Akkuzu, Gulsum, Aziz, Benjamin and Liu, Han ![]() |
This is the latest version of this item.
Preview |
PDF
- Accepted Post-Print Version
Download (332kB) | Preview |
Official URL: http://dx.doi.org/10.1109/ICWAPR.2018.8521252
Abstract
Data mining techniques have been widely used as a common goal to discover hidden patterns from big data sets, so researchers have been motivated to make use of data in discovering useful information. The main contribution of this paper lies in its identifying relevant features from an open data set to predict the containment time of Cyber incidents. In particular, 13 relevant features were identified and selected to come up with a predictive model. Our results are discussed in the context of the organisation's' information security.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Date Type: | Publication |
Status: | Published |
Schools: | Computer Science & Informatics |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Publisher: | IEEE |
ISBN: | 978-1-5386-5218-3 |
Related URLs: | |
Date of First Compliant Deposit: | 6 July 2018 |
Date of Acceptance: | 17 May 2018 |
Last Modified: | 25 Oct 2022 13:26 |
URI: | https://orca.cardiff.ac.uk/id/eprint/119821 |
Available Versions of this Item
-
Feature analysis on the containment time for cyber security incidents. (deposited 06 Jul 2018 09:10)
- Feature analysis on the containment time for cyber security incidents. (deposited 15 May 2019 10:15) [Currently Displayed]
Citation Data
Cited 2 times in Scopus. View in Scopus. Powered By Scopus® Data
Actions (repository staff only)
![]() |
Edit Item |