
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
2025
Indexing Partners



















Enhancing Network Security with GeoAI and Real-Time Intrusion Detection
Author(s) | Kirti Vasdev |
---|---|
Country | United States |
Abstract | GeoAI (Geospatial Artificial Intelligence) combines geospatial data analysis with AI capabilities to enhance decision-making. Its application in network security offers a revolutionary approach to detecting and mitigating cyber threats. This paper explores the integration of GeoAI with real-time intrusion detection systems (IDS), discussing theoretical foundations, practical applications, and challenges. Case studies illustrate GeoAIās role in identifying geographically contextualized cyber threats. We also examine the integration of machine learning, geospatial analytics, and real-time processing to improve network resilience. Challenges like data privacy and system complexity are discussed, alongside future trends in GeoAI-enabled network security. |
Keywords | GeoAI, Network Security, Real-Time Intrusion Detection, Geospatial Analytics, Cybersecurity, Machine Learning, Data Privacy, Anomaly Detection, Artificial Intelligence, IDS |
Field | Engineering |
Published In | Volume 16, Issue 1, January-March 2025 |
Published On | 2025-02-04 |
Cite This | Enhancing Network Security with GeoAI and Real-Time Intrusion Detection - Kirti Vasdev - IJSAT Volume 16, Issue 1, January-March 2025. DOI 10.5281/zenodo.14802799 |
DOI | https://doi.org/10.5281/zenodo.14802799 |
Short DOI | https://doi.org/g83xkt |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
