Professional Documents
Culture Documents
KNTT 235
KNTT 235
Starting with the inception of an education program and progressing through its
development, implementation, delivery, and evaluation, Managing an
Information Security and Privacy Awareness and Training Program,
Second Edition provides authoritative coverage of nearly everything needed to
create an effective training program that is compliant with applicable laws,
regulations, and policies[6].
The Internet of Things (IoT) has been extensively utilized in domains such as
smart homes, healthcare, and other industries. With the exponential growth of
Internet of Things (IoT) devices, they have become prime targets for malicious
cyber-attacks. Effective classification of IoT traffic is, therefore, imperative to
enable robust intrusion detection systems[7].
The Möbius function μ(n) is known for containing limited information on the
prime factorization of n. Its known algorithms, however, are all based on
factorization and hence are exponentially slow on logn. Consequently, a faster
algorithm of μ(n) could potentially lead to a fast algorithm of prime
factorization which in turn would throw doubt upon the security of most public-
key cryptosystems[8].
The detection of different types of concept drift has wide applications in the
fields of cloud computing and security information detection. Concept drift
detection can indeed assist in promptly identifying instances where model
performance deteriorates or when there are changes in data distribution. This
paper focuses on the problem of concept drift detection in order to conduct
frequent pattern mining. To address the limitation of fixed sliding windows in
adapting to evolving data streams, we propose a variable sliding window
frequent pattern mining algorithm, which dynamically adjusts the window size
to adapt to new concept drifts and detect them in a timely manner[9].
References:
[1] B. Blakley, E. McDermott, and D. Geer, “Information security is information
risk management,” in Proceedings of the 2001 workshop on New security
paradigms, in NSPW ’01. New York, NY, USA: Association for Computing
Machinery, Tháng Chín 2001, pp. 97–104. doi: 10.1145/508171.508187.
[2] S. Tweneboah-Koduah, K. E. Skouby, and R. Tadayoni, “Cyber Security
Threats to IoT Applications and Service Domains,” Wirel. Pers. Commun.,
vol. 95, no. 1, pp. 169–185, 2017, doi: 10.1007/s11277-017-4434-6.
[3] T. Wu, X. Hu, and C. Liu, “Security-oriented steganographic payload
allocation for multi-remote sensing images,” Sci. Rep., vol. 14, no. 1, 2024,
doi: 10.1038/s41598-024-55474-y.
[4] “What Is Inflation and How Does Inflation Affect Investments?,”
Investopedia. Accessed: Mar. 12, 2024. [Online]. Available:
https://www.investopedia.com/ask/answers/what-is-inflation-and-how-
should-it-affect-investing/
[5] J. Stapleton and W. C. Epstein, Security Without Obscurity: A Guide to PKI
Operations, 2nd edition. CRC Press, 2024.
[6] R. Herold, Managing an Information Security and Privacy Awareness and
Training Program, 2nd edition. Boca Raton, FL: CRC Press, 2010.
[7] N. Liao and J. Guan, “Multi-scale Convolutional Feature Fusion Network
Based on Attention Mechanism for IoT Traffic Classification,” Int. J.
Comput. Intell. Syst., vol. 17, no. 1, 2024, doi: 10.1007/s44196-024-00421-y.
[8] H. Qin and Y. Ye, “Algorithms of the Möbius function by random forests and
neural networks,” J. Big Data, vol. 11, no. 1, 2024, doi: 10.1186/s40537-
024-00889-7.
[9] J. Chen, S. Yang, T. Gao, Y. Ying, T. Li, and P. Li, “Multi-type concept drift
detection under a dual-layer variable sliding window in frequent pattern
mining with cloud computing,” J. Cloud Comput., vol. 13, no. 1, 2024, doi:
10.1186/s13677-023-00566-9.
[10] J. Seaman and M. Gioia, Security Risk Management - The Driving Force
for Operational Resilience: The Firefighting Paradox, 1st edition. CRC
Press, 2023.