A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …

Big data management system security threat model

MA Poltavtseva, DP Zegzhda, MO Kalinin - Automatic control and …, 2019 - Springer
The article considers the concept and features of Big Data management systems and their
differences from traditional DBMS's. The authors describe changes in the intruder model and …

ML4IoT: A framework to orchestrate machine learning workflows on internet of things data

JM Alves, LM Honório, MAM Capretz - IEEE Access, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) applications generate vast amounts of real-time data. Temporal
analysis of these data series to discover behavioural patterns may lead to qualified …

Detection of distributed cyber attacks based on weighted ensembles of classifiers and big data processing architecture

I Kotenko, I Saenko, A Branitskiy - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Distributed cyber attacks represent a special class of attacks on computer networks and
systems which is rather difficult to detect. In many respects it is explained by the complexity …

A consistent approach to building secure big data processing and storage systems

MA Poltavtseva - Automatic Control and Computer Sciences, 2019 - Springer
This article considers the solution to the problem of building secure Big Data management
systems using a consistent approach. The concept and features of Big Data management …

МОДЕЛЬ УГРОЗ БЕЗОПАСНОСТИСИСТЕМ УПРАВЛЕНИЯ БОЛЬШИМИ ДАННЫМИ

МА Полтавцева, ДП Зегжда, МО Калинин - Проблемы …, 2019 - elibrary.ru
Рассмотрено понятие и особенности систем управления большими данными, их
отличия от традиционных СУБД. Описаны изменения модели нарушителя и новые …

Консистентный подход к построению защищенных систем обработки и хранения больших данных

МА Полтавцева - Проблемы информационной безопасности …, 2019 - elibrary.ru
Рассмотрена проблема построения защищенных систем управления большими
данными с помощью консистентного подхода. Приводятся понятие и особенности …

Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework

I Kotenko, N Komashinsky - … of the 12th international conference on …, 2019 - dl.acm.org
The paper proposes an approach to security information processing in order to detect
computer attacks and network anomalies based on big data technologies. The main …

Strategy of †œCold Start†of New Academic Laboratories

AL Ronzhin - Administrative Consulting, 2019 - ideas.repec.org
The Ministry of Science and Higher Education of the Russian Federation to attract young
promising personnel to research activities at the end of 2018, an additional budget was set …

Защита данных в системах мониторинга безопасности крупномасштабных объектов

МА Полтавцева, МО Калинин - … развитием крупномасштабных систем …, 2019 - elibrary.ru
В работе рассматриваются особенности систем управления данными при мониторинге
безопасности крупномасштабных объектов. Выделены особенности угроз и …