Abstract: Cybersecurity is referred to the process, technologies and practices for protection of devices, networks, data from damage and unauthorized access. Cybersecurity has always been important because military, government, financial and corporate organizations collect, store and process enormous amounts of data on computers and on the other devices. As the older threats are eradicated, newer threats are being added to the system by the adversaries. This project is aimed to provide a secure communication between a server and a client. Many cryptographic libraries are available for this purpose but many libraries do not have adequate documentation. Now a days it is necessary to monitor and regulate the data security systems for controlli...
This paper discussed how artificial intelligence (AI) may be used to address cybersecurity issues. A...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
This chapter proposes an autonomic computing security framework for protecting cloud-based SCADA sys...
Abstract: Cyber security is referred to the process, technologies and practices for protection of...
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smar...
Abstract:- Cloud Computing is giving the new approach to use our computers to handle and storing the...
AI has been implemented in many sectors such as security, health, finance, national defense, etc. Ho...
Cloud computing provides the flexible architecture where data and resources are dispersed at various...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Abstract: Many different checks, rules, processes, and technologies work together to keep cloud-base...
Artificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its en...
As a result of the expansion of the internet of things and linked devices, professionals in the fiel...
Today, cybersecurity is considered one of the most noteworthy topics that are circulated frequently ...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
This paper discussed how artificial intelligence (AI) may be used to address cybersecurity issues. A...
This paper discussed how artificial intelligence (AI) may be used to address cybersecurity issues. A...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
This chapter proposes an autonomic computing security framework for protecting cloud-based SCADA sys...
Abstract: Cyber security is referred to the process, technologies and practices for protection of...
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smar...
Abstract:- Cloud Computing is giving the new approach to use our computers to handle and storing the...
AI has been implemented in many sectors such as security, health, finance, national defense, etc. Ho...
Cloud computing provides the flexible architecture where data and resources are dispersed at various...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Abstract: Many different checks, rules, processes, and technologies work together to keep cloud-base...
Artificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its en...
As a result of the expansion of the internet of things and linked devices, professionals in the fiel...
Today, cybersecurity is considered one of the most noteworthy topics that are circulated frequently ...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
This paper discussed how artificial intelligence (AI) may be used to address cybersecurity issues. A...
This paper discussed how artificial intelligence (AI) may be used to address cybersecurity issues. A...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
This chapter proposes an autonomic computing security framework for protecting cloud-based SCADA sys...