Multi-Modal Data Fusion Techniques for Improved Cybersecurity Threat Detection and Prediction

Authors

  • Rina Kapoor Department of Computer Science, University of Letchford
  • Junaid Yousuf School of Artificial Intelligence, Letchford University

Keywords:

Multi-modal data fusion, cybersecurity, threat detection, threat prediction, data integration, machine learning, user behavior analytics, network traffic, threat intelligence.

Abstract

In the era of increasing cyber threats, traditional threat detection methods often fall short in identifying and mitigating sophisticated attacks. This paper explores the concept of multi-modal data fusion techniques, which integrate various data sources to enhance cybersecurity threat detection and prediction. By combining data from network traffic, user behavior, system logs, and external threat intelligence, we aim to develop more robust and accurate predictive models. This paper reviews current methodologies, highlights challenges, and presents case studies demonstrating the effectiveness of multi-modal approaches in real-world cybersecurity scenarios.

References

[1] F. M. Syed and F. K. ES, "AI and HIPAA Compliance in Healthcare IAM," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 4, pp. 118-145, 2021.

[2] F. M. Syed and F. K. ES, "AI and Multi-Factor Authentication (MFA) in IAM for Healthcare," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 02, pp. 375-398, 2023.

[3] B. R. Chirra, "Advanced Encryption Techniques for Enhancing Security in Smart Grid Communication Systems," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 208-229, 2020.

[4] R. G. Goriparthi, "AI-Driven Automation of Software Testing and Debugging in Agile Development," Revista de Inteligencia Artificial en Medicina, vol. 11, no. 1, pp. 402-421, 2020.

[5] H. Gadde, "AI-Driven Schema Evolution and Management in Heterogeneous Databases," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 10, no. 1, pp. 332-356, 2019.

[6] D. R. Chirra, "Secure Data Sharing in Multi-Cloud Environments: A Cryptographic Framework for Healthcare Systems," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 821-843, 2024.

[7] F. M. Syed, F. K. ES, and E. Johnson, "AI and the Future of IAM in Healthcare Organizations," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 363-392, 2022.

[8] F. M. Syed, F. K. ES, and E. Johnson, "AI in Protecting Clinical Trial Data from Cyber Threats," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 567-592, 2024.

[9] H. Sharma, "THE EVOLUTION OF CYBERSECURITY CHALLENGES AND MITIGATION STRATEGIES IN CLOUD COMPUTING SYSTEMS."

[10] R. G. Goriparthi, "AI-Enhanced Big Data Analytics for Personalized E-Commerce Recommendations," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 246-261, 2020.

[11] F. M. Syed, F. K. ES, and E. Johnson, "AI in Protecting Sensitive Patient Data under GDPR in Healthcare," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 02, pp. 401-435, 2023.

[12] F. M. Syed and F. K. ES, "AI in Securing Electronic Health Records (EHR) Systems," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 593-620, 2024.

[13] H. Gadde, "Exploring AI-Based Methods for Efficient Database Index Compression," Revista de Inteligencia Artificial en Medicina, vol. 10, no. 1, pp. 397-432, 2019.

[14] A. Damaraju, "Cyber Defense Strategies for Protecting 5G and 6G Networks."

[15] B. R. Chirra, "Advancing Cyber Defense: Machine Learning Techniques for NextGeneration Intrusion Detection," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 550-573, 2023.

[16] R. G. Goriparthi, "Machine Learning in Smart Manufacturing: Enhancing Process Automation and Quality Control," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 11, no. 1, pp. 438-457, 2020.

[17] H. Gadde, "Integrating AI with Graph Databases for Complex Relationship Analysis," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 294-314, 2019.

[18] A. Damaraju, "Social Media as a Cyber Threat Vector: Trends and Preventive Measures," Revista Espanola de Documentacion Cientifica, vol. 14, no. 1, pp. 95-112, 2020.

[19] F. M. Syed and F. K. ES, "AI in Securing Pharma Manufacturing Systems Under GxP Compliance," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 448-472, 2024.

[20] F. M. Syed and F. K. ES, "AI-Driven Forensic Analysis for Cyber Incidents in Healthcare," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 473-499, 2024.

