期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
1
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Machine Learning Approach to Mobile Forensics Framework for Cyber Crime Detection in Nigeria
2
作者 Ibrahim Goni Murtala Mohammad 《Journal of Computer Science Research》 2020年第4期1-6,共6页
The mobile Cyber Crime detection is challenged by number of mobiledevices (internet of things), large and complex data, the size, the velocity,the nature and the complexity of the data and devices has become sohigh th... The mobile Cyber Crime detection is challenged by number of mobiledevices (internet of things), large and complex data, the size, the velocity,the nature and the complexity of the data and devices has become sohigh that data mining techniques are no more efficient since they cannothandle Big Data and internet of things. The aim of this research work wasto develop a mobile forensics framework for cybercrime detection usingmachine learning approach. It started when call was detected and thisdetection is made by machine learning algorithm furthermore intelligentmass media towers and satellite that was proposed in this work has theability to classified calls whether is a threat or not and send signal directlyto Nigerian communication commission (NCC) forensic lab for necessaryaction. 展开更多
关键词 cyber crime Machine learning NCC Mobile forensics
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部