Research on Cluster Analysis Method in the E-Government

Article Preview

Abstract:

In February 27, 2014, the central network security and information leading group were set up, the general secretary of the CPC Central Committee, President and chairman of the Central Military Commission Xi Jinping himself is as a leader, which shows that the top deepen comprehensively reform and strengthen top-level design. It also shows the determination to promote the informationization development in protecting network security and safeguard national interests. Based on the status of E-government, we analyze the connotation of e-government and its safety features in the development process and summary the security demand of E-government. On the basis of E-government security system, combining with data mining features of clustering algorithm, we construct the E-government security detection model, and apply the FCM clustering algorithm to do simulation model test. The results show that the model has obvious effect and strong practicability.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5668-5671

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Pan Rongkun. The problem of information security for e-government system and countermeasures [J]. E-government, 2010(1): 45-50.

Google Scholar

[2] Ye Peihua. Study on application of information security problem of E-government in China [J]. Chinese management information, 2012(3): 15-19.

Google Scholar

[3] Patcha, A., Park, J. -M. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks Information Assurance Workshop. Proceedings from the Fifth Annual IEEE SMC 10-11, 2011(3): 280-284.

DOI: 10.1109/iaw.2004.1437828

Google Scholar

[4] Christopher M. King (Chang Xiaobo translating). The design, deployment and operation of the security architecture [M]. Tsinghua University press, 2012(3): 34-52.

Google Scholar

[5] Leknes, Einar. The roles of EIA in the decision-making process, Environmental Impact Assessment Review, 2012(3): 309-334.

DOI: 10.1016/s0195-9255(00)00081-0

Google Scholar

[6] Gaffney, J.E., Jr., Ulvila, J.W. Evaluation of intrusion detectors: a decision theory approach [J]. Security and Privacy, 2011(3): 456-463.

DOI: 10.1109/secpri.2001.924287

Google Scholar

[7] Zhang Benqun. E-government system of information security risk assessment based on risk theory [J]. Microelectronics and computer, 2012(1): 78-84.

Google Scholar