X-AI Enabled Hybrid Approach for Detection of Cyber Terrorism Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.47001/irjiet/2025.inspire51
In an time checked by the fast advancement of innovation, cyber fear mongering postures a noteworthy danger to worldwide security and societal solidness. This paper proposes an X-AI empowered crossover approach to improve the location and avoidance of cyber fear mongering exercises. By coordination progressed counterfeit insights methods with conventional cybersecurity measures, this approach points to make a strong framework able of recognizing and relieving cyber dangers in real-time. The proposed show leverages machine learning calculations, counting profound learning and gathering strategies, to analyze tremendous datasets for designs characteristic of cyber fear monger behavior. Furthermore, the cross breed approach joins inconsistency location techniques to recognize bizarre exercises that will flag a looming cyber attack. Our framework is outlined to adjust persistently, learning from modern information and advancing danger scenes, hence guaranteeing proactive defense instruments against developing cyber dangers. We approve our approach through broad experimentation on benchmark datasets, illustrating made strides precision and diminished false-positive rates compared to existing location frameworks. The discoveries emphasize the potential of X-AI innovations in invigorating cybersecurity frameworks against cyber fear based oppression. This inquire about not as it were contributes to the scholastic talk on cybersecurity but moreover gives commonsense suggestions for organizations looking for to improve their danger location capabilities.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.47001/irjiet/2025.inspire51
- https://doi.org/10.47001/irjiet/2025.inspire51
- OA Status
- bronze
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409967386
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409967386Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.47001/irjiet/2025.inspire51Digital Object Identifier
- Title
-
X-AI Enabled Hybrid Approach for Detection of Cyber TerrorismWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
Tina Babu, D. Sravani, Ram ReddyList of authors in order
- Landing page
-
https://doi.org/10.47001/irjiet/2025.inspire51Publisher landing page
- PDF URL
-
https://doi.org/10.47001/irjiet/2025.inspire51Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.47001/irjiet/2025.inspire51Direct OA link when available
- Concepts
-
Terrorism, Computer science, Computer security, Computational biology, Data science, Biology, Political science, LawTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409967386 |
|---|---|
| doi | https://doi.org/10.47001/irjiet/2025.inspire51 |
| ids.doi | https://doi.org/10.47001/irjiet/2025.inspire51 |
| ids.openalex | https://openalex.org/W4409967386 |
| fwci | 0.0 |
| type | article |
| title | X-AI Enabled Hybrid Approach for Detection of Cyber Terrorism |
| biblio.issue | Special Issue |
| biblio.volume | 09 |
| biblio.last_page | 322 |
| biblio.first_page | 315 |
| topics[0].id | https://openalex.org/T11512 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.6656000018119812 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Anomaly Detection Techniques and Applications |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.6632000207901001 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T14470 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.598800003528595 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Advanced Data Processing Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C203133693 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6770942211151123 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7283 |
| concepts[0].display_name | Terrorism |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.49100926518440247 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3855050206184387 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C70721500 |
| concepts[3].level | 1 |
| concepts[3].score | 0.33680999279022217 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q177005 |
| concepts[3].display_name | Computational biology |
| concepts[4].id | https://openalex.org/C2522767166 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3230471611022949 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[4].display_name | Data science |
| concepts[5].id | https://openalex.org/C86803240 |
| concepts[5].level | 0 |
| concepts[5].score | 0.21105819940567017 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[5].display_name | Biology |
| concepts[6].id | https://openalex.org/C17744445 |
| concepts[6].level | 0 |
| concepts[6].score | 0.19985035061836243 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[6].display_name | Political science |
| concepts[7].id | https://openalex.org/C199539241 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[7].display_name | Law |
| keywords[0].id | https://openalex.org/keywords/terrorism |
| keywords[0].score | 0.6770942211151123 |