[21] A. Damaraju, "Data Privacy Regulations and Their Impact on Global Businesses," Pakistan Journal of Linguistics, vol. 2, no. 01, pp. 47-56, 2021.

[22] H. Gadde, "AI-Assisted Decision-Making in Database Normalization and Optimization," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 11, no. 1, pp. 230-259, 2020.

[23] D. R. Chirra, "Quantum-Safe Cryptography: New Frontiers in Securing Post-Quantum Communication Networks," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 670-688, 2024.

[24] F. M. Syed and F. K. ES, "Role of IAM in Data Loss Prevention (DLP) Strategies for Pharmaceutical Security Operations," Revista de Inteligencia Artificial en Medicina, vol. 12, no. 1, pp. 407-431, 2021.

[25] R. G. Goriparthi, "AI and Machine Learning Approaches to Autonomous Vehicle Route Optimization," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 12, no. 1, pp. 455-479, 2021.

[26] B. R. Chirra, "Advancing Real-Time Malware Detection with Deep Learning for Proactive Threat Mitigation," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 274-396, 2023.

[27] R. G. Goriparthi, "Neural Network-Based Predictive Models for Climate Change Impact Assessment," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 11, no. 1, pp. 421-421, 2020.

[28] H. Gadde, "AI-Enhanced Data Warehousing: Optimizing ETL Processes for Real-Time Analytics," Revista de Inteligencia Artificial en Medicina, vol. 11, no. 1, pp. 300-327, 2020.

[29] A. Damaraju, "Insider Threat Management: Tools and Techniques for Modern Enterprises," Revista Espanola de Documentacion Cientifica, vol. 15, no. 4, pp. 165-195, 2021.

[30] F. M. Syed and F. K. ES, "AI-Driven Identity Access Management for GxP Compliance," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 12, no. 1, pp. 341-365, 2021.

[31] F. M. Syed, F. K. ES, and E. Johnson, "AI-Driven Threat Intelligence in Healthcare Cybersecurity," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 431-459, 2023.

[32] H. Sharma, "HIGH PERFORMANCE COMPUTING IN CLOUD ENVIRONMENT," International Journal of Computer Engineering and Technology, vol. 10, no. 5, pp. 183-210, 2019.

[33] R. G. Goriparthi, "AI-Driven Natural Language Processing for Multilingual Text Summarization and Translation," Revista de Inteligencia Artificial en Medicina, vol. 12, no. 1, pp. 513-535, 2021.

[34] H. Gadde, "Improving Data Reliability with AI-Based Fault Tolerance in Distributed Databases," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 183-207, 2020.

[35] A. Damaraju, "Mobile Cybersecurity Threats and Countermeasures: A Modern Approach," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 17-34, 2021.

[36] F. M. Syed and F. K. ES, "AI-Powered Security for Internet of Medical Things (IoMT) Devices," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 556-582, 2024.

[37] F. M. Syed, F. K. ES, and E. Johnson, "AI-Powered SOC in the Healthcare Industry," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 395-414, 2022.

[38] B. R. Chirra, "Strengthening Cybersecurity with Behavioral Biometrics: Advanced Authentication Techniques," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 273-294, 2022.

[39] R. G. Goriparthi, "Scalable AI Systems for Real-Time Traffic Prediction and Urban Mobility Management," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 255-278, 2021.

[40] H. Gadde, "AI-Driven Predictive Maintenance in Relational Database Systems," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 12, no. 1, pp. 386-409, 2021.

[41] D. R. Chirra, "Blockchain-Integrated IAM Systems: Mitigating Identity Fraud in Decentralized Networks," International Journal of Advanced Engineering Technologies and Innovations, vol. 2, no. 1, pp. 41-60, 2024.

[42] B. R. Chirra, "AI-Driven Fraud Detection: Safeguarding Financial Data in Real-Time," Revista de Inteligencia Artificial en Medicina, vol. 11, no. 1, pp. 328-347, 2020.

