dc.contributor.author | Olobo, Neibo Augustine | de |
dc.contributor.author | Ayuba, Waliu Adebayo | de |
dc.contributor.author | Obi-Obuoha, Abiamamela | de |
dc.contributor.author | Iyobosa, Izevbigie Hope | de |
dc.contributor.author | Adebayo, Aderemi Ibraheem | de |
dc.contributor.author | Jude, Ishiwu Ifeanyichukwu | de |
dc.contributor.author | Ifechukwu, Chioma Jessica | de |
dc.date.accessioned | 2025-01-16T10:51:46Z | |
dc.date.available | 2025-01-16T10:51:46Z | |
dc.date.issued | 2024 | de |
dc.identifier.issn | 2413-9009 | de |
dc.identifier.uri | https://www.ssoar.info/ssoar/handle/document/99058 | |
dc.description.abstract | Machine learning (ML) is revolutionising cybersecurity by enhancing the ability to predict, detect, and respond to cyber threats. By leveraging advanced algorithms, ML systems can analyse vast datasets in real-time, identify patterns, and automate responses, addressing the challenges of increasingly sophisticated cyberattacks. This paper explores the transformative impact of machine learning in cybersecurity, highlighting key tasks such as classification, anomaly detection, and natural language processing. It also discusses future research directions, including explainable AI, adversarial machine learning, federated learning, and privacy-preserving techniques. The cybersecurity community can develop more robust and adaptive defences by focusing on these innovative areas, ensuring a safer digital environment. Integrating machine learning into cybersecurity practices is crucial for navigating the evolving threat landscape and maintaining trust in digital systems. | de |
dc.language | en | de |
dc.subject.ddc | Soziologie, Anthropologie | de |
dc.subject.ddc | Sociology & anthropology | en |
dc.subject.other | Intelligent Incident Response; Machine Learning; Threat Detection; Automated Response; Predictive Analytics | de |
dc.title | Intelligent Incident Response Systems Using Machine Learning | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.identifier.url | https://pathofscience.org/index.php/ps/article/view/3418/1627 | de |
dc.source.journal | Path of Science | |
dc.source.volume | 10 | de |
dc.publisher.country | MISC | de |
dc.source.issue | 12 | de |
dc.subject.classoz | Wissenschaftssoziologie, Wissenschaftsforschung, Technikforschung, Techniksoziologie | de |
dc.subject.classoz | Sociology of Science, Sociology of Technology, Research on Science and Technology | en |
dc.subject.thesoz | computerunterstütztes Lernen | de |
dc.subject.thesoz | computer aided learning | en |
dc.subject.thesoz | Bildung | de |
dc.subject.thesoz | education | en |
dc.subject.thesoz | Bedrohung | de |
dc.subject.thesoz | threat | en |
dc.subject.thesoz | Datenschutz | de |
dc.subject.thesoz | data protection | en |
dc.subject.thesoz | Automatisierung | de |
dc.subject.thesoz | automation | en |
dc.rights.licence | Creative Commons - Namensnennung 4.0 | de |
dc.rights.licence | Creative Commons - Attribution 4.0 | en |
internal.status | formal und inhaltlich fertig erschlossen | de |
internal.identifier.thesoz | 10040398 | |
internal.identifier.thesoz | 10035091 | |
internal.identifier.thesoz | 10037879 | |
internal.identifier.thesoz | 10040560 | |
internal.identifier.thesoz | 10037519 | |
dc.type.stock | article | de |
dc.type.document | Zeitschriftenartikel | de |
dc.type.document | journal article | en |
dc.source.pageinfo | 5019-5032 | de |
internal.identifier.classoz | 10220 | |
internal.identifier.journal | 1570 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 301 | |
dc.identifier.doi | https://doi.org/10.22178/pos.112-13 | de |
dc.description.pubstatus | Veröffentlichungsversion | de |
dc.description.pubstatus | Published Version | en |
internal.identifier.licence | 16 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
internal.dda.reference | https://pathofscience.org/index.php/index/oai/@@oai:ojs.pathofscience.org:article/3418 | |
ssoar.urn.registration | false | de |