IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Case-Based Reasoning and Computer Vision for Cybersecurity: A Short Review

Case-Based Reasoning and Computer Vision for Cybersecurity: A Short Review
View Sample PDF
Author(s): Naomi Dassi Tchomte (University of Ngaoundere, Cameroon), Franklin Tchakounte (Faculty of Science, University of Ngaoundere, Cameroon)and Ismael Abbo (Faculty of Sciences, University of Ngaoundere, Cameroon)
Copyright: 2024
Pages: 42
Source title: Global Perspectives on the Applications of Computer Vision in Cybersecurity
Source Author(s)/Editor(s): Franklin Tchakounté (University of Ngaoundere, Cameroon)and Marcellin Atemkeng (Rhodes University, South Africa)
DOI: 10.4018/978-1-6684-8127-1.ch002

Purchase

View Case-Based Reasoning and Computer Vision for Cybersecurity: A Short Review on the publisher's website for pricing and purchasing information.

Abstract

The integration of case-based reasoning (CBR) and computer vision (CV) holds significant promise for enhancing cybersecurity, enabling the analysis and interpretation of visual data to detect security threats. This study provides an investigation of the synergy between case-based reasoning and computer vision techniques in the context of cybersecurity, aiming to address open challenges and identify opportunities for advancing security operations. Three main steps are realized. First, a taxonomy declining categories and sub-categories of the studied works is designed. Second, the collected literature is analysed in terms of (1) CBR for leveraging past security incidents and patterns in visual data analysis, facilitating threat detection, incident response, and threat intelligence analysis; (2) CV for cybersecurity modelling and to support cybersecurity decision making; (3) association between CBR and CV to design cybersecurity approaches. Third, open issues are discussed. This study exploiting CBR in computing vision for cybersecurity opens doors for further research.

Related Content

Fahim Anzum, Ashratuz Zavin Asha, Lily Dey, Artemy Gavrilov, Fariha Iffath, Abu Quwsar Ohi, Liam Pond, Md. Shopon, Marina L. Gavrilova. © 2024. 46 pages.
Naomi Dassi Tchomte, Franklin Tchakounte, Ismael Abbo. © 2024. 42 pages.
Wyclife Ong'eta. © 2024. 13 pages.
Gabbi Evrard Tchoukouegno De Mofo, Ali Joan Beri Wacka, Franklin Tchakounte, Jean Marie Kuate Fotso. © 2024. 22 pages.
Cecile Simo Tala. © 2024. 31 pages.
Ismael Abbo, Naomi Dassi Tchomte. © 2024. 20 pages.
Stones Dalitso Chindipha. © 2024. 22 pages.
Body Bottom