Items where Subject is "Cyber Security"

Group by: Creators | Item Type
Jump to: G | K | M | N
Number of items at this level: 5.

G

Giriprasath, K S (2024) Adversarial Attacks and Defenses Using Machine Learning for Cybersecurity in Corporates. 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). pp. 1-6.

K

Kala, I (2026) TALL-Detect: A Transformer and LLM-Augmented Framework for Tamper-Evident and Explainable Secure Log Analysis. Journal Européen des Systèmes Automatisés, 59 (2). ISSN 12696935

M

Maha Vishnu, V C (2024) Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems. International Journal of System Assurance Engineering and Management, 15 (12). pp. 5454-5468. ISSN 0975-6809

Manimegalai, R (2025) Real-Time Anomaly Detection Using Snort and Machine Learning: A Data Analytics Approach for Network Security. 2025 Second International Conference on Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM). pp. 1-7.

N

Nidhya, R and Monishkka, C and Sukirda, K G (2025) Cybersecurity Risks in Human-in-the-Loop (HITL) System: Emerging Technologies and Integration. In: Bridging Human-Machine Interaction for Energy Infrastructure. IGI Global Scientific Publishing, pp. 387-418. ISBN 9798337356235

This list was generated on Tue May 5 14:03:05 2026 IST.