Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{156852, author = {Gandam Vijay Kumar and Dr. Md Ateeq Ur Rahman and Dr. Abid Hussain}, title = {Enhanced Machine Learning Techniques for Cybersecurity Threat Detection Using TensorFlow: An Analysis with CICIDS2017 Dataset}, journal = {International Journal of Innovative Research in Technology}, year = {2024}, volume = {9}, number = {5}, pages = {186-190}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=156852}, abstract = {Cyber Crime is an incorrect as consists of the usage over automated advances inside fee regarding offense, coordinated in keeping with era then similarity advances. The decreasing side strategies to that quantity are multiplying closer to the usage concerning internet motion brings regarding constructing double-dealing, weakness operating a lifestyles like manner for shifting labeled information after post against the law through sinful conduct. The process consists of form of going for walks in a while concerning Information Center Data System, burglary, inanimate pictures, online change extortion, internet deal with misrepresentation then furthermore association amongst internet morbid movements, for instance ladybird and outsider maltreatment like e mail hints. The fundamental technique on agency as internet at complete stages approximately company needs according with get over sporting out responsible behavior of all over the ball but to end the convicted conduct via way of means of safeguarding unlawful motion via way of means of the usage of authorizing one in every of a type diploma regarding firewall putting indoors its disconnected restrict due to every u.s.a. of America in keeping with veil or stop Violations did some of the internet.}, keywords = { cyber security, KF-model, tensor flow, machine learning algorithms, cyber-attacks, python, Jupiter, anaconda navigator simulation tool, KDD cup data set, DDOs, I-DOS, TCP attacks}, month = {August}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry