Academic literature on the topic 'Automated Threat Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Automated Threat Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Automated Threat Detection"
Shah, Anki, J. Kathyayani, D. Janani, E. Abhinav, and Rajashree Sutrawe. "CYBER THREAT DETECTION AND PROFILING USING AI." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–6. https://doi.org/10.55041/ijsrem.ncft025.
Full textDatta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.
Full textDesai, Aditya R. "A Review on Cybercrime Control through Behavioural Pattern Analysis Using a Comprehensive Database and Enhanced APIS." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3304–9. https://doi.org/10.22214/ijraset.2025.68894.
Full textFranciskumar, Gavit, and Mr Satish Kumar. "CipherScan: An Advanced Web Application Vulnerability Scanner for Enhanced Cybersecurity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43804.
Full textRamasankar Molleti, Vinod Goje, Puneet Luthra, and Prathap Raghavan. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. http://dx.doi.org/10.30574/wjarr.2024.24.2.3329.
Full textRamasankar, Molleti, Goje Vinod, Luthra Puneet, and Raghavan Prathap. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. https://doi.org/10.5281/zenodo.15067889.
Full textMamayson, Emmanuel B., Mark Cherwin L. Alejandria, and Jose Gil K. Escalante. "Kalasag: An Integrated and Advanced Cybersecurity Tools for Cyber Threats Protection." International Journal of Research and Innovation in Applied Science X, no. VI (2025): 826–29. https://doi.org/10.51584/ijrias.2025.10060061.
Full textP. Nisha, Mrs M. "Dark web Guardian: Real time threat Detection and Analysis." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03502.
Full textEmmanuel Joshua, John Do, and Rushil Patel. "AI-Driven Threat Intelligence System (AIDTIS): Leveraging large language models for automated threat research and detection development." International Journal of Science and Research Archive 14, no. 3 (2025): 270–85. https://doi.org/10.30574/ijsra.2025.14.3.0339.
Full textRamaiah, CH, D. Adithya Charan, and R. Syam Akhil. "Secure automated threat detection and prevention (SATDP)." International Journal of Engineering & Technology 7, no. 2.20 (2018): 86. http://dx.doi.org/10.14419/ijet.v7i2.20.11760.
Full textDissertations / Theses on the topic "Automated Threat Detection"
Heiberg, Einar Brandt. "Automated feature detection in multidimensional images /." Linköping : Univ, 2004. http://www.bibl.liu.se/liupubl/disp/disp2005/tek917s.pdf.
Full textWang, Lu, and 王璐. "Three-dimensional model based human detection and tracking in crowded scenes." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587421.
Full textJärrendahl, Hannes. "Automatic Detection of Anatomical Landmarks in Three-Dimensional MRI." Thesis, Linköpings universitet, Datorseende, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-130944.
Full textPokric, Boris. "Laser based machine vision for three-dimensional surface analysis." Thesis, Leeds Beckett University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.297358.
Full textEl, Mallahi Ahmed. "Automated 3D object analysis by digital holographic microscopy." Doctoral thesis, Universite Libre de Bruxelles, 2013. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209489.
Full textSeyrafi, Aylar. "Developing Real Time Automatic Step Detection in the three dimensional Accelerometer Signal implemented on a Microcontroller System." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1183.
Full textGresson, Régis. "Segmentation et reconstruction tridimensionnelle du foyer de microcalcifications mammaires." Vandoeuvre-les-Nancy, INPL, 1998. http://www.theses.fr/1998INPL108N.
Full textBerrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Full textCarroll, Matthew. "Automatic detection of revealing cutting planes in three-dimensional datasets." 2006. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=450328&T=F.
Full textHuang, Sheng-fang, and 黃聖方. "Automatic Spiculate Detection for Breast Tumor Using Three-dimensional Ultrasound." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/25361974990535961749.
Full textBooks on the topic "Automated Threat Detection"
Hagan, John, Bill McCarthy, and Daniel Herda. Chicago's Reckoning. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197627860.001.0001.
