IoT Network Cybersecurity Risk Mitigation with Vulnerability Mapping
Keywords:
Predictive Vulnerability Mapping, IoT Networks, Cybersecurity, AI in CybersecurityAbstract
Healthcare industry is increasingly depending on Internet of Things (IoT) which is a fast-growing network of connected devices. But IoT devices generally have weak security and may be used by attackers posing as a cybersecurity hazards. A solution is needed to predict and mitigate these types of activities on IOT network.
Downloads
References
Anderson, J., & Lee, T. (2023). Proactive cybersecurity measures for IoT networks: AI and vulnerability mapping. Journal of Cybersecurity Innovation, 12(1), 45-59.
Benassi, S., & Roberts, A. (2021). Predicting IoT vulnerabilities with machine learning. IEEE Transactions on IoT Security, 14(3), 101-115.
Chang, L., & Harris, R. (2022). Vulnerability mapping for IoT security: AI-driven solutions. Cybersecurity Review, 9(2), 87-103.
Chen, G., & Zhang, Y. (2023). Artificial intelligence for predictive cybersecurity in IoT networks. International Journal of Cloud Computing and Security, 10(4), 210-224.
S. Kumari, “AI-Driven Cloud Transformation for Product Management: Optimizing Resource Allocation, Cost Management, and Market Adaptation in Digital Products ”, IoT and Edge Comp. J, vol. 2, no. 1, pp. 29–54, Jun. 2022
Pillai, Vinayak. “Implementing Efficient Data Operations: An Innovative Approach”. Asian Journal of Multidisciplinary Research & Review, vol. 3, no. 6, Dec. 2022, pp. 231-67, https://ajmrr.org/journal/article/view/241.
S. Kumari, “Agile Cloud Transformation in Enterprise Systems: Integrating AI for Continuous Improvement, Risk Management, and Scalability”, Australian Journal of Machine Learning Research & Applications, vol. 2, no. 1, pp. 416–440, Mar. 2022
Zhu, Yue, and Johnathan Crowell. "Systematic Review of Advancing Machine Learning Through Cross-Domain Analysis of Unlabeled Data." Journal of Science & Technology 4.1 (2023): 136-155.
Sangaraju, Varun Varma, and Senthilkumar Rajagopal. "Applications of Computational Models in OCD." In Nutrition and Obsessive-Compulsive Disorder, pp. 26-35. CRC Press.
Sivaraman, Hariprasad. "Self-Healing Test Automation Frameworks Using Reinforcement Learning for Full-Stack Test Automation." Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-E210. DOI: doi. org/10.47363/JAICC/2022 (1) E210 J Arti Inte & Cloud Comp 1.4 (2022): 2-4.
Singu, Santosh Kumar. "Impact of Data Warehousing on Business Intelligence and Analytics." ESP Journal of Engineering & Technology Advancements 2.2 (2022): 101-113.
S. Kumari, “AI-Enhanced Agile Development for Digital Product Management: Leveraging Data-Driven Insights for Iterative Improvement and Market Adaptation”, Adv. in Deep Learning Techniques, vol. 2, no. 1, pp. 49–68, Mar. 2022
S. Kumari, “AI-Driven Cybersecurity in Agile Cloud Transformation: Leveraging Machine Learning to Automate Threat Detection, Vulnerability Management, and Incident Response”, J. of Art. Int. Research, vol. 2, no. 1, pp. 286–305, Apr. 2022
Sangaraju, Varun Varma, and Kathleen Hargiss. "Zero trust security and multifactor authentication in fog computing environment." Available at SSRN 4472055.
Sivaraman, Hariprasad. (2022). Adaptive Thresholding in ML-Driven Alerting Systems for Reducing False Positives in Production Environments. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. 6. 10.55041/IJSREM11938.
Pillai, V. “Data Analytics and Engineering in Automobile Data Systems”. Journal of Science & Technology, vol. 4, no. 6, Dec. 2023, pp. 140-79, https://thesciencebrigade.com/jst/article/view/520
S. Kumari, “Cybersecurity in Digital Transformation: Using AI to Automate Threat Detection and Response in Multi-Cloud Infrastructures ”, J. Computational Intel. & Robotics, vol. 2, no. 2, pp. 9–27, Aug. 2022
Sivaraman, Hariprasad. "Behavior-Based DDoS Detection for Multi-Vector Attacks in Hybrid Cloud Environments." Sivaraman H. Behavior-Based DDoS Detection for Multi-Vector Attacks in Hybrid Cloud Environments.
Kumar, V., & Srinivas, N. (2021). Federated learning for AI in cybersecurity. Journal of Machine Learning in Cybersecurity, 5(2), 121-136.
Williams, J., & Patel, D. (2024). The future of IoT security: Blockchain, edge computing, and AI. IEEE Transactions on Secure Systems, 32(1), 52-66.