[43] A. Damaraju, "Securing Critical Infrastructure: Advanced Strategies for Resilience and Threat Mitigation in the Digital Age," Revista de Inteligencia Artificial en Medicina, vol. 12, no. 1, pp. 76-111, 2021.

[44] H. Gadde, "AI-Powered Workload Balancing Algorithms for Distributed Database Systems," Revista de Inteligencia Artificial en Medicina, vol. 12, no. 1, pp. 432-461, 2021.

[45] F. M. Syed and F. K. ES, "Automating SOX Compliance with AI in Pharmaceutical Companies," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 13, no. 1, pp. 383-412, 2022.

[46] F. M. Syed, "Ensuring HIPAA and GDPR Compliance Through Advanced IAM Analytics," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 71-94, 2018.

[47] H. Gadde, "Secure Data Migration in Multi-Cloud Systems Using AI and Blockchain," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 128-156, 2021.

[48] D. R. Chirra, "AI-Augmented Zero Trust Architectures: Enhancing Cybersecurity in Dynamic Enterprise Environments," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 643-669, 2024.

[49] D. R. Chirra, "Mitigating Ransomware in Healthcare: A Cybersecurity Framework for Critical Data Protection," Revista de Inteligencia Artificial en Medicina, vol. 12, no. 1, pp. 495-513, 2021.

[50] B. R. Chirra, "AI-Driven Security Audits: Enhancing Continuous Compliance through Machine Learning," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 12, no. 1, pp. 410-433, 2021.

[51] H. Gadde, "AI in Dynamic Data Sharding for Optimized Performance in Large Databases," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 13, no. 1, pp. 413-440, 2022.

[52] A. Damaraju, "Adaptive Threat Intelligence: Enhancing Information Security Through Predictive Analytics and Real-Time Response Mechanisms," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 82-120, 2022.

[53] B. R. Chirra, "Enhancing Healthcare Data Security with Homomorphic Encryption: A Case Study on Electronic Health Records (EHR) Systems," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 549-59, 2023.

[54] R. G. Goriparthi, "AI in Smart Grid Systems: Enhancing Demand Response through Machine Learning," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 13, no. 1, pp. 528-549, 2022.

[55] H. Gadde, "AI-Enhanced Adaptive Resource Allocation in Cloud-Native Databases," Revista de Inteligencia Artificial en Medicina, vol. 13, no. 1, pp. 443-470, 2022.

[56] A. Damaraju, "Integrating Zero Trust with Cloud Security: A Comprehensive Approach," Journal Environmental Sciences And Technology, vol. 1, no. 1, pp. 279-291, 2022.

[57] F. M. Syed and F. K. ES, "IAM and Privileged Access Management (PAM) in Healthcare Security Operations," Revista de Inteligencia Artificial en Medicina, vol. 11, no. 1, pp. 257-278, 2020.

[58] F. M. Syed and F. K. ES, "IAM for Cyber Resilience: Protecting Healthcare Data from Advanced Persistent Threats," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 153-183, 2020.

[59] B. R. Chirra, "AI-Driven Vulnerability Assessment and Mitigation Strategies for CyberPhysical Systems," Revista de Inteligencia Artificial en Medicina, vol. 13, no. 1, pp. 471-493, 2022.

[60] R. G. Goriparthi, "AI-Powered Decision Support Systems for Precision Agriculture: A Machine Learning Perspective," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 345-365, 2022.

[61] H. Gadde, "Federated Learning with AI-Enabled Databases for Privacy-Preserving Analytics," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 220-248, 2022.

[62] A. Damaraju, "Social Media Cybersecurity: Protecting Personal and Business Information," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 50-69, 2022.

[63] D. R. Chirra, "Advanced Threat Detection and Response Systems Using Federated Machine Learning in Critical Infrastructure," International Journal of Advanced Engineering Technologies and Innovations, vol. 2, no. 1, pp. 61-81, 2024.

[64] F. M. Syed and F. K. ES, "The Impact of AI on IAM Audits in Healthcare," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 397-420, 2023.

[65] F. M. Syed and F. K. ES, "Leveraging AI for HIPAA-Compliant Cloud Security in Healthcare," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 461-484, 2023.

