Network Segmentation: Why It Matters for Security and AI
Abstract
Full Text:
PDFReferences
Hadlington, L., & Chivers, S. (2020). Segmentation analysis of susceptibility to cybercrime: Exploring individual differences in information security awareness and personality factors. Policing: A Journal of Policy and Practice, 14(2), 479-492.
Altun, A., & Yildirim, M. (2022). A research on the new generation artificial intelligence: GPT-3 model. IEEE Access, 10, 12345–12356. https://doi.org/10.1109/ACCESS.2022.9998298
Rapuzzi, R., & Repetto, M. (2018). Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model. Future Generation Computer Systems, 85, 235-249.
Munagandla, V. B., Vadde, B. C., & Dandyala, S. S. V. (2020). Cloud-Driven Data Integration for Enhanced Learning Analytics in Higher Education LMS. Revista de Inteligencia Artificial en Medicina, 11(1), 279-299.
Guo, H., Li, J., Liu, J., Tian, N., & Kato, N. (2021). A survey on space-air-ground-sea integrated network security in 6G. IEEE Communications Surveys & Tutorials, 24(1), 53-87.
Nersu, S. R. K., Kathram, S. R., & Mandaloju, N. (2020). Cybersecurity Challenges in Data Integration: A Case Study of ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 11(1), 422-439.
Ylianttila, M., Kantola, R., Gurtov, A., Mucchi, L., Oppermann, I., Yan, Z., ... & Röning, J. (2020). 6G white paper: Research challenges for trust, security and privacy. arXiv preprint arXiv:2004.11665.
Kathram, S. R., & Nersu, S. R. K. (2020). Adopting CICD Pipelines in Project Management Bridging the Gap Between Development and Operations. Revista de Inteligencia Artificial en Medicina, 11(1), 440- 461.
Muqorobin, M., Hisyam, Z., Mashuri, M., Hanafi, H., & Setiyantara, Y. (2019). Implementasi Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud Computing. Majalah Ilmiah Bahari Jogja, 17(2), 1-9.
Plachkinova, M., & Maurer, C. (2018). Security breach at target. Journal of Information Systems Education, 29(1), 11-20.
Vadde, B. C., Munagandla, V. B., & Dandyala, S. S. V. (2021). Enhancing Research Collaboration in Higher Education with Cloud Data Integration. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 366385.
Pattaranantakul, M., He, R., Song, Q., Zhang, Z., & Meddahi, A. (2018). NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures. IEEE Communications Surveys & Tutorials, 20(4), 3330-3368.
Kathram, S. R., & Nersu, S. R. K. (2022). Effective Resource Allocation in Distributed Teams: Addressing the Challenges of Remote Project Management. Revista de Inteligencia Artificial en Medicina, 13(1), 615-634.
Muqorobin, M., Utomo, P. B., Nafi’Uddin, M., & Kusrini, K. (2019). Implementasi Metode Certainty Factor pada Sistem Pakar Diagnosa Penyakit Ayam Berbasis Android. Creative Information Technology Journal, 5(3), 185-195.
Hadar, E., & Hassanzadeh, A. (2019, September). Big data analytics on cyber attack graphs for prioritizing agile security requirements. In 2019 IEEE 27th International Requirements Engineering Conference (RE) (pp. 330-339). IEEE.
Nersu, S. R. K., & Kathram, S. R. (2022). Harnessing Federated Learning for Secure Distributed ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 13(1), 592-615.
Smith, J. M., & Schuchard, M. (2018, May). Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 599-617). IEEE.
Mandaloju, N., kumar Karne, V., Srinivas, N., & Nadimpalli, S. V. (2021). Overcoming Challenges in Salesforce Lightning Testing with AI Solutions. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 1(1), 228-238.
Cheruvu, S., Kumar, A., Smith, N., & Wheeler, D. M. (2020). Demystifying internet of things security: successful iot device/edge and platform security deployment (p. 488). Springer Nature.
Kothamali, P. R., & Banik, S. (2019). Leveraging Machine Learning Algorithms in QA for Predictive Defect Tracking and Risk Management. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 103-120.
Ramzan, F., Khan, M. U. G., Iqbal, S., Saba, T., & Rehman, A. (2020). Volumetric segmentation of brain regions from MRI scans using 3D convolutional neural networks. IEEE Access, 8, 103697-103709.
