2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA) 2018
DOI: 10.1109/icbda.2018.8367651
|View full text |Cite
|
Sign up to set email alerts
|

Association rules mining analysis of app usage based on mobile traffic flow data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…This paper only focused on objective interestingness measure using support, confidence and lift to measure the meaningful and reliable association ruleset that were used to guide security analysts in making decisions. The thresholds for minimum support (minsup) and minimum confidence (minconf) were predefined manually by using trial and error method [7], [19], [22]. The summary of the association rules generated for all the datasets is depicted in Table XI using Apriori Algorithm.…”
Section: B Results Of Evaluation and Validation For Cti-armentioning
confidence: 99%
See 2 more Smart Citations
“…This paper only focused on objective interestingness measure using support, confidence and lift to measure the meaningful and reliable association ruleset that were used to guide security analysts in making decisions. The thresholds for minimum support (minsup) and minimum confidence (minconf) were predefined manually by using trial and error method [7], [19], [22]. The summary of the association rules generated for all the datasets is depicted in Table XI using Apriori Algorithm.…”
Section: B Results Of Evaluation and Validation For Cti-armentioning
confidence: 99%
“…Agrawal and Srikant developed this algorithm to study customers' purchasing behavior in supermarkets where goods are often purchased together by customers [4]. Besides, the Apriori Algorithm has also been used successfully in many areas of daily life, including energy, recruitment, communication protocol, monitoring and network traffic behavior [7]. Hence, the implementation of the Apriori Algorithm in determining malicious network traffic behavior can help security analysts to study attacker behavior in conducting cyberattack.…”
Section: A Cyber Threat Intelligence (Cti) For Threat Attributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Agrawal [9] developed this algorithm to study customers' purchasing behavior in supermarkets where goods are often purchased together by customers. Besides, Apriori Algorithm also has been used in many areas of daily life successfully, including energy, recruitment, communication protocol, monitoring and network traffic behavior [10]. Hence the implementation of Apriori Algorithm in determining network traffic behavior can help security analysts to study attacker behavior in conducting cyberattack.…”
Section: Wherementioning
confidence: 99%
“…As discussed in Section 2, this paper will only focus on objective interestingness measure specifically using support, confidence and lift. While, the thresholds for minimum support (minsup) and minimum confidence (minconf) are manually defined by user [20][21] [10]. Table III depicts the top five association rules with respect to lift measure.…”
Section: Association Rule Evaluation Usingmentioning
confidence: 99%