IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Review on Intelligent Algorithms for Cyber Security

Review on Intelligent Algorithms for Cyber Security
View Sample PDF
Author(s): P. Subashini (Avinshilingam Institute for Home Science and Higher Education for Women, India), M. Krishnaveni (Avinashilingam Institute for Home Science and Higher Education for Women, India), T. T. Dhivyaprabha (Avinashilingam Institute for Home Science and Higher Education for Women, India)and R. Shanmugavalli (Avinashilingam Institute for Home Science and Higher Education for Women, India)
Copyright: 2020
Pages: 22
Source title: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Source Author(s)/Editor(s): Padmavathi Ganapathi (Avinashilingam Institute for Home Science and Higher Education for Women, India)and D. Shanmugapriya (Avinashilingam Institute for Home Science and Higher Education for Women, India)
DOI: 10.4018/978-1-5225-9611-0.ch001

Purchase

View Review on Intelligent Algorithms for Cyber Security on the publisher's website for pricing and purchasing information.

Abstract

Cyber security comprises of technologies, architecture, infrastructure, and software applications that are designed to protect computational resources against cyber-attacks. Cyber security concentrates on four main areas such as application security, disaster security, information security, and network security. Numerous cyber security algorithms and computational methods are introduced by researchers to protect cyberspace from undesirable invaders and susceptibilities. But, the performance of traditional cyber security algorithms suffers due to different types of offensive actions that target computer infrastructures, architectures and computer networks. The implementation of intelligent algorithms in encountering the wide range of cyber security problems is surveyed, namely, nature-inspired computing (NIC) paradigms, machine learning algorithms, and deep learning algorithms, based on exploratory analyses to identify the advantages of employing in enhancing cyber security techniques.

Related Content

Kamel Mouloudj, Vu Lan Oanh LE, Achouak Bouarar, Ahmed Chemseddine Bouarar, Dachel Martínez Asanza, Mayuri Srivastava. © 2024. 20 pages.
José Eduardo Aleixo, José Luís Reis, Sandrina Francisca Teixeira, Ana Pinto de Lima. © 2024. 52 pages.
Jorge Figueiredo, Isabel Oliveira, Sérgio Silva, Margarida Pocinho, António Cardoso, Manuel Pereira. © 2024. 24 pages.
Fatih Pinarbasi. © 2024. 20 pages.
Stavros Kaperonis. © 2024. 25 pages.
Thomas Rui Mendes, Ana Cristina Antunes. © 2024. 24 pages.
Nuno Geada. © 2024. 12 pages.
Body Bottom