Research on Network Crime and Security Strategy Based on K-means Cluster Analysis Model
DOI: 10.23977/acss.2025.090214 | Downloads: 4 | Views: 229
Author(s)
Zimeng Hui 1, Kaiwen Zhao 1
Affiliation(s)
1 School of Business, Xi'an International Studies University, Xi'an, Shaanxi, China
Corresponding Author
Kaiwen ZhaoABSTRACT
Cyber security is one of the important issues in global territorial governance, which concerns the security, stability, economic development and public interests of a country and even the whole world. This paper mainly studies the distribution pattern of global cybercrime and establishes the index system of global cybercrime index (GCI). According to the entropy weight method, the top three countries in the global cybercrime index are Indonesia, Tunisia and Nigeria. Countries with an index size above 3.50 are divided according to different geographical characteristics, and the regions with a high proportion of global cybercrime index are Europe, the Pacific region, the tropical region, the Eastern Hemisphere and the coastal region. The K-means cluster analysis model is established, and it is concluded that the countries with high density of cyber crimes include Indonesia, Tunisia, Nigeria, etc. Countries with high success rates include the United States, Switzerland, Serbia, etc. Countries with high rates of reported cybercrime incidents include Albania, Argentina and Armenia. Countries with high litigation rates include Panama, South Korea and Lithuania. The global distribution of cybercrime presents a relatively common pattern, which requires countries to prevent and improve laws and policies in different regions.
KEYWORDS
Cyber Security; WCI Index System; Entropy Weight Method; K-MeansCITE THIS PAPER
Zimeng Hui, Kaiwen Zhao, Research on Network Crime and Security Strategy Based on K-means Cluster Analysis Model. Advances in Computer, Signals and Systems (2025) Vol. 9: 113-119. DOI: http://dx.doi.org/10.23977/acss.2025.090214.
REFERENCES
[1] Tan Youzhi. Global Governance of Cyberspace: International Situation and Chinese Path[J]. World Economy and Politics, 2013(12):18.
[2] Kwon D, Borrion H, Wortley R.Measuring Cybercrime in Calls for Police Service[J].Asian Journal of Criminology, 2024,19(3):329-351.
[3] Hegarty K,Wilken R,Meese J, et al.Shaping infrastructural futures: The International Telecommunication Union's visions for mobile communications and the anticipatory politics of 5G standardization[J].Mobile Media & Communication, 2025,13(1):171-191.
[4] Xiang W, Yuanhao M,Hao L, et al.Clustering Optimized Portrait Matting Algorithm Based on Improved Sparrow Algorithm[J].Tehnički vjesnik,2023,30(6):1911-1919.
[5] Parveen S, Yang S M. Lasso-Based k-Means++ Clustering [J]. Electronics, 2025, 14(7): 1429-1429.
[6] Kalpit S,Arunabha M. Kernel naïve Bayes classifier-based cyber-risk assessment and mitigation framework for online gaming platforms[J].Journal of Organizational Computing and Electronic Commerce,2021,31(4):343-363.
Downloads: | 38554 |
---|---|
Visits: | 698000 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks