{"id":29,"date":"2026-04-30T13:19:35","date_gmt":"2026-04-30T17:19:35","guid":{"rendered":"https:\/\/community.mis.temple.edu\/nsalma\/blog\/points\/ai-driven-threat-detection\/"},"modified":"2026-04-30T13:19:35","modified_gmt":"2026-04-30T17:19:35","slug":"ai-driven-threat-detection","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/nsalma\/points\/ai-driven-threat-detection\/","title":{"rendered":"AI-Driven Threat Detection"},"content":{"rendered":"<p>Through this research paper on AI-driven threat detection, I explored how machine learning is used to identify and respond to cyber threats in real time. I developed a stronger understanding of how data, pattern recognition, and automation improve security compared to traditional systems. This experience also strengthened my ability to analyze technical topics and communicate them clearly for a professional audience.<\/p>\n","protected":false},"author":30499,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/points\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/users\/30499"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/points\/29\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/nsalma\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}