UNIFYING ENTERPRISE DEFENSE: A FRAMEWORK FOR AI-DRIVEN CYBERSECURITY PLATFORMIZATION AND RESILIENT THREAT MITIGATION
Keywords:
age, life cycle, chronological age, relative ageAbstract
This study examines the concept of age as a multifaceted phenomenon within linguistic, cultural, and socio-anthropological contexts. Drawing on interdisciplinary perspectives, the research traces the evolution of age-related categories from traditional, institutionally fixed hierarchies to their modern, dynamic reconfigurations shaped by cultural, social, and technological determinants. The analysis highlights how linguistic expressions, idiomatic constructions, and terminological systems reflect societal perceptions of age, encompassing both chronological and socially constructed dimensions. Comparative observations from Russian, English, and Uzbek contexts reveal that age serves not only as a temporal measure but also as a marker of social status, cultural identity, and generational roles. Furthermore, globalization, digitalization, and demographic shifts have expanded the semantic field of age, generating new nominative units, transforming existing terms, and reshaping discursive practices. The findings underscore the importance of viewing the age phenomenon as a multilayered semiotic system, whose lexical-semantic and pragmatic components evolve in parallel with socio-cultural change.
References
Aditya Gupta, Prassanna Rao Rajgopal. Cybersecurity Platformization: Transforming Enterprise Security in an AI-Driven, Threat-Evolving Digital Landscape. International Journal of Computer Applications. 186, 80 (Apr 2025), 19-28. DOI=10.5120/ijca2025924719
AL-Hawamleh, A., Cyber resilience framework: Strengthening defenses and enhancing continuity in business security. International Journal of Computing and Digital Systems, 2024. 15(1): p. 1315-1331.
Burton, S.L., The Rise and Advancement: Intelligent Cybersecurity Markets, in Pioneering Paradigms in Organizational Research and Consulting Interventions: A Multidisciplinary Approach. 2024, IGI Global. p. 259-302.
Alesinloye, T., et al., THE ROLE OF ARTIFICIAL INTELLIGENCE IN ENHANCING CYBERSECURITY FOR FINTECH APPLICATIONS: A COMPREHENSIVE REVIEW. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY (IJCET), 2024. 15(5): p. 38-44.
Nassar, A. and M. Kamal, Machine Learning and Big Data analytics for Cybersecurity Threat Detection: A Holistic review of techniques and case studies. Journal of Artificial Intelligence and Machine Learning in Management, 2021. 5(1): p. 51-63.
Chen, X.-W. and X. Lin, Big data deep learning: challenges and perspectives. IEEE access, 2014. 2: p. 514-525.
Arulkumaran, K., et al., Deep reinforcement learning: A brief survey. IEEE Signal Processing Magazine, 2017. 34(6): p. 26-38.
Thanh SN, Stege M, El-Habr PI, Bang J, Dragoni N. Survey on botnets: incentives, evolution, detection and current trends. Future Internet. 2021. https://doi.org/10.3390/f13080198.
Perwej Y, Qamar Abbas S, Pratap Dixit J, Akhtar N, Kumar Jaiswal A. A systematic literature review on the cyber security. Int J Sci Res Manag. 2021; 9(12):669–710. https://doi.org/10.18535/ijsrm/v9i12.ec04.
AbuBakar A, Zolkipli MF. Cyber security threats and predictions: a survey. Int J Adv Eng Manag (IJAEM). 2023; 5(2):733. https://doi.org/10.35629/5252-0502733741.
Parizad A, Hatziadoniu CJ. Cyber-attack detection using principal component analysis and noisy clustering algorithms: a collaborative machine learning-based framework. IEEE Trans Smart Grid. 2022; 13(6):4848–61. https://doi.org/10.1109/TSG.2022.3176311
Welukar JN, Bajoria GP. Artifcial intelligence in cyber security—a review. Int J Sci Res Sci Technol. 2021. https://doi.org/10.32628/IJSRST218675
Shuford, J. . . (2024). Quantum Computing and Artificial Intelligence: Synergies and Challenges. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 1(1). https://doi.org/10.60087/jaigs.v1i1.35
B.-X. Wang, J.-L. Chen, and C.-L. Yu, ‘‘An AI-powered network threat detection system,’’ IEEE Access, vol. 10, pp. 54029–54037, 2022.
C. Park, J. Lee, Y. Kim, J.-G. Park, H. Kim, and D. Hong, ‘‘An enhanced AI-based network intrusion detection system using generative adversarial networks,’’ IEEE Internet Things J., vol. 10, no. 3, pp. 2330–2345, Feb. 2023.
D. Javeed, T. Gao, P. Kumar, and A. Jolfaei, ‘‘An explainable and resilient intrusion detection system for Industry 5.0,’’ IEEE Trans. Consum. Electron., vol. 70, no. 1, pp. 1342–1350, Jun. 2023.
Simran, S. Kumar, and A. Hans, ‘‘The AI shield and red AI framework: Machine learning solutions for cyber threat intelligence(CTI),’’ in Proc. Int. Conf. Intell. Syst. Cybersecurity (ISCS), May 2024, pp. 1–6.