Dr.Chales KimABDULLAH ZABBAR ALRUHAYMI2022-06-042022-02-052022-06-04110023https://drepo.sdl.edu.sa/handle/20.500.14154/64324To work with a cybersecurity database then to make part of the data missing . Impute the missingness with three different approaches . then study the affect for Cyber Threat.158enData Analytics and Imputation for Detecting Cyber ThreatThesis