Cyber Threat Detection and Analysis Using Dual-Layered Approach
Uložené v:
| Vydané v: | The Journal of computer information systems s. 1 - 18 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
17.09.2025
|
| ISSN: | 0887-4417, 2380-2057 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Author | Gudnavar, Anand Naregal, Keerti Madagouda, Basavaraj K. |
|---|---|
| Author_xml | – sequence: 1 givenname: Anand surname: Gudnavar fullname: Gudnavar, Anand – sequence: 2 givenname: Keerti surname: Naregal fullname: Naregal, Keerti – sequence: 3 givenname: Basavaraj K. surname: Madagouda fullname: Madagouda, Basavaraj K. |
| BookMark | eNo10M1Og0AUBeCJqYm0-ggmvAB4Z-5cGFamof4lJG7aNRngYjEIZAYXvL0S6-oszslZfFuxGcaBhbiXEEsw8ADGpFrLNFagKFZEKCm5EoFCA5ECSjciWDfROroRW-8_AaQh0IF4zJeKXXg8O7ZzeOCZ67kbh9AOTbgfbL_4zocn3w0f4eHb9lFhF3b8202TG219vhXXre09311yJ07PT8f8NSreX97yfRHVCnCOWp0QZQYtKwUMWqORxiYNZo2USiFmQCzTFiRqYypUNXFGGmtLqUyxwp2gv9_ajd47bsvJdV_WLaWEclUo_xXKVaG8KOAP4xNPAQ |
| Cites_doi | 10.1016/j.iotcps.2023.09.003 10.22541/au.172719839.91919526/v1 10.33545/27075923.2020.v1.i2a.16 10.54254/2755-2721/86/20241604 10.3390/s23062974 10.3390/s23031561 10.9734/ajrcos/2024/v17i6472 10.1109/ACCESS.2023.3246660 10.1109/ICIPTM59628.2024.10563348 10.1109/TIFS.2023.3245413 10.1109/IDCIoT56793.2023.10053487 10.22247/ijcna/2023/221891 10.1080/1206212X.2020.1711617 10.3390/iot4030016 10.1016/j.ins.2023.01.067 10.1186/s13635-023-00139-y 10.3390/sym15061205 10.22541/au.172901014.44599790/v1 10.53022/oarjst.2024.11.1.0060 10.36227/techrxiv.172599578.85351154/v1 10.1109/ICICT57646.2023.10134374 10.22214/ijraset.2024.58946 10.1016/j.procs.2023.01.080 10.22232/stj.2022.10.01.07 10.1007/978-3-031-28581-3_7 10.1007/s00500-023-08541-x 10.1016/j.iot.2022.100656 10.1186/s42400-023-00178-5 10.54254/2755-2721/69/20241511 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.1080/08874417.2025.2553156 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2380-2057 |
| EndPage | 18 |
| ExternalDocumentID | 10_1080_08874417_2025_2553156 |
| GroupedDBID | -~X .DC 0BK 0R~ 29K 30N 5GY 7WY 8FL 8R4 8R5 8VB 96U AAGDL AAHIA AAJMT AALDU AAMIU AAPUL AAQRR AAYXX ABCCY ABFIM ABJNI ABLIJ ABPAQ ABXUL ABXYU ACGFO ACGFS ACGOD ACKOT ACTIO ADCVX ADFRT ADGTB ADMLS AEISY AENEX AEYOC AFRVT AGDLA AHDZW AIJEM AIYEW AKBVH AKOOK ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH AWYRJ BLEHA CCCUG CITATION D-I DGEBU EBS H13 H~9 K1G K60 K6~ KYCEM LJTGL M4Z O9- Q2X QWB RNANH ROSJB RTWRZ RWL RXW TAE TASJS TBQAZ TDBHL TEN TFL TFT TFW TTHFI TUROJ TWZ U5U UHB UNMZH WH7 ZGOLN ZL0 |
| ID | FETCH-LOGICAL-c203t-f4655983ae220e0443818a6d39d112233905e17f013488b32c5e9543ca57173b3 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001573135900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0887-4417 |
| IngestDate | Sat Nov 29 07:29:51 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c203t-f4655983ae220e0443818a6d39d112233905e17f013488b32c5e9543ca57173b3 |
