Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference52 articles.
1. HM Government: Cyber Security Breaches Survey 2022. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022/cyber-security-breaches-survey-2022 2022. Accessed 29 Sept 2023.
2. Martínez Torres J, Iglesias Comesaña C, García-Nieto PJ. Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern. 2019;10:2823–36.
3. Kaplan S, Garrick BJ. On the quantitative definition of risk. Risk Anal. 1981;1(1):11–27.
4. Suh-Lee C, Jo JY, Kim Y. Text mining for security threat detection discovering hidden information in unstructured log messages. In: Communications and Network Security (CNS), 2016 IEEE Conference On, 2016;252–260. IEEE
5. Kakavand M, Mustapha N, Mustapha A, Abdullah MT. A text mining-based anomaly detection model in network security. Glob J Comput Sci Technol. 2015;14(1):22–31.