F Ullah, MA Babar - Journal of Systems and Software, 2019 - Elsevier
Abstract Context Big Data Cybersecurity Analytics (BDCA) systems leverage big data technologies for analyzing security events data to protect organizational networks …
Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers …
With an exponential increase in the popularity of Internet, the real-time data collected by various smart sensing devices can be analyzed remotely by a remote user (eg, a manager) …
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software Engineering (SE) has recently taken significant steps in proposing countermeasures for …
In the modern world, there is a purpose of storing, retrieving and analysing huge volumes of data. So, big data becomes one of the reliable aspects to analyse the large volumes of data …
MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …
The expand trend of cloud data mobility led to malicious data threats that necessitate using data protection techniques. Most cloud system applications contain valuable and …
Although there are numerous advantages of the IoT in industrial use, there are also some security problems, such as insecure supply chains or vulnerabilities. These lead to a …
C Eyüpoğlu, MA Aydın, A Sertbaş… - Bilişim Teknolojileri …, 2017 - dergipark.org.tr
Büyük verinin ortaya çıkışı bilgi güvenliği ve klasik güvenlik tedbirleri için kullanılan koruma modelleri için yeni zorluklara neden olmaktadır. Bu çalışmada büyük veri güvenliği ve büyük …