MJBD 2022
DOI: 10.58496/mjcs/2022/004
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to The Data Mining Techniques in Cybersecurity

Abstract: As a result of the evolution of the Internet and the massive amount of data that is transmitted every second, as well as the methods for protecting and preserving it and distinguishing those who are authorized to view it, the role of cyber security has evolved to provide the best protection for information over the network. In this paper, the researcher discusses the role of data mining methods in cyber security. Data mining has several uses in security, including national security (for example, surveillance) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…However, deep learning measures the performance of systems in addressing a problem, whether the examples are one-or multi-dimensional. Scholars are actively trying to find solutions to many issues in the field of cybersecurity by using deep learning methods [85][86][87]. These methods obtain a very high accuracy of more than 97% in identifying attack messages and blocking their display on vehicle screens.…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%
“…However, deep learning measures the performance of systems in addressing a problem, whether the examples are one-or multi-dimensional. Scholars are actively trying to find solutions to many issues in the field of cybersecurity by using deep learning methods [85][86][87]. These methods obtain a very high accuracy of more than 97% in identifying attack messages and blocking their display on vehicle screens.…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%
“…Cyberspace is a digital space that creates a way for computers to connect with each other or with other electronic devices within the Internet of Things environment [8][9][10]. It utilizes artificial intelligence techniques to protect its data against any wrong operations [11][12][13]. Figure 1 illustrates the cyber threats that institutions may face in the digital environment.…”
Section: Introductionmentioning
confidence: 99%
“…They are continually seeking to develop these strategies and make them more effective and able to know the behaviour of electronic attacks. Cyberattacks can be described as malicious activities that target computer systems, networks, and devices over the Internet, intending to endanger or damage sensitive information [13][14][15][16][17][18][19][20]. Computer systems are among the most desirable systems to be controlled by unauthorized persons because the information included within these systems is very necessary to them [21].…”
Section: Introductionmentioning
confidence: 99%