International Journal of Innovative Research in Engineering and Management
Year: 2025, Volume: 13, Issue: 1
First page : ( 74) Last page : ( 78)
Online ISSN : 2350-0557.
DOI: 10.55524/ijircst.2025.13.1.11 |
DOI URL: https://doi.org/10.55524/ijircst.2025.13.1.11
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Aftab Arif , Muhammad Ismaeel Khan, Ali Raza A Khan, Nadeem Anjum, Haroon Arif
The rapid evolution of cyber threats has created unprecedented challenges, particularly in technologically advanced regions like California, where digital infrastructure supports critical industries and millions of residents. This study investigates the application of artificial intelligence (AI) in predicting and mitigating cybersecurity risks, focusing on its transformative role in safeguarding California's digital landscape. By leveraging AI-driven technologies such as machine learning algorithms, neural networks, and natural language processing (NLP), the research demonstrates how these tools identify and neutralize threats before they escalate into breaches. For example, supervised machine learning models are used to detect anomalies in network traffic, while NLP-based tools analyze phishing emails to prevent social engineering attacks. AI-powered solutions like predictive analytics and real-time threat intelligence platforms showcase their ability to enhance cybersecurity frameworks through faster detection, improved accuracy, and reduced response times. The study also examines AI's integration with security systems like firewalls and intrusion detection systems, which are now bolstered by adaptive learning capabilities. Our findings illustrate that AI not only mitigates immediate risks but also fortifies long-term resilience against emerging cyber threats, making it a cornerstone of future cybersecurity strategies.
Student, Department of Computer Science and Technology, Washington University of Science and Technology, Washington, USA
No. of Downloads: 11 | No. of Views: 422
Shivaraj Yanamandram Kuppuraju, Sharad Shyam Ojha, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Shiva Kiran Lingishetty, Chandrashekhar Moharir, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Dr. Vishal Kishorchandra Pandya, Joshi Keyur Ramesh, Modha Vivek Pankajbhai.
March 2025 - Vol 13, Issue 2