Reference Hub1
Data-Driven Mathematical Modeling for AI-Based Security Applications

Data-Driven Mathematical Modeling for AI-Based Security Applications

Sini Anna Alex, Parkavi A., Sangeetha V.
ISBN13: 9781668464083|ISBN10: 166846408X|ISBN13 Softcover: 9781668464090|EISBN13: 9781668464106
DOI: 10.4018/978-1-6684-6408-3.ch010
Cite Chapter Cite Chapter

MLA

Alex, Sini Anna, et al. "Data-Driven Mathematical Modeling for AI-Based Security Applications." Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities, edited by Sabyasachi Pramanik and K. Martin Sagayam, IGI Global, 2023, pp. 175-191. https://doi.org/10.4018/978-1-6684-6408-3.ch010

APA

Alex, S. A., A., P., & V., S. (2023). Data-Driven Mathematical Modeling for AI-Based Security Applications. In S. Pramanik & K. Sagayam (Eds.), Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities (pp. 175-191). IGI Global. https://doi.org/10.4018/978-1-6684-6408-3.ch010

Chicago

Alex, Sini Anna, Parkavi A., and Sangeetha V. "Data-Driven Mathematical Modeling for AI-Based Security Applications." In Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities, edited by Sabyasachi Pramanik and K. Martin Sagayam, 175-191. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6408-3.ch010

Export Reference

Mendeley
Favorite

Abstract

Artificial intelligence (A.I.) is defined as the ability of a machine to perform cognitive functions that we associate with human minds, such as perceiving, reasoning, learning, interacting with the environment, problem solving, decision-making, and even demonstrating creativity. This field of artificial intelligence finds itself indispensable across various domains like shopping, fraud prevention, personalized learning, autonomous vehicles, voice assistants, etc. It is widely used in the field of cyber security. There are numerous AI based security models to delay security threats. Such algorithms could be classified under three heads – rule-based, shallow machine learning and deep learning algorithms. Fuzzy logic and fuzzy neural networks fall under rule-based algorithm. support vector machine (SVM), naïve bayes, decision tree, random forest, k-nearest neighbour and ensemble learning are some shallow ML algorithms that could be employed for cyber security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.