AI-Enabled Machine Learning Solutions for Cybersecurity and Web Analytics in Enterprise Healthcare Systems with SAP
Main Article Content
Abstract
Article Details
Section
How to Cite
References
1. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
2. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, SE-13(2), 222–232.
3. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316.
4. Shwartz-Ziv, R., & Armon, A. (2022). Tabular data: Deep learning is not all you need. Information Fusion, 81, 84–90.
5. Mahajan, N. (2024). AI-Enabled Risk Detection and Compliance Governance in Fintech Portfolio Operations. Cuestiones de Fisioterapia, 53(03), 5366-5381.
6. Ramalingam, S., Mittal, S., Karunakaran, S., Shah, J., Priya, B., & Roy, A. (2025, May). Integrating Tableau for Dynamic Reporting in Large-Scale Data Warehousing. In 2025 International Conference on Networks and Cryptology (NETCRYPT) (pp. 664-669). IEEE.
7. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(01), 67-83.
8. M. R. Rahman, “Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices”, jictra, vol. 15, no. 1, pp. 17–23, Dec. 2025, doi: 10.51239/jictra.v15i1.348.
9. Pimpale, S. (2025). A Comprehensive Study on Cyber Attack Vectors in EV Traction Power Electronics. arXiv preprint arXiv:2511.16399.
10. Kumar, A., Anand, L., & Kannur, A. (2024, November). Optimized Learning Model for Brain-Computer Interface Using Electroencephalogram (EEG) for Neuroprosthetics Robotic Arm Design for Society 5.0. In 2024 International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications (COSMIC) (pp. 30-35). IEEE.
11. Raju, S., & Sindhuja, D. (2024). Transparent encryption for external storage media with mobile-compatible key management by Crypto Ciphershield. PatternIQ Mining, 1(3), 12-24.
12. Nagarajan, G. (2024). A Cybersecurity-First Deep Learning Architecture for Healthcare Cost Optimization and Real-Time Predictive Analytics in SAP-Based Digital Banking Systems. International Journal of Humanities and Information Technology, 6(01), 36-43.
13. Genne, S. (2025). Bridging the Digital Divide: Mobile Web Engineering as a Pathway to Equitable Higher Education Access. Journal of Computer Science and Technology Studies, 7(7), 560-566.
14. Kesavan, E. (2022). Driven learning and collaborative automation innovation via Trailhead and Tosca user groups. International Scientific Journal of Engineering and Management, 1(1), Article 00058. https://doi.org/10.55041/ISJEM00058
15. Potdar, A., Gottipalli, D., Ashirova, A., Kodela, V., Donkina, S., & Begaliev, A. (2025, July). MFO-AIChain: An Intelligent Optimization and Blockchain-Backed Architecture for Resilient and Real-Time Healthcare IoT Communication. In 2025 International Conference on Innovations in Intelligent Systems: Advancements in Computing, Communication, and Cybersecurity (ISAC3) (pp. 1-6). IEEE.
16. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.
17. Panda, M. R., Musunuru, M. V., & Sardana, A. (2025). Federated Reinforcement Learning for Adaptive Fraud Behavior Analytics in Digital Banking. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 4(3), 90-96.
18. Kusumba, S. (2024). Accelerating AI and Data Strategy Transformation: Integrating Systems, Simplifying Financial Operations Integrating Company Systems to Accelerate Data Flow and Facilitate Real-Time Decision-Making. The Eastasouth Journal of Information System and Computer Science, 2(02), 189-208.
19. Cherukuri, B. R. (2025). Enhanced trimodal emotion recognition using multibranch fusion attention with epistemic neural networks and Fire Hawk optimization. Journal of Machine and Computer, 58, Article 202505005. https://doi.org/10.53759/7669/jmc202505005
20. Kasireddy, J. R. (2025, April). The Role of AI in Modern Data Engineering: Automating ETL and Beyond. In International Conference of Global Innovations and Solutions (pp. 667-693). Cham: Springer Nature Switzerland.
21. Natta, P. K. (2023). Harmonizing enterprise architecture and automation: A systemic integration blueprint. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(6), 9746–9759. https://doi.org/10.15662/IJRPETM.2023.0606016
22. Madabathula, L. (2024). Metadata-driven multi-tenant data ingestion for cloud-native pipelines. International Journal of Computer Technology and Electronics Communication (IJCTEC), 7(6), 9857–9865. https://doi.org/10.15680/IJCTECE.2024.0706020
23. Khan, M. I. (2025). Big Data Driven Cyber Threat Intelligence Framework for US Critical Infrastructure Protection. Asian Journal of Research in Computer Science, 18(12), 42-54.
24. Singh, A. (2021). Mitigating DDoS attacks in cloud networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(4), 3386–3392. https://doi.org/10.15662/IJEETR.2021.0304003
25. Chivukula, V. (2023). Calibrating Marketing Mix Models (MMMs) with Incrementality Tests. International Journal of Research and Applied Innovations (IJRAI), 6(5), 9534–9538.
26. Kumar, S. S. (2023). AI-Based Data Analytics for Financial Risk Governance and Integrity-Assured Cybersecurity in Cloud-Based Healthcare. International Journal of Humanities and Information Technology, 5(04), 96-102.
27. Manda, P. (2024). THE ROLE OF MACHINE LEARNING IN AUTOMATING COMPLEX DATABASE MIGRATION WORKFLOWS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(3), 10451-10459.
28. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
29. Vasugi, T. (2023). An Intelligent AI-Based Predictive Cybersecurity Architecture for Financial Workflows and Wastewater Analytics. International Journal of Computer Technology and Electronics Communication, 6(5), 7595-7602.
30. Adari, V. K. (2024). How Cloud Computing is Facilitating Interoperability in Banking and Finance. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11465-11471.
31. Kumar, R. (2024). Real-Time GenAI Neural LDDR Optimization on Secure Apache–SAP HANA Cloud for Clinical and Risk Intelligence. International Journal of Engineering & Extended Technologies Research (IJEETR), 6(5), 8737-8743.
32. Kavuru, Lakshmi Triveni. (2024). Cross-Platform Project Reality: Managing Work When Teams Refuse to use the Same Tool. International Journal of Multidisciplinary Research in Science Engineering and Technology. 10.15680/IJMRSET.2024.0706146.
33. Vimal Raja, G. (2024). Intelligent Data Transition in Automotive Manufacturing Systems Using Machine Learning. International Journal of Multidisciplinary and Scientific Emerging Research, 12(2), 515-518.
34. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.
35. Karnam, A. (2024). Next-Gen Observability for SAP: How Azure Monitor Enables Predictive and Autonomous Operations. International Journal of Computer Technology and Electronics Communication, 7(2), 8515–8524. https://doi.org/10.15680/IJCTECE.2024.0702006
36. Archana, R., & Anand, L. (2025). Residual u-net with Self-Attention based deep convolutional adaptive capsule network for liver cancer segmentation and classification. Biomedical Signal Processing and Control, 105, 107665.
37. Fazilath, M., & Umasankar, P. (2025, February). Comprehensive Analysis of Artificial Intelligence Applications for Early Detection of Ovarian Tumours: Current Trends and Future Directions. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) (pp. 1-9). IEEE.
38. Patnaik, S. K., Sidhu, M. S., Gehlot, Y., Sharma, B., & Muthu, P. (2018). Automated skin disease identification using deep learning algorithm. Biomedical & Pharmacology Journal, 11(3), 1429.
39. Eberle, W., & Holder, L. (2007). Insider threat detection using graph-based approaches. Journal of Applied Security Research, 4(1), 32–81.
40. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
41. Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331.