A Cloud Security Hyper-Automation Model for Financial Markets and ERP Healthcare AI-Driven Anomaly Detection, Multivariate Risk Inference, and Continuous DevSecOps Assurance
Main Article Content
Abstract
Article Details
Section
How to Cite
References
1. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58.
2. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
3. Anand, L., & Neelanarayanan, V. (2019). Liver disease classification using deep learning algorithm. BEIESP, 8(12), 5105–5111.
4. Adari, V. K. (2021). Building trust in AI-first banking: Ethical models, explainability, and responsible governance. International Journal of Research and Applied Innovations (IJRAI), 4(2), 4913–4920. https://doi.org/10.15662/IJRAI.2021.0402004
5. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.
6. Mohile, A. (2021). Performance Optimization in Global Content Delivery Networks using Intelligent Caching and Routing Algorithms. International Journal of Research and Applied Innovations, 4(2), 4904-4912.
7. Ravipudi, S., Thangavelu, K., & Ramalingam, S. (2021). Automating Enterprise Security: Integrating DevSecOps into CI/CD Pipelines. American Journal of Data Science and Artificial Intelligence Innovations, 1, 31-68.
8. Singh, H. (2020). Evaluating AI-enabled fraud detection systems for protecting businesses from financial losses and scams. The Research Journal (TRJ), 6(4).
9. Amutha, M., & Sugumar, R. (2015). A survey on dynamic data replication system in cloud computing. International Journal of Innovative Research in Science, Engineering and Technology, 4(4), 1454-1467.
10. Zimek, A., Schubert, E., & Kriegel, H.-P. (2012). A survey on unsupervised outlier detection in high-dimensional numerical data. Statistical Analysis and Data Mining, 5(5), 363–387.
11. Humble, J., & Farley, D. (2010). Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation. Addison-Wesley.
12. Humble, J., Kim, G., Debois, P., & Willis, J. (2016). The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations. IT Revolution Press.
13. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.
14. Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media.
15. Goodfellow, I., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv:1412.6572.
16. Chiranjeevi, K. G., Latha, R., & Kumar, S. S. (2016). Enlarge Storing Concept in an Efficient Handoff Allocation during Travel by Time Based Algorithm. Indian Journal of Science and Technology, 9, 40.
17. Sculley, D., Holt, G., Golovin, D., et al. (2015). Hidden technical debt in machine learning systems. Proceedings of the 28th International Conference on Neural Information Processing Systems (NIPS) — Workshop/Industry track (discussion of maintainability and operational debt in ML systems).
18. Kapadia, V., Jensen, J., McBride, G., Sundaramoothy, J., Deshmukh, R., Sacheti, P., & Althati, C. (2015). U.S. Patent No. 8,965,820. Washington, DC: U.S. Patent and Trademark Office.
19. Mani, K., Pichaimani, T., & Siripuram, N. K. (2021). RiskPredict360: Leveraging Explainable AI for Comprehensive Risk Management in Insurance and Investment Banking. Newark Journal of Human-Centric AI and Robotics Interaction, 1, 34-70.
20. Vijayaboopathy, V., Kalyanasundaram, P. D., & Surampudi, Y. (2022). Optimizing Cloud Resources through Automated Frameworks: Impact on Large-Scale Technology Projects. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 2, 168-203.
21. Amuda, K. K., Kumbum, P. K., Adari, V. K., Chunduru, V. K., & Gonepally, S. (2021). Performance evaluation of wireless sensor networks using the wireless power management method. Journal of Computer Science Applications and Information Technology, 6(1), 1–9.
22. Sivaraju, P. S. (2021). 10x Faster Real-World Results from Flash Storage Implementation (Or) Accelerating IO Performance A Comprehensive Guide to Migrating From HDD to Flash Storage. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 4(5), 5575-5587.
23. Navandar, P. (2021). Fortifying cybersecurity in Healthcare ERP systems: unveiling challenges, proposing solutions, and envisioning future perspectives. Int J Sci Res, 10(5), 1322-1325.
24. Arora, Anuj. "Challenges of Integrating Artificial Intelligence in Legacy Systems and Potential Solutions for Seamless Integration." The Research Journal (TRJ), vol. 6, no. 6, Nov.–Dec. 2020, pp. 44–51. ISSN 2454-7301 (Print), 2454-4930 (Online).
25. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.
26. Nagarajan, G. (2022). Optimizing project resource allocation through a caching-enhanced cloud AI decision support system. International Journal of Computer Technology and Electronics Communication, 5(2), 4812–4820. https://doi.org/10.15680/IJCTECE.2022.0502003
27. Srikumar, S., & Roth, D. (2011). Modeling source code and configuration artifacts for security analysis. Proceedings — relevant conference paper exploring code/configuration analysis in automated pipelines.