Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula

Published: 12 November 2020 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    Agrawal, R., Srikant, R. et al. Fast algorithms for mining association rules. Proc. 20th int. conf. very large data bases, VLDB (1994), 487-499.
    [2]
    David, J., Guillet, F. and Briand, H. Association Rule Ontology Matching Approach. Int. J. Semantic Web Inf. Syst. 3, (2007), 27--49.
    [3]
    Davis, J. and Goadrich, M. The relationship between Precision-Recall and ROC curves. Proceedings of the 23rd international conference on Machine learning (2006), 233--240.
    [4]
    Grant, J. 2014. Principles of curriculum design. Understanding medical education: evidence, theory and practice. 2nd ed. (London, John Wiley & Sons, 2014), 1-4, 31--46.
    [5]
    Han, J., Pei, J. and Kamber, M. Data mining: concepts and techniques. (Elsevier, 2011).
    [6]
    Hansen, R.E. Five principles for guiding curriculum development practice: The case of technological teacher education. Journal of Industrial Teacher Education, 32, 2 (1995), 30--50.
    [7]
    Hodhod, R., Wang, S. and Khan, S. Cybersecurity Curriculum Development Using AI and Decision Support Expert System. International Journal of Computer Theory and Engineering. 10, 4 (2018), 111.
    [8]
    Jacob, J., Wei, W., Sha, K., Davari, S. and Yang, A. Is the NICE Cybersecurity Framework (NCWF) Effective for a Workforce Comprised of Interdisciplinary Majors? International Conference Scientific Computing. (2018), 124--130.
    [9]
    Joint Task Force (JTF) on Cybersecurity Education. Cybersecurity curricula 2017, curriculum guidelines for post-secondary degree programs in cybersecurity, a report in the computing curricula series. (ACM/IEEE-CS/AIS SIGSEC/IFIP WG 11.8, Version 1.0, New York, 2017).
    [10]
    Newhouse, W., Keith, S., Scribner, B. and Witte, G. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (SP 800-181), 2017.
    [11]
    Newhouse, W., Sanchez-Cherry, K., Williams, C. and Duyn, L. Van. Preliminary Draft NIST Special Publication 800-16 Cybersecurity Role Profiles for Training. NIST Special Publication. (2019).
    [12]
    NICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework. Accessed: 2019 May 19.
    [13]
    Programs, D. National Centers of Academic Excellence in Cyber Defense (CAE-CD) Designation Program Guidance CAE-CD Program Guidance. (2019), 1--3.
    [14]
    Richey, R.C., Klein, J.D., and Tracey, M.W. The instructional design knowledge base: Theory, research, and practice. (Routledge, 2010).
    [15]
    Tobey, D. H. Cybersecurity Core Curriculum Mapping Report Mapping of the National Cyberwatch Center's Curriculum to National Workforce Competency Requirements. (2017).
    [16]
    Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K.M., Nunamaker Jr, J.F., Sipior, J.C. and De Vreede, G.J. Curriculum guidelines for undergraduate degree programs in information systems. ACM/AIS task force. (2010), 3,5,78.
    [17]
    Tyler, R.W. Basic Principles of Curriculum and Instruction. (University of Chicago Press, 1949).
    [18]
    Wiles, J. Leading Curriculum Development. (Corwin Press, 2008).

    Cited By

    View all
    • (2024)Design of students’ learning state evaluation model in online education based on double improved neural networkJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-024-04765-315:4(2467-2480)Online publication date: 16-Mar-2024
    • (2023)Measurement of Student Physical Fitness Based on Association Rule Algorithm2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC)10.1109/ICAISC58445.2023.10199789(1-8)Online publication date: 16-Jun-2023

    Index Terms

    1. Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Inroads
      ACM Inroads  Volume 11, Issue 4
      December 2020
      51 pages
      ISSN:2153-2184
      EISSN:2153-2192
      DOI:10.1145/3436232
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 November 2020
      Published in INROADS Volume 11, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Popular
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Design of students’ learning state evaluation model in online education based on double improved neural networkJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-024-04765-315:4(2467-2480)Online publication date: 16-Mar-2024
      • (2023)Measurement of Student Physical Fitness Based on Association Rule Algorithm2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC)10.1109/ICAISC58445.2023.10199789(1-8)Online publication date: 16-Jun-2023

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Digital Edition

      View this article in digital edition.

      Digital Edition

      Magazine Site

      View this article on the magazine site (external)

      Magazine Site

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media