Full textHilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textInsight into Images: Principles and Practice for Segmentation, Registration, and Image Analysis. AK Peters, 2004.
Find full textBook chapters on the topic "Automated Threat Detection"
Niranjana, J., J. Mary Dhivya, and A. Balamurali. "Artificial Intelligence Powered Weapon Detection with Automated Threat Alert System." In Advances in Computer Science Research. Atlantis Press International BV, 2025. https://doi.org/10.2991/978-94-6463-718-2_22.
Full textvan Verre, Wouter, Toykan Özdeǧer, Ananya Gupta, Frank J. W. Podd, and Anthony J. Peyton. "Threat Identification in Humanitarian Demining Using Machine Learning and Spectroscopic Metal Detection." In Intelligent Data Engineering and Automated Learning – IDEAL 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33607-3_58.
Full textPetrozziello, Alessio, and Ivan Jordanov. "Automated Deep Learning for Threat Detection in Luggage from X-Ray Images." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34029-2_32.
Full textFerrara, Matteo, and Annalisa Franco. "Morph Creation and Vulnerability of Face Recognition Systems to Morphing." In Handbook of Digital Face Manipulation and Detection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_6.
Full textOrazi, Gilles, Marianne Marot, Iheb Khelifi, Léa Robert, and Franck Le Gall. "Early Warning of Harmful Algal Blooms (HAB): A Low-Cost Integrated IoT Device with Spectrofluorometry and Automated Plankton Imaging." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78572-6_11.
Full textFlizikowski, Adam, Mirosław Maszewski, Marcin Wachowiak, and Grzegorz Taberski. "Background Subtraction and Movement Detection Algorithms in Dynamic Environments – An Evaluation for Automated Threat Recognition Systems." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-01622-1_26.
Full textLi, Xiaodong, Song Chai, Liwei Wang, and Hua Wang. "A Configurable and Automated Testing Framework for Hardware Trojan Detection in FPGAs." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-2409-6_31.
Full textvan Ditmarsch, Hans, Krisztina Fruzsa, Roman Kuznets, and Ulrich Schmid. "A Logic for Repair and State Recovery in Byzantine Fault-Tolerant Multi-agent Systems." In Automated Reasoning. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-63501-4_7.
Full textRampershad, Yashay, Serestina Viriri, and Mandlenkosi Gwetu. "Automatic Baggage Threat Detection Using Deep Attention Networks." In Artificial Intelligence Research. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95070-5_11.
Full textSales, Emerson, Omar Inverso, and Emilio Tuosto. "Accurate Static Data Race Detection for C." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-71162-6_23.
Full textConference papers on the topic "Automated Threat Detection"
Yulianto, Semi, and Gerard Nathaniel Cac Ngo. "Automated Threat Hunting, Detection, and Threat Actor Profiling Using TIRA." In 2024 International Conference on ICT for Smart Society (ICISS). IEEE, 2024. http://dx.doi.org/10.1109/iciss62896.2024.10750987.
Full textP, Krishnaja Venkata Naga Sri Lasya, Munisaiteja Sharan Tupakula, and Naresh Sammeta. "Automated Anomaly Detection and Threat Classification in Network Traffic." In 2025 2nd International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE). IEEE, 2025. https://doi.org/10.1109/rmkmate64874.2025.11042463.
Full textKamath, Abhay, Aditya Joshi, Aditya Sharma, Nikhil R. Shetty, and Lenish Pramiee. "Automated Threat Detection in the Dark Web: A Multi-Model NLP Approach." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011956.
Full textManikandan, K. P., Navaneeswar Reddy Onteddu, and Abdul Kalam Chilimi. "Next-Gen Malware Detection using AI AI-Powered Malware Threat Detection Automated Malware Classification Through Machine Learning." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10985389.
Full textVenuturumilli, Munni, V. L. Manaswini Nune, M. Praveen, Helina Rajini Suresh, G. Elumalai, and P. Chitra. "Enhancing Cybersecurity: A Scalable System for Real-Time Threat Detection Using ML and Automated Response." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910406.