| keywords[0].display_name | Terrorism |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.49100926518440247 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.3855050206184387 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/computational-biology |
| keywords[3].score | 0.33680999279022217 |
| keywords[3].display_name | Computational biology |
| keywords[4].id | https://openalex.org/keywords/data-science |
| keywords[4].score | 0.3230471611022949 |
| keywords[4].display_name | Data science |
| keywords[5].id | https://openalex.org/keywords/biology |
| keywords[5].score | 0.21105819940567017 |
| keywords[5].display_name | Biology |
| keywords[6].id | https://openalex.org/keywords/political-science |
| keywords[6].score | 0.19985035061836243 |
| keywords[6].display_name | Political science |
| language | en |
| locations[0].id | doi:10.47001/irjiet/2025.inspire51 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210215381 |
| locations[0].source.issn | 2581-3048 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2581-3048 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Research Journal of Innovations in Engineering and Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Research Journal of Innovations in Engineering and Technology |
| locations[0].landing_page_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5076530957 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7846-3679 |
| authorships[0].author.display_name | Tina Babu |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | T.Niranjan Babu |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5062064862 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | D. Sravani |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Dumpala Sravani |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5114042223 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Ram Reddy |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | R.Siva Sundar Reddy |
| authorships[2].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | X-AI Enabled Hybrid Approach for Detection of Cyber Terrorism |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11512 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.6656000018119812 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Anomaly Detection Techniques and Applications |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W569815712, https://openalex.org/W4235672678, https://openalex.org/W1894594762, https://openalex.org/W1487740203, https://openalex.org/W1590627964, https://openalex.org/W1982644550, https://openalex.org/W1973338178 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.47001/irjiet/2025.inspire51 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210215381 |
| best_oa_location.source.issn | 2581-3048 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2581-3048 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Research Journal of Innovations in Engineering and Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Research Journal of Innovations in Engineering and Technology |
| best_oa_location.landing_page_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| primary_location.id | doi:10.47001/irjiet/2025.inspire51 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210215381 |
| primary_location.source.issn | 2581-3048 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2581-3048 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Research Journal of Innovations in Engineering and Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Research Journal of Innovations in Engineering and Technology |
| primary_location.landing_page_url | https://doi.org/10.47001/irjiet/2025.inspire51 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 14, 57, 110 |
| abstract_inverted_index.By | 42 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.We | 138 |
| abstract_inverted_index.an | 1, 26 |
| abstract_inverted_index.as | 182 |
| abstract_inverted_index.by | 4 |
| abstract_inverted_index.in | 67, 169 |
| abstract_inverted_index.is | 116 |
| abstract_inverted_index.it | 183 |
| abstract_inverted_index.of | 8, 37, 61, 89, 166 |
| abstract_inverted_index.on | 145, 190 |
| abstract_inverted_index.to | 17, 31, 55, 82, 103, 118, 157, 186, 201 |
| abstract_inverted_index.Our | 114 |
| abstract_inverted_index.The | 69, 161 |
| abstract_inverted_index.and | 20, 35, 63, 79, 125, 152 |
| abstract_inverted_index.but | 192 |
| abstract_inverted_index.for | 86, 197, 200 |
| abstract_inverted_index.not | 181 |
| abstract_inverted_index.our | 140 |
| abstract_inverted_index.the | 5, 33, 95, 164, 187 |
| abstract_inverted_index.This | 23, 178 |
| abstract_inverted_index.X-AI | 27, 167 |
| abstract_inverted_index.able | 60 |
| abstract_inverted_index.fast | 6 |
| abstract_inverted_index.fear | 11, 39, 91, 175 |
| abstract_inverted_index.flag | 109 |
| abstract_inverted_index.from | 122 |
| abstract_inverted_index.made | 149 |
| abstract_inverted_index.make | 56 |
| abstract_inverted_index.show | 71 |
| abstract_inverted_index.talk | 189 |
| abstract_inverted_index.that | 107 |
| abstract_inverted_index.this | 52 |
| abstract_inverted_index.time | 2 |
| abstract_inverted_index.were | 184 |
| abstract_inverted_index.will | 108 |
