Survey of security advances in smart grid: A data driven approach

S Tan, D De, WZ Song, J Yang… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
With the integration of advanced computing and communication technologies, smart grid is
considered as the next-generation power system, which promises self healing, resilience …

Architectural tactics for big data cybersecurity analytics systems: a review

F Ullah, MA Babar - Journal of Systems and Software, 2019 - Elsevier
Abstract Context Big Data Cybersecurity Analytics (BDCA) systems leverage big data
technologies for analyzing security events data to protect organizational networks …

Cloud centric authentication for wearable healthcare monitoring system

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Security and privacy are the major concerns in cloud computing as users have limited
access on the stored data at the remote locations managed by different service providers …

Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things

J Srinivas, AK Das, M Wazid… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With an exponential increase in the popularity of Internet, the real-time data collected by
various smart sensing devices can be analyzed remotely by a remote user (eg, a manager) …

Machine learning for detecting data exfiltration: A review

B Sabir, F Ullah, MA Babar, R Gaire - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software
Engineering (SE) has recently taken significant steps in proposing countermeasures for …

Securing medical big data through blockchain technology

KR Devi, S Suganyadevi, S Karthik… - 2022 8th international …, 2022 - ieeexplore.ieee.org
In the modern world, there is a purpose of storing, retrieving and analysing huge volumes of
data. So, big data becomes one of the reliable aspects to analyse the large volumes of data …

Big data in cybersecurity: a survey of applications and future trends

MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated
has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …

An integrated methodology for big data classification and security for improving cloud systems data mobility

I Hababeh, A Gharaibeh, S Nofal, I Khalil - IEEE Access, 2018 - ieeexplore.ieee.org
The expand trend of cloud data mobility led to malicious data threats that necessitate using
data protection techniques. Most cloud system applications contain valuable and …

[HTML][HTML] Digital-twin-based security analytics for the internet of things

P Empl, G Pernul - Information, 2023 - mdpi.com
Although there are numerous advantages of the IoT in industrial use, there are also some
security problems, such as insecure supply chains or vulnerabilities. These lead to a …

Büyük veride kişi mahremiyetinin korunması

C Eyüpoğlu, MA Aydın, A Sertbaş… - Bilişim Teknolojileri …, 2017 - dergipark.org.tr
Büyük verinin ortaya çıkışı bilgi güvenliği ve klasik güvenlik tedbirleri için kullanılan koruma
modelleri için yeni zorluklara neden olmaktadır. Bu çalışmada büyük veri güvenliği ve büyük …