Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kabanda, Gabriel
- An Evaluation of Big Data Analytics Projects and The Project Predictive Analytics Approach
Abstract Views :183 |
PDF Views:0
Authors
Affiliations
1 Atlantic International University 900 Fort Street Mall 40 Honolulu, Hawaii 96813, US
1 Atlantic International University 900 Fort Street Mall 40 Honolulu, Hawaii 96813, US
Source
Oriental Journal of Computer Science and Technology, Vol 12, No 4 (2019), Pagination: 132-146Abstract
Big Data is the process of managing large volumes of data obtained from several heterogeneous data types e.g. internal, external, structured and unstructured that can be used for collecting and analyzing enterprise data. The purpose of the paper is to conduct an evaluation of Big Data Analytics Projects which discusses why the projects fail and explain why and how the Project Predictive Analytics (PPA) approach may make a difference with respect to the future methods based on data mining, machine learning, and artificial intelligence. A qualitative research methodology was used. The research design was discourse analysis supported by document analysis. Laclau and Mouffe’s discourse theory was the most thoroughly poststructuralist approach.Keywords
Assignment Decisions, Big Data, Communication Methodology, Project Manager.References
- Ajah, I.A. and Nweke, H.F. (2019). Big Data and Business Analytics: Trends, Platforms, Success Factors and Applications, Big Data and Cognitive Computing, 3(32), 1-30.
- Ali, A., Qadir, J., Rasool, R., Sathiaseelan, A., Zwitter, A., and Crowcroft, J. (2016). Big Data for Development: Applications and Techniques, Big Data Analytics, 1(2), 1-24.
- Armstrong, M.B., Landers, R.N., and Collmus, A.B. (2016). Gamifying Recruitment, Selection, Training, and Performance Management: Game-thinking in Human Resource Management, In Gangadharbatla, H., and Davis, D.Z. (Eds), Emerging Research and Trends in Gamification, 140-165, Hershey: IGI Global.
- Axr yd, S. (2019). Why 85% of Big Data Projects Fail, www.digitalnewsasia.com/insights/why-85-big-data-projects-fail [Accessed 10 September 2019]
- Bartlett, C.A. and Ghoshal, S. (2011). Building Competitive Advantage through People, MIT Sloan Management Review, 84(2), 34-45.
- Beringer, C., Jonas, D. and Kock, A. (2013).Behaviour of Internal Stakeholders in Project Por tfolio Management and its Impact on Success, International Journal of Project Management, 31(6), 830-846.
- Ber kun, S. (2005). The Ar t of Project Management, New York: O’Reilly.
- ClickUp (2019) https://clickup.com/ 9. Cristobal, J.R.S. (2017). Complexity in Project Management, CENTERIS Inter national Conference on Project Management, 8-10 November 2017, Barcelona, Spain.
- Demirkan, H. and Dal, B. (2014). Big Data, Big Opportunities, Big Decisions, Harvard Business Review Turkish Edition, March 2014, 28-30.
- Dollan, K. 2010. Address Project Failure Through PRINCE2, London: Best Management Practice, White Paper, Stationery Office.
- EpicFlow (2019) How AI Will Change the Future of Project Management https://www.epicflow.com/blog/how-ai-will-change-the-future-of-project-management/
- Garavan, T.N., Carbery, R., and Rock, A. (2012). Mapping Talent Development: Definition, Scope and Architecture, European Journal of Training and Development, 36(2012): 5–24.
- Han, J., Kamber, M., and Pei, J. (2012). Data Mining: Concepts and Techniques, Third Edition, Waltham, MA: Morgan Kaufmann, and Imprint of Elsevier.
- Hanson, E. (2011). Talent Reviews and High-Potential Identification: Overcoming five Common Challenges, Pittsburgh; Development Dimensions International.
- Hemlata, C. and Gulia, P. (2016). Big Data Analytics, Research Journal of Computer and Information Technology Sciences, 4(2), 1-4.
- Henderson, P. (2006). Why Large IT Projects Fail, Southampton: University of Southampton, School of Electronics and Computer Science.
- Hussain, M. and Manhas, J. (2016). Artificial Intelligence for Big Data: Potential and Relevance, International Academy of Engineering and Medical Research, 1(1), 1-5.
- Jorgensen M, Phillips LJ (2002). “Discourse Analysis as Theory and Method”, SAGE Publications, London • Thousand Oaks • New Delhi.
- Kerzner, H.R. (2013). Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th Edition, Hoboken: Jon Wiley and Sons.
- Liu, Y., Han, H. DeBello, J.E. (2018). The Challenges of Business Analytics: Successes and Failures, Proceedings of the 51st Hawaii International Conference on System Sciences.
- Mahmud, N.B. (2009). A Study of Effectiveness of Project Management Consultancy (PMC) Services, University of Malaysia Pahang, A Report Submitted in Partial Fulfilment of the Requirements for the Award of the Degree of Bachelor of Civil Engineering.
- Makuia, A., Zadeh, P.M., Bagherpour, M., and Jabbarzadeh, A. (2018). A Structural Equation Modelling Approach to Examine the Relationship between Complexity Factors of a Project and the Merits of Project Manager, Journal of Project Management, 3(2018), 1-12.
- Mazur, A.K. and Pisarski, A. (2015). Major Project Managers’ Internal and External Stakeholder Relationships: The Development and Validation of Measurement Scales, International Journal of Project Management, 33(2015), 1680-1691.
- Mpingajira, M. (2013). E-government Project Failure in Africa: Lessons for Reducing Risk, African Journal of Business Management, 7(32), 3196-3201.
- Mutula, S. and Mostert, J. (2010). Challenges and Opportunities of E-government in South Africa, Electron Lib.28(1), 38-53.
- National Audit Office. (2006). National Programme for IT in the NHS, London: Report by the Comptroller and Auditor General.
- Nikolaou, I. and Foti, K. (2017). Personnel Selection and Personality, In Zeigler-Hill, V. and Shackelford, T. (Eds), The SAGE Handbook of Personality and Individual Differences, New York; Sage, 1-37.
- Nikumbh, A.R. and Pimplikar, S.S. (2014). Role of Project Management Consultancy in Construction Project, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE), 10(6), 14-19.
- Patanakul, P. (2015). Project Manager Assignment: A Strategic Perspective, Open Economics and Management Jour nal, 2(Suppl 1: M4), 21-28.
- Patanakul, P., Milosevic, D., and Anderson, T. (2003). Assigning Projects to Project Managers in a Multiple-Project Management Environment: A Pilot Study of a Decision Support Model, Management of Engineering and Technology, 2003. PICMET 03. Technology Management for Reshaping the World, Portland International Conference, 20-24 July 2003.
- Patanakul, P., Milosevic, D., and Anderson, T. (2007). A Decision Support Model for Project Manager Assignments, Engineering and Technology Management Faculty Publications and Presentations, Paper 22.
- Power, T. (2013). What are examples of Database Project Failures? Available on www.dssresources.com [Accessed 4 September 2019].
- Pospieszny P. (2017) Application of Data Mining Techniques in Project Management – an Overview Research Gate https://www.researchgate.net/publication/317973749
- Project Management Institute. (2013). A Guide to the Project Management Body of Knowledge, 5th Edition, Newton Square: Pennsylvania; Publications Division.
- Qassim, A. (2012). Why Information Systems Projects Fail: Guidelines for Successful Projects, Oman: State Audit Institution.
- Riahi, Y. (2017). Identifying, Analysing, Executing, Planning, and Monitoring Project Stakeholders: Analysis and Management Processes, SSRG Inter national Jour nal of Economics and Management Studies, 4(3), 37-42.
- Richardson, T.M., Marion, J. and Onu, S. (2015). Insights from Global Project Managers: Career Advice for Successful International Assignments,International Journal of Business and Management, 10(10), 9-18.
- Salgado, J.F., Moscoso, S., and Alonso, P. (2013). The Sub-Dimensional Structure of the Hogan Personality Inventory, International Jour nal of Selection and Assessment, 21(2), 277-285.
- Shaw, K. (2012). Lessons from a Billion Dollar Project Failure, Available on www.itbusinessedge.com [Accessed 5 September 2019].
- Shibani, A. and Sukumar, D. (2015). The Role of the Project Manager in Construction Projects in India, Chinese Business Review, 14(6), 298-324.
- Singh, S., Firdaus, T., and Sharma, A.K. (2015). Sur vey on Big Data Using Data Mining, International Journal of Engineering Development and Research,3(4), 135-143.
- Su, J. (2013). Enabling Risk Analytics for Project Success, Ontario: Deloitte and Touche.
- Sun, Z. (2017). Big Data Analytics and Artificial Intelligence, PNG University of Technology, UNITECH Research Committee Seminar, 2 May 2017.
- Swailes, S. (2013). The Ethics of Talent Management, Business Ethics: A European Review 22 2013, 32-46.
- Torfi, F. and Rashidi, A. (2011). Selection of Project Managers in Construction Firms Using Analytic Hierarchy Process (AHP) and Fuzzy Topsis: A Case Study, Journal of Construction in Developing Countries, 16(1), 69-89.
- Vargas, R. V. (2010). Using the analytic hierarchy process (ahp) to select and prioritize projects in a portfolio. Paper presented at PMI® Global Congress 2010—North America, Washington, DC. Newtown Square, PA: Project Management Institute
- Watson, H.J. (2014). Tutorial: Big Data Analytics: Concepts, Technologies, and Applications, Communications of the Association for Information Systems, 34(65), 1247-1268.
- Weibl, J. and Hess, T. (2018). Success or Failure of Big Data: Insights of Managerial Challenges from a Technology Assimilation Perspective, Luneburg: Institute for Information Systems and New Media.
- Windman, J. (2005). IT Biggest Project Failures and What we can Learn from them, Available on www.computerwor ld.com [Accessed 5 September 2019].
- A Bayesian Network Model for a Zimbabwean Cybersecurity System
Abstract Views :326 |
PDF Views:0
Authors
Affiliations
1 Atlantic International University 900 Fort Street Mall 40 Honolulu, Hawaii 96813, US
1 Atlantic International University 900 Fort Street Mall 40 Honolulu, Hawaii 96813, US
Source
Oriental Journal of Computer Science and Technology, Vol 12, No 4 (2019), Pagination: 147-167Abstract
The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM).Keywords
Autonomous Robotic Vehicle, Artificial Neural Networks, Bayesian Network, Cybersecurity, Decision Tree C4.5, Fuzzy Logic, Machine Learning Methods, Random Forests and Support Vector Machines (Svm).References
- ALJEBREEN, M.J., (2018). Towards Intelligent Intr usion Detection Systems for Cloud Computing, Ph.D. Dissertation, Florida Institute of Technology, 2018.
- ALANEZI, A.A., (2014). Development of an Orally Disintegrating Mini-Tablet (ODMTs) Containing Metoclopramide HCl to Enhance Patient Compliance, Master of Science Thesis, University of Toledo, 2014, http://rave.ohiolink.edu/etdc/view?acc_num=mco1417861431.
