2023
DOI: 10.32628/cseit2390225
|View full text |Cite
|
Sign up to set email alerts
|

Different Machine Learning Algorithms used for Secure Software Advance using Software Repositories

Abstract: In the present phase of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data, business data, social media data, health data, etc. To intelligently analyze these data and develop the corresponding smart and automated applications, the knowledge of artificial intelligence (AI), particularly, machine learning (ML) is the key. Cyber Security attacks are significantly growing in today’s modern world of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
0
0
Order By: Relevance
“…[9] As we progress, we hope to offer readers a comprehensive understanding of how gesture-based interactions have transformed our digital experiences and hint at the exciting possibilities the future might hold. [10,11] This introduction sets the stage for the paper by providing context and framing the topic's importance [12,13]. As with any research paper, it's crucial to ensure that the content aligns with the depth of your research and the specific areas you intend to explore in subsequent sections.…”
Section: Introductionmentioning
confidence: 99%
“…[9] As we progress, we hope to offer readers a comprehensive understanding of how gesture-based interactions have transformed our digital experiences and hint at the exciting possibilities the future might hold. [10,11] This introduction sets the stage for the paper by providing context and framing the topic's importance [12,13]. As with any research paper, it's crucial to ensure that the content aligns with the depth of your research and the specific areas you intend to explore in subsequent sections.…”
Section: Introductionmentioning
confidence: 99%
“…This paradigm shift has revolutionized industries, from healthcare and agriculture to smart cities and industrial automation, by enabling data-driven insights and real-time decision-making [2]. In this dynamic ecosystem, a multitude of devices, often with diverse communication technologies and distinct quality of service (QoS) requirements, coexist and collaborate to fulfill an array of tasks [3].The hallmark of the IoT lies not only in the sheer number of devices but also in their heterogeneity. From low-power sensors to high-performance gateways, these devices span a wide spectrum of capabilities and constraints.…”
Section: Iintroductionmentioning
confidence: 99%
“…However, this transformational potential comes hand in hand with a complex array of security challenges that cast a shadow over the seamless integration of IoT in our lives. [2,3] As the boundaries between the physical and digital realms blur, IoT devices have become integral components of our environments, facilitating tasks, automating processes, and gathering data. Yet, this pervasive presence also exposes vulnerabilities that threat actors are eager to exploit.…”
Section: Iintroductionmentioning
confidence: 99%