| PageCount | 18 |
| ParticipantIDs | crossref_primary_10_1080_08874417_2025_2553156 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-09-17 |
| PublicationDateYYYYMMDD | 2025-09-17 |
| PublicationDate_xml | – month: 09 year: 2025 text: 2025-09-17 day: 17 |
| PublicationDecade | 2020 |
| PublicationTitle | The Journal of computer information systems |
| PublicationYear | 2025 |
| References | e_1_3_4_4_1 e_1_3_4_3_1 e_1_3_4_2_1 e_1_3_4_8_1 e_1_3_4_7_1 e_1_3_4_20_1 e_1_3_4_6_1 e_1_3_4_5_1 e_1_3_4_23_1 e_1_3_4_24_1 e_1_3_4_21_1 e_1_3_4_22_1 Thapa P (e_1_3_4_10_1) 2024; 9 e_1_3_4_27_1 e_1_3_4_28_1 Yaseen A (e_1_3_4_31_1) 2023; 6 e_1_3_4_25_1 e_1_3_4_26_1 e_1_3_4_29_1 Chirra DR (e_1_3_4_9_1) 2023; 14 Arjunan T (e_1_3_4_16_1) 2024; 12 Singh JP (e_1_3_4_11_1) 2023; 7 e_1_3_4_30_1 e_1_3_4_12_1 e_1_3_4_35_1 e_1_3_4_13_1 e_1_3_4_34_1 e_1_3_4_33_1 e_1_3_4_32_1 e_1_3_4_17_1 e_1_3_4_14_1 e_1_3_4_37_1 e_1_3_4_15_1 e_1_3_4_36_1 e_1_3_4_18_1 e_1_3_4_19_1 |
| References_xml | – ident: e_1_3_4_3_1 doi: 10.1016/j.iotcps.2023.09.003 – ident: e_1_3_4_12_1 doi: 10.22541/au.172719839.91919526/v1 – ident: e_1_3_4_17_1 doi: 10.33545/27075923.2020.v1.i2a.16 – ident: e_1_3_4_33_1 doi: 10.54254/2755-2721/86/20241604 – ident: e_1_3_4_28_1 doi: 10.3390/s23062974 – ident: e_1_3_4_19_1 doi: 10.3390/s23031561 – ident: e_1_3_4_6_1 doi: 10.9734/ajrcos/2024/v17i6472 – ident: e_1_3_4_8_1 doi: 10.1109/ACCESS.2023.3246660 – volume: 6 start-page: 16 issue: 8 year: 2023 ident: e_1_3_4_31_1 article-title: The role of machine learning in network anomaly detection for cybersecurity publication-title: Sage Sci Rev Appl Mach Learn – ident: e_1_3_4_34_1 doi: 10.1109/ICIPTM59628.2024.10563348 – ident: e_1_3_4_35_1 doi: 10.1109/TIFS.2023.3245413 – volume: 7 start-page: 40 issue: 1 year: 2023 ident: e_1_3_4_11_1 article-title: Enhancing database security: a machine learning approach to anomaly detection in NoSQL systems publication-title: Int J Inf cybersec – ident: e_1_3_4_13_1 doi: 10.1109/IDCIoT56793.2023.10053487 – ident: e_1_3_4_23_1 doi: 10.22247/ijcna/2023/221891 – ident: e_1_3_4_26_1 doi: 10.1080/1206212X.2020.1711617 – ident: e_1_3_4_27_1 doi: 10.3390/iot4030016 – ident: e_1_3_4_30_1 doi: 10.1016/j.ins.2023.01.067 – ident: e_1_3_4_36_1 doi: 10.1186/s13635-023-00139-y – ident: e_1_3_4_25_1 doi: 10.3390/sym15061205 – ident: e_1_3_4_4_1 doi: 10.22541/au.172901014.44599790/v1 – ident: e_1_3_4_32_1 doi: 10.53022/oarjst.2024.11.1.0060 – volume: 14 start-page: 529 issue: 1 year: 2023 ident: e_1_3_4_9_1 article-title: Deep learning techniques for anomaly detection in IoT devices: enhancing security and privacy publication-title: Rev Intelig Artif Med – ident: e_1_3_4_21_1 doi: 10.36227/techrxiv.172599578.85351154/v1 – ident: e_1_3_4_18_1 doi: 10.1109/ICICT57646.2023.10134374 – ident: e_1_3_4_29_1 – ident: e_1_3_4_14_1 doi: 10.22214/ijraset.2024.58946 – ident: e_1_3_4_2_1 doi: 