Cyber Threat Detection and Analysis Using Dual-Layered Approach

Uložené v:
Podrobná bibliografia
Vydané v:The Journal of computer information systems s. 1 - 18
Hlavní autori: Gudnavar, Anand, Naregal, Keerti, Madagouda, Basavaraj K.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: 17.09.2025
ISSN:0887-4417, 2380-2057
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Author Gudnavar, Anand
Naregal, Keerti
Madagouda, Basavaraj K.
Author_xml – sequence: 1
  givenname: Anand
  surname: Gudnavar
  fullname: Gudnavar, Anand
– sequence: 2
  givenname: Keerti
  surname: Naregal
  fullname: Naregal, Keerti
– sequence: 3
  givenname: Basavaraj K.
  surname: Madagouda
  fullname: Madagouda, Basavaraj K.
BookMark eNo10M1Og0AUBeCJqYm0-ggmvAB4Z-5cGFamof4lJG7aNRngYjEIZAYXvL0S6-oszslZfFuxGcaBhbiXEEsw8ADGpFrLNFagKFZEKCm5EoFCA5ECSjciWDfROroRW-8_AaQh0IF4zJeKXXg8O7ZzeOCZ67kbh9AOTbgfbL_4zocn3w0f4eHb9lFhF3b8202TG219vhXXre09311yJ07PT8f8NSreX97yfRHVCnCOWp0QZQYtKwUMWqORxiYNZo2USiFmQCzTFiRqYypUNXFGGmtLqUyxwp2gv9_ajd47bsvJdV_WLaWEclUo_xXKVaG8KOAP4xNPAQ
Cites_doi 10.1016/j.iotcps.2023.09.003
10.22541/au.172719839.91919526/v1
10.33545/27075923.2020.v1.i2a.16
10.54254/2755-2721/86/20241604
10.3390/s23062974
10.3390/s23031561
10.9734/ajrcos/2024/v17i6472
10.1109/ACCESS.2023.3246660
10.1109/ICIPTM59628.2024.10563348
10.1109/TIFS.2023.3245413
10.1109/IDCIoT56793.2023.10053487
10.22247/ijcna/2023/221891
10.1080/1206212X.2020.1711617
10.3390/iot4030016
10.1016/j.ins.2023.01.067
10.1186/s13635-023-00139-y
10.3390/sym15061205
10.22541/au.172901014.44599790/v1
10.53022/oarjst.2024.11.1.0060
10.36227/techrxiv.172599578.85351154/v1
10.1109/ICICT57646.2023.10134374
10.22214/ijraset.2024.58946
10.1016/j.procs.2023.01.080
10.22232/stj.2022.10.01.07
10.1007/978-3-031-28581-3_7
10.1007/s00500-023-08541-x
10.1016/j.iot.2022.100656
10.1186/s42400-023-00178-5
10.54254/2755-2721/69/20241511
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1080/08874417.2025.2553156
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2380-2057
EndPage 18
ExternalDocumentID 10_1080_08874417_2025_2553156
GroupedDBID -~X
.DC
0BK
0R~
29K
30N
5GY
7WY
8FL
8R4
8R5
8VB
96U
AAGDL
AAHIA
AAJMT
AALDU
AAMIU
AAPUL
AAQRR
AAYXX
ABCCY
ABFIM
ABJNI
ABLIJ
ABPAQ
ABXUL
ABXYU
ACGFO
ACGFS
ACGOD
ACKOT
ACTIO
ADCVX
ADFRT
ADGTB
ADMLS
AEISY
AENEX
AEYOC
AFRVT
AGDLA
AHDZW
AIJEM
AIYEW
AKBVH
AKOOK
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQRUH
AWYRJ
BLEHA
CCCUG
CITATION
D-I
DGEBU
EBS
H13
H~9
K1G
K60
K6~
KYCEM
LJTGL
M4Z
O9-
Q2X
QWB
RNANH
ROSJB
RTWRZ
RWL
RXW
TAE
TASJS
TBQAZ
TDBHL
TEN
TFL
TFT
TFW
TTHFI
TUROJ
TWZ
U5U
UHB
UNMZH
WH7
ZGOLN
ZL0
ID FETCH-LOGICAL-c203t-f4655983ae220e0443818a6d39d112233905e17f013488b32c5e9543ca57173b3
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001573135900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0887-4417
IngestDate Sat Nov 29 07:29:51 EST 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c203t-f4655983ae220e0443818a6d39d112233905e17f013488b32c5e9543ca57173b3
PageCount 18
ParticipantIDs crossref_primary_10_1080_08874417_2025_2553156
PublicationCentury 2000
PublicationDate 2025-09-17
PublicationDateYYYYMMDD 2025-09-17
PublicationDate_xml – month: 09
  year: 2025
  text: 2025-09-17
  day: 17
PublicationDecade 2020
PublicationTitle The Journal of computer information systems
PublicationYear 2025
References e_1_3_4_4_1
e_1_3_4_3_1
e_1_3_4_2_1
e_1_3_4_8_1
e_1_3_4_7_1
e_1_3_4_20_1
e_1_3_4_6_1
e_1_3_4_5_1
e_1_3_4_23_1
e_1_3_4_24_1
e_1_3_4_21_1
e_1_3_4_22_1
Thapa P (e_1_3_4_10_1) 2024; 9
e_1_3_4_27_1
e_1_3_4_28_1
Yaseen A (e_1_3_4_31_1) 2023; 6
e_1_3_4_25_1
e_1_3_4_26_1
e_1_3_4_29_1
Chirra DR (e_1_3_4_9_1) 2023; 14
Arjunan T (e_1_3_4_16_1) 2024; 12
Singh JP (e_1_3_4_11_1) 2023; 7
e_1_3_4_30_1
e_1_3_4_12_1
e_1_3_4_35_1
e_1_3_4_13_1
e_1_3_4_34_1
e_1_3_4_33_1
e_1_3_4_32_1
e_1_3_4_17_1
e_1_3_4_14_1
e_1_3_4_37_1
e_1_3_4_15_1
e_1_3_4_36_1
e_1_3_4_18_1
e_1_3_4_19_1
References_xml – ident: e_1_3_4_3_1
  doi: 10.1016/j.iotcps.2023.09.003
– ident: e_1_3_4_12_1
  doi: 10.22541/au.172719839.91919526/v1
– ident: e_1_3_4_17_1
  doi: 10.33545/27075923.2020.v1.i2a.16
– ident: e_1_3_4_33_1
  doi: 10.54254/2755-2721/86/20241604
– ident: e_1_3_4_28_1
  doi: 10.3390/s23062974
– ident: e_1_3_4_19_1
  doi: 10.3390/s23031561
– ident: e_1_3_4_6_1
  doi: 10.9734/ajrcos/2024/v17i6472
– ident: e_1_3_4_8_1
  doi: 10.1109/ACCESS.2023.3246660
– volume: 6
  start-page: 16
  issue: 8
  year: 2023
  ident: e_1_3_4_31_1
  article-title: The role of machine learning in network anomaly detection for cybersecurity
  publication-title: Sage Sci Rev Appl Mach Learn
– ident: e_1_3_4_34_1
  doi: 10.1109/ICIPTM59628.2024.10563348
– ident: e_1_3_4_35_1
  doi: 10.1109/TIFS.2023.3245413
– volume: 7
  start-page: 40
  issue: 1
  year: 2023
  ident: e_1_3_4_11_1
  article-title: Enhancing database security: a machine learning approach to anomaly detection in NoSQL systems
  publication-title: Int J Inf cybersec
– ident: e_1_3_4_13_1
  doi: 10.1109/IDCIoT56793.2023.10053487
– ident: e_1_3_4_23_1
  doi: 10.22247/ijcna/2023/221891
– ident: e_1_3_4_26_1
  doi: 10.1080/1206212X.2020.1711617
– ident: e_1_3_4_27_1
  doi: 10.3390/iot4030016
– ident: e_1_3_4_30_1
  doi: 10.1016/j.ins.2023.01.067
– ident: e_1_3_4_36_1
  doi: 10.1186/s13635-023-00139-y
– ident: e_1_3_4_25_1
  doi: 10.3390/sym15061205
– ident: e_1_3_4_4_1
  doi: 10.22541/au.172901014.44599790/v1
– ident: e_1_3_4_32_1
  doi: 10.53022/oarjst.2024.11.1.0060
– volume: 14
  start-page: 529
  issue: 1
  year: 2023
  ident: e_1_3_4_9_1
  article-title: Deep learning techniques for anomaly detection in IoT devices: enhancing security and privacy
  publication-title: Rev Intelig Artif Med
– ident: e_1_3_4_21_1
  doi: 10.36227/techrxiv.172599578.85351154/v1
– ident: e_1_3_4_18_1
  doi: 10.1109/ICICT57646.2023.10134374
– ident: e_1_3_4_29_1
– ident: e_1_3_4_14_1
  doi: 10.22214/ijraset.2024.58946