Banik, S., & Kothamali, P. R. (2019). Developing an End-to-End QA Strategy for Secure Software: Insights from SQA Management. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 10(1), 125-155.
Stergiou, C., Psannis, K., Plageras, A. P., Ishibashi, Y., & Kim, B. G. (2018). Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of multimedia information system.
Kothamali, P. R., & Banik, S. (2019). Building Secure Software Systems: A Case Study on Integrating QA with Ethical Hacking Practices. Revista de Inteligencia Artificial en Medicina, 10(1), 163-191.
Chen, Z., Li, B., Wu, S., Xu, J., Ding, S., & Zhang, W. (2022, October). Shape matters: deformable patch attack. In European conference on computer vision (pp. 529-548). Cham: Springer Nature Switzerland.
Muqorobin, M., Rokhmah, S., Muslihah, I., & Rais, N. A. R. (2020). Classification of Community Complaints Against Public Services on Twitter. International Journal of Computer and Information System (IJCIS), 1(1), 7-10.
Kothamali, P. R., & Banik, S. (2019). The Role of Quality Assurance in Safeguarding Healthcare Software: A Cybersecurity Perspective. Revista de Inteligencia Artificial en Medicina, 10(1), 192-228.
Dangi, R., Jadhav, A., Choudhary, G., Dragoni, N., Mishra, M. K., & Lalwani, P. (2022). Ml-based 5g network slicing security: A comprehensive survey. Future Internet, 14(4), 116.
Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.
Zhao, J., Masood, R., & Seneviratne, S. (2021). A review of computer vision methods in network security. IEEE Communications Surveys & Tutorials, 23(3), 1838-1878.
Banik, S., Dandyala, S. S. M., & Nadimpalli, S. V. (2020). Introduction to Machine Learning in Cybersecurity. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 11(1), 180-204.
Chen, C., Asoni, D. E., Perrig, A., Barrera, D., Danezis, G., & Troncoso, C. (2018, April). TARANET: Traffic-analysis resistant anonymity at the network layer. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 137-152). IEEE.
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Introduction to Threat Detection in Cybersecurity. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 113- 132.
Muqorobin, M., Kusrini, K., Rokhmah, S., & Muslihah, I. (2020). Estimation System For Late Payment Of School Tuition Fees. International Journal of Computer and Information System (IJCIS), 1(1), 1-6.
Zhang, Y., Chu, J., Leng, L., & Miao, J. (2020). Mask-refined R-CNN: A network for refining object details in instance segmentation. Sensors, 20(4), 1010.
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.
Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.
Mehraj, S., & Banday, M. T. (2020, January). Establishing a zero trust strategy in cloud computing environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Challenges in Applying ML to Cybersecurity. Revista de Inteligencia Artificial en Medicina, 11(1), 214-256.
Ray, P. P., Dash, D., & Kumar, N. (2020). Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions. Computer Communications, 160, 111-131.
Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.
Obaidat, M., Khodjaeva, M., Holst, J., & Ben Zid, M. (2020). Security and privacy challenges in vehicular ad hoc networks. Connected Vehicles in the Internet of Things: Concepts, Technologies and Frameworks for the IoV, 223-251.
Muqorobin, M., & Rais, N. A. R. (2020, November). Analisis Peran Teknologi Sistem Informasi Dalam Pembelajaran Kuliah Dimasa Pandemi Virus Corona. In Prosiding Seminar Nasional & Call for Paper STIE AAS (Vol. 3, No. 1, pp. 157-168).
Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.
Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.
Ustundag, A., Cevikcan, E., Ervural, B. C., & Ervural, B. (2018). Overview of cyber security in the industry 4.0 era. Industry 4.0: managing the digital transformation, 267-284.
Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.
He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. Journal of medical Internet research, 23(4), e21747.
Kothamali, P. R., Mandaloju, N., & Dandyala, S. S. M. (2022). Optimizing Resource Management in Smart Cities with AI. Unique Endeavor in Business & Social Sciences, 1(1), 174-191. https://unbss.com/index.php/unbss/article/view/54.
Balogh, S., Gallo, O., Ploszek, R., Špaček, P., & Zajac, P. (2021). IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques. Electronics, 10(21), 2647.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.

