Open Access

The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity

   | May 03, 2024

Cite

Suhail, S., Malik, S. U. R., Jurdak, R., Hussain, R., Matulevicius, R., & Svetinovic, D. (2022). Towards situational aware cyber-physical systems: a security-enhancing use case of blockchain-based digital twins. Computers in Industry(141-), 141. Search in Google Scholar

Christian J. D’Orazio, Choo, K. K. R., & Yang, L. T. (2017). Data exfiltration from Internet of things devices: ios devices as case studies. IEEE Internet of Things Journal. Search in Google Scholar

Dlamini, M. T., Eloff, J. H. P., Venter, H. S., & Eloff, M. M. (2021). Cbac4c: conflict-based vm isolation control for cloud computing. International Transactions in Operational Research. Search in Google Scholar

Massaro, A., Gargaro, M., Dipierro, G., Galiano, A. M., & Buonopane, S. (2020). Prototype cross platform oriented on cybersecurity, virtual connectivity, big data and artificial intelligence control. IEEE Access, 8, 197939-197954. Search in Google Scholar

Lee, S., Huh, J. H., & Kim, Y. (2020). Python tensorflow big data analysis for the security of korean nuclear power plants. Electronics, 9(9), 1467. Search in Google Scholar

Feng, J., Yang, L. T., Dai, G., Wang, W., & Zou, D. (2018). A secure higher-order lanczos-based orthogonal tensor svd for big data reduction. IEEE Transactions on Big Data, 1-1. Search in Google Scholar

Haleem, A., Javaid, M., Singh, R. P., Rab, S., & Suman, R. (2022). Perspectives of cybersecurity for ameliorative industry 4.0 era: a review-based framework. Industrial Robot(3), 49. Search in Google Scholar

Nguyen, T., Gosine, R., & Warrian, P. (2020). A systematic review of big data analytics for oil and gas industry 4.0. IEEE Access, PP(99), 1-1. Search in Google Scholar

Liu, Peng, Erbacher, Robert, F., Yen, & John, et al. (2019). Learning from experts’ experience: toward automated cyber security data triage. IEEE Systems Journal. Search in Google Scholar

Hossain, E., Khan, I., Un-Noor, F., Sikander, S. S., & Sunny, M. S. H. (2019). Application of big data and machine learning in smart grid, and associated security concerns: a review. IEEE Access, 13960-13988. Search in Google Scholar

Choo, K. K. R., Conti, M., & Dehghantanha, A. (2019). Special issue on big data applications in cyber security and threat intelligence – part 2. IEEE transactions on big data(5-4). Search in Google Scholar

Tang, M. J., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data, PP(99), 1-1. Search in Google Scholar

Sabar, N. R., Yi, X., & Song, A. (2018). A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access, PP(99), 1-1. Search in Google Scholar

Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: from securing big data to data-driven security. IEEE Transactions on Services Computing, 1-1. Search in Google Scholar

Xie, L., Hang, F., Guo, W., Lv, Y., Ou, W., & Shibly, F. H. A. (2021). Network security defence system based on artificial intelligence and big data technology. International journal of high performance systems architecture(3/4), 10. Search in Google Scholar

Jensen, KristofferHai Thanh NguyenThanh Van DoArnes, Andre. (2017). A big data analytics approach to combat telecommunication vulnerabilities. Cluster computing, 20(3). Search in Google Scholar

Rashid, A. N., Ahmed, M., Sikos, L. F., & Haskell-Dowland, P. S. (2022). Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection. ACM Transactions on Management Information Systems (TMIS). Search in Google Scholar

Hussain, A., Al-Dubai, A., Buchanan, B., Huang, K., & Alimi, A. M. (2018). Special issue on “big data analytics for secure and smart environmental services”. Remote Sensing. Search in Google Scholar

Wazid, M., Das, A. K., Hussain, R., Succi, G., & Rodrigues, J. J. P. C. (2018). Authentication in cloud-driven iot-based big data environment: survey and outlook. Journal of Systems Architecture. Search in Google Scholar

Zhao, L., Zhu, D., Shafik, W., Matinkhah, S. M., Ahmad, Z., & Sharif, L., et al. (2022). Artificial intelligence analysis in cyber domain: a review:. International Journal of Distributed Sensor Networks, 18(4), 121-131. Search in Google Scholar

Eklas Hossain, Imtiaj Khan, Fuad Un-Noor, Sarder Shazali Sikander, & Md. Samiul Haque Sunny. (2019). Application of big data and machine learning in smart grid, and associated security concerns: a review. IEEE Access. Search in Google Scholar

Andrade, R. O., Yoo, S. G., Oquendo, L. T., & Iván Ortiz-Garcés. (2020). A comprehensive study of the iot cybersecurity in smart cities. IEEE Access, 1-1. Search in Google Scholar

eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics