The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Machine Learning Application With Avatar-Based Management Security to Reduce Cyber Threat
Abstract
This chapter is devoted to studying the opportunities of machine learning with avatar-based management techniques aimed at optimizing threat for cyber security professionals. The authors of the chapter developed a triangular scheme of machine learning, which included at each vertex one participant: a trainee, training, and an expert. To realize the goal set by the authors, an intelligent agent is included in the triangular scheme. The authors developed the innovation tools using intelligent visualization techniques for big data analytic with avatar-based management in sliding mode introduced by V. Mkrttchian in his books and chapters published by IGI Global in 2017-18. The developed algorithm, in contrast to the well-known, uses a three-loop feedback system that regulates the current state of the program depending on the user's actions, virtual state, and the status of implementation of available hardware resources. The algorithm of automatic situational selection of interactive software component configuration in virtual machine learning environment in intelligent-analytic platforms was developed.
Related Content
Princy Pappachan, Sreerakuvandana, Mosiur Rahaman.
© 2024.
26 pages.
|
Winfred Yaokumah, Charity Y. M. Baidoo, Ebenezer Owusu.
© 2024.
23 pages.
|
Mario Casillo, Francesco Colace, Brij B. Gupta, Francesco Marongiu, Domenico Santaniello.
© 2024.
25 pages.
|
Suchismita Satapathy.
© 2024.
19 pages.
|
Xinyi Gao, Minh Nguyen, Wei Qi Yan.
© 2024.
13 pages.
|
Mario Casillo, Francesco Colace, Brij B. Gupta, Angelo Lorusso, Domenico Santaniello, Carmine Valentino.
© 2024.
30 pages.
|
Pratyay Das, Amit Kumar Shankar, Ahona Ghosh, Sriparna Saha.
© 2024.
32 pages.
|
|
|