A Comparative Study of Deep Neural Networks and Support Vector Machines for Unsupervised Anomaly Detection in Cloud Computing Environments

A Hassan, T Arjunan - Quarterly Journal of Emerging Technologies and …, 2024 - vectoral.org
Cloud computing has become ubiquitous, providing convenient, on-demand access to
computing resources. However, the complexity of cloud environments makes them prone to …

[PDF][PDF] Enhancing Realism in M&A Simulations through Behavioral Economics Integration

D Stilinski, K Potter - 2024 - researchgate.net
This paper investigates the integration of principles from behavioral economics into Mergers
and Acquisitions (M&A) simulation algorithms to enhance the realism and accuracy of …

[PDF][PDF] Detecting Threats in Cloud Computing: A Comparative Analysis of AI-Driven Anomaly Detection Techniques

A Fathia - 1924 - researchgate.net
Cloud computing has revolutionized the landscape of modern computing, offering scalable,
on-demand resources to users worldwide. However, with this convenience comes the …

[PDF][PDF] AI-Enhanced Cybersecurity: Machine Learning for Anomaly Detection in Cloud Computing

A Fathia - 1924 - researchgate.net
With the pervasive integration of cloud computing across industries, ensuring the security
and integrity of cloud-based systems has become paramount. This research delves into the …

[PDF][PDF] Leveraging Natural Language Processing for Anomaly Detection and Intrusion Detection in Unstructured Cybersecurity Data

S Kayode - 1924 - researchgate.net
Cybersecurity systems face an escalating challenge in detecting anomalies and intrusions
within the vast expanse of unstructured data generated across network logs, system events …

[PDF][PDF] Detecting Anomalies and Intrusions in Unstructured Cybersecurity Data Using Natural Language Processing

J Owen - 1924 - researchgate.net
The rapid proliferation of cyber threats poses significant challenges to traditional intrusion
detection systems (IDS) in effectively safeguarding sensitive information systems. In recent …

[PDF][PDF] Textual Intelligence for Cyber Defense: An NLP-based Approach to Anomaly Detection in Unstructured Cyber Data

A Samad - 1924 - researchgate.net
In the contemporary landscape of cybersecurity, the proliferation of unstructured data
presents a formidable challenge for effective anomaly detection. Traditional methods reliant …

[PDF][PDF] Guarding Networks: A Comprehensive Study of NLP Techniques for Intrusion Detection in Unstructured Cybersecurity Data

J Owen - 1924 - researchgate.net
In the contemporary digital landscape, cybersecurity stands as a critical imperative, with the
proliferation of sophisticated cyber threats posing substantial challenges to the integrity of …