Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
The current threat landscape shows that the rapid evolving cyberattacks with the Tactic, Technique and Procedure (TTPs) used by an adversary become less predictable, more persistent, resourceful, money motivated and better funded. Many organisation has taken an initiative to utilize Cyber Threat Int...
| Main Author: | Abu, Md Sahrom |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/26021/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=121151 |
| Abstract | Abstract here |
Similar Items
Threat analysis for cyber physical system
by: Ahmed Al-Mhiqani, Mohammed Nasser
Published: (2015)
by: Ahmed Al-Mhiqani, Mohammed Nasser
Published: (2015)
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005)
by: Choo, Ai Ling
Published: (2005)
The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations
by: Afiqah, Abdul Razak
Published: (2025)
by: Afiqah, Abdul Razak
Published: (2025)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
by: Ong, Phaik Ling
Published: (2016)
by: Ong, Phaik Ling
Published: (2016)
Antecedents of cyber resilience against cybercrime threats among the Perlis community
by: Nur Hafifah Jamalludin
Published: (2025)
by: Nur Hafifah Jamalludin
Published: (2025)
Multi-label learning based on positive label correlations using predictive apriori
by: Al Azaidah, Raed Hasan Saleh
Published: (2019)
by: Al Azaidah, Raed Hasan Saleh
Published: (2019)
A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
by: Alhashmi, Omar
Published: (2023)
by: Alhashmi, Omar
Published: (2023)
Product Recommendation for E-Groceries Using Apriori Algorithm
by: Muziah, Muhammad
Published: (2004)
by: Muziah, Muhammad
Published: (2004)
Components of a cyber security framework for the protection of the critical national information infrastructure of Malaysia against cyber threats / Mohd Shamir Hashim
by: Hashim, Mohd Shamir
Published: (2019)
by: Hashim, Mohd Shamir
Published: (2019)
Determinants of cyberattack prevention and the role of cybersecurity leadership in UAE banking sector
by: Alshamsi, Sultan Khalifa Humaid Khalifa
Published: (2023)
by: Alshamsi, Sultan Khalifa Humaid Khalifa
Published: (2023)
Antecedents of cyber security behavior: the roles of coping appraisal, threat appraisal and responsibility norms among government employees
by: Noor Suhani, Sulaiman
Published: (2023)
by: Noor Suhani, Sulaiman
Published: (2023)
Android-based malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen
Published: (2024)
by: Adebayo, Olawale Surajudeen
Published: (2024)
A parellel apriori-transaction reduction algorithm using Hadoop-MapReduce in cloud
by: Ahamed Lebbe Sayeth Saabith (P68509)
Published: (2023)
by: Ahamed Lebbe Sayeth Saabith (P68509)
Published: (2023)
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
by: Mohammad Ahmad, Jomah Tubishat
Published: (2019)
by: Mohammad Ahmad, Jomah Tubishat
Published: (2019)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
An ontology development architecure for strategic threat intelligence South China Sea conflict
by: Muhammad Fakhrul Syazwan Kamarudin
Published: (2025)
by: Muhammad Fakhrul Syazwan Kamarudin
Published: (2025)
Model bakat akademik bagi faktor bakat penerbitan menggunakan teknik apriori
by: Fazuha Ismail (P56159)
Published: (2023)
by: Fazuha Ismail (P56159)
Published: (2023)
Pengubahsuaian ke atas algoritma apriori dan perbandingannya dengan pengelas kasar
by: Mohamad Farhan Mohamad Mohsin
Published: (2023)
by: Mohamad Farhan Mohamad Mohsin
Published: (2023)
Improving book lending service in UTM Library using apriori rule-mining technique
by: Omotunde Habeeb Oladapo
Published: (2025)
by: Omotunde Habeeb Oladapo
Published: (2025)
Kaedah kueri dua fasa dalam algoritma apriori untuk perlombongan petua sekutuan
by: Anis Suhailis Abdul Kadir (P53569)
