Abstract

Research creates both knowledge and technology which are put into practical use through the process of innovation. The success in achieving applied scientific technologies can be measured in the form of technological solutions, patents, inventions, published research papers, etc. The purpose of the research was to formulate an economic framework and develop technological solutions for Zimbabwe with respect to knowledge generation, innovation and enterprise development. This was compounded by an exploration for opportunities in cybersecurity and machine learning for use in the knowledge generation and dissemination business. Cybersecurity is an amalgamation of technologies, processes and operations purposed to preserve and protect computer information systems from cyber-attacks or unauthorized access. Machine Learning (ML) entails the automatic data analysis of large data sets and production of models for the general relationships found among data. The Pragmatism paradigm was used as the research philosophy in this research as it epitomizes the congruity between knowledge and action. The qualitative aspect was primarily used in the knowledge generation component which was based on an integral research architecture which combines descriptive, narrative, theoretical, and experimental survey methods, through focused group discussions as the major research design. The quantitative dimension used an experiment as a research design to explore prototype models for cybersecurity and machine learning. Priority projects for strategic investment were identified for commercialization and these were on post-harvest technologies; small scale mining/mineral value addition/bio mining; clean water alternatives; tiles technologies from mining waste; ICT innovations in Machine Learning and Cybersecurity; and defence technologies. A Bayesian Network model for Cybersecurity was developed to guide implementation of future cybersecurity systems in Africa. The research used the KDDCup 1999 intrusion detection benchmark dataset in order to build an efficient network intrusion detection system. The sample comprised primary data with 42 variables in a set of 494,020 instances that was analysed using mainly the SNORT open-source software and other Bayesian Network supportive platforms. A Bayesian Network model was developed which took into consideration the most efficient ML algorithms.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.