Introduction to The Data Mining Techniques in Cybersecurity

dc.contributor.authorSalem, I.E.
dc.contributor.authorMijwil, M.M.
dc.contributor.authorAbdulqader, A.W.
dc.contributor.authorIsmaeel, M.M.
dc.contributor.authorAlkhazraji, A.
dc.contributor.authorAlaabdin, A.M.Z.
dc.date.accessioned2024-09-29T16:16:01Z
dc.date.available2024-09-29T16:16:01Z
dc.date.issued2022
dc.departmentKarabük Üniversitesien_US
dc.description.abstractAs a result of the evolution of the Internet and the massive amount of data that is transmitted every second, as well as the methods for protecting and preserving it and distinguishing those who are authorized to view it, the role of cyber security has evolved to provide the best protection for information over the network. In this paper, the researcher discusses the role of data mining methods in cyber security. Data mining has several uses in security, including national security (for example, surveillance) and cyber security (e.g., virus detection). Attacks against buildings and the destruction of key infrastructure, such as power grids and telecommunications networks, are examples of national security concerns. Cybersecurity is concerned with safeguarding computer and network systems from harmful malware such as Trojan horses and viruses. In addition, data mining is being used to deliver solutions such as intrusion detection and auditing. © 2022, Mesopotamian Academic Press. All rights reserved.en_US
dc.identifier.doi10.58496/MJCS/2022/004
dc.identifier.endpage37en_US
dc.identifier.issn2958-6542
dc.identifier.scopus2-s2.0-85148496328en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage28en_US
dc.identifier.urihttps://doi.org/10.58496/MJCS/2022/004
dc.identifier.urihttps://hdl.handle.net/20.500.14619/8784
dc.identifier.volume2022en_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherMesopotamian Academic Pressen_US
dc.relation.ispartofMesopotamian Journal of CyberSecurityen_US
dc.relation.publicationcategoryDiğeren_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectArtificial intelligenceen_US
dc.subjectCybersecurityen_US
dc.subjectData miningen_US
dc.subjectInterneten_US
dc.subjectVirusesen_US
dc.titleIntroduction to The Data Mining Techniques in Cybersecurityen_US
dc.typeReviewen_US

Dosyalar