IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Review on Intelligent Algorithms for Cyber Security

Review on Intelligent Algorithms for Cyber Security
View Sample PDF
Author(s): P. Subashini (Avinshilingam Institute for Home Science and Higher Education for Women, India), M. Krishnaveni (Avinashilingam Institute for Home Science and Higher Education for Women, India), T. T. Dhivyaprabha (Avinashilingam Institute for Home Science and Higher Education for Women, India) and R. Shanmugavalli (Avinashilingam Institute for Home Science and Higher Education for Women, India)
Copyright: 2020
Pages: 22
Source title: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Source Author(s)/Editor(s): Padmavathi Ganapathi (Avinashilingam Institute for Home Science and Higher Education for Women, India) and D. Shanmugapriya (Avinashilingam Institute for Home Science and Higher Education for Women, India)
DOI: 10.4018/978-1-5225-9611-0.ch001

Purchase

View Review on Intelligent Algorithms for Cyber Security on the publisher's website for pricing and purchasing information.

Abstract

Cyber security comprises of technologies, architecture, infrastructure, and software applications that are designed to protect computational resources against cyber-attacks. Cyber security concentrates on four main areas such as application security, disaster security, information security, and network security. Numerous cyber security algorithms and computational methods are introduced by researchers to protect cyberspace from undesirable invaders and susceptibilities. But, the performance of traditional cyber security algorithms suffers due to different types of offensive actions that target computer infrastructures, architectures and computer networks. The implementation of intelligent algorithms in encountering the wide range of cyber security problems is surveyed, namely, nature-inspired computing (NIC) paradigms, machine learning algorithms, and deep learning algorithms, based on exploratory analyses to identify the advantages of employing in enhancing cyber security techniques.

Related Content

Kapil Sethi, Shweta Chauhan, Varun Jaiswal. © 2021. 29 pages.
Mani Arora. © 2021. 19 pages.
Poonam jatwani, Pradeep Tomar, Vandana Dhingra. © 2021. 13 pages.
Chander Diwaker, Atul Sharma, Pradeep Tomar. © 2021. 11 pages.
Libi Shen, Irene Chen, Anne Grey, Anchi Su. © 2021. 26 pages.
Latika Kharb, Prateek Singh. © 2021. 25 pages.
Amit Mishra. © 2021. 10 pages.
Body Bottom