Journal articles on the topic 'Automated Threat Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Automated Threat Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shah, Anki, J. Kathyayani, D. Janani, E. Abhinav, and Rajashree Sutrawe. "CYBER THREAT DETECTION AND PROFILING USING AI." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–6. https://doi.org/10.55041/ijsrem.ncft025.
Full textDatta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.
Full textDesai, Aditya R. "A Review on Cybercrime Control through Behavioural Pattern Analysis Using a Comprehensive Database and Enhanced APIS." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3304–9. https://doi.org/10.22214/ijraset.2025.68894.
Full textFranciskumar, Gavit, and Mr Satish Kumar. "CipherScan: An Advanced Web Application Vulnerability Scanner for Enhanced Cybersecurity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43804.
Full textRamasankar Molleti, Vinod Goje, Puneet Luthra, and Prathap Raghavan. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. http://dx.doi.org/10.30574/wjarr.2024.24.2.3329.
Full textRamasankar, Molleti, Goje Vinod, Luthra Puneet, and Raghavan Prathap. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. https://doi.org/10.5281/zenodo.15067889.
Full textMamayson, Emmanuel B., Mark Cherwin L. Alejandria, and Jose Gil K. Escalante. "Kalasag: An Integrated and Advanced Cybersecurity Tools for Cyber Threats Protection." International Journal of Research and Innovation in Applied Science X, no. VI (2025): 826–29. https://doi.org/10.51584/ijrias.2025.10060061.
Full textP. Nisha, Mrs M. "Dark web Guardian: Real time threat Detection and Analysis." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03502.
Full textEmmanuel Joshua, John Do, and Rushil Patel. "AI-Driven Threat Intelligence System (AIDTIS): Leveraging large language models for automated threat research and detection development." International Journal of Science and Research Archive 14, no. 3 (2025): 270–85. https://doi.org/10.30574/ijsra.2025.14.3.0339.
Full textRamaiah, CH, D. Adithya Charan, and R. Syam Akhil. "Secure automated threat detection and prevention (SATDP)." International Journal of Engineering & Technology 7, no. 2.20 (2018): 86. http://dx.doi.org/10.14419/ijet.v7i2.20.11760.
Full textYerabolu, Malleswar Reddy. "The Evolution of AI-Driven Threat Hunting: A Technical Deep Dive into Modern Cybersecurity." European Journal of Computer Science and Information Technology 13, no. 7 (2025): 36–49. https://doi.org/10.37745/ejcsit.2013/vol13n73649.
Full textVenkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.
Full textChitoor Venkat Rao Ajay Kumar, Shanti Lekhana Yakkaladevi, Samagna Pandiri, and Yeshwanth Godugu. "Reinforcement learning-based phishing detection model." World Journal of Advanced Research and Reviews 25, no. 1 (2025): 2291–95. https://doi.org/10.30574/wjarr.2025.25.1.0256.
Full textNair, Rajesh Rajamohanan. "Proactive Threat Hunting: The Vanguard of Modern Cybersecurity Defense." European Journal of Computer Science and Information Technology 13, no. 22 (2025): 53–67. https://doi.org/10.37745/ejcsit.2013/vol13n225367.
Full textDr. Rajitha Kotoju and Md. Abrar Khan. "Cognitive Cyber Threat Intelligence: AI-Driven Behavioural Profiling for Proactive Security." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 156–59. https://doi.org/10.46647/10.46647/ijetms.2025.v09si01.025.
Full textBhavik Patel, Patel Krunalkumar Bhagavanbhai, and Niravkumar Dhameliya. "Revolutionizing Cybersecurity with AI: Predictive Threat Intelligence and Automated Response Systems." Darpan International Research Analysis 12, no. 4 (2024): 1–5. http://dx.doi.org/10.36676/dira.v12.i4.126.
Full textKailash Dhakal, Mohammad Mosiur Rahman, Mashfiquer Rahman, Khairul Anam, Mostafizur Rahman, and Ramesh Poudel. "How machine learning is transforming cyber threat detection." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 963–73. https://doi.org/10.30574/wjaets.2024.13.2.0581.
Full textReddy, Mr K. V. Siva Prasad, B. Mohith, P. Mahesh Babu, and K. Navtej. "CyberSleuth AI: Intelligent Network Forensics Analyzer." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 1643–47. https://doi.org/10.22214/ijraset.2025.68420.
Full textResearcher. "SECURITY DETECTIONS AS CODE: MODERNIZING THREAT DETECTION THROUGH SOFTWARE ENGINEERING PRINCIPLES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 991–99. https://doi.org/10.5281/zenodo.14281933.
Full textBaskaran, Saravanakumar. "A Comprehensive Framework for Threat Intelligence-Driven Incident Detection." International Journal of Scientific Research and Management (IJSRM) 7, no. 08 (2019): 288–93. http://dx.doi.org/10.18535/ijsrm/v7i8.ec01.
Full textMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Using AI for Intrusion Detection and Threat Intelligence: Enhancing Enterprise Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01331.
Full textBhaskar, Parumanchala, Farooq Sunar Mahammad, K. Ramachari, et al. "Automated Cyber Threat Identification Using Natural Language Processing." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 395–99. https://doi.org/10.47001/irjiet/2025.inspire64.
Full textABDULRAHMAN, IBRAHIM ABDUL, UZOAMAKA C. OGOR, GABRIEL TOSIN AYODELE, CHIDOZIE ANADOZIE, and JACOB ALEBIOSU. "AI-Driven Threat Intelligence and Automated Incident Response: Enhancing Cyber Resilience through Predictive Analytics." Research Journal in Civil, Industrial and Mechanical Engineering 2, no. 1 (2025): 16–32. https://doi.org/10.61424/rjcime.v2i1.236.
Full textML, Shiwani. "Prediction of Threat Detection using." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30759.
Full textKumari, Neelam, and Ashok Kumar. "Advanced Computational Techniques for Analyzing Cybersecurity Event Datasets Using Artificial Intelligence and Machine Learning." SCT Proceedings in Interdisciplinary Insights and Innovations 3 (January 1, 2025): 524. https://doi.org/10.56294/piii2025524.
Full textDubrovina, A. I., and M. H. Alcordi. "Development of methods for neutralizing «Zero-day» threats." Herald of Dagestan State Technical University. Technical Sciences 50, no. 4 (2024): 93–100. http://dx.doi.org/10.21822/2073-6185-2023-50-4-93-100.
Full textRosh Perumpully Ramadass. "Kubernetes runtime security framework: Integrated detection and automated remediation workflow." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1766–73. https://doi.org/10.30574/wjaets.2025.15.3.1091.
Full textJ, LAKSHMI. "A Python - Powered Keylogger Detection Tool." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31982.
Full textYogeswara, Reddy Avuthu. "Cloud-Native Security Analytics: Real-Time Threat Intelligence in DevSecOps Pipelines Using AI and Big Data." Journal of Scientific and Engineering Research 8, no. 8 (2021): 253–61. https://doi.org/10.5281/zenodo.14274206.
Full textAminat Bolaji Bello, Akeem Olakunle Ogundipe, Awobelem A. George, and Olabode Anifowose. "The role of AI and machine learning in cybersecurity: Advancements in threat detection, anomaly detection and automated response." International Journal of Science and Research Archive 14, no. 2 (2025): 1587–97. https://doi.org/10.30574/ijsra.2025.14.2.0542.
Full textDr., Anitha S., and D. Pravishka. "Intelligent Automation Framework for Penetration Testing and Security Assessment." Research and Reviews: Advancement in Cyber Security 2, no. 3 (2025): 39–45. https://doi.org/10.5281/zenodo.15583371.
Full textVaralakshmi, I., S. Pariselvam, and D. Oviya. "Hybrid Adaptive Threat Intelligence Detection System for Modern Cyber Attacks." Journal of Neonatal Surgery 14, no. 30S (2025): 654–71. https://doi.org/10.63682/jns.v14i30s.7031.
Full textOlakunle Abayomi Ajala and Olusegun Abiodun Balogun. "Leveraging AI/ML for anomaly detection, threat prediction, and automated response." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2584–98. http://dx.doi.org/10.30574/wjarr.2024.21.1.0287.
Full textOlakunle, Abayomi Ajala, and Abiodun Balogun Olusegun. "Leveraging AI/ML for anomaly detection, threat prediction, and automated response." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2584–98. https://doi.org/10.5281/zenodo.13377680.
Full textPasupuleti, Murali Krishna. "Threat Intelligence Automation Using Natural Language Processing on Dark Web Data." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 399–411. https://doi.org/10.62311/nesx/rphcrcscrcp3.
Full textS, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.
Full textPitkar, Harshad. "Cloud Security Automation Through Symmetry: Threat Detection and Response." Symmetry 17, no. 6 (2025): 859. https://doi.org/10.3390/sym17060859.
Full textIsmail, Dr Walaa Saber. "Threat Detection and Response Using AI and NLP in Cybersecurity." Journal of Internet Services and Information Security 14, no. 1 (2024): 195–205. http://dx.doi.org/10.58346/jisis.2024.i1.013.
Full textNellore, Nitya Sri. "Securing Cloud-Native Architectures with Dynamic Threat Detection: A Scalable Approach for Multi-Tier Applications." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. https://doi.org/10.55041/ijsrem37877.
Full textSunnat, Rizaev, and Kholmuradov Sardorbek. "The Rise of AI in Cybersecurity: Transforming Threat Detection and Response." Multidisciplinary Journal of Science and Technology 5, no. 5 (2025): 144–48. https://doi.org/10.5281/zenodo.15351063.
Full textSujan Kumar, Kummari. "Next-Generation Security Operations: Leveraging Automation for Proactive Threat Mitigation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43432.
Full textA, Ms Ambika. "Advanced CCTV Using Machine Learning and Internet of Things." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 3307–16. https://doi.org/10.22214/ijraset.2025.72772.
Full textKaran Singh Alang and Prof.(Dr) Vishwadeepak Singh Baghela. "Leveraging Large Language Models for Threat Detection and Cyber Defence: A Framework for Automated Security Analytics." International Journal for Research Publication and Seminar 16, no. 2 (2025): 17–25. https://doi.org/10.36676/jrps.v16.i1.46.
Full textBhardwaj, Arvind Kumar, P. K. Dutta, and Pradeep Chintale. "AI-Powered Anomaly Detection for Kubernetes Security: A Systematic Approach to Identifying Threats." Babylonian Journal of Machine Learning 2024 (August 20, 2024): 142–48. http://dx.doi.org/10.58496/bjml/2024/014.
Full textJAYASIMHA, ROYYALA, and MRS. T. SUMITRA. "The Cyberattack Correlation and Prevention for Distribution Systems via Machine Learning." Journal of Engineering Sciences 16, no. 04 (2025): 159–63. https://doi.org/10.36893/jes.2025.v16i04.026.
Full textRizvi, Mohammed. "Enhancing cybersecurity: The power of artificial intelligence in threat detection and prevention." International Journal of Advanced Engineering Research and Science 10, no. 5 (2023): 055–60. http://dx.doi.org/10.22161/ijaers.105.8.
Full textKwon, Taeksoo, and Connor Hunjoon Kim. "Efficacy of Utilizing Large Language Models to Detect Public Threat Posted Online." Advances in Artificial Intelligence and Machine Learning 04, no. 04 (2024): 3125–34. https://doi.org/10.54364/aaiml.2024.44179.
Full textChigozie Kingsley Ejeofobiri, Adedoyin Adetumininu Fadare, Olalekan Olorunfemi Fagbo, Valerie Ojinika Ejiofor, and Adetutu Temitope Fabusoro. "The role of Artificial Intelligence in enhancing cybersecurity: A comprehensive review of threat detection, response, and prevention techniques." International Journal of Science and Research Archive 13, no. 2 (2024): 310–16. http://dx.doi.org/10.30574/ijsra.2024.13.2.2161.
Full textVamsi Krishna Vemulapalli. "AI-driven cybersecurity: The future of adaptive threat defense." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3248–55. https://doi.org/10.30574/wjarr.2025.26.2.1953.
Full textKelkar, Atharva Abhijit, Palavi Manohar Adhav, Yogesh Madhukar Upare, and Pratiksha Sawant. "A Survey of Ransomware Resilience: Strategies for Prevention and Recovery." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1630–35. https://doi.org/10.22214/ijraset.2025.67557.
Full text