10.1016/j.procs.2023.01.080 – ident: e_1_3_4_37_1 doi: 10.22232/stj.2022.10.01.07 – volume: 12 start-page: 844 issue: 3 year: 2024 ident: e_1_3_4_16_1 article-title: Real-time detection of network traffic anomalies in big data environments using deep learning models publication-title: Int J Res Appl Sci Eng Technol doi: 10.22214/ijraset.2024.58946 – ident: e_1_3_4_22_1 doi: 10.1007/978-3-031-28581-3_7 – volume: 9 start-page: 25 issue: 1 year: 2024 ident: e_1_3_4_10_1 article-title: AI-enhanced cybersecurity: machine learning for anomaly detection in cloud computing publication-title: Q J Emerg Technol Innov – ident: e_1_3_4_7_1 – ident: e_1_3_4_24_1 doi: 10.1007/s00500-023-08541-x – ident: e_1_3_4_5_1 doi: 10.1016/j.iot.2022.100656 – ident: e_1_3_4_20_1 doi: 10.1186/s42400-023-00178-5 – ident: e_1_3_4_15_1 doi: 10.54254/2755-2721/69/20241511 |
| SSID | ssj0018504 |
| Score | 2.39789 |
| SecondaryResourceType | online_first |
| SourceID | crossref |
| SourceType | Index Database |
| StartPage | 1 |
| Title | Cyber Threat Detection and Analysis Using Dual-Layered Approach |
| WOSCitedRecordID | wos001573135900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAWR databaseName: Taylor & Francis Online Journals customDbUrl: eissn: 2380-2057 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0018504 issn: 0887-4417 databaseCode: TFW dateStart: 19850901 isFulltext: true titleUrlDefault: https://www.tandfonline.com providerName: Taylor & Francis |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9wwEBbbtIdekjRtyatFh94WL7ZlraVTCHkQaAg9bJvclrElpw2LE_bF5t9nRpK9pg2lOfRijEBjW98wmpFnvmHsS15BZdBRjgzGChH55JEeqjIqSiNTWQyrzB1d_LjMr67UzY3-1uutmlqY5SSva7Va6Yf_CjWOIdhUOvsCuFuhOID3CDpeEXa8_hPwJ4-FnfZHP13sf2rnNjQDr82agcQnCpwuYBJdwiO16yR31BVXdb3Vdd3YpEk_pw4Q_cC26uTOOpTnlMezMDUsfdb2ce3bg_jTZpjaWwi1QJTMvT4LN3B7vzC-BzTMaDbc9b8OugcSqaTsCV9_2bFb1NnMbzFuDB2DGFHyXNTBViadTdfb4D_Mech_VMTRn-QDetoAYyCRyGfos3_b1tpkw6RhQQ1ixiRmHMS8Yq_TXGoy6aPz6_b_k5Ku8WT7KU3tF7GyP_c2Ha-m456MttlmQIkfe314x3q23mFbTc8OHkz4e3bk1IN79eCtenBEijfqwZ168K568EY9PrDv52ejk4soNNGIyjQW86gigjytBNg0jW2cEaWbgqER2qCrnQqhY2mTvMJQAG15IdJSWi0zUYKkBI1CfGQb9X1tdxnHOQoyXQjyonWpITOA8bqolKkKA7DHBs0ijB88V8r4r4u__9IJB-ztWuMO2cZ8urCf2JtyOf81m352ED4Bf7Jbbg |
| linkProvider | Taylor & Francis |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Threat+Detection+and+Analysis+Using+Dual-Layered+Approach&rft.jtitle=The+Journal+of+computer+information+systems&rft.au=Gudnavar%2C+Anand&rft.au=Naregal%2C+Keerti&rft.au=Madagouda%2C+Basavaraj+K.&rft.date=2025-09-17&rft.issn=0887-4417&rft.eissn=2380-2057&rft.spage=1&rft.epage=18&rft_id=info:doi/10.1080%2F08874417.2025.2553156&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_08874417_2025_2553156 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0887-4417&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0887-4417&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0887-4417&client=summon |