ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Intelligence Techniques for e-government applications

Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.4, No. 2)

Publication Date:

Authors : ; ; ; ;

Page : 006-020

Keywords : E-government; Cyber Security models; Intrusion detection (ID); Penetration testing; Neural Networks; Fuzzy Logic; Genetic algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper introduces intelligence security strategy approaches. The successful implementation of the egovernment depends on the viable security. E-government security is considered one of the crucial factors for achieving an advanced stage of e-government. In this research we focused on several techniques, algorithms, approaches and different areas of data mining technique models in Cyber Security from different perspectives, to establish a classification and comparison of various types of Intrusion Detection and Countermeasures in E-government of this researches, Intelligent Technique Approaches categorization that reflect the important criteria of the data mining models. It summarizes various Intelligent Data analyses and presents an Intelligent Data Analysis of “Cairo Cleaning and Beautification Agency”; establishing such a classification impacts deeply guiding data mining applications towards better operations and performance. Moreover how data mining can help in detection and prevention of these attacks. Information security violations such as access control violations as well as a discussion of various threats are presented. Finally we present a comparative analysis between selected models to improve security.

Last modified: 2015-05-15 19:51:01