The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyber Space Security Assessment Case Study
|
Author(s): Hanaa. M. Said (University Ain Shams, Cairo, Egypt), Rania El Gohary (University Ain Shams, Cairo, Egypt), Mohamed Hamdy (University Ain Shams, Cairo, Egypt)and Abdelbadeeh M. Salem (University Ain Shams, Cairo, Egypt)
Copyright: 2018
Pages: 33
Source title:
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-5634-3.ch052
Purchase
|
Abstract
Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.
Related Content
Preethi, Sapna R., Mohammed Mujeer Ulla.
© 2023.
16 pages.
|
Srividya P..
© 2023.
12 pages.
|
Preeti Sahu.
© 2023.
15 pages.
|
Vandana Niranjan.
© 2023.
23 pages.
|
S. Darwin, E. Fantin Irudaya Raj, M. Appadurai, M. Chithambara Thanu.
© 2023.
33 pages.
|
Shankara Murthy H. M., Niranjana Rai, Ramakrishna N. Hegde.
© 2023.
23 pages.
|
Jothimani K., Bhagya Jyothi K. L..
© 2023.
19 pages.
|
|
|