Cybersecurity using Data Mining Techniques

Dr. Sanjiv Kumar Jain, Joey G. Fernando
{"title":"Cybersecurity using Data Mining Techniques","authors":"Dr. Sanjiv Kumar Jain, Joey G. Fernando","doi":"10.36647/ttidmkd/02.04.a003","DOIUrl":null,"url":null,"abstract":"The study is based on the cyber security using data mining in a certain manner and all the insights have been taken from reliable resources which are related to the subject matter. At the beginning of the following article, the, the introduction has been served over the following topic of the cyber security and data mining in business. Also, in the following context, several kinds of materials and methods have been selected and evaluated to bring betterment in the study. The cross-sectional research design, inductive approach, secondary data have been selected by following the qualitative method. At the beginning, the data mining and cyber security have been represented with sheer elaboration and then the importance of data mining techniques within the business has been illustrated within a certain manner. After this, different kinds of usages of data mining techniques like detecting malwares, intrusions and virus attacks have been depicted in a certain norm of data mining techniques. Later on, the following study has been evaluated with the help of proper and authentic interpretation of the rate of cyber security within a business.","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36647/ttidmkd/02.04.a003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The study is based on the cyber security using data mining in a certain manner and all the insights have been taken from reliable resources which are related to the subject matter. At the beginning of the following article, the, the introduction has been served over the following topic of the cyber security and data mining in business. Also, in the following context, several kinds of materials and methods have been selected and evaluated to bring betterment in the study. The cross-sectional research design, inductive approach, secondary data have been selected by following the qualitative method. At the beginning, the data mining and cyber security have been represented with sheer elaboration and then the importance of data mining techniques within the business has been illustrated within a certain manner. After this, different kinds of usages of data mining techniques like detecting malwares, intrusions and virus attacks have been depicted in a certain norm of data mining techniques. Later on, the following study has been evaluated with the help of proper and authentic interpretation of the rate of cyber security within a business.
使用数据挖掘技术的网络安全
该研究基于网络安全,以某种方式使用数据挖掘,所有的见解都是从与主题相关的可靠资源中获取的。在本文的开头,对网络安全和数据挖掘在商业中的应用这一主题进行了介绍。此外,在以下背景下,选择和评估了几种材料和方法,以改善研究。采用横断面研究设计、归纳法、二手资料等方法,采用定性研究方法。首先,对数据挖掘和网络安全进行了详尽的阐述,然后以某种方式说明了数据挖掘技术在业务中的重要性。在此之后,在一定的数据挖掘技术规范中描述了数据挖掘技术的不同用途,如检测恶意软件、入侵和病毒攻击。随后,通过对企业内部网络安全率的正确和真实的解释,对以下研究进行了评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信