-
1
-
-
84988301588
-
How to use big data technologies to optimize operations in upstream petroleum industry
-
A. Baaziz, and L. Quoniam, "How to use Big Data technologies to optimize operations in Upstream Petroleum Industry," International Journal of Innovation, Vol. 1, no. 1, pp. 19-29, 2013.
-
(2013)
International Journal of Innovation
, vol.1
, Issue.1
, pp. 19-29
-
-
Baaziz, A.1
Quoniam, L.2
-
2
-
-
84945510035
-
Community cleverness required
-
Editorial 4 September
-
Editorial: "Community cleverness required," Nature, Vol. 455, No. 7209, pp. 1-1, 4 September 2008. http://www.nature.com/news/specials/bigdata/index.html
-
(2008)
Nature
, vol.455
, Issue.7209
, pp. 1-1
-
-
-
3
-
-
81055138684
-
-
McKinsey Global Institute, May
-
J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. H. Byers. Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute, May 2011.
-
(2011)
Big Data: The Next Frontier for Innovation, Competition, and Productivity
-
-
Manyika, J.1
Chui, M.2
Brown, B.3
Bughin, J.4
Dobbs, R.5
Roxburgh, C.6
Byers, A.H.7
-
4
-
-
84893547380
-
-
March
-
Big Data Research and Development Initiative. March 2012. http://www.whitehouse.gov/sites/default/files/microsites/ostp/big-data-press-release-final-2.pdf.
-
(2012)
Big Data Research and Development Initiative
-
-
-
6
-
-
79953844445
-
Big data and cloud computing: Current state and future opportunities
-
D. Agrawal, S. Das, and A. El Abbadi, "Big data and cloud computing: current state and future opportunities," Proc. of the 14th International Conference on Extending Database Technology, pp. 530-533, 2011.
-
(2011)
Proc. of the 14th International Conference on Extending Database Technology
, pp. 530-533
-
-
Agrawal, D.1
Das, S.2
El Abbadi, A.3
-
7
-
-
84873131659
-
Challenges and opportunities with big data
-
August
-
A. Labrinidis, and H. V. Jagadish, "Challenges and Opportunities with Big Data," Journal Proceedings of the VLDB Endowment, Vol. 5, no. 12, pp. 2032-2033, August 2012.
-
(2012)
Journal Proceedings of the VLDB Endowment
, vol.5
, Issue.12
, pp. 2032-2033
-
-
Labrinidis, A.1
Jagadish, H.V.2
-
8
-
-
84887058308
-
Big data: New opportunities and new challenges
-
June
-
K. Michael, and K. Miller, "Big Data: New Opportunities and New Challenges," IEEE Security & Privacy, Vol. 46, no. 6, pp. 22-24, June 2013.
-
(2013)
IEEE Security & Privacy
, vol.46
, Issue.6
, pp. 22-24
-
-
Michael, K.1
Miller, K.2
-
9
-
-
84898473131
-
Big data analytics for security
-
June
-
A. A. Cardenas, Manadhata P. K., and Rajan S. P., "Big Data Analytics for Security," IEEE Security & Privacy, Vol. 11, no. 6, pp. 74-76, June 2013.
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.6
, pp. 74-76
-
-
Cardenas, A.A.1
Manadhata, P.K.2
Rajan, S.P.3
-
10
-
-
84897675129
-
Security analytics: Big data analytics for cyber security: A review of trends, techniques and tools
-
T. Mahmood, and U. Afzal, "Security Analytics: Big Data Analytics for cyber security: A review of trends, techniques and tools," Proc. of the 2nd National Conference on Information Assurance (NCIA), pp. 129-134, 2013.
-
(2013)
Proc. of the 2nd National Conference on Information Assurance (NCIA)
, pp. 129-134
-
-
Mahmood, T.1
Afzal, U.2
-
11
-
-
85030321143
-
MapReduce: Simplified data processing on large clusters
-
J. Dean, and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," Proc. of the 6th Conference on Symposium on Opearting Systems Design & Implementation (OSDI'04), Vol. 6, pp. 137-150, 2004.
