A Comparative Study of Deep Neural Networks and Support Vector Machines for Unsupervised Anomaly Detection in Cloud Computing Environments
A Hassan, T Arjunan - Quarterly Journal of Emerging Technologies and …, 2024 - vectoral.org
Cloud computing has become ubiquitous, providing convenient, on-demand access to
computing resources. However, the complexity of cloud environments makes them prone to …
computing resources. However, the complexity of cloud environments makes them prone to …
[PDF][PDF] Enhancing Realism in M&A Simulations through Behavioral Economics Integration
D Stilinski, K Potter - 2024 - researchgate.net
This paper investigates the integration of principles from behavioral economics into Mergers
and Acquisitions (M&A) simulation algorithms to enhance the realism and accuracy of …
and Acquisitions (M&A) simulation algorithms to enhance the realism and accuracy of …
[PDF][PDF] Detecting Threats in Cloud Computing: A Comparative Analysis of AI-Driven Anomaly Detection Techniques
A Fathia - 1924 - researchgate.net
Cloud computing has revolutionized the landscape of modern computing, offering scalable,
on-demand resources to users worldwide. However, with this convenience comes the …
on-demand resources to users worldwide. However, with this convenience comes the …
[PDF][PDF] AI-Enhanced Cybersecurity: Machine Learning for Anomaly Detection in Cloud Computing
A Fathia - 1924 - researchgate.net
With the pervasive integration of cloud computing across industries, ensuring the security
and integrity of cloud-based systems has become paramount. This research delves into the …
and integrity of cloud-based systems has become paramount. This research delves into the …
[PDF][PDF] Leveraging Natural Language Processing for Anomaly Detection and Intrusion Detection in Unstructured Cybersecurity Data
S Kayode - 1924 - researchgate.net
Cybersecurity systems face an escalating challenge in detecting anomalies and intrusions
within the vast expanse of unstructured data generated across network logs, system events …
within the vast expanse of unstructured data generated across network logs, system events …
[PDF][PDF] Detecting Anomalies and Intrusions in Unstructured Cybersecurity Data Using Natural Language Processing
J Owen - 1924 - researchgate.net
The rapid proliferation of cyber threats poses significant challenges to traditional intrusion
detection systems (IDS) in effectively safeguarding sensitive information systems. In recent …
detection systems (IDS) in effectively safeguarding sensitive information systems. In recent …
[PDF][PDF] Textual Intelligence for Cyber Defense: An NLP-based Approach to Anomaly Detection in Unstructured Cyber Data
A Samad - 1924 - researchgate.net
In the contemporary landscape of cybersecurity, the proliferation of unstructured data
presents a formidable challenge for effective anomaly detection. Traditional methods reliant …
presents a formidable challenge for effective anomaly detection. Traditional methods reliant …
[PDF][PDF] Guarding Networks: A Comprehensive Study of NLP Techniques for Intrusion Detection in Unstructured Cybersecurity Data
J Owen - 1924 - researchgate.net
In the contemporary digital landscape, cybersecurity stands as a critical imperative, with the
proliferation of sophisticated cyber threats posing substantial challenges to the integrity of …
proliferation of sophisticated cyber threats posing substantial challenges to the integrity of …