메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Big Data: