Pranab Kumar Goswami, Sunandan Baruah, L. Thakuria
{"title":"网络安全和数据挖掘技术","authors":"Pranab Kumar Goswami, Sunandan Baruah, L. Thakuria","doi":"10.1109/ICECAA55415.2022.9936489","DOIUrl":null,"url":null,"abstract":"For a long time, security and privacy have been a source of concern for the general population. Nonetheless, rapid technological advances, the rapid growth of the internet and electronic commerce, and the development of more contemporary methods for collecting, investigating, and using private information have elevated privacy to the forefront of public and government concerns. Because of the ease with which data can be collected and stored on PC systems, the area of data mining is growing insignificance. Data mining techniques, while allowing individuals to extract hidden information, on the one hand, offer a variety of privacy risks on the other. This article provides an overview of the various data mining methods that may be utilized in cyber security to identify intrusions. This article provides an overview of data mining in the context of cyber security.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Security and Data Mining Techniques\",\"authors\":\"Pranab Kumar Goswami, Sunandan Baruah, L. Thakuria\",\"doi\":\"10.1109/ICECAA55415.2022.9936489\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For a long time, security and privacy have been a source of concern for the general population. Nonetheless, rapid technological advances, the rapid growth of the internet and electronic commerce, and the development of more contemporary methods for collecting, investigating, and using private information have elevated privacy to the forefront of public and government concerns. Because of the ease with which data can be collected and stored on PC systems, the area of data mining is growing insignificance. Data mining techniques, while allowing individuals to extract hidden information, on the one hand, offer a variety of privacy risks on the other. This article provides an overview of the various data mining methods that may be utilized in cyber security to identify intrusions. This article provides an overview of data mining in the context of cyber security.\",\"PeriodicalId\":273850,\"journal\":{\"name\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA55415.2022.9936489\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA55415.2022.9936489","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
For a long time, security and privacy have been a source of concern for the general population. Nonetheless, rapid technological advances, the rapid growth of the internet and electronic commerce, and the development of more contemporary methods for collecting, investigating, and using private information have elevated privacy to the forefront of public and government concerns. Because of the ease with which data can be collected and stored on PC systems, the area of data mining is growing insignificance. Data mining techniques, while allowing individuals to extract hidden information, on the one hand, offer a variety of privacy risks on the other. This article provides an overview of the various data mining methods that may be utilized in cyber security to identify intrusions. This article provides an overview of data mining in the context of cyber security.