2020
DOI: 10.4018/978-1-5225-9611-0.ch001
|View full text |Cite
|
Sign up to set email alerts
|

Review on Intelligent Algorithms for Cyber Security

Abstract: Cyber security comprises of technologies, architecture, infrastructure, and software applications that are designed to protect computational resources against cyber-attacks. Cyber security concentrates on four main areas such as application security, disaster security, information security, and network security. Numerous cyber security algorithms and computational methods are introduced by researchers to protect cyberspace from undesirable invaders and susceptibilities. But, the performance of traditional cybe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…al. [45] extend this work by reviewing ML and DL algorithms. They mostly focus on the infrastructure area for intrusion and anomaly detection, and they marginally outline the contributions in the software area for botnet and malware detection.…”
Section: Related Workmentioning
confidence: 85%
See 1 more Smart Citation
“…al. [45] extend this work by reviewing ML and DL algorithms. They mostly focus on the infrastructure area for intrusion and anomaly detection, and they marginally outline the contributions in the software area for botnet and malware detection.…”
Section: Related Workmentioning
confidence: 85%
“…They mostly focus on the infrastructure area for intrusion and anomaly detection, and they marginally outline the contributions in the software area for botnet and malware detection. Unlike other surveys, [45] reviews Nature Inspired computing (NIC) paradigms which are applied for fine-tuning the parameters in the security learning model to categorize attacks. This improves efficiency and performance.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, studies have been carried out to explore new techniques and tools to counter the issue of application-level security. For instance, the authors in [43], [44], [45], [46], [47], [48], [49] and [50] point out that it is pertinent for security to be the initial step prior to system development. The process should not only be flexible but also independent, containing security aspects customized to the organization.…”
Section: Introductionmentioning
confidence: 99%
“…The use of intelligent algorithms in the development of cyber security models to detect various sorts of assaults is researched to improve performance. As a result, it underlines the effectiveness of intelligent algorithms in developing sophisticated cyber security models that can detect threats or vulnerabilities [17,18].…”
mentioning
confidence: 99%