Reference no: EM132385476
NIT3202 Data Analytics for Cyber Security Assignment
Victoria University
Objectives
• To apply skills and knowledge acquired throughout the semester in classification algorithms and machine learning process.
• To rationalize the use of machine learning algorithms to effectively and efficiently process of data in big size.
• To demonstrate ability to use R to perform email classification tasks that are common for corporate security analyst.
• To scientifically conduct and document machine learning experiments for analytics purposes.
Problem Statement
This is an individual assessment task. Each student is required to submit a report of approximately 2,000-2,500 words along with exhibits to support findings with respect to the provided spam and non-spam messages. This report should consist of:
• Overview of classifiers and evaluation metrics
• Construction of data sets, identification of features and the process of conducting classification
• Technical findings of experiment results
• Justified discussion of the performance evaluation outcomes for different classifiers
To demonstrate your achievement of these goals, you must write a report of at least 2,000 words (2,500 words maximum). Your report should consist of the following chapters:
1. A proper title which matches the contents of your report.
2. Your name and student number in the author line.
3. An executive summary which summarizes your findings. (You may find hints on writing good executive summaries from)
4. An introduction chapter which lists the classification algorithms of your choice (at least 5 algorithms), the features used for classification, the performance evaluation metrics (at least 5 evaluation metrics), the brief summary of your findings, and the organization of the rest of your report. (You may find hints on features used for classification from Twitter Developer Documentation)
5. A literature review chapter which surveys the latest academic papers regarding the classifiers and performance evaluation metrics of your choice. With respect to each classifier and performance evaluation metrics, you are advised to identify and cite at least one paper published by ACM and IEEE journals or conference proceedings. In addition, Your aim of this part of the report is to demonstrate deep and thorough understanding of the existing body of knowledge encompassing multiple classification techniques for security data analytics, specifically, your argument should explain why machine learning algorithms should be used rather than human readers.
6. Technical demonstration chapter which consists of fully explained screenshots when your experiments were conducted in R. That is, you should explain each step of the procedure of classification, and the performance results for your classifiers. Note, what classifiers you presented in literature review should be what you conduct experiments.
7. Performance evaluation chapter which evaluates the performance of classifiers. You should analyze each classifier's performance with respect to the performance metrics of your choice. In addition, you should compare the performance results in terms of evaluation metrics, e.g., accuracy, false positive, recall, F-measure, speed and so on, for the selected classifiers and datasets.
8. A conclusions chapter which summarizes major findings of the study (You should use at least 5 evaluation metrics to evaluate the performance of classifiers and compare the performance of different classifiers. You can demonstrate your experiment results in the form of table and plots), discusses whether the results match your hypotheses prior to the experiments and recommends the best performing classification algorithm.
9. A bibliography list of all cited papers and other resources. You must use in-text citations in Harvard style and each citation must correspond to a bibliography entry. There must be no bibliography entries that are not cited in the report.
Attachment:- Data Analytics for Cyber Security Assignment.rar
Prepare a article review for a social work statistics
: Prepare a article review for a social work statistics with the proper points. There should be a brief literature review, methods, results and discussion.
|
Derive a regular expression for the language
: Consider the automaton on page 15 in Milner's book, with the initial state as accepting state. Derive a regular expression for the language
|
Build on your existing work by implementing application
: Build on your existing work by implementing simple application binary interfaces that use System Calls to request services from the operating system.
|
Essay on problems of the youth today
: Write essay on Problems of the youth today.
|
NIT3202 Data Analytics for Cyber Security Assignment
: NIT3202 Data Analytics for Cyber Security Assignment help and solution, Victoria University, Assessment help - conduct and document machine learning experiments
|
MNG93220 - Project Procurement and Contract Management
: MNG93220 - Project Procurement and Contract Management Assignment Help and Solutions, Southern Cross University Australia
|
How did teacher instruct the content and language objectives
: How did the teacher instruct the content and language objectives? What types of strategies, interactions, applications, and assessments were implemented?
|
How you would group the students for in-class activities
: In a 500-750 word essay, describe how you would group these students for in-class English language arts activities. Include a rationale for your choices.
|
Discuss the outcome of the best analysis
: Using graphs (histogram and P-P plot) to support your answer, comment on the suitability of parametric statistics to analyse this data
|