| abstract_inverted_index.with | 48 |
| abstract_inverted_index.about | 180 |
| abstract_inverted_index.based | 176 |
| abstract_inverted_index.breed | 97 |
| abstract_inverted_index.broad | 143 |
| abstract_inverted_index.cross | 96 |
| abstract_inverted_index.cyber | 10, 38, 65, 90, 112, 136, 174 |
| abstract_inverted_index.gives | 194 |
| abstract_inverted_index.hence | 129 |
| abstract_inverted_index.joins | 99 |
| abstract_inverted_index.paper | 24 |
| abstract_inverted_index.rates | 155 |
| abstract_inverted_index.their | 203 |
| abstract_inverted_index.adjust | 119 |
| abstract_inverted_index.danger | 16, 127, 204 |
| abstract_inverted_index.modern | 123 |
| abstract_inverted_index.monger | 92 |
| abstract_inverted_index.points | 54 |
| abstract_inverted_index.strong | 58 |
| abstract_inverted_index.against | 134, 173 |
| abstract_inverted_index.analyze | 83 |
| abstract_inverted_index.approve | 139 |
| abstract_inverted_index.attack. | 113 |
| abstract_inverted_index.bizarre | 105 |
| abstract_inverted_index.checked | 3 |
| abstract_inverted_index.dangers | 66 |
| abstract_inverted_index.defense | 132 |
| abstract_inverted_index.designs | 87 |
| abstract_inverted_index.improve | 32, 202 |
| abstract_inverted_index.inquire | 179 |
| abstract_inverted_index.looking | 199 |
| abstract_inverted_index.looming | 111 |
| abstract_inverted_index.machine | 73 |
| abstract_inverted_index.methods | 47 |
| abstract_inverted_index.scenes, | 128 |
| abstract_inverted_index.strides | 150 |
| abstract_inverted_index.through | 142 |
| abstract_inverted_index.approach | 30, 53, 98, 141 |
| abstract_inverted_index.compared | 156 |
| abstract_inverted_index.counting | 76 |
| abstract_inverted_index.dangers. | 137 |
| abstract_inverted_index.datasets | 85 |
| abstract_inverted_index.existing | 158 |
| abstract_inverted_index.insights | 46 |
| abstract_inverted_index.learning | 74, 78, 121 |
| abstract_inverted_index.location | 34, 101, 159, 205 |
| abstract_inverted_index.moreover | 193 |
| abstract_inverted_index.outlined | 117 |
| abstract_inverted_index.postures | 13 |
| abstract_inverted_index.profound | 77 |
| abstract_inverted_index.proposed | 70 |
| abstract_inverted_index.proposes | 25 |
| abstract_inverted_index.security | 19 |
| abstract_inverted_index.societal | 21 |
| abstract_inverted_index.advancing | 126 |
| abstract_inverted_index.avoidance | 36 |
| abstract_inverted_index.behavior. | 93 |
| abstract_inverted_index.benchmark | 146 |
| abstract_inverted_index.crossover | 29 |
| abstract_inverted_index.datasets, | 147 |
| abstract_inverted_index.emphasize | 163 |
| abstract_inverted_index.empowered | 28 |
| abstract_inverted_index.exercises | 106 |
| abstract_inverted_index.framework | 59, 115 |
| abstract_inverted_index.gathering | 80 |
| abstract_inverted_index.leverages | 72 |
| abstract_inverted_index.measures, | 51 |
| abstract_inverted_index.mongering | 12, 40 |
| abstract_inverted_index.potential | 165 |
| abstract_inverted_index.precision | 151 |
| abstract_inverted_index.proactive | 131 |
| abstract_inverted_index.recognize | 104 |
| abstract_inverted_index.relieving | 64 |
| abstract_inverted_index.worldwide | 18 |
| abstract_inverted_index.developing | 135 |
| abstract_inverted_index.diminished | 153 |
| abstract_inverted_index.exercises. | 41 |
| abstract_inverted_index.frameworks | 172 |
| abstract_inverted_index.noteworthy | 15 |
| abstract_inverted_index.progressed | 44 |
| abstract_inverted_index.real-time. | 68 |
| abstract_inverted_index.scholastic | 188 |
| abstract_inverted_index.solidness. | 22 |
| abstract_inverted_index.techniques | 102 |
| abstract_inverted_index.tremendous | 84 |
| abstract_inverted_index.advancement | 7 |
| abstract_inverted_index.commonsense | 195 |
| abstract_inverted_index.contributes | 185 |
| abstract_inverted_index.counterfeit | 45 |
| abstract_inverted_index.discoveries | 162 |
| abstract_inverted_index.frameworks. | 160 |
| abstract_inverted_index.information | 124 |
| abstract_inverted_index.innovation, | 9 |
| abstract_inverted_index.innovations | 168 |
| abstract_inverted_index.instruments | 133 |
| abstract_inverted_index.oppression. | 177 |
| abstract_inverted_index.recognizing | 62 |
| abstract_inverted_index.strategies, | 81 |
| abstract_inverted_index.suggestions | 196 |
| abstract_inverted_index.Furthermore, | 94 |
| abstract_inverted_index.conventional | 49 |
| abstract_inverted_index.coordination | 43 |
| abstract_inverted_index.guaranteeing | 130 |
| abstract_inverted_index.illustrating | 148 |
| abstract_inverted_index.invigorating | 170 |
| abstract_inverted_index.calculations, | 75 |
| abstract_inverted_index.capabilities. | 206 |
| abstract_inverted_index.cybersecurity | 50, 171, 191 |
| abstract_inverted_index.inconsistency | 100 |
| abstract_inverted_index.organizations | 198 |
| abstract_inverted_index.persistently, | 120 |
| abstract_inverted_index.characteristic | 88 |
| abstract_inverted_index.false-positive | 154 |
| abstract_inverted_index.experimentation | 144 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.0611327 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |