การวิเคราะห์แนวทางการพัฒนาการตรวจสอบและแจ้งเตือนการรักษาความมั่นคงปลอดภัยของระบบปฎิบัติการด้วยการประยุกต์ใช้โมเดลออโตมาตา
Keywords:
Inspection, Security, Operating System, Automata ModelAbstract
This study aims to examine the challenges and state of operating system security to develop methods for monitoring, surveillance, and alerting. It uses data analysis techniques, including frequency, percentage, mean, and standard deviation. The findings are as follows: Part 1 shows data management testing at 4.98%. Part 2's analysis and reporting stand at 4.93%. Part 3's alerting methods account for 4.98%. Part 4 discusses developing inspection and alerting methods using automata models, which were found to be at a significantly high level.
References
Molina-Granja F, Molina L, Velasco D, Allauca G, Senthikumar G, Swaminathan N. Demand and employability for the career of engineering in computer security. Inventive Communication and Computational Technologies Conference 2022;383:533-42.
Plerdplern W. The cybersecurity skills development of national cyber security agency [Master of Public Administration]. Bangkok, Thailand: Ramkhamhaeng University; 2022. (In Thai)
Lin J. Research on the security of the application of computer technology and electronic information engineering technology. Journal of Physics Conference Series 2021;1744(3): 032126. doi:10.1088/1742-6596/1744/3/032126.
Zhigalov K, Guzueva E, Polovneva S. Automation security in a machine-building plant. IOP Conference Series: Materials Science and Engineering 2021;1111:012067. doi: 10.1088/ 1757-899X/1111/1/012067
Molisakulmongkol P, Praneetpolgrang P, Soonthornsaratul M, Weerakulwattana S, Wuttipornpong A. Operating systems. Bangkok, Thailand: Duangkamonsamai; 2002. (In Thai)
Jungsamarn S, Pangsuk P. Development of surgical safety checklist in operating room in Surin hospital. Udonthani Hospital Medical Journal 2020;28(2):130-42. (In Thai)
Nilmanee P. The relationship between the perception and the use of computer information security systems: a case study of Thairath group [master of business administration]. Pathumthani, Thailand: Rajamangala University of Technology Thanyaburi; 2018. (In Thai)
Gu J, Hua Z, Li M, Chen H. Innovations and applications of operating system security with a hardware-software co-design. Chineses Science Bulletin 2022;67(32):3862-71.
Sipser M. Introduction to the theory of computation. 3rd ed. Boston, USA: Cengage Learning; 2012.
Imsuwan S, Vorarat S. Using automation testing test the software web application: case study of information and communication technology company. DPU Graduate Studies Journal 2018;7(1):1186-97. (In Thai)
Dataset.world. Cyber security (performance measure 5.12) [Internet]. 2020 [cited 2024 January 20]. Available from: https://data.world/datasets/performance-measures
Rohini N, Sharmila B. RT-IoT2022 [Internet]. 2024 [cited 2024 January 20]. Available from: https://archive.ics.uci.edu/dataset/942/rt-iot2022.
Wikipedia. SPSS statistics [Internet]. 1968 [cited 2024 January 20]. Available from: https://en.wikipedia.org/wiki/SPSS
Wikipedia. MATLAB programming language. [Internet]. 1970s [cited 2024 January 20]. Available from: https://en.wikipedia.org/wiki/MATLAB
Wikipedia. Waikato Environment for Knowledge Analysis (WEKA) [Internet]. 2022 [cited 2024 January 20]. Available from: https://en.wikipedia.org/wiki/Weka_(software)
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Kasem Bundit University
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
*Copyright
The article has been published in Kasem Bundit Engineering Journal (KBEJ) is the copyright of the Kasem Bundit University. Do not bring all of the messages or republished except permission from the university.
* Responsibility
If the article is published as an article that infringes the copyright or has the wrong content the author of article must be responsible.