Matches in SemOpenAlex for { <https://semopenalex.org/work/W4366452655> ?p ?o ?g. }
- W4366452655 endingPage "105" @default.
- W4366452655 startingPage "90" @default.
- W4366452655 abstract "Purpose: Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do malicious actions on digital systems or networks in order to make a profit. These crimes include hacking computer systems and stealing confidential information from businesses and individuals. A thorough study on the algorithms to detect threats in the virtual world of corporate sectors. Finding/Result: Researchers are using a wide array of deep learning algorithms to achieve this goal, and the results have been rather impressive. A system like this may provide substandard results because to its limited ability to describe the problem area and the complexity of its modeling of hazardous behaviours. Supervised learning systems often deliver a high level of accuracy because of the large amount of data made available by manually labelled samples. Originality/Value: Antivirus software is an absolute need for any and all computers. The vast majority of antivirus software is able to identify malicious software such as malware, spyware, ransomware, and harmful email attachments. Paper Type: Literature Review." @default.
- W4366452655 created "2023-04-22" @default.
- W4366452655 creator A5027635504 @default.
- W4366452655 creator A5084510223 @default.
- W4366452655 date "2023-04-12" @default.
- W4366452655 modified "2023-10-17" @default.
- W4366452655 title "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors" @default.
- W4366452655 cites W133869968 @default.
- W4366452655 cites W1811853421 @default.
- W4366452655 cites W1975633692 @default.
- W4366452655 cites W1979559890 @default.
- W4366452655 cites W1979612096 @default.
- W4366452655 cites W1999245225 @default.
- W4366452655 cites W2000387275 @default.
- W4366452655 cites W2001152389 @default.
- W4366452655 cites W2012649175 @default.
- W4366452655 cites W2040644879 @default.
- W4366452655 cites W2057691519 @default.
- W4366452655 cites W2060898162 @default.
- W4366452655 cites W2066499239 @default.
- W4366452655 cites W2076698718 @default.
- W4366452655 cites W2081290035 @default.
- W4366452655 cites W2093977023 @default.
- W4366452655 cites W2095345875 @default.
- W4366452655 cites W2119633057 @default.
- W4366452655 cites W2125083487 @default.
- W4366452655 cites W2140936627 @default.
- W4366452655 cites W2147118406 @default.
- W4366452655 cites W2169384781 @default.
- W4366452655 cites W2549550143 @default.
- W4366452655 cites W2552664657 @default.
- W4366452655 cites W2605307741 @default.
- W4366452655 cites W2743775608 @default.
- W4366452655 cites W2779627157 @default.
- W4366452655 cites W2782171552 @default.
- W4366452655 cites W2782735691 @default.
- W4366452655 cites W2783741806 @default.
- W4366452655 cites W2786171514 @default.
- W4366452655 cites W2793448306 @default.
- W4366452655 cites W2804048727 @default.
- W4366452655 cites W2883506667 @default.
- W4366452655 cites W2884861143 @default.
- W4366452655 cites W2886705555 @default.
- W4366452655 cites W2892859754 @default.
- W4366452655 cites W2899948414 @default.
- W4366452655 cites W2902466218 @default.
- W4366452655 cites W2913796112 @default.
- W4366452655 cites W2931458697 @default.
- W4366452655 cites W2933955319 @default.
- W4366452655 cites W2944404766 @default.
- W4366452655 cites W2946115984 @default.
- W4366452655 cites W2948113838 @default.
- W4366452655 cites W2948143530 @default.
- W4366452655 cites W2962787757 @default.
- W4366452655 cites W2964150038 @default.
- W4366452655 cites W2968774960 @default.
- W4366452655 cites W2969262880 @default.
- W4366452655 cites W2969579839 @default.
- W4366452655 cites W2970293835 @default.
- W4366452655 cites W2974295432 @default.
- W4366452655 cites W2980215516 @default.
- W4366452655 cites W2980759501 @default.
- W4366452655 cites W2989945650 @default.
- W4366452655 cites W2990740199 @default.
- W4366452655 cites W2997608262 @default.
- W4366452655 cites W2999472659 @default.
- W4366452655 cites W3000568417 @default.
- W4366452655 cites W3001151456 @default.
- W4366452655 cites W3002711162 @default.
- W4366452655 cites W3005805195 @default.
- W4366452655 cites W3017646290 @default.
- W4366452655 cites W3017752721 @default.
- W4366452655 cites W3022218140 @default.
- W4366452655 cites W3041532907 @default.
- W4366452655 cites W3088516633 @default.
- W4366452655 cites W3105148627 @default.
- W4366452655 cites W3108630703 @default.
- W4366452655 cites W3122553435 @default.
- W4366452655 cites W3134333045 @default.
- W4366452655 cites W3134408627 @default.
- W4366452655 cites W3157294495 @default.
- W4366452655 cites W3163963286 @default.
- W4366452655 cites W3200780444 @default.
- W4366452655 cites W3200845768 @default.
- W4366452655 cites W4205752277 @default.
- W4366452655 cites W4224263973 @default.
- W4366452655 doi "https://doi.org/10.47992/ijcsbe.2581.6942.0261" @default.
- W4366452655 hasPublicationYear "2023" @default.
- W4366452655 type Work @default.
- W4366452655 citedByCount "0" @default.
- W4366452655 crossrefType "journal-article" @default.
- W4366452655 hasAuthorship W4366452655A5027635504 @default.
- W4366452655 hasAuthorship W4366452655A5084510223 @default.
- W4366452655 hasBestOaLocation W43664526551 @default.
- W4366452655 hasConcept C108759981 @default.
- W4366452655 hasConcept C11012388 @default.
- W4366452655 hasConcept C111919701 @default.
- W4366452655 hasConcept C136764020 @default.