Uneingeschränkter Zugang

The Role of Mining and Detection of Big Data Processing Techniques in Cybersecurity

  
03. Mai 2024

Zitieren
COVER HERUNTERLADEN

Suhail, S., Malik, S. U. R., Jurdak, R., Hussain, R., Matulevicius, R., & Svetinovic, D. (2022). Towards situational aware cyber-physical systems: a security-enhancing use case of blockchain-based digital twins. Computers in Industry(141-), 141. Search in Google Scholar

Christian J. D’Orazio, Choo, K. K. R., & Yang, L. T. (2017). Data exfiltration from Internet of things devices: ios devices as case studies. IEEE Internet of Things Journal. Search in Google Scholar

Dlamini, M. T., Eloff, J. H. P., Venter, H. S., & Eloff, M. M. (2021). Cbac4c: conflict-based vm isolation control for cloud computing. International Transactions in Operational Research. Search in Google Scholar

Massaro, A., Gargaro, M., Dipierro, G., Galiano, A. M., & Buonopane, S. (2020). Prototype cross platform oriented on cybersecurity, virtual connectivity, big data and artificial intelligence control. IEEE Access, 8, 197939-197954. Search in Google Scholar

Lee, S., Huh, J. H., & Kim, Y. (2020). Python tensorflow big data analysis for the security of korean nuclear power plants. Electronics, 9(9), 1467. Search in Google Scholar

Feng, J., Yang, L. T., Dai, G., Wang, W., & Zou, D. (2018). A secure higher-order lanczos-based orthogonal tensor svd for big data reduction. IEEE Transactions on Big Data, 1-1. Search in Google Scholar

Haleem, A., Javaid, M., Singh, R. P., Rab, S., & Suman, R. (2022). Perspectives of cybersecurity for ameliorative industry 4.0 era: a review-based framework. Industrial Robot(3), 49. Search in Google Scholar

Nguyen, T., Gosine, R., & Warrian, P. (2020). A systematic review of big data analytics for oil and gas industry 4.0. IEEE Access, PP(99), 1-1. Search in Google Scholar

Liu, Peng, Erbacher, Robert, F., Yen, & John, et al. (2019). Learning from experts’ experience: toward automated cyber security data triage. IEEE Systems Journal. Search in Google Scholar

Hossain, E., Khan, I., Un-Noor, F., Sikander, S. S., & Sunny, M. S. H. (2019). Application of big data and machine learning in smart grid, and associated security concerns: a review. IEEE Access, 13960-13988. Search in Google Scholar

Choo, K. K. R., Conti, M., & Dehghantanha, A. (2019). Special issue on big data applications in cyber security and threat intelligence – part 2. IEEE transactions on big data(5-4). Search in Google Scholar

Tang, M. J., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data, PP(99), 1-1. Search in Google Scholar

Sabar, N. R., Yi, X., & Song, A. (2018). A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access, PP(99), 1-1. Search in Google Scholar

Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: from securing big data to data-driven security. IEEE Transactions on Services Computing, 1-1. Search in Google Scholar

Xie, L., Hang, F., Guo, W., Lv, Y., Ou, W., & Shibly, F. H. A. (2021). Network security defence system based on artificial intelligence and big data technology. International journal of high performance systems architecture(3/4), 10. Search in Google Scholar

Jensen, KristofferHai Thanh NguyenThanh Van DoArnes, Andre. (2017). A big data analytics approach to combat telecommunication vulnerabilities. Cluster computing, 20(3). Search in Google Scholar

Rashid, A. N., Ahmed, M., Sikos, L. F., & Haskell-Dowland, P. S. (2022). Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection. ACM Transactions on Management Information Systems (TMIS). Search in Google Scholar

Hussain, A., Al-Dubai, A., Buchanan, B., Huang, K., & Alimi, A. M. (2018). Special issue on “big data analytics for secure and smart environmental services”. Remote Sensing. Search in Google Scholar

Wazid, M., Das, A. K., Hussain, R., Succi, G., & Rodrigues, J. J. P. C. (2018). Authentication in cloud-driven iot-based big data environment: survey and outlook. Journal of Systems Architecture. Search in Google Scholar

Zhao, L., Zhu, D., Shafik, W., Matinkhah, S. M., Ahmad, Z., & Sharif, L., et al. (2022). Artificial intelligence analysis in cyber domain: a review:. International Journal of Distributed Sensor Networks, 18(4), 121-131. Search in Google Scholar

Eklas Hossain, Imtiaj Khan, Fuad Un-Noor, Sarder Shazali Sikander, & Md. Samiul Haque Sunny. (2019). Application of big data and machine learning in smart grid, and associated security concerns: a review. IEEE Access. Search in Google Scholar

Andrade, R. O., Yoo, S. G., Oquendo, L. T., & Iván Ortiz-Garcés. (2020). A comprehensive study of the iot cybersecurity in smart cities. IEEE Access, 1-1. Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Biologie, Biologie, andere, Mathematik, Angewandte Mathematik, Mathematik, Allgemeines, Physik, Physik, andere