Skip to main content
. 2024 Jul 27;24(15):4888. doi: 10.3390/s24154888

Table 1.

Proactive techniques used.

Problem Methodology Used Findings Reference
Risk mitigations and proactive threats Reactive defense measured Highlights threats and risk mitigations solutions [35]
Cyber-attacks Early response/proactive response Changes active to proactive security system Both AI and ML used in future [36]
Data breaches in business industries IoT used Recommend legacy system [37]
Cyber-attacks Artificial Intelligence based Enhanced decision support system [38]
Cyber-attacks Bayesian long-short term memory Holistic approach covering 42 attacks across 36 countries. [39]
Distributed reflection denial of service (DRDoS) Proposed proactive feature selection model (PFS) PFS shows better accuracy for DRDoS detection [40]
Destructive cyber-threats Neural network-based machine and deep learning approach Proactive cyber-threat detection with greater accuracy and prediction [41]