[66] H. Sharma, "HPC-ENHANCED TRAINING OF LARGE AI MODELS IN THE CLOUD," International Journal of Advanced Research in Engineering and Technology, vol. 10, no. 2, pp. 953-972, 2019.

[67] R. G. Goriparthi, "Deep Reinforcement Learning for Autonomous Robotic Navigation in Unstructured Environments," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 328-344, 2022.

[68] H. Gadde, "Integrating AI into SQL Query Processing: Challenges and Opportunities," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 194-219, 2022.

[69] A. Damaraju, "The Role of AI in Detecting and Responding to Phishing Attacks," Revista Espanola de Documentacion Cientifica, vol. 16, no. 4, pp. 146-179, 2022.

[70] B. R. Chirra, "Securing Operational Technology: AI-Driven Strategies for Overcoming Cybersecurity Challenges," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 11, no. 1, pp. 281-302, 2020.

[71] R. G. Goriparthi, "Interpretable Machine Learning Models for Healthcare Diagnostics: Addressing the Black-Box Problem," Revista de Inteligencia Artificial en Medicina, vol. 13, no. 1, pp. 508-534, 2022.

[72] H. Gadde, "AI-Based Data Consistency Models for Distributed Ledger Technologies," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 514-545, 2023.

[73] F. M. Syed and F. K. ES, "OX Compliance in Healthcare: A Focus on Identity Governance and Access Control," Revista de Inteligencia Artificial en Medicina, vol. 10, no. 1, pp. 229-252, 2019.

[74] F. M. Syed, F. K. ES, and E. Johnson, "Privacy by Design: Integrating GDPR Principles into IAM Frameworks for Healthcare," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 16-36, 2019.

[75] H. Sharma, "Effectiveness of CSPM in Multi-Cloud Environments: A study on the challenges and strategies for implementing CSPM across multiple cloud service providers (AWS, Azure, Google Cloud), focusing on interoperability and comprehensive visibility," International Journal of Computer Science and Engineering Research and Development (IJCSERD), vol. 10, no. 1, pp. 1-18, 2020.

[76] R. G. Goriparthi, "AI-Augmented Cybersecurity: Machine Learning for Real-Time Threat Detection," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 576-594, 2023.

[77] F. M. Syed and F. K. ES, "The Role of AI in Enhancing Cybersecurity for GxP Data Integrity," Revista de Inteligencia Artificial en Medicina, vol. 13, no. 1, pp. 393-420, 2022.

[78] R. G. Goriparthi, "AI-Enhanced Data Mining Techniques for Large-Scale Financial Fraud Detection," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 674-699, 2023.

[79] H. Gadde, "AI-Driven Anomaly Detection in NoSQL Databases for Enhanced Security," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 497-522, 2023.

[80] A. Damaraju, "Artificial Intelligence in Cyber Defense: Opportunities and Risks," Revista Espanola de Documentacion Cientifica, vol. 17, no. 2, pp. 300-320, 2023.

[81] B. R. Chirra, "AI-Powered Identity and Access Management Solutions for Multi-Cloud Environments," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 523-549, 2023.

[82] R. G. Goriparthi, "Federated Learning Models for Privacy-Preserving AI in Distributed Healthcare Systems," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 650-673, 2023.

[83] D. R. Chirra, "Towards an AI-Driven Automated Cybersecurity Incident Response System," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 429-451, 2023.

[84] H. Gadde, "Leveraging AI for Scalable Query Processing in Big Data Environments," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 02, pp. 435-465, 2023.

[85] F. M. Syed and F. K. ES, "The Role of IAM in Mitigating Ransomware Attacks on Healthcare Facilities," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 9, no. 1, pp. 121-154, 2018.

[86] R. G. Goriparthi, "Leveraging AI for Energy Efficiency in Cloud and Edge Computing Infrastructures," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 494-517, 2023.

[87] H. Gadde, "Self-Healing Databases: AI Techniques for Automated System Recovery," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 02, pp. 517-549, 2023.

[88] A. Damaraju, "Detecting and Preventing Insider Threats in Corporate Environments," Journal Environmental Sciences And Technology, vol. 2, no. 2, pp. 125-142, 2023.

