The authors discuss the risk factors associated with the collaborative development of information systems (IS) within the university environment in Nigeria. They use observations and reviews of relevant reports of the project as well as a variation of the Delphi Study in presenting their findings. The study shows that risks were associated with funding, top administrators' commitment, the number of participating universities, the role of the donor, as well as other factors. In addition, the challenges posed by each risk factor and the lessons learned are presented. Primarily, the study reports the scenario of IS development by universities in a developing economy in which the development process is characterized by collaboration. Opportunities for future research on the issue are also outlined. C 2006 Wiley Periodicals, Inc.
In this paper, a Fuzzy Association Rule Mining (FARM) with expert-driven approach is proposed to acquire a knowledge-base, which corresponds more intuitively to human perception with a high comprehensibility. This approach reduces the number of rules in the knowledge-base when compared with the Standard Rule-base Formulation (SRF) and makes possible the rating of the rules according to their relevance. The rule relevance is determined by the measures of significance and certainty factors. The approach is validated using a medical database and the result shows that this approach ultimately reduces the number of rules and enhances the comprehensibility of the expert system.
The prediction of cyberattacks has been a major concern in cybersecurity. This is due to the huge financial and resource losses incurred by organisations after a cyberattack. The emergence of new applications and disruptive technologies has come with new vulnerabilities, most of which are novel – with no immediate remediation available. Recent attacks signatures are becoming evasive, deploying very complex techniques and algorithms to infiltrate a network, leading to unauthorized access and modification of system parameters and classified data. Although there exists several approaches to mitigating attacks, challenges of using known attack signatures and modeled behavioural profiles of network environments still linger. Consequently, this paper discusses the use of unsupervised statistical and supervised deep learning techniques to predict attacks by mapping hyper-alerts to class labels of attacks. This enhances the processes of feature extraction and transformation, as a means of giving structured interpretation of the dynamic profiles of a network.Keywords: Alert correlation, Cyberattack prediction, Cybersecurity, Deep learning, Cyberattacks, Supervised and Unsupervised LearningVol. 26 No 1, June 2019
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.