial Intelligence (AI) has appeared as a powerful tool in the domain of cyber-security and can be accustomed to deal with cyber-security and cyber-threats. Cyber security is an incredibly growing field since last decade, there are many applications based on cybersecurity, eventually threats are accelerating. The paper will deliberate about the utilization of AI and implementation in cyber-security and annotate on the disadvantages.
n
Keywords: Artificial intelligence, cyber security, cyber- threats, block chain
n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Information Security Engineering(ijise)]
n
n
n
n
n
nn
nn[if 992 equals=”Open Access”] Full Text PDF[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘ijise’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n
Browse Figures
n
n
n[/if 379]n
References
n[if 1104 equals=””]n
- Jenis Nilkanth Welukar, Gagan Prashant Bajoria, “Artificial Intelligence in Cyber Security – A Review”, International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 8 Issue 6, pp. 488-491, November-December
- Jagadeeshwar Podishetti and Kadapala Anjaiah, “Role of Artificial Intelligence in Cyber Security”, International Journal of Research in Advanced Computer Science Engineering, Volume No:3, Issue No:3 (August-2017), ISSN No : 2454-423X
- Ghosh, A. K., Michael, C., & Schatz, M. (2000). A real-time intrusion detection system based on learning program behavior. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1907, 93–109.
- Shitharth, S.; Prasad, K.M.; Sangeetha, K.; Kshirsagar, P.R.; Babu, S.; Alhelou, H.H. An Enriched RPCO BCNN Mechanisms for Attack Detection and Classification in SCADA Systems. IEEE Access 2021, 9, 156297– 156312
- Akojwar, ; Kshirsagar, P. A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems. Wseas Trans. Electron. 2016, 7, 79–84.
- Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin Kshirsagar, undefined BaruDebtera, “An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques”, Computational Intelligence and Neuroscience, vol. 2022, Article ID 5061059, 13 pages, 2022.
- Jude, A.B., Singh, D., Islam, S. et al. An Artificial Intelligence Based Predictive Approach for Smart Waste Management. Wireless Pers Commun (2021).
- Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin Kshirsagar, undefined BaruDebtera, “An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques”, Computational Intelligence and Neuroscience, vol. 2022, Article ID 5061059, 13 pages, 2022.
- R. Chandan, P. R. Kshirsagar, H. Manoharan et al., “Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor,” International Journal of Computers Communications & Control, vol. 17, no. 3, 2022.
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
nn
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n
n
International Journal of Information Security Engineering
n
n
n
n
n
n
Volume | 01 |
Issue | 02 |
Received | July 20, 2023 |
Accepted | July 30, 2023 |
Published | August 23, 2023 |
n
n
n
n
n[/foreach]
n[/if 1190] [if 1177 not_equal=””]n
n
n[/foreach]
n[/if 1177]
n
n
n
n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n n function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]