- ALMUTAIRI, A., (2016). Improving intrusion detection systems using data mining techniques, Ph.D Thesis, Loughborough University, 2016.
- BANDE S., (2018).Legislating against Cyber Crime in Southern African Development Community: Balancing International Standards with Country-Specific Specificities.International Journal of Cyber Criminology Volume 12 Issue 1 January-June 2018.
- BOLZONI, D., (2009). Revisiting Anomaly-based Network Intrusion Detection Systems, Ph.D Thesis, University of Twente, The Netherlands, ISBN: 978-90-365-2853-5, ISSN: 1381-3617, DOI: 10.3990/1.9789036528535.
- BRINGAS, P.B., and Santos, I., (2010). Bayesian Networks for Network Intrusion Detection, Bayesian Network, Ahmed Rebai (Ed.), ISBN: 978-953-307-124-4, InTech, Available from: http://www.intechopen.com/books/bayesian-network/bayesian-networks-for-network-intrusion-detection.
- CHUKWUDI, L., Lopez R., Wager, T.D., Silvers, J.A., and Buhle, J.T., (2014), Cognitive Reappraisal of Emotion: A Meta-Analysis of Human Neuroimaging Studies, Cerebral Cortex, Volume 24, Issue 11, 1 November 2014, Pages 2981–2990, https://doi.org/10.1093/cercor/bht154 https://academic.oup.com/cercor/ article/24/11/2981/301871.
- DEMIR, N., and Dalkilic, G., (2017). Modified stacking ensemble approach to detect network intrusion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/ Published Online: 15.11.2017, http://journals.tubitak.gov.tr/elektrik/
- International Telecommunication Union, (2009).Global Security Report.
- Inter national Telecommunication Union, (2012). http://www.itu.int/net/pressoffice/press_releases/2012/70.aspx#.XI-UZoyxWfA
- JABBARI, F., Visweswaran, S., and Cooper, G.F., (2018), Instance-Specific Bayesian Network Structure Learning, Proceedings of Machine Learning Research vol 72, 169-180, 2018, PGM 2018.
- KABANDA, G., (2013). "African context for technological futures for digital learning and the endogenous growth of a knowledge economy", Basic Journal of Engineering Innovation (BRJENG), Volume 1(2), April 2013, pages 32-52, http://basicresearchjournals.org/engineering/PDF/Kabanda.pdf
- KARIMPOUR, J., Lotfi, S., and Siahmarzkooh, A.T., (2016). Intrusion detection in network flows based on an optimized clustering criterion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/Published Online: 17.07.2016, http://journals.tubitak.gov.tr/elektrik
- KESSLER, G.C., (2019). An Overview of Cryptography. [Online]. Available from: https:// www.gar ykessler.net/librar y/cr ypto.html [Accessed: 30 April 2019].
- KIVUNJA, C., and Kuyini, A.B., (2017). Understanding and Applying Research Paradigms in Educational Contexts, International Journal of Higher Education, Vol. 6, No. 5, September 2017, Published by Sciedu Press 26, ISSN 1927-6044, E-ISSN 1927-6052, http:// ijhe.sciedupress.com; doi:10.5430/ijhe.v6n5p26 URL: https://doi.org/10.5430/ijhe.v6n5p26.
- KUMAR, R., (2011). Research Methodology: A step by step guide for beginners 3rd ed. London: Sage Publishers.
- KYLILI, A., Fokaides, P.A., Ioannides, A., and Kalogirou, S., (2018). Environmental assessment of solar thermal systems for the industrial sector, Journal of Cleaner Production, 176, 99-109.
- MADIGAN, D., (2008). Data Mining: An Overview, http://www.stat.columbia.edu/~madigan, retrieved on 6th April, 2019.
- MOHAJAN, H.K., (2018). Qualitative Research Methodology in Social Sciences and Related Subjects. Journal of Economic Development, Environment and People.Volume 7 Issue 1, 2018 pp 23-48.
- MORGAN, D.L., (2013). Pragmatism as a Paradigm for Social Research, Qualitative Inquiry, 201X, Vol XX(X) 1–9, © The Author(s) 2013, http://www. sagepub.com/journalsPermissions. nav, DOI: 10.1177/1077800413513733,
- MULLER, P.L., (2015). Cybersecurity Capacity Building in Developing Countries. Opportunities and Challenges. Norwegian Institute of International Affairs.
- MURUGAN, S., and Rajan, M.S., (2014). Detecting Anomaly IDS in Network using Bayesian Network, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07, www.iosrjournals.org
- National Institute of Standards and Technology, (2018). Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
- NIELSEN, R. (2015). CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan, Technical Report January 2015, Los Alamos National Laboratory, USA.
- PETER, G.R., Ar tur, P., and Peter, H.F., (2005). "A Pragmatic Research Philosophy for Applied Sport Psychology", Ph.D Dissertation, Kinesiology, Spor t Studies and Physical Education Faculty Publications, 80, 2005, https://digitalcommons.brockport.edu/pes_facpub/80.
- SAUNDERS, M.N.K., Thornhill, A., and Lewis, P., (2009). Research Methods for Business Students (5th Edition),Publisher: Pearson; ISBN-13: 978-0273716860, ISBN-10: 0273716867, https://www.amazon.com/Research-Methods-Business-Students-5th/dp/0273716867.
- SCHIA, N.N., (2018), The cyber frontier and digital pitfalls in the Global South, Third World Quarterly,39:5, 821-837, DOI: 10.1080/01436597.2017.1408403, pages 821-837, https://www.tandfonline.com/doi/abs/10.1080/01436597.2017.1408403
- SINGH, R., Ahlawat, M., and Shar ma, D., (2017). A Review on Radio over Fiber communication System, International Journal of Enhanced Research in Management & Computer Applications, ISSN: 2319-7471, Vol. 6, Issue 4, April-2017.
- SMITHERMAN, S., (2014). Chaos and Complexity Theories: Creating Holes and Wholes in Curr iculum, The Chaos and Complexity Theories SIG at the AERA Annual Meeting, San Diego, CA, on Thursday, April 15, 2004.
- STALLINGS, W., (2015). Operating System Stability. Accessed on 27th March, 2019. https:// www.unf.edu/public/cop4610/ree/Notes/PPT/PPT8E/CH15-OS8e.pdf.
- THE Mauritius Cybercrime Strategy 2017-2019, (2017). http://certmu.govmu.org/English/Documents/Cybercrime%20Strategy/National%20Cybercrime%20Strategy-%20 August%202017.pdf.
- UNITED Nations Economic Commission for Africa. (2014).Tackling the challenges of cybersecurity in Africa.
- XIAO, L., (2016). Intrusion detection using probabilistic graphical models, PhD Dissertation, Iowa State University,
- WU, L.Y., Li, S.L., and Gan, X.S., (2017). Network anomaly intrusion detection CVM model based on PLS feature extraction, Control and Decision, 32(4), 755-758.
- WU, H., Wang, Z., and Wang, C., (2016). Study on the recognition method of airport perimeter intrusion incidents based on laser detection technology, Turkish Journal of Electrical Engineering & Computer Sciences,Accepted/ Published Online: 20.10.2016, http://journals.tubitak.gov.tr/elektrik.
- WU, W., (2018). Ship communication network intrusion signal identification based on Hidden Markov model, In: Liu, Z.L. and Mi, C. (eds.), Advances in Sustainable Port and Ocean Engineering, Journal of Coastal Research, Special Issue No. 83, pp. 868–871. Coconut Creek (Florida), ISSN 0749-0208.
- WU, S., Zhu, W., Li, H., Yu, I.T., Lin, S., Wang, X., and Yang, S., (2010). Quality of life and its influencing factors among medical professionals in China, International Archives of Occupational and Environmental Health, 83(7), 753-761.
- Performance of Machine Learning and other Artificial Intelligence Paradigms In Cybersecurity
Abstract Views :280 |
PDF Views:1
Authors
Affiliations
1 Atlantic International University, 900 Fort Street Mall 40, Honolulu, Hawaii 96813, US
1 Atlantic International University, 900 Fort Street Mall 40, Honolulu, Hawaii 96813, US
Source
Oriental Journal of Computer Science and Technology, Vol 13, No 1 (2020), Pagination: 1-21Abstract
Cybersecurity systems are required at the application, network, host, and data levels. The research is purposed to evaluate Artificial Intelligence paradigms for use in network detection and prevention systems. This is purposed to develop a Cybersecurity system that uses artificial intelligence paradigms and can handle a high degree of complexity. The Pragmatism paradigm is elaborately associated with the Mixed Method Research (MMR), and is the research philosophy used in this research. Pragmatism recognizes the full rationale of the congruence between knowledge and action. The Pragmatic paradigm advocates a relational epistemology, a non-singular reality ontology, a mixed methods methodology, and a value-laden axiology. A qualitative approach where Focus Group discussions were held was used. The Artificial Intelligence paradigms evaluated include machine learning methods, autonomous robotic vehicle, artificial neural networks, and fuzzy logic. A discussion was held on the performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms.Keywords
Artificial Intelligence, Artificial Neural Networks, Bayesian Network, Cybersecurity, Deep Learning, Machine Learning.References
- Acs, (2016).Cybersecurity: Opportunities, Threats and Challenges.
- Africa Cybersecurity Report, (2016).
- ht t ps:/ /www.ser ianu.com/downloads/ AfricaCyberSecurityReport2016.pdf
- Ajayi, A., Idowu, S.A., and Anyahie, A.A., (2013). Comparative Study of Selected Data Mining Algorithms Used For Intrusion Detection, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-3, July 2013, p.237-241.
- Aljebreen, M.J., (2018). Towards Intelligent Intrusion Detection Systems for Cloud Computing, Ph.D. Dissertation, Florida Institute of Technology, 2018.
- Almutairi, A., (2016). Improving intrusion detection systems using data mining techniques, Ph.D Thesis, Loughborough University, 2016.
- Alocious, C., Abouzakar, N., Xiao, H, and Christianson, B., (2014), Intrusion Detection Framework for Cyber Crimes using Bayesian Network, https://www.researchgate.net/ publication/272999966_Intrusion_Detection_ Framework_for_Cyber_Crimes_using_Bayesian_Network
- Al Hogail, M., (2015). How is the ministry fostering public-private partnerships (PPPs) with local private developers?, https:// oxfordbusinessgroup.com/interview/right-homeobgtalks-majed-al-hogail-minister-housing
- Angelini et al., (2017).CRUMBS: a Cybersecurity Framework Browser.
- Apruzzese, G; Colajanni, M.; Ferretti, L.; Guido, A.; & Marchetti, M.( 2018). "On the effectiveness of machine and deep learning for cyber security," 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, 2018, pp.371390.
- Azzalini, A., and Scarpa, B., (2012), Data analysis and data mining : an Introduction, Oxford University Press, Inc., ISBN 978-0-19976710-6.