– ident: e_1_3_4_2_1
  doi: 10.1016/j.procs.2023.01.080
– ident: e_1_3_4_37_1
  doi: 10.22232/stj.2022.10.01.07
– volume: 12
  start-page: 844
  issue: 3
  year: 2024
  ident: e_1_3_4_16_1
  article-title: Real-time detection of network traffic anomalies in big data environments using deep learning models
  publication-title: Int J Res Appl Sci Eng Technol
  doi: 10.22214/ijraset.2024.58946
– ident: e_1_3_4_22_1
  doi: 10.1007/978-3-031-28581-3_7
– volume: 9
  start-page: 25
  issue: 1
  year: 2024
  ident: e_1_3_4_10_1
  article-title: AI-enhanced cybersecurity: machine learning for anomaly detection in cloud computing
  publication-title: Q J Emerg Technol Innov
– ident: e_1_3_4_7_1
– ident: e_1_3_4_24_1
  doi: 10.1007/s00500-023-08541-x
– ident: e_1_3_4_5_1
  doi: 10.1016/j.iot.2022.100656
– ident: e_1_3_4_20_1
  doi: 10.1186/s42400-023-00178-5
– ident: e_1_3_4_15_1
  doi: 10.54254/2755-2721/69/20241511
SSID ssj0018504
Score 2.39789
SecondaryResourceType online_first
SourceID crossref
SourceType Index Database
StartPage 1
Title Cyber Threat Detection and Analysis Using Dual-Layered Approach
WOSCitedRecordID wos001573135900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAWR
  databaseName: Taylor & Francis Online Journals
  customDbUrl:
  eissn: 2380-2057
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0018504
  issn: 0887-4417
  databaseCode: TFW
  dateStart: 19850901
  isFulltext: true
  titleUrlDefault: https://www.tandfonline.com
  providerName: Taylor & Francis
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9wwEBbbtIdekjRtyatFh94WL7ZlraVTCHkQaAg9bJvclrElpw2LE_bF5t9nRpK9pg2lOfRijEBjW98wmpFnvmHsS15BZdBRjgzGChH55JEeqjIqSiNTWQyrzB1d_LjMr67UzY3-1uutmlqY5SSva7Va6Yf_CjWOIdhUOvsCuFuhOID3CDpeEXa8_hPwJ4-FnfZHP13sf2rnNjQDr82agcQnCpwuYBJdwiO16yR31BVXdb3Vdd3YpEk_pw4Q_cC26uTOOpTnlMezMDUsfdb2ce3bg_jTZpjaWwi1QJTMvT4LN3B7vzC-BzTMaDbc9b8OugcSqaTsCV9_2bFb1NnMbzFuDB2DGFHyXNTBViadTdfb4D_Mech_VMTRn-QDetoAYyCRyGfos3_b1tpkw6RhQQ1ixiRmHMS8Yq_TXGoy6aPz6_b_k5Ku8WT7KU3tF7GyP_c2Ha-m456MttlmQIkfe314x3q23mFbTc8OHkz4e3bk1IN79eCtenBEijfqwZ168K568EY9PrDv52ejk4soNNGIyjQW86gigjytBNg0jW2cEaWbgqER2qCrnQqhY2mTvMJQAG15IdJSWi0zUYKkBI1CfGQb9X1tdxnHOQoyXQjyonWpITOA8bqolKkKA7DHBs0ijB88V8r4r4u__9IJB-ztWuMO2cZ8urCf2JtyOf81m352ED4Bf7Jbbg
linkProvider Taylor & Francis
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Threat+Detection+and+Analysis+Using+Dual-Layered+Approach&rft.jtitle=The+Journal+of+computer+information+systems&rft.au=Gudnavar%2C+Anand&rft.au=Naregal%2C+Keerti&rft.au=Madagouda%2C+Basavaraj+K.&rft.date=2025-09-17&rft.issn=0887-4417&rft.eissn=2380-2057&rft.spage=1&rft.epage=18&rft_id=info:doi/10.1080%2F08874417.2025.2553156&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_08874417_2025_2553156
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0887-4417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0887-4417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0887-4417&client=summon