Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula

Published: 12 November 2020 Publication History
First page of PDF

References

[1]
Agrawal, R., Srikant, R. et al. Fast algorithms for mining association rules. Proc. 20th int. conf. very large data bases, VLDB (1994), 487-499.
[2]
David, J., Guillet, F. and Briand, H. Association Rule Ontology Matching Approach. Int. J. Semantic Web Inf. Syst. 3, (2007), 27--49.
[3]
Davis, J. and Goadrich, M. The relationship between Precision-Recall and ROC curves. Proceedings of the 23rd international conference on Machine learning (2006), 233--240.
[4]
Grant, J. 2014. Principles of curriculum design. Understanding medical education: evidence, theory and practice. 2nd ed. (London, John Wiley & Sons, 2014), 1-4, 31--46.
[5]
Han, J., Pei, J. and Kamber, M. Data mining: concepts and techniques. (Elsevier, 2011).
[6]
Hansen, R.E. Five principles for guiding curriculum development practice: The case of technological teacher education. Journal of Industrial Teacher Education, 32, 2 (1995), 30--50.
[7]
Hodhod, R., Wang, S. and Khan, S. Cybersecurity Curriculum Development Using AI and Decision Support Expert System. International Journal of Computer Theory and Engineering. 10, 4 (2018), 111.
[8]
Jacob, J., Wei, W., Sha, K., Davari, S. and Yang, A. Is the NICE Cybersecurity Framework (NCWF) Effective for a Workforce Comprised of Interdisciplinary Majors? International Conference Scientific Computing. (2018), 124--130.
[9]
Joint Task Force (JTF) on Cybersecurity Education. Cybersecurity curricula 2017, curriculum guidelines for post-secondary degree programs in cybersecurity, a report in the computing curricula series. (ACM/IEEE-CS/AIS SIGSEC/IFIP WG 11.8, Version 1.0, New York, 2017).
[10]
Newhouse, W., Keith, S., Scribner, B. and Witte, G. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (SP 800-181), 2017.
[11]
Newhouse, W., Sanchez-Cherry, K., Williams, C. and Duyn, L. Van. Preliminary Draft NIST Special Publication 800-16 Cybersecurity Role Profiles for Training. NIST Special Publication. (2019).
[12]
NICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework. Accessed: 2019 May 19.
[13]
Programs, D. National Centers of Academic Excellence in Cyber Defense (CAE-CD) Designation Program Guidance CAE-CD Program Guidance. (2019), 1--3.
[14]
Richey, R.C., Klein, J.D., and Tracey, M.W. The instructional design knowledge base: Theory, research, and practice. (Routledge, 2010).
[15]
Tobey, D. H. Cybersecurity Core Curriculum Mapping Report Mapping of the National Cyberwatch Center's Curriculum to National Workforce Competency Requirements. (2017).
[16]
Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K.M., Nunamaker Jr, J.F., Sipior, J.C. and De Vreede, G.J. Curriculum guidelines for undergraduate degree programs in information systems. ACM/AIS task force. (2010), 3,5,78.
[17]
Tyler, R.W. Basic Principles of Curriculum and Instruction. (University of Chicago Press, 1949).
[18]
Wiles, J. Leading Curriculum Development. (Corwin Press, 2008).

Cited By

View all
  • (2024)Design of students’ learning state evaluation model in online education based on double improved neural networkJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-024-04765-315:4(2467-2480)Online publication date: 16-Mar-2024
  • (2023)Measurement of Student Physical Fitness Based on Association Rule Algorithm2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC)10.1109/ICAISC58445.2023.10199789(1-8)Online publication date: 16-Jun-2023
  1. Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Inroads
    ACM Inroads  Volume 11, Issue 4
    December 2020
    51 pages
    ISSN:2153-2184
    EISSN:2153-2192
    DOI:10.1145/3436232
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 November 2020
    Published in INROADS Volume 11, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Popular
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Design of students’ learning state evaluation model in online education based on double improved neural networkJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-024-04765-315:4(2467-2480)Online publication date: 16-Mar-2024
    • (2023)Measurement of Student Physical Fitness Based on Association Rule Algorithm2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC)10.1109/ICAISC58445.2023.10199789(1-8)Online publication date: 16-Jun-2023

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Digital Edition

    View this article in digital edition.

    Digital Edition

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media