John Butler

John Butler

About

8
Publications
553
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3
Citations

Publications

Publications (8)
Research
Full-text available
In the digital age, small and medium-sized enterprises (SMEs) face increasing challenges in securing their vast amounts of data from cyber threats, while maintaining profitability. This study explores the role of artificial intelligence (AI)-powered cybersecurity solutions in safeguarding big data and enhancing the financial performance of SMEs. Th...
Research
Full-text available
In the digital era, small and medium-sized enterprises (SMEs) face the dual challenge of leveraging business intelligence (BI) to fuel growth while safeguarding their operations against cyber threats. This study explores the integration of AI-driven business intelligence solutions with robust cybersecurity measures to enhance SME competitiveness. B...
Research
Full-text available
The integration of quantum computing with machine learning presents a transformative approach to advancing AI-driven healthcare solutions. As the complexity of medical data increases, traditional computational models face limitations in processing efficiency and predictive accuracy. Quantum computing, with its ability to perform parallel computatio...
Research
Full-text available
The increasing prevalence of cardiovascular diseases necessitates advanced predictive models that are both highly accurate and interpretable. Explainable AI (XAI) has emerged as a crucial field in medical AI, providing transparency and trustworthiness in disease prediction models. This study explores the application of neuro-evolutionary models to...
Research
Full-text available
Building resilient cloud infrastructure requires a proactive approach to security, especially as organizations increasingly rely on cloud environments for critical operations. Advanced posture management strategies are essential for ensuring that cloud systems remain secure, compliant, and adaptable to emerging threats. These strategies involve con...
Research
Full-text available
Ransomware attacks have evolved into one of the most destructive cybersecurity threats, with significant financial and operational implications for individuals and organizations worldwide. Traditional security measures struggle to combat the increasing sophistication of ransomware, making the integration of advanced technologies like Artificial Int...
Research
Full-text available
As cyber threats continue to grow in sophistication and frequency, organizations are seeking advanced, future-proof solutions to safeguard their digital assets. Integrating Artificial Intelligence (AI) with Zero Trust Architecture (ZTA) offers a powerful strategy for comprehensive cybersecurity protection. AI enables real-time threat detection, ano...
Research
Full-text available
Artificial Intelligence (AI) is revolutionizing cybersecurity by transforming threat detection and response mechanisms. With the increasing complexity and frequency of cyberattacks, traditional security measures are often insufficient to handle the scale and sophistication of modern threats. AI technologies, including machine learning (ML) and deep...

Network

Cited By