<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="20395" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/20395?output=omeka-xml" accessDate="2026-04-29T04:55:18+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181068">
              <text>The Empirical Analysis of Machine Learning Approaches for Enhancing the Cyber security for better Quality</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181069">
              <text>Cyber Security; Cyber-attack; Data; Information; Machine Learning (ML); Methods; Techniques; Technologies</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181070">
              <text>In recent years, there have been significant advances in both technologies tactics so in area of cyber security, with (ML) machine learning at the forefront of the transformation. It is the ability to obtain security event characteristics or findings from cyber security information and then develop a matching information model that will allow a security system to become autonomous and smart. The widespread proliferation and the usage of Web and Smartphone applications has increased the size of cyber world as a consequence. When a computerized assault takes too long to complete, the internet becomes vulnerable. Security measures may be improved by recognizing and reacting to cyber-attacks, thanks to cyber security techniques. Security measures that were previously used aren't any longer appropriate because scammers have learned how to evade them. It is getting more difficult to detect formerly unknown and unpredictable security breaches, which are growing more widespread. Cyber security is becoming more dependent on machine learning (ML) techniques. Machine learning algorithms' dependability remains a major challenge, given its continual advancement. It is possible to find malicious hackers in internet that are ready to exploit ML defects that have been made public. A thorough review of machine learning techniques safeguarding cyberspace against attacks is provided in this paper, which presents a literature review on Cyber security using machine learning methods, such as vulnerability scanning, spam filtering, or threat detection on desktop networks as well as smart phone networks. Among other things, this paper provides brief descriptions of each machine-learning technique and security info, essential machine-learning technology, and evaluation parameters for a classification method.  2022 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181071">
              <text>Tongkachok K.; Samata V.; Nethravathi K.; Nirmal M.; Mohan L.R.; Khan Z.Z.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="181072">
              <text>Proceedings of 2nd International Conference on Innovative Practices in Technology and Management, ICIPTM 2022, pp. 95-100.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="181073">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181074">
              <text>2022-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="181075">
              <text>&lt;a href="https://doi.org/10.1109/ICIPTM54933.2022.9754195" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICIPTM54933.2022.9754195&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129369039&amp;amp;doi=10.1109%2FICIPTM54933.2022.9754195&amp;amp;partnerID=40&amp;amp;md5=9c9ba7426607342b84e6df02f3b2f811" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129369039&amp;amp;doi=10.1109%2fICIPTM54933.2022.9754195&amp;amp;partnerID=40&amp;amp;md5=9c9ba7426607342b84e6df02f3b2f811&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181076">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="181077">
              <text>ISBN: 978-166546643-1</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181078">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181079">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="181080">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="181081">
              <text>Tongkachok K., Thaksin University, Faculty Of Law, Thailand; Samata V., Dk Govt College (A), Lecturer In Computer Applications, A.P, Nellore, India; Nethravathi K., Jain (Deemed-to-be University), BMS-FS, Bangalore, India; Nirmal M., Pravara Rural Engineering College, Maharashtra, Loni, India; Mohan L.R., Christ (Deemed To Be University), Computer Science And Engineering, Bangalore, Karnataka, India; Khan Z.Z., Mumbai University, Anjuman I Islam Kalsekar Technical Campus, Maharashtra, Mumbai, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
