ABSTRACT
Implementation of new ICT technologies aims at improving government services all over the world. The main agent technology in ICT technology based artificial intelligence in the proposed e-service is that it recognizes a cyber-attack after the state has completed the e-form on the website approved by any citizen and sends out the obtained results of the computer scan. Intelligent e-service decides whether to post the threat to a computer emergency response team of the Ministry of Interior or reject it after the final danger parameters have been obtained. This 1paper presents possible support decision system in the process that detects malicious code.
- Pivk, Aleksander, and Matjaž Gams. 2000. Intelligent Agents in E-commerce. Electrotechnical Review, 67(5), 251--260.Google Scholar
- Barbara Hayes-Roth. 1995. An architecture for adaptive intelligent systems. Artif. Intell. 72, 1 -2 (January 1995), 329--365. Google ScholarDigital Library
- Lu, Jie, Da Ruan, and Guangquan Zhang. 2007. E-Service Intelligence. Springer-Verlag Berlin Heidelberg.Google Scholar
- Rizmal, Irina., Radunović, Vladimir. and Krivokapić, Dorđe. 2016. Guide through information security in the Republic of Serbia, Organization for Security and Co-operation in Europe, (5 October 20016). Retrieved February 3, 2018 from https://www.osce.org/serbia/272171Google Scholar
- Law on Information Security. Official Gazette of RS, issue no. 6/16. Retrieved from http://www.parlament.gov.rsGoogle Scholar
- Virustotal. 2018. Free online virus, malware and url scanner. Retrieved from http://virustotal.com.Google Scholar
- Liu, Shuhua Monica, and Qianli Yuan. 2015. Special Issue Article: The evolution of information and communication technology in public administration. Public Administration and Development, 35(2), 140--151.Google ScholarCross Ref
- Lolić, Teodora, Dušnaka Dakić, Ivan Miković, and Darko Stefanović. 2017. Electronic government at the local level in the Republic of Serbia. In Proceeding of the 10th International Scientific Conference "Science and Higher Education in Function of Sustainable Development" (SED'17). BTC, Mećavnik-Drvengrad, Užice, Serbia, 35--40.Google Scholar
- Ian M. Chapman, Sylvain P. Leblanc, and Andrew Partington. 2011. Taxonomy of cyber attacks and simulation of their effects. In Proceedings of the 2011 Military Modeling & Simulation Symposium (MMS '11). Society for Computer Simulation International, San Diego, CA, USA, 73--80. Google ScholarDigital Library
- Andreas Schuster. 2008. The impact of Microsoft Windows pool allocation strategies on memory forensics. Digit. Investig. 5 (September 2008), S58-S64. Google ScholarDigital Library
- Ross, Timothy J. 2009. Fuzzy logic with engineering applications. John Wiley & Sons. NY.Google Scholar
- Casillas, Jorge, Oscar Cordón, Francisco Herrera, and Luis Magdalena. 2003. Accuracy Improvements to Find the Balance Interpretability-Accuracy in Linguistic Fuzzy Modeling: An Overview. In Accuracy Improvements in Linguistic Fuzzy Modeling, Casillas, Jorge, Oscar Cordón, Francisco Herrera, and Luis Magdalena (Eds). Studies in Fuzziness and Soft Computing, Vol 129. Springer, Berlin, Heidelberg, 3--24.Google Scholar
- Pasquale De Meo, Giovanni Quattrone, and Domenico Ursino. 2008. A decision support system for designing new services tailored to citizen profiles in a complex and distributed e-government scenario. Data Knowl. Eng. 67, 1 (October 2008), 161--184. Google ScholarDigital Library
- Phyu, Thu Zar, and Nyein Nyein Oo. 2016. Performance Comparison of Feature Selection Methods. In MATEC Web of Conferences, Vol. 42. EDP Sciences, 06002-p.2- 06002-p.4.Google Scholar
- Chandrashekar, Girish, and Ferat Sahin. 2014. A survey on feature selection methods. Computers & Electrical Engineering. 40(1). 16--28. Google ScholarDigital Library
- Zdravko Markov and Ingrid Russell. 2006. An introduction to the WEKA data mining system. SIGCSE Bull. 38, 3 (June 2006), 367--368. Google ScholarDigital Library
- Rakesh Agrawal, Tomasz Imieliński, and Arun Swami. 1993. Mining association rules between sets of items in large databases. SIGMOD Rec. 22, 2 (June 1993), 207--216. Google ScholarDigital Library
Index Terms
- Intelligent E-Service for Detecting Malicious Code Based Agent Technology
Recommendations
Technology adoption in the public sector: an exploratory study of e-government in Malaysia
ICEGOV '07: Proceedings of the 1st international conference on Theory and practice of electronic governanceAll around the world, the quest to improve government service delivery is becoming an important agenda for most governments. Information and Communications Technology (ICT) and the Internet in particular have opened new possibilities for the government ...
Exploring the Impact of Mobile Technology Adoption on Financial Sustainability of Telecentres: The case of India
ICEGOV '19: Proceedings of the 12th International Conference on Theory and Practice of Electronic GovernanceDeveloping countries, with limited ICT resources available, are heavily dependent upon Telecentres for delivery of e-Government services to citizens, especially in rural areas. As a result, success of e-Governance initiatives in these countries is ...
E-government and transformation of governance and service delivery in Bangladesh: a developing country perspective
ICEGOV '12: Proceedings of the 6th International Conference on Theory and Practice of Electronic GovernanceAs elsewhere around the world, lately e-government has become a major component of governmental policy in Bangladesh. It has received a particular push with the launch of 'Digital Bangladesh'. The twin pillars of the campaign - 'connecting citizens' and ...
Comments