Published on: April 2026
DEVELOPMENT OF AEOSARS: AN AI ENHANCED OFFLINE SECURITY AUDIT REPORTING SYSTEM FOR AIR GAPED CYBERSECURITY ENVIRONMENTS
KAVITHA C SASHWATH Y NITHISH M GUNASEKARAN V
Article Status
Available Documents
Abstract
Index Terms: Cybersecurity Audit, Offline AI, Rule-Based Detection, Security Reporting Automation, Air-Gapped Systems, Vulnerability Evidence.
How to Cite this Paper
C, K., Y, S., M, N. & V, G. (2026). Development of AEOSARS: An AI Enhanced Offline Security Audit Reporting System for Air Gaped Cybersecurity Environments. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.192
C, KAVITHA, et al.. "Development of AEOSARS: An AI Enhanced Offline Security Audit Reporting System for Air Gaped Cybersecurity Environments." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.192.
C, KAVITHA,SASHWATH Y,NITHISH M, and GUNASEKARAN V. "Development of AEOSARS: An AI Enhanced Offline Security Audit Reporting System for Air Gaped Cybersecurity Environments." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.192.
References
[1] National Institute of Standards and Technology, Guide for Conducting Risk Assessments, NIST Special Publication 800-30, Gaithersburg, MD, USA, 2022.[2] Open Web Application Security Project, OWASP Top 10: The Ten Most Critical Web Application Security Risks, OWASP Foundation, 2023.
[3] Gary McGraw, Software Security: Building Security In, Addison-Wesley Professional, Boston, MA, USA, 2006.
[4] Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd ed., Wiley, 2020.
[5] Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep Learning, MIT Press, Cambridge, MA, USA, 2016.
[6] A. Sharma, R. Gupta, and P. Kumar, "Automated vulnerability detection using machine learning techniques," IEEE Access, vol. 9, pp. 124567–124578, 2021.
[7] L. Wang, S. Jajodia, and A. Singhal, "Network vulnerability analysis and security risk assessment," IEEE Security & Privacy, vol. 8, no. 6, pp. 44–52, 2020.
[8] H. Holm, M. Ekstedt, and D. Andersson, "Empirical analysis of system vulnerabilities and security risk evaluation," Computers & Security, vol. 34, pp. 31–43, 2019.
[9] J. Kim and Y. Lee, "AI-assisted cybersecurity analysis for automated security auditing systems," Journal of Information Security and Applications, vol. 60, pp. 102870, 2021.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 10 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

