13Artificial Intelligence for Threat Anomaly Detection Using Graph Databases – A Semantic Outlook
Edwiges G.H. Grata1, Anand Deshpande2, Ricardo T. Lopes3, Asif A. Laghari4, Abdullah A. Khan5, R. Jenice Aroma6, Kumudha Raimond7, Shoulin Yin8, and Awais Khan Jumani9
1Department of Telecommunications, Federal Fluminense University (UFF), Niterói, RJ, Brazil
2Electronics and Communication Engineering, Angadi Institute of Technology and Management, Belagavi, India
3Federal University of Rio de Janeiro (COPPE/UFRJ), Nuclear Engineering Laboratory (LIN), Rio de Janeiro, RJ, Brazil
4Sindh Madresstul Islam University, Karachi, Sindh, Pakistan
5Research Lab of Artificial Intelligence and Information Security, Faculty of Computing, Science and Information Technology, Benazir Bhutto Shaheed University, Karachi, Sindh, Pakistan
6Department of CSE, Karunya Institute of Technology and Sciences, Karunya University, Coimbatore, India
7Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India
8Shenyang Normal University, Shenyang, Liaoning Province, China
9Department of Computer Science, Sindh Madressa‐tul‐Islam University, Karachi, Sindh, Pakistan
13.1 Introduction
A comprehensive cybersecurity (CS) framework must help implement “cyber‐physical systems” (CPSs) effectively while managing potential security risks to accommodate the Internet of Things (IoT) hardware (HW) diversity [1–3]. Both factors are becoming increasingly crucial in infrastructure, ...
Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.