{"title":"网络安全实现的机器学习方法","authors":"H. Idris","doi":"10.1109/ICBATS54253.2022.9759091","DOIUrl":null,"url":null,"abstract":"Cybersecurity has become a necessary component among all aspects of modern life. The internet is becoming increasingly important in everyday life around the world. As people become more reliant on the internet, malicious attacks have become more likely. The increasing in cybersecurity is increasingly vulnerable to the ever-increasing risk of being attacked by many cyber dangers. This paper deals with the design and development of a malicious software removal application using deep learning (DL) approaches along with Artificial intelligence (AI) that will be able to identify and eliminate unwanted malicious software and understanding all of the recent advancements in detecting methods for potential cybersecurity threats.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine Learning Approach for Cybersecurity Implementation\",\"authors\":\"H. Idris\",\"doi\":\"10.1109/ICBATS54253.2022.9759091\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cybersecurity has become a necessary component among all aspects of modern life. The internet is becoming increasingly important in everyday life around the world. As people become more reliant on the internet, malicious attacks have become more likely. The increasing in cybersecurity is increasingly vulnerable to the ever-increasing risk of being attacked by many cyber dangers. This paper deals with the design and development of a malicious software removal application using deep learning (DL) approaches along with Artificial intelligence (AI) that will be able to identify and eliminate unwanted malicious software and understanding all of the recent advancements in detecting methods for potential cybersecurity threats.\",\"PeriodicalId\":289224,\"journal\":{\"name\":\"2022 International Conference on Business Analytics for Technology and Security (ICBATS)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Business Analytics for Technology and Security (ICBATS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICBATS54253.2022.9759091\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBATS54253.2022.9759091","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine Learning Approach for Cybersecurity Implementation
Cybersecurity has become a necessary component among all aspects of modern life. The internet is becoming increasingly important in everyday life around the world. As people become more reliant on the internet, malicious attacks have become more likely. The increasing in cybersecurity is increasingly vulnerable to the ever-increasing risk of being attacked by many cyber dangers. This paper deals with the design and development of a malicious software removal application using deep learning (DL) approaches along with Artificial intelligence (AI) that will be able to identify and eliminate unwanted malicious software and understanding all of the recent advancements in detecting methods for potential cybersecurity threats.