Full textAlo, Salam Omar, Abeer Salim Jamil, Mohammed Jabbar Hussein, Mohammed K. H. Al-Dulaimi, Sarmad Waleed Taha, and Anastasiia Khlaponina. "Automated Detection of Cybersecurity Threats Using Generative Adversarial Networks (GANs)." In 2024 36th Conference of Open Innovations Association (FRUCT). IEEE, 2024. http://dx.doi.org/10.23919/fruct64283.2024.10749874.
Full textRefaat, Seif Eldin, and Haitham Omran. "Machine Learning Assisted Automated Laser Profile Tracking." In Advanced Solid State Lasers. Optica Publishing Group, 2024. https://doi.org/10.1364/assl.2024.jtu2a.45.
Full textZanpure, Vibhas Mohan. "Improving Zero Trust Architecture with Machine Learning: Automatic Threat Detection using Network Traffic Analysis." In 2025 2nd International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE). IEEE, 2025. https://doi.org/10.1109/rmkmate64874.2025.11042837.
Full textWang, Yunjia, Ziling Li, Tiejun Wu, Ishbel Duncan, and Qixin Lyu. "An Empirical Study: Automated Subdomain Takeover Threat Detection." In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2021. http://dx.doi.org/10.1109/cybersa52016.2021.9478220.
Full textStachowiak, Jeanne C., Erin E. Shugard, Pamela Caton, et al. "Automated Sample Preparation System for Rapid Biological Threat Detection." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-80945.
Full textReports on the topic "Automated Threat Detection"
Asari, Vijayan, Paheding Sidike, Binu Nair, Saibabu Arigela, Varun Santhaseelan, and Chen Cui. PR-433-133700-R01 Pipeline Right-of-Way Automated Threat Detection by Advanced Image Analysis. Pipeline Research Council International, Inc. (PRCI), 2015. http://dx.doi.org/10.55274/r0010891.
Full textPrice, Donald. PR-403-123706-R02 2012 Right-of-Way Automated Monitoring Program- Machinery Threat Flight Test Results. Pipeline Research Council International, Inc. (PRCI), 2015. http://dx.doi.org/10.55274/r0010865.
Full textYoel, David, Tina Sicilia, Matthew Bogaart, and Jeremy Fernandes. PR-417-203902-R01 Remote Sensing and Leak Detection Platform That Can Deploy Multiple Sensor Types. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000052.
Full textYoel, David, Tina Sicilia, Matthew Bogaart, and Jeremy Fernandes. PR-417-203902-R02 Remote Sensing and Leak Detection Platform that Can Deploy Multiple Sensor Types. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000055.
Full textUnknown, Author. L51630 In-Line Detection and Sizing of Stress Corrosion Cracks Using EMAT Ultrasonics. Pipeline Research Council International, Inc. (PRCI), 1990. http://dx.doi.org/10.55274/r0010616.
Full textPasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.
Full textPrice, Donald. SM-403-148100-R01 Mineral Wells 2012 RAM Gas and Oil Leak Detection Field Study Results. Pipeline Research Council International, Inc. (PRCI), 2015. http://dx.doi.org/10.55274/r0010851.
Full textBerney, Ernest, Andrew Ward, and Naveen Ganesh. First generation automated assessment of airfield damage using LiDAR point clouds. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40042.
Full textYan, Yujie, and Jerome F. Hajjar. Automated Damage Assessment and Structural Modeling of Bridges with Visual Sensing Technology. Northeastern University, 2021. http://dx.doi.org/10.17760/d20410114.
Full textKurimo-Beechuk, Elizabeth, Michael Byrne, and Wendy Wright. Landbird community monitoring at Fort Sumter National Monument: 2012 data summary. National Park Service, Natural Resource Stewardship and Science, 2016. https://doi.org/10.36967/2228028.
Full text