AI-Driven Automation and Learning Techniques for Enhanced Cloud and Network Security in Flash Storage and Healthcare ERP Systems
Main Article Content
Abstract
Article Details
Section
How to Cite
References
1. Al-Jarrah, O. Y., Yoo, P. D., Muhaidat, S., Karagiannidis, G. K., & Taha, K. (2016). Data randomization and clustering for intrusion detection in big data networks. IEEE Access, 4, 1722–1735. https://doi.org/10.1109/ACCESS.2016.2543838
2. Sabin Begum, R., & Sugumar, R. (2019). Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster Computing, 22(Suppl 4), 9581-9588.
3. Adari, V. K. (2021). Building trust in AI-first banking: Ethical models, explainability, and responsible governance. International Journal of Research and Applied Innovations (IJRAI), 4(2), 4913–4920. https://doi.org/10.15662/IJRAI.2021.0402004
4. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.
5. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.
6. Navandar, P. (2021). Fortifying cybersecurity in Healthcare ERP systems: unveiling challenges, proposing solutions, and envisioning future perspectives. Int J Sci Res, 10(5), 1322-1325.
7. Das, D., Vijayaboopathy, V., & Rao, S. B. S. (2018). Causal Trace Miner: Root-Cause Analysis via Temporal Contrastive Learning. American Journal of Cognitive Computing and AI Systems, 2, 134-167.
8. Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems, 25, 1097–1105.
9. Hardial Singh, “ENHANCING CLOUD SECURITY POSTURE WITH AI-DRIVEN THREAT DETECTION AND RESPONSE MECHANISMS”, INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR), VOLUME-6, ISSUE-2, 2019.
10. Li, W., & Luo, R. (2017). A multivariate intrusion detection method based on deep belief networks. Journal of Information Security and Applications, 35, 165–170. https://doi.org/10.1016/j.jisa.2017.06.005Mnih, V. et al. (2015). Human-level control through deep reinforcement learning. Nature, 518, 529–533. https://doi.org/10.1038/nature14236Shin, D., & Lee, S. (2019). Flash storage technologies for cloud computing: Security challenges and opportunities. ACM Computing Surveys, 51(6), 1–37. https://doi.org/10.1145/3277609
11. Sundararaman, S., Balakrishnan, M., & Prabhakaran, V. (2011). FlashStore: High throughput persistent key-value store. Proceedings of the VLDB Endowment, 3(1–2), 111–122.
12. Konidena, B. K., Bairi, A. R., & Pichaimani, T. (2021). Reinforcement Learning-Driven Adaptive Test Case Generation in Agile Development. American Journal of Data Science and Artificial Intelligence Innovations, 1, 241-273.
13. Thangavelu, K., Sethuraman, S., & Hasenkhan, F. (2021). AI-Driven Network Security in Financial Markets: Ensuring 100% Uptime for Stock Exchange Transactions. American Journal of Autonomous Systems and Robotics Engineering, 1, 100-130.
14. Anuj Arora, “Analyzing Best Practices and Strategies for Encrypting Data at Rest (Stored) and Data in Transit (Transmitted) in Cloud Environments”, “INTERNATIONAL JOURNAL OF RESEARCH IN ELECTRONICS AND COMPUTER ENGINEERING”, VOL. 6 ISSUE 4 ( OCTOBER- DECEMBER 2018).
15. Kapadia, V., Jensen, J., McBride, G., Sundaramoothy, J., Deshmukh, R., Sacheti, P., & Althati, C. (2015). U.S. Patent No. 8,965,820. Washington, DC: U.S. Patent and Trademark Office.
16. Peddamukkula, P. K. (2021). Ethical considerations in AI and automation integration within the life insurance industry. International Journal of Innovative Research in Computer and Communication Engineering, 9(9), 9701–9709. https://doi.org/10.15680/IJIRCCE.2021.0909001
17. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.
18. Anbazhagan, R. S. K. (2016). A Proficient Two Level Security Contrivances for Storing Data in Cloud.
19. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
20. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.
21. Zhang, Y., Qian, Y., Wu, Y., & Yu, R. (2018). Machine learning-based network security assessment in cloud environments. IEEE Transactions on Cloud Computing, 6(3), 719–731. https://doi.org/10.1109/TCC.2015.2511754