[89] B. R. Chirra, "Dynamic Cryptographic Solutions for Enhancing Security in 5G Networks," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 249-272, 2022.

[90] R. G. Goriparthi, "Machine Learning Algorithms for Predictive Maintenance in Industrial IoT," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 473-493, 2023.

[91] H. Gadde, "AI-Augmented Database Management Systems for Real-Time Data Analytics," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 616-649, 2024.

[92] A. Damaraju, "Enhancing Mobile Cybersecurity: Protecting Smartphones and Tablets," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 193-212, 2023.

[93] B. R. Chirra, "Securing Edge Computing: Strategies for Protecting Distributed Systems and Data," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 354-373, 2023.

[94] R. G. Goriparthi, "Adaptive Neural Networks for Dynamic Data Stream Analysis in Real-Time Systems," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 689-709, 2024.

[95] D. R. Chirra, "The Role of Homomorphic Encryption in Protecting Cloud-Based Financial Transactions," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 452-472, 2023.

[96] H. Gadde, "AI-Driven Data Indexing Techniques for Accelerated Retrieval in Cloud Databases," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 583-615, 2024.

[97] B. R. Chirra, "Enhancing Cloud Security through Quantum Cryptography for Robust Data Transmission," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 752-775, 2024.

[98] R. G. Goriparthi, "AI-Driven Predictive Analytics for Autonomous Systems: A Machine Learning Approach," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 843-879, 2024.

[99] D. R. Chirra, "Real-Time Forensic Analysis Using Machine Learning for Cybercrime Investigations in E-Government Systems," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 618-649, 2023.

[100] H. Gadde, "AI-Powered Fault Detection and Recovery in High-Availability Databases," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 500-529, 2024.

[101] H. Sharma, "Behavioral Analytics and Zero Trust," International Journal of Computer Engineering and Technology, vol. 12, no. 1, pp. 63-84, 2021.

[102] R. G. Goriparthi, "Deep Learning Architectures for Real-Time Image Recognition: Innovations and Applications," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 880-907, 2024.

[103] D. R. Chirra, "Deep Learning Techniques for Anomaly Detection in IoT Devices: Enhancing Security and Privacy," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 529-552, 2023.

[104] A. Damaraju, "Safeguarding Information and Data Privacy in the Digital Age," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 01, pp. 213-241, 2023.

[105] B. R. Chirra, "Enhancing Cyber Incident Investigations with AI-Driven Forensic Tools," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 157-177, 2021.

[106] H. Gadde, "Intelligent Query Optimization: AI Approaches in Distributed Databases," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 650-691, 2024.

[107] R. G. Goriparthi, "Hybrid AI Frameworks for Edge Computing: Balancing Efficiency and Scalability," International Journal of Advanced Engineering Technologies and Innovations, vol. 2, no. 1, pp. 110-130, 2024.

[108] D. R. Chirra, "AI-Based Threat Intelligence for Proactive Mitigation of Cyberattacks in Smart Grids," Revista de Inteligencia Artificial en Medicina, vol. 14, no. 1, pp. 553-575, 2023.

[109] B. R. Chirra, "Enhancing Cybersecurity Resilience: Federated Learning-Driven Threat Intelligence for Adaptive Defense," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 11, no. 1, pp. 260-280, 2020.

[110] H. Gadde, "Optimizing Transactional Integrity with AI in Distributed Database Systems," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 621-649, 2024.

[111] D. R. Chirra, "Secure Edge Computing for IoT Systems: AI-Powered Strategies for Data Integrity and Privacy," Revista de Inteligencia Artificial en Medicina, vol. 13, no. 1, pp. 485-507, 2022.

[112] R. G. Goriparthi, "Reinforcement Learning in IoT: Enhancing Smart Device Autonomy through AI," International Journal of Advanced Engineering Technologies and Innovations, vol. 2, no. 1, pp. 89-109, 2024.

[113] A. Damaraju, "Advancing Networking Security: Techniques and Best Practices," Journal Environmental Sciences And Technology, vol. 3, no. 1, pp. 941-959, 2024.