- Berman, D.S., Buczak, A.L., Chavis, J.S., and Corbett, C.L. (2019). “Survey of Deep Learning Methods for Cyber Security”, Information 2019, 10, 122; doi:10.3390/info10040122
- Bezemskij, A., Loukas, G., Gan, D., and Anthony, R.J., (2017). Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 21-23 June 2017, IEEE, United Kingdom, https://ieeexplore.ieee.org/ document/8276737
- Bolzoni, D., (2009). Revisiting Anomaly-based Network Intrusion Detection Systems, Ph.D Thesis, University of Twente, The Netherlands, ISBN: 978-90-365-2853-5, ISSN: 1381-3617, DOI: 10.3990/1.9789036528535,
- Bringas, P.B., and Santos, I., (2010). Bayesian Networks for Network Intrusion Detection, Bayesian Network, Ahmed Rebai (Ed.), ISBN: 978-953-307-124-4, InTech, Available from: http://www.intechopen.com/books/bayesiannetwork/ bayesian-networks-for-networkintrusiondetection
- Concierge, (2018). Concierge Security Report. Cybersecurity: Trends from 2017 and Predictions for 2018.
- Cornmen, T.H, Leiserson, C.E, Rivest, A.L, Stein, C. (2009). 3rd ed. Introduction to Algorithms. Cambridge: MIT Press.
- Crewell, J.W., (2014). Research Design: Qualitative, quantitative and mixed methods .4rd edition, Sage Publications,Inc.
- Demir, N., and Dalkilic, G., (2017). Modified stacking ensemble approach to detect network intrusion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/ Published Online: 15.11.2017, http://journals.tubitak.gov.tr/elektrik/
- European Union Agency for Network and Information Society (2017) https://openarchive.cbs.dk/bitstream/handle/10398/9524/Evaluation of ENISA- Final Report.pdf?sequence=1
- Fehling, C., Leymann, F., Retter, R., Schupeck, W., Arbitter, P. (2014). Cloud Computing Patterns. Fundamentals to Design, Build, and Manage Cloud Applications. Springer-Verlag Wien .
- Flick, U., (2013). The SAGE Handbook of Qualitative Data Analysis: Mapping the Field, New York, 2013.
- Gcaza, N., Solms, R. Von, & Vuuren, J. Van.(2015). An Ontology for a National CyberSecurity Culture Environment. In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (1-10).
- Gercke, M. (2012). ‘Cybercrime Understanding Cybercrime’, Understanding cybercrime: phenomena, challenges and legal response.
- Ghafouri, A., (2018). Resilient Anomaly Detection in Cyber-Physical Systems, Ph.D. Dissertation, Faculty of the Graduate School of Vanderbilt University, February 2018.
- Karimpour, J., Lotfi, S., and Siahmarzkooh, A.T., (2016). Intrusion detection in network flows based on an optimized clustering criterion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/Published Online: 17.07.2016, http://journals.tubitak.gov.tr/elektrik
- Kothari, C., (2004). Research Methodology Methods and Techniques, 2nd Edition. New Age International Publishers.
- Kpmg, (2018).Clarity on Cybersecurity. Driving growth with confidence.
- MacAfee, (2018). https://www.mcafee.com/ consumer/en-sg/store/m0/catalog.html 30. Malyuk and Miloslavskaya, (2016). Cybersecurity Culture as an Element of IT Professional Training, TBA.
- Murugan, S., and Rajan, M.S., (2014). Detecting Anomaly IDS in Network using Bayesian Network, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07, www.iosrjournals.org
- National Institute of Standards and Technology, (2018). Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
- Napanda, K., Shah, H., and Kurup, L., (2015). Artificial Intelligence Techniques for Network Intrusion Detection, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, IJERTV4IS110283 www.ijert.org, Vol. 4 Issue 11, November-2015.
- Nielsen, R. (2015). CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan, Technical Report January 2015, Los Alamos National Laboratory, USA.
- Norton Symantec (2017) ‘2017 Norton Cyber Security Insights Report - Global Results’, p.2018.
- Oxford English Dictionary (2019). Oxford: Oxford University Press. Available at: https://en.oxforddictionaries.com.
- Saunders, M.N.K., Thornhill, A., and Lewis, P., (2009). Research Methods for Business Students (5th Edition),Publisher: Pearson; ISBN13: 978-0273716860, ISBN-10: 0273716867, https://www.amazon.com/Research-MethodsBusiness-Students-5th/dp/0273716867
- Stefanova, Z.S., (2018). "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems", Graduate Theses and Dissertations, 2018, https:// scholarcommons.usf.edu/etd/7367
- Sharma, R. (2012). Study of Latest Emerging Trends on Cybersecurity and its Challenges to Society. International Journal of Scientific and Engineering Research .Vol 3 Issue 6, June 2012.
- Stallings, W., (2015). Operating System Stability. Accessed on 27th March, 2019. https://www.unf.edu/public/cop4610/ree/Notes/PPT/PPT8E/ CH15-OS8e.pdf
- Symantec Annual Report (2016), https:// s1.q4cdn.com/doc_financials
- Tran, T.M., Ko, D.W., Ryul, C., and Dinh, H., (2019). A bayesian network analysis of reforestation decisions by rural mountain communities in Vietnam, Forest Science and Technology, DOI: 10.1080/21580103.2019.1581665.
- Tran, T.P., (2009). Innovative machine learning techniques for security detection problems, Ph.D. Dissertation, University of Technology, Sydney, Australia, 2009.
- Truong, T.C; Diep, Q.B.; & Zelinka, I. (2020).Artificial Intelligence in the Cyber Domain: Offense and Defense. Symmetry 2020, 12, 410.
- Umamaheswari, K., and Sujatha, S., (2017). Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud, Defence Science Journal, Vol. 67, No. 6, November 2017, pp.645-653, DOI : 10.14429/dsj.67.11118.
