Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Augmenting Cyber Defense Counter To Zero-Day Attacks Through Predictive Analysis- A Fusion Methodology Assimilating Game Theory and RESNet Inspired Optimization Techniques
by
Akshaya, Swathy
, Ganapathi, Padmavathi
in
Accuracy
/ Algorithms
/ Artificial neural networks
/ Back propagation
/ Back propagation networks
/ Deep learning
/ Defense
/ Exploitation
/ Feature selection
/ Game theory
/ Intrusion detection systems
/ Machine learning
/ Malware
/ Methodology
/ Neural networks
/ Optimization
/ Optimization techniques
/ Prediction models
/ Programmers
/ Propagation
/ Software
/ Supervised learning
/ Threat evaluation
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Augmenting Cyber Defense Counter To Zero-Day Attacks Through Predictive Analysis- A Fusion Methodology Assimilating Game Theory and RESNet Inspired Optimization Techniques
by
Akshaya, Swathy
, Ganapathi, Padmavathi
in
Accuracy
/ Algorithms
/ Artificial neural networks
/ Back propagation
/ Back propagation networks
/ Deep learning
/ Defense
/ Exploitation
/ Feature selection
/ Game theory
/ Intrusion detection systems
/ Machine learning
/ Malware
/ Methodology
/ Neural networks
/ Optimization
/ Optimization techniques
/ Prediction models
/ Programmers
/ Propagation
/ Software
/ Supervised learning
/ Threat evaluation
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Augmenting Cyber Defense Counter To Zero-Day Attacks Through Predictive Analysis- A Fusion Methodology Assimilating Game Theory and RESNet Inspired Optimization Techniques
by
Akshaya, Swathy
, Ganapathi, Padmavathi
in
Accuracy
/ Algorithms
/ Artificial neural networks
/ Back propagation
/ Back propagation networks
/ Deep learning
/ Defense
/ Exploitation
/ Feature selection
/ Game theory
/ Intrusion detection systems
/ Machine learning
/ Malware
/ Methodology
/ Neural networks
/ Optimization
/ Optimization techniques
/ Prediction models
/ Programmers
/ Propagation
/ Software
/ Supervised learning
/ Threat evaluation
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Augmenting Cyber Defense Counter To Zero-Day Attacks Through Predictive Analysis- A Fusion Methodology Assimilating Game Theory and RESNet Inspired Optimization Techniques
Journal Article
Augmenting Cyber Defense Counter To Zero-Day Attacks Through Predictive Analysis- A Fusion Methodology Assimilating Game Theory and RESNet Inspired Optimization Techniques
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Zero-day attacks pose a significant threat to software vendors, as they exploit previously unknown vulnerabilities, making them insidious and challenging to defend against. Predictive analysis offers a proactive approach to zero-day attack detection, enabling organizations to anticipate and mitigate threats before they manifest. By leveraging advanced techniques such as machine learning and game theory, predictive models can identify emerging attack patterns and adapt in real time to evolving threats. This paper proposes a zero-day attack optimization technique using supervised learning algorithms to identify system disruptions effectively. This paper presents innovative approaches to zero-day attack identification using advanced techniques such as Probabilistic Graph-based Back Propagation Neural Networks, Modified Bi-LSTM with Game Theory, ANN Auto Encoder, Convolutional Neural Network (CNN) with Long Short-Term Memory (LSTM) and Residual Network (RESNET50). Multiple machine learning approaches were used to determine the most suited model for predicting zero-day assaults. A deep-convolutional n-zero-day network is introduced to distinguish zero-day malware from legitimate software, employing feature selection techniques and a diverse range of machine learning algorithms. This paper presents a novel methodology integrating Hybrid Game Theory (HGT) with Transfer Learning (TL), incorporating feature selection strategies and building upon earlier research. This paper contributes to the field by offering a comprehensive methodology for zero-day attack prediction and highlights areas for further research to address existing limitations and optimize outcomes in network security. Results demonstrate the efficacy of the proposed approach, achieving high detection rates and accuracy in identifying disruptions to network systems.
This website uses cookies to ensure you get the best experience on our website.