Published: (2023)
by: Anis Suhailis Abdul Kadir (P53569)
Published: (2023)
Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
by: Zainab. A. A.Abdelsadeq
Published: (2024)
by: Zainab. A. A.Abdelsadeq
Published: (2024)
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
by: Hasan Mahmoud Sha'ban Kanaker
Published: (2024)
by: Hasan Mahmoud Sha'ban Kanaker
Published: (2024)
Formulation of the homological functors of some Bieberbach groups with dihedral point group
by: Wan Nor Farhana Wan Mohd Fauzi
Published: (2015)
by: Wan Nor Farhana Wan Mohd Fauzi
Published: (2015)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Ant colony algorithm for graph based association rules mining
by: Ghassan Saleh Hussein Al-Dharhani (P47969)
Published: (2023)
by: Ghassan Saleh Hussein Al-Dharhani (P47969)
Published: (2023)
The development of insider threat prevention framework within organization
by: Rahimah Mohamad Zuwita@Abu Bakar
Published: (2023)
by: Rahimah Mohamad Zuwita@Abu Bakar
Published: (2023)
Cyber terrorism : the legal and enforcement issue
by: Pardis Moslemzadeh Tehrani (P52395)
Published: (2023)
by: Pardis Moslemzadeh Tehrani (P52395)
Published: (2023)
Emotional intelligence of IKBN youth and the relationship with personality attributes
by: Hari Krishnan Andi
Published: (2015)
by: Hari Krishnan Andi
Published: (2015)
Mathematical formulation of multilevel voltage source inverter switching instats
by: Mohd Alif Ismail
Published: (2025)
by: Mohd Alif Ismail
Published: (2025)
Formulation of the nonabelian tensor squares of some bieberbach groups with point group C2XC2: Abelian and nonabelian cases
by: Nor Fadzilah Abdul Ladi
Published: (2018)
by: Nor Fadzilah Abdul Ladi
Published: (2018)
Effects of Problem Based Learning on Mathematics Performance, Instructional Efficiency and Affective Attributes In Secondary Schools, Port Dickson, Malaysia
by: Abdullah, Nur Izzati Lojinin
Published: (2009)
by: Abdullah, Nur Izzati Lojinin
Published: (2009)
An extended protection motivation theory for cyber fraud prevention
by: Norhasyimatul Naquiah, Ghazali
Published: (2025)
by: Norhasyimatul Naquiah, Ghazali
Published: (2025)
Enhancing rule of engagement in cyber warfare operation planning
by: Nazaruddin Ahmad
Published: (2025)
by: Nazaruddin Ahmad
Published: (2025)
Standard operating procedure for digital evidence in cyber crime
by: Mohd. Kamarudin Md. Din
Published: (2025)
by: Mohd. Kamarudin Md. Din
Published: (2025)
Implication of TQM in e-commerce (strategies for cyber marketer)
by: Ong, Gim Beng
Published: (2024)
by: Ong, Gim Beng
Published: (2024)
Threats and regulatory protection of Asian elephants in Peninsular Malaysia
by: Lee, Ee Ling
Published: (2016)
by: Lee, Ee Ling
Published: (2016)
Information security threat avoidance behavior: an
empirical investigation
by: Ling, Zhixuan
Published: (2019)
by: Ling, Zhixuan
Published: (2019)
Risk profile matrix enhancement for insider Threat prediction
by: Iszaida Ismail
Published: (2025)
by: Iszaida Ismail
Published: (2025)
Optimized clustering with modified K-means algorithm
by: Alibuhtto, Mohamed Cassim
Published: (2021)
by: Alibuhtto, Mohamed Cassim
Published: (2021)
Aco-based feature selection algorithm for classification
by: Al-mazini, Hassan Fouad Abbas
Published: (2022)
by: Al-mazini, Hassan Fouad Abbas
Published: (2022)
Similar Items
-
Threat analysis for cyber physical system
by: Ahmed Al-Mhiqani, Mohammed Nasser
Published: (2015) -
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005) -
The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations
by: Afiqah, Abdul Razak
Published: (2025) -
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
by: Ong, Phaik Ling
Published: (2016) -
Antecedents of cyber resilience against cybercrime threats among the Perlis community
by: Nur Hafifah Jamalludin
Published: (2025)