- United Nations Economic Commission for Africa. (2014).Tackling the challenges of cybersecurity in Africa.
- Yedaly, M. and Wright, B. (2016) ‘Cyber Crime & Cyber Security Trends in Africa’, Symantec.
- YU, J., Chang, G.K., Kooning, A.M.J, and Ellinas, G., (2009). Radio-over-optical-fiber Networks: Introduction to the feature issue, Journal of Optical Networking,
- Williams, B. T., (2014). The joint force commander’s guide to cyberspace operations. Joint Force Quarterly, 73(2), 12–19. Retrieved from http://ndupress.ndu.edu/ Portals/68/Documents/jfq/jfq-73/jfq-73_12-19_Williams.pdf.
- Zekrifa, D.M.S., (2014). Hybrid Intrusion Detection System, Ph.D Thesis in Computer Science, School of Information Technology & Mathematical Sciences, 2014, University of South Australia, https://tel.archives-ouvertes.fr/tel-01584217.
- A Cybersecurity Culture Framework for Grassroots Levels in Zimbabwe
Abstract Views :237 |
PDF Views:1
Authors
Affiliations
1 Zimbabwe Academy of Sciences, Trep Building, University of Zimbabwe Harare, ZW
2 Zimbabwe Open University, Corner House, Samora Machel Avenue/ L.takawira Street Harare
1 Zimbabwe Academy of Sciences, Trep Building, University of Zimbabwe Harare, ZW
2 Zimbabwe Open University, Corner House, Samora Machel Avenue/ L.takawira Street Harare
Source
Oriental Journal of Computer Science and Technology, Vol 14, No 1,2,3 (2021), Pagination: 17-34Abstract
Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access.1 The research was purposed to develop a cybersecurity culture framework which ensures that grassroot users of cyberspace are secured from cyber threats. Literature review showed that in Zimbabwe, no research had attempted to come up with a cybersecurity culture framework for grassroot users of cyberspace.The research was guided by the interpretivist paradigm and employed a qualitative methodology. A descriptive research design was used to answer the research questions and unstructured interviews were done to ascertain the cybersecurity needs and challenges of grassroot users of cyberspace. A cybersecurity culture framework was then crafted based on the research findings. The researchers recommended that Zimbabwe should have a cybersecurity vision and strategy that cascades to the grassroot users of cyberspace. Furthermore, the education curricula should be revised so that it incorporates cybersecurity courses at primary and secondary school level. This will then ensure that ICT adoption is matched with cyber hygiene and responsible use of cyberspace.Keywords
Artificial Intelligence; Big Cloud Computing; Culture Framework; Cybersecurity, Data Analytics, Internet Of Things; Machine LearningReferences
- Kabanda G. Performance of Machine Learning and other Artificial Intelligence paradigms in Cybersecurity. Orient.J. Comp. Sci. and Technol; 13(1).
- Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. Cybersecurity data science: an overview from machine learning perspective, 2020. Journal of Big Data. https://doi.org/10.1186/ s40537-020-00318-5
- Berman, D.S., Buczak, A.L., Chavis, J.S., and Corbett, C.L.Survey of Deep Learning Methods for Cyber Security; 2019. doi:10.3390/info10040122
- Bringas, P.B and Santos, I. Bayesian Networks for Network Intrusion Detection, Bayesian Network, Ahmed Rebai (Ed.), ISBN: 978-953-307-124-4; 2010. InTech, Available from: http://www.intechopen.com/ books/bayesian-network/bayesian-networksfornetwork-intrusion-detection
- Bloice, M. and Holzinger, A. A Tutorial on Machine Learning and Data Science Tools with Python. Graz, Austria, 2018: s.n.
- Gcaza, N., Solms, R. Von, & Vuuren, J. Van. An Ontology for a National Cybersecurity Culture Environment,. In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (1-10); 2015.
- Malyuk and Miloslavska. Cybersecurity Culture as an Element of IT Professional Training; 2015
- United Nations. Policy Brief. Tackling the challenges of cybersecurity in Africa; 2014
- Al Hogail M. How is the ministry fostering public-private partnerships (PPPs) with local private developers?, 2015. https://oxfordbusinessgroup.com/interview/ right-home-obg-talks-majed-al-hogailministerhousing.
- International Telecommunication Union. Global Security Report; 2008.
- Sharma R.Study of Latest Emerging Trends on Cybersecurity and its Challenges to Society, 2012. International Journal of Scientific and Engineering Research. Vol 3 Issue 6, June 2012
- Wamala, F. ITU National Cybersecurity Strategy Guide. Chemistry & Geneva, Switzerland;2011
- Symantec .Cybercrime and cybersecurity trends in Africa;2016
- Ernst and Young. Cybersecurity and the Internet of Things;2015
- Concierge. Concierge Security Report. Cybersecurity: Trends from 2017 and Predictions for 2018, 2018
- ACS .Cybersecurity: Opportunities, Threats and Challenges; 2016
- SANS Cybersecurity Threat Landscape Survey; 2017
- McAfee Labs Threats Report;2018
- KPMG .Clarity on Cybersecurity. Driving growth with confidence;2018
- Cox, R. & Wang, G. Predicting the US bank failure: A discriminant analysis. Economic Analysis and Policy, Issue 44.2, pp. 201-211;2014
- Yang, C., Yu, M., Hu, F., Jiang, Y., & Li, Y. Utilizing Cloud Computing to address big geospatial data challenges. Computers, Environment and Urban Systems;2017 https://doi.org/10.1016/j.compenvurbsys. 2016.10.010
- Gercke, M. Cybercrime Understanding Cybercrime, Understanding cybercrime: phenomena, chal lenges and legal response;2012
- Murugan, S., and Rajan, M.S. Detecting Anomaly IDS in Network using Bayesian Network,2014. IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 22780661, p- ISSN: 2278-8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07;2014 www.iosrjournals.org
- National Institute Of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity Version 1.1;2018
- Alkaraz C. and Zeadally S. Critical Infrastructure Protection: Requirements and Challenges for the 21st Century. Journal of Critical Infrastructure Protection (IJCIP), volume 8, Elsevier Science, pp. 53-66, 01/2015;2015
- Schuessler J.H .General Deterrence Theory: Assessing Information Systems Security Effectiveness In Large Versus Small Businesses,2009.Accessible on: https://digital.library.unt.edu/ark:/67531/metadc9829/m2/1/high_res_d/ dissertation.pdf
- Alanezi, M. A., Kamil, A., & Basri, S. A proposed instrument dimensions for e-government service quality, 2010. International Journal of u-and e-Service, 3(4), 1–18.