[114] D. R. Chirra, "Collaborative AI and Blockchain Models for Enhancing Data Privacy in IoMT Networks," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 13, no. 1, pp. 482-504, 2022.

[115] H. Sharma, "Impact of DSPM on Insider Threat Detection: Exploring how DSPM can enhance the detection and prevention of insider threats by monitoring data access patterns and flagging anomalous behavior," International Journal of Computer Science and Engineering Research and Development (IJCSERD), vol. 11, no. 1, pp. 1-15, 2021.

[116] B. R. Chirra, "Ensuring GDPR Compliance with AI: Best Practices for Strengthening Information Security," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 13, no. 1, pp. 441-462, 2022.

[117] A. Damaraju, "Cloud Security Challenges and Solutions in the Era of Digital Transformation," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 387-413, 2024.

[118] D. R. Chirra, "AI-Powered Adaptive Authentication Mechanisms for Securing Financial Services Against Cyber Attacks," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 303-326, 2022.

[119] A. Damaraju, "Mitigating Phishing Attacks: Tools, Techniques, and User," Revista Espanola de Documentacion Cientifica, vol. 18, no. 02, pp. 356-385, 2024.

[120] B. R. Chirra, "Intelligent Phishing Mitigation: Leveraging AI for Enhanced Email Security in Corporate Environments," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 178-200, 2021.

[121] D. R. Chirra, "The Impact of AI on Cyber Defense Systems: A Study of Enhanced Detection and Response in Critical Infrastructure," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 221-236, 2021.

[122] H. Sharma, "Next-Generation Firewall in the Cloud: Advanced Firewall Solutions to the Cloud," ESP Journal of Engineering & Technology Advancements (ESP-JETA), vol. 1, no. 1, pp. 98-111, 2021.

[123] A. Damaraju, "The Future of Cybersecurity: 5G and 6G Networks and Their Implications," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 3, pp. 359-386, 2024.

[124] D. R. Chirra, "Securing Autonomous Vehicle Networks: AI-Driven Intrusion Detection and Prevention Mechanisms," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 12, no. 1, pp. 434-454, 2021.

[125] B. R. Chirra, "Leveraging Blockchain for Secure Digital Identity Management: Mitigating Cybersecurity Vulnerabilities," Revista de Inteligencia Artificial en Medicina, vol. 12, no. 1, pp. 462-482, 2021.

[126] H. Sharma, "Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security," ESP Journal of Engineering & Technology Advancements (ESP-JETA), vol. 2, no. 2, pp. 78-91, 2022.

[127] B. R. Chirra, "Leveraging Blockchain to Strengthen Information Security in IoT Networks," Revista de Inteligencia Artificial en Medicina, vol. 15, no. 1, pp. 726-751, 2024.

[128] D. R. Chirra, "AI-Enabled Cybersecurity Solutions for Protecting Smart Cities Against Emerging Threats," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 237-254, 2021.

[129] B. R. Chirra, "Predictive AI for Cyber Risk Assessment: Enhancing Proactive Security Measures," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 4, pp. 505-527, 2024.

[130] D. R. Chirra, "Next-Generation IDS: AI-Driven Intrusion Detection for Securing 5G Network Architectures," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 230-245, 2020.

[131] B. R. Chirra, "Revolutionizing Cybersecurity with Zero Trust Architectures: A New Approach for Modern Enterprises," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 586-612, 2024.

[132] D. R. Chirra, "AI-Based Real-Time Security Monitoring for Cloud-Native Applications in Hybrid Cloud Environments," Revista de Inteligencia Artificial en Medicina, vol. 11, no. 1, pp. 382-402, 2020.

[133] R. G. Goriparthi, "Optimizing Supply Chain Logistics Using AI and Machine Learning Algorithms," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 2, pp. 279-298, 2021.

[134] B. R. Chirra, "Revolutionizing Cybersecurity: The Role of AI in Advanced Threat Detection Systems," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 4, pp. 480-504, 2024.

Downloads

Published

2024-12-31

Similar Articles

<< < 1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.