-
(2004)
Proc. of the 6th Conference on Symposium on Opearting Systems Design & Implementation (OSDI'04)
, vol.6
, pp. 137-150
-
-
Dean, J.1
Ghemawat, S.2
-
14
-
-
84873369793
-
Targeted cyberattacks: A superset of advanced persistent threats
-
A.K. Sood, R.J. Enbody, "Targeted Cyberattacks: A Superset of Advanced Persistent Threats," IEEE Security & Privacy, Vol. 11, no. 1, pp. 54-61, 2013.
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.1
, pp. 54-61
-
-
Sood, A.K.1
Enbody, R.J.2
-
19
-
-
84910625765
-
-
White paper, January
-
S. Curry, E. Kirda, E. Schwartz, W. H. Stewart, and A. Yoran, "Big Data Fuels Intelligence-Driven Security". White paper, January 2013.
-
(2013)
Big Data Fuels Intelligence-Driven Security
-
-
Curry, S.1
Kirda, E.2
Schwartz, E.3
Stewart, W.H.4
Yoran, A.5
-
20
-
-
84904208174
-
-
September
-
Cloud Security Alliance (CSA): Big Data Analytics for Security Intelligence. September 2013. https://cloudsecurityalliance.org/download/big-data-analytics-for-security-intelligence
-
(2013)
Big Data Analytics for Security Intelligence
-
-
-
21
-
-
79958736290
-
Toward a standard benchmark for computer security research: The worldwide intelligence network environment (WINE)
-
ACM
-
Dumitras T., Shou D., Toward a Standard Benchmark for Computer Security Research: The Worldwide Intelligence Network Environment (WINE) / Proc. EuroSys BADGERS Workshop, ACM, 2011, pp. 89-96.
-
(2011)
Proc. EuroSys BADGERS Workshop
, pp. 89-96
-
-
Dumitras, T.1
Shou, D.2
-
23
-
-
84893295028
-
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
-
Dec.
-
T.-F. Yen et al., "Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks," Proc. Ann. Computer Security ApplicationsConference (ACSAC 13), pp. 199-208, Dec. 2013.
-
(2013)
Proc. Ann. Computer Security ApplicationsConference (ACSAC 13)
, pp. 199-208
-
-
Yen, T.-F.1
-
24
-
-
84988274498
-
High performance cryptography: Need of the hour
-
September
-
Ganugula U., Saxena A., "High Performance Cryptography: Need of the Hour," CSI Communications, pp. 16-17, September 2013.
-
(2013)
CSI Communications
, pp. 16-17
-
-
Ganugula, U.1
Saxena, A.2
-
25
-
-
80955143573
-
Adversarial machine learning
-
L. Huang, A. D. Joseph, B. Nelson, B. I. P. Rubinstein, J. D. Tygar, "Adversarial machine learning," Proc. of the 4th ACM workshop on Security and artificial intelligence (AISec'11), pp. 43-58, 2011.
-
(2011)
Proc. of the 4th ACM Workshop on Security and Artificial Intelligence (AISec'11)
, pp. 43-58
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.I.P.4
Tygar, J.D.5
-
27
-
-
84862606327
-
A survey of visualization systems for network security
-
Aug.
-
A. Shiravi, H. Shiravi, and A.A. Ghorbani, "A Survey of Visualization Systems for Network Security," IEEE Transactions on Visualization and Computer Graphics, Vol. 18, no. 8, pp. 1313-1329, Aug. 2012.
-
(2012)
IEEE Transactions on Visualization and Computer Graphics
, vol.18
, Issue.8
, pp. 1313-1329
-
-
Shiravi, A.1
Shiravi, H.2
Ghorbani, A.A.3
-
29
-
-
84872914529
-
Visual analytics for the big data era? A comparative review of state-of-the-art commercial systems
-
Mittelstadt S., Behrisch M., Weber S., Schreck T. et al., "Visual analytics for the big data era? A comparative review of state-of-the-art commercial systems," Proc. of the IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 173-182, 2012.
-
(2012)
Proc. of the IEEE Conference on Visual Analytics Science and Technology (VAST)
, pp. 173-182
-
-
Mittelstadt, S.1
Behrisch, M.2
Weber, S.3
Schreck, T.4
|