Aller au contenu
MyTheses
  • Remarques
  • Panier de livres: 0 notices (Plein)
  • HOME
  • MYTHESES
  • BLOG
  • AI ASSISTANT
  • INSTITUTION
  • GUIDE & TUTORIAL
  • CONTACT
    • English
    • Français
    • 日本語
    • 中文(简体)
    • 中文(繁體)
    • اللغة العربية
    • हिंदी
Recherche avancée
  • Association ruleset formulatio...
  • Citer
  • Envoyer par SMS
  • Imprimer
  • Exporter les notices
    • Exporter vers RefWorks
    • Exporter vers EndNoteWeb
    • Exporter vers EndNote
  • Ajouter au panier Retirer du panier
  • Permalien

QR Code

Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm

The current threat landscape shows that the rapid evolving cyberattacks with the Tactic, Technique and Procedure (TTPs) used by an adversary become less predictable, more persistent, resourceful, money motivated and better funded. Many organisation has taken an initiative to utilize Cyber Threat Int...

Description complète

Détails bibliographiques
Auteur principal: Abu, Md Sahrom
Format: Thèse
Langue:anglais
anglais
Publié: 2021
Sujets:
Q Science (General)
QA Mathematics
Accès en ligne:http://eprints.utem.edu.my/id/eprint/26021/1/Association%20ruleset%20formulation%20for%20cyberattack%20attribution%20process%20in%20cyber%20threat%20intelligence%20using%20apriori%20algorithm.pdf
http://eprints.utem.edu.my/id/eprint/26021/2/Association%20ruleset%20formulation%20for%20cyberattack%20attribution%20process%20in%20cyber%20threat%20intelligence%20using%20apriori%20algorithm.pdf
  • Exemplaires
  • Description
  • Documents similaires
  • Affichage MARC

Internet

http://eprints.utem.edu.my/id/eprint/26021/1/Association%20ruleset%20formulation%20for%20cyberattack%20attribution%20process%20in%20cyber%20threat%20intelligence%20using%20apriori%20algorithm.pdf
http://eprints.utem.edu.my/id/eprint/26021/2/Association%20ruleset%20formulation%20for%20cyberattack%20attribution%20process%20in%20cyber%20threat%20intelligence%20using%20apriori%20algorithm.pdf

Documents similaires

  • Threat analysis for cyber physical system
    par: Ahmed Al-Mhiqani, Mohammed Nasser
    Publié: (2015)
  • An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
    par: Ong, Phaik Ling
    Publié: (2016)
  • Product Recommendation for E-Groceries Using Apriori Algorithm
    par: Muziah, Muhammad
    Publié: (2004)
  • A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
    par: Alhashmi, Omar
    Publié: (2023)
  • Determinants of cyberattack prevention and the role of cybersecurity leadership in UAE banking sector
    par: Alshamsi, Sultan Khalifa Humaid Khalifa
    Publié: (2023)

Options de recherche

  • Historique de recherche
  • Recherche avancée

Autres modes de recherche

  • Parcourir le catalogue
  • Parcours alphabétique
  • Explorer avec les canaux
  • Exemplaires mis en réserve pour un cours
  • Nouveautés

Besoin d'aide ?

  • Astuces pour la recherche
  • Contacter un bibliothécaire
  • FAQ