- Chukwudi A.E, Udoka E, Charles I. Game Theory Basics and Its Application in Cyber Security; 2017. Advances in Wireless Communications and Networks. Vol. 3, No. 4, 2017, pp. 45-49. doi: 10.11648/j. awcn.20170304.13
- Norwegian Institute of International Affairs, 2018
- Bande .Legislating against Cyber Crime in Southern African Development Community: Balancing International Standards with Country-Specific Specificities, 2018. International Journal of Cyber Criminology Volume 12 Issue 1 January-June 2018
- ITU . Measuring the Information Society 2012;2012
- Schia N.N. The cyber frontier and digital pitfalls in the Global South, 2018. Third World Quarterly, 39(5): 821-837.
- Muller P.L. Cybersecurity Capacity Building in Developing Countries. Opportunities and Challenges, 2015.
- Kortjan, N. & Von Solms, R. A conceptual framework for cybersecurity awareness and education in SA, 2014. South African Computer Journal, 52, 29-41., 2014(52), pp.29–41.
- The Republic of Mauritius Cybercrime Strategy 2017-2019,2017
- https://www.webopedia.com/TERM/C/cryptography.html
- https://www.garykessler.net/library/crypto.html
- https://hitachi-id.com/resource/iam-concepts/authentication.html):
- https://www.techopedia.com/definition/10284/integrity).
- A Reinforcement Learning Paradigm for Cybersecurity Education and Training
Abstract Views :148 |
PDF Views:1
Authors
Affiliations
1 Machine Learning Woxsen School of Business, Woxsen University, Hyderabad, IN
2 Department of Information and Masrketing Sciences Midlands State University Faculty of Business Sciences, ZW
3 Faculty of Technology, Zimbabwe Open University, ZW
1 Machine Learning Woxsen School of Business, Woxsen University, Hyderabad, IN
2 Department of Information and Masrketing Sciences Midlands State University Faculty of Business Sciences, ZW
3 Faculty of Technology, Zimbabwe Open University, ZW
Source
Oriental Journal of Computer Science and Technology, Vol 16, No 1 (2023), Pagination: 12-45Abstract
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.Keywords
Artificial Intelligence, Cybersecurity, Deep Learning, DRL Applications, E-Learning, Machine Learning, Reinforcement Learning.References
- Kammann, L. (2018). Digitalisierung im Versicherungsvertrieb: Eine Untersuchung der rechtlichen Grenzen und Möglichkeiten unter besonderer Berücksichtigung der Versicherungsvergleichsportale. VVW GmbH.
- Kabanda, G., (2022), “Face Recognition in Machine Learning: A Framework for Dimensionality Reduction Algorithms”, International Journal of Advanced Networking and Applications (IJANA), Volume: 14, Issue: 02, September-October, 2022, Pages: 5396-5407 (2022), ISSN: 0975-0290, http://www.ijana.in/, https://www.ijana.in/papers/V14I2-11. pdf.
- Saravanan, R., & Sujatha, P. (2018, June). A state of art techniques on machine learning algorithms: a perspective of supervised learning approaches in data classification. In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 945-949). IEEE.
- Alzubi, J., Nayyar, A., & Kumar, A. (2018, November). Machine learning from theory to algorithms: an overview. In Journal of physics: conference series (Vol. 1142, No. 1, p. 012012). IOP Publishing.
- Kabudi, T., Pappas, I., & Olsen, D. H. (2021). AI-enabled adaptive learning systems: A systematic mapping of the literature. Computers and Education: Artificial Intelligence, 2, 100017.
- Sharma, N., Sharma, R., & Jindal, N. (2021). Machine learning and deep learning applications-a vision. Global Transitions Proceedings, 2(1), 24-28
- Oh, D. Y., & Yun, I. D. (2018). Residual error based anomaly detection using auto-encoder in SMD machine sound. Sensors, 18(5), 1308.
- Malekloo, A., Ozer, E., AlHamaydeh, M., & Girolami, M. (2022). Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights. Structural Health Monitoring, 21(4), 1906-1955.
- Divya, K. S., Bhargavi, P., & Jyothi, S. (2018). Machine learning algorithms in big data analytics. Int. J. Comput. Sci. Eng, 6(1), 63-70.
- Rochan, M. (2020). Efficient deep learning models for video abstraction.
- Sáray, S., Rössert, C. A., Appukuttan, S., Migliore, R., Vitale, P., Lupascu, C. A., ... & Káli, S. (2021). HippoUnit: A software tool for the automated testing and systematic comparison of detailed models of hippocampal neurons based on electrophysiological data. PLoS computational biology, 17(1), e1008114.
- Sen, P. C., Hajra, M., & Ghosh, M. (2020). Supervised classification algorithms in machine learning: A survey and review. In Emerging technology in modelling and graphics (pp. 99-111). Springer, Singapore.
- Dargan, S., Kumar, M., Ayyagari, M. R., & Kumar, G. (2020). A survey of deep learning and its applications: a new paradigm to machine learning. Archives of Computational Methods in Engineering, 27(4), 1071-1092.
- Srivastava, N., Mansimov, E., & Salakhudinov, R. (2015, June). Unsupervised learning of video representations using lstms. In International conference on machine learning (pp. 843-852). PMLR.
- Lemenkova, P. (2018, November). Hierarchical cluster analysis by R language for pattern recognition in the bathymetric data frame: a Case study of the Mariana Trench, Pacific Ocean. In Virtual Simulation, Prototyping and Industrial Design. Proceedings of 5th International Scientific-Practical Conference (Vol. 2, No. 5, pp. 147-152).
- Nozari, H., & Sadeghi, M. E. (2021). Artificial intelligence and Machine Learning for Real-world problems (A survey). International Journal of Innovation in Engineering, 1(3), 38-47.
- Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95.
- Alpaydin, E. (2020). Introduction to machine learning. MIT press.
- Iscen, A., Tolias, G., Avrithis, Y., & Chum, O. (2019). Label propagation for deep semi-supervised learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 5070-5079).
- Jeong, J., Lee, S., Kim, J., & Kwak, N. (2019). Consistency-based semi-supervised learning for object detection. Advances in neural information processing systems, 32.
- Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," in IEEE Access, vol. 6, pp. 35365-35381, 2018, doi: 10.1109/ACCESS.2018.2836950.
- J. Zhang, L. Pan, Q. -L. Han, C. Chen, S. Wen and Y. Xiang, "Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey," in IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 3, pp. 377-391, March 2022, doi: 10.1109/JAS.2021.1004261.
- T. T. Nguyen and V. J. Reddi, "Deep Reinforcement Learning for Cyber Security," in IEEE Transactions on Neural Networks and Learning Systems, doi: 10.1109/TNNLS.2021.3121870.
- Alghamdi, M. I. (2020). Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security. International Journal of Interactive Mobile Technologies, 14(16).
- Kivunja, ,. C. & Kuyini, B. A., 2017. Understanding and Applying Research Paradigms in Educational Contexts. International Journal of Higher Education, 6(26).
- Mohajan, 2017. Qualitative Research Methodology in Social Sciences and Related Subjects. Journal of Economic Development, Environment and People, Volume 7, pp. 23-48.
- Siedlecki, S.L. (2020), “Understanding Descriptive Research Designs and Methods”, Clinical Nurse Specialist, Lippincott Williams and Wilkins, Vol. 34 No. 1, pp. 8–12.
- Kumar, M. (2022), “Classification of Research Design: Descriptive, Diagnostic, Exploratory and Experimental”.
- Casula, M., Rangarajan, N. and Shields, P. (2021), “The potential of working hypotheses for deductive exploratory research”, Quality and Quantity, Springer Science and Business Media B.V., Vol. 55 No. 5, pp. 1703–1725.
- Toyon, M.A.S. (2021), “Explanatory sequential design of mixed methods research: Phases and challenges”, International Journal of Research in Business and Social Science (2147- 4478), Center for Strategic Studies in Business and Finance SSBFNET, Vol. 10 No. 5, pp. 253–260.
- Dileep, P. K., Tröger, J. A., Hartmann, S., & Ziegmann, G. (2022). Three-dimensional shear-angle determination with application to shear-frame test. Composite Structures, 285, 115134.
- Dawson, M. (2020). National Cybersecurity Education: Bridging Defense To Offense. Land Forces Academy Review Vol. XXV, No 1(97), 2020
- Kortjan, N., & Solms, R. Von. (2014). A Conceptual Framework for Cyber-Security Awareness and Education in SA. South African Computer Journal, 52, 29-41.
- Catota, F., E., Morgan, G., Sicker, D., C. (2019). Cybersecurity education in a developing nation: the Ecuadorian environment. Journal of Cybersecurity, 2019, 1–19 doi: 10.1093/cybsec/tyz001
- South African Government Gazette, (2015). National Cybersecurity Policy Framework for South Africa.
- Rahman, N. A. A, Sairi, I. H., Zizi, N. A. M., and Khalid, F. (2020) The Importance of Cybersecurity Education in School. International Journal of Information and Education Technology, Vol. 10, No. 5, May 2020
- Nakama, D., and Paullet, K. (2019). The urgency for cybersecurity education: The impact of early college innovation in Hawaii rural communities. Information System Education Journal, vol. 16, no. 4, pp. 41-52, 2019
- Khader, M., Karam, M.,Fares, H. (2021). Cybersecurity Awareness Framework for Academia. Information 2021, 12, 417. https://doi.org/ 10.3390/info12100417
- Mutemwa, M., Masango, M. G., & Gcaza, N. (2021, December). Managing the Shift in the Enterprise Perimeter in order to delay a Cybersecurity Breach. In Proceedings of the International Conference on Artificial Intelligence and its Applications (pp. 1-10).
- Aldawood H, Skinner G (2019). Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues. Future Internet 2019, 11(3), 73; https://doi.org/10.3390/fi11030073
- Bada, M., Sasse, A. M., Nurse, J. R. C. (2019). Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
- Chowdhury, N., and Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review .Volume 40, May 2021. https://doi.org/10.1016/j.cosrev.2021.100361
- Nguyen, T. T., & Reddi, V. J. (2021). Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems.