Introduction to The Data Mining Techniques in Cybersecurity
dc.contributor.author | Salem, I.E. | |
dc.contributor.author | Mijwil, M.M. | |
dc.contributor.author | Abdulqader, A.W. | |
dc.contributor.author | Ismaeel, M.M. | |
dc.contributor.author | Alkhazraji, A. | |
dc.contributor.author | Alaabdin, A.M.Z. | |
dc.date.accessioned | 2024-09-29T16:16:01Z | |
dc.date.available | 2024-09-29T16:16:01Z | |
dc.date.issued | 2022 | |
dc.department | Karabük Üniversitesi | en_US |
dc.description.abstract | As a result of the evolution of the Internet and the massive amount of data that is transmitted every second, as well as the methods for protecting and preserving it and distinguishing those who are authorized to view it, the role of cyber security has evolved to provide the best protection for information over the network. In this paper, the researcher discusses the role of data mining methods in cyber security. Data mining has several uses in security, including national security (for example, surveillance) and cyber security (e.g., virus detection). Attacks against buildings and the destruction of key infrastructure, such as power grids and telecommunications networks, are examples of national security concerns. Cybersecurity is concerned with safeguarding computer and network systems from harmful malware such as Trojan horses and viruses. In addition, data mining is being used to deliver solutions such as intrusion detection and auditing. © 2022, Mesopotamian Academic Press. All rights reserved. | en_US |
dc.identifier.doi | 10.58496/MJCS/2022/004 | |
dc.identifier.endpage | 37 | en_US |
dc.identifier.issn | 2958-6542 | |
dc.identifier.scopus | 2-s2.0-85148496328 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 28 | en_US |
dc.identifier.uri | https://doi.org/10.58496/MJCS/2022/004 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14619/8784 | |
dc.identifier.volume | 2022 | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Mesopotamian Academic Press | en_US |
dc.relation.ispartof | Mesopotamian Journal of CyberSecurity | en_US |
dc.relation.publicationcategory | Diğer | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Artificial intelligence | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Data mining | en_US |
dc.subject | Internet | en_US |
dc.subject | Viruses | en_US |
dc.title | Introduction to The Data Mining Techniques in Cybersecurity | en_US |
dc.type | Review | en_US |