ARCHIVES

Original Article

A Unified AI Framework for Early Threat Detection in Healthcare: Combining Anomaly Detection, Sequence Learning, and CTI Correlation

Kalyana Krishna Kondapalli1
1 CEO, Mytecz, India

Published Online: May-August 2026

Pages: 123-128

References

1. M. Dekker and L. Alevizos, "A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance
decision-making," Security and Privacy, vol. 7, no. 1, pp. 1–18, 2024, doi: 10.1002/spy2.333.
2. S. Hansen and A. J. Baroody, "Beyond the boundaries of care: Electronic health records and the changing practices of healthcare,"
Information and Organization, vol. 33, no. 3, p. 100477, 2023.
3. Z. Almahmoud, P. D. Yoo, O. Alhussein, I. Farhat, and E. Damiani, "A holistic and proactive approach to forecasting cyber threats,"
Scientific Reports, vol. 13, no. 1, pp. 1–15, 2023, doi: 10.1038/s41598-023-35198-1.
4. A. R. Iossifova and S. Meyer-Goldstein, "Impact of standards adoption on healthcare transaction performance: The case of HIPAA,"
International Journal of Production Economics, vol. 141, no. 1, pp. 277–285, 2013.
5. J. Xing and Z. Zhang, "Hierarchical network security measurement and optimal proactive defense in cloud computing environments,"
Security and Communication Networks, vol. 2022, pp. 1–12, 2022, doi: 10.1155/2022/6783223.
6. M. Tahmasebi, "Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises," Journal of
Information Security, vol. 15, no. 2, pp. 106–133, 2024, doi: 10.4236/jis.2024.152008.
7. Y. Creado and V. Ramteke, "Active cyber defence strategies and techniques for banks and financial institutions," Journal of Financial Crime,
vol. 27, no. 3, pp. 771–780, 2020, doi: 10.1108/JFC-01-2020-0008.
8. N. U. I. Hossain, S. Rahman, and S. A. Liza, "Cyber-susiliency index: A comprehensive resiliency-sustainability-cybersecurity index for
healthcare supply chain networks," Decision Analytics Journal, vol. 9, p. 100319, 2023.
9. G. Apruzzese, P. Laskov, E. Montes De Oca, W. Mallouli, L. Brdalo Rapa, A. V. Grammatopoulos, and F. Di Franco, "The role of machine
learning in cybersecurity," Digital Threats: Research and Practice, vol. 4, no. 1, pp. 1–38, 2023, doi: 10.1145/3545574.
10. Y. Zheng, Z. Li, X. Xu, and Q. Zhao, "Dynamic defenses in cyber security: Techniques, methods, and challenges," Digital Communications
and Networks, vol. 8, no. 4, pp. 422–435, 2022, doi: 10.1016/j.dcan.2021.07.006.
11. H. I. Kure, S. Islam, M. Ghazanfar, A. Raza, and M. Pasha, "Asset criticality and risk prediction for an effective cybersecurity risk
management of cyber-physical systems," Neural Computing and Applications, vol. 34, no. 1, pp. 493–514, 2022, doi: 10.1007/s00521-021-
06400-0.
12. A. Yeboah-Ofori, S. Islam, S. W. Lee, Z. U. Shamszaman, K. Muhammad, M. Altaf, and M. S. Al-Rakhami, "Cyber threat predictive
analytics for improving cyber supply chain security," IEEE Access, vol. 9, pp. 94318–94337, 2021, doi: 10.1109/ACCESS.2021.3087109.
13. Y. Kim, I. Lee, H. Kwon, K. Lee, and J. Yoon, "Ban: Predicting APT attack based on Bayesian network with MITRE ATT&CK framework,"
IEEE Access, vol. 11, pp. 91949–91968, 2023, doi: 10.1109/ACCESS.2023.3306593.
14. N. Thapa, Z. Liu, A. Shaver, A. Esterline, B. Gokaraju, and K. Roy, "Secure cyber defense: An analysis of network intrusion-based dataset
CCD-IDSv1 with machine learning and deep learning models," Electronics, vol. 10, no. 15, pp. 1–13, 2021, doi:
10.3390/electronics10151747.
15. M. Javaid, A. Haleem, R. P. Singh, and R. Suman, "Towards insighting cybersecurity for healthcare domains: A comprehensive review of
recent practices and trends," Cyber Security and Applications, vol. 1, p. 100016, 2023.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260502013

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.