Cybersecurity Policy Classification, National Clustering, and Transnational Transfer Based on SVM and HCA
DOI:
https://doi.org/10.54097/6ad2ng14Keywords:
Support vector machine, hierarchical clustering analysis, multiple linear regression.Abstract
This paper proposes a cybersecurity policy analysis and transfer model integrating natural language processing (NLP), support vector machines (SVM), hierarchical cluster analysis (HCA), and network analysis. It focuses on exploring the patterns of utility flow in policy classification, country clustering, and policy transfer. First, a dataset is constructed by extracting policy text word vectors using TF-IDF. SVM classifies policies into four categories: prevention, accountability, cooperation, and emergency response. Policy effectiveness is calculated by comparing crime counts between control and experimental groups. Second, using per capita GDP, higher education enrollment rate, and internet penetration rate as indicators, countries undergo data standardization. Euclidean distance measures clustering distance, and HCA categorizes 141 countries into five groups. Finally, a multiple linear regression model linking countries and cybercrime was constructed. The policy transfer guidance coefficient (incorporating non-transfer scenarios and the weakest-link effect) was defined. Combined with cosine similarity calculations for country similarity, relative policy effect coefficients were derived. Network analysis visualized policy efficacy diffusion. This model enables precise policy classification, scientific country clustering, and efficient policy transfer. Its advantage lies in integrating multiple algorithms to enhance the scientific rigor of analysis and policy transfer.
Downloads
References
[1] Zhang Chenfang, Xia Zhijie, Wang Yiming. Quantitative Analysis of China's Cybersecurity Policy Content from a Policy Instrument Perspective: Based on National Policy Texts from 2015 to 2020 [J]. Journal of Information Resources Management, 2021, 11 (03): 99-109+120. DOI:10.13365/j.jirm. 2021.03.099.
[2] Jiang Haoda, Zhao Chunlei, Chen Han, et al. A Method for Constructing Domain-Specific Sentiment Dictionaries Based on Improved TF-IDF and BERT [J]. Computer Science, 2024, 51 (S1): 162-170. DOI: CNKI:SUN:JSJA.0.2024-S1-020.
[3] Guo Li, Sun Hua. A Traffic Classification Method for Power Data Communication Networks Based on K-means and Support Vector Machines (SVM). Network Security Technology and Application, 2024, (04): 64-66. DOI: CNKI:SUN:WLAQ.0.2024-04-022.
[4] Guo Fang, Liu Xinyong, Zhang Jun, et al. Analysis of Water Quality Variation Characteristics in Typical Years of the Central Route Main Canal of the South-to-North Water Diversion Project Based on Hierarchical Clustering and Water Quality Index Method [J]. Journal of Environmental Engineering, 2024, 18 (03): 644-652.
[5] Xiong Jianfang, Feng Wen, Gao Ji, et al. Design and Implementation of a Linear Regression-Based Meteorological Data Forecasting and Visualization System [J]. Modern Information Technology, 2024, 8 (23): 133-137+144. DOI:10.19850/j.cnki.2096-4706.2024.23.026.
[6] Ji Shan, Wei Jiang, and Xin Jing. “A Power Load Forecasting Method Based on Cosine Similarity and Graph Convolutional Networks.” Zhejiang Electric Power 44.01 (2025): 68-75. doi:10.19585/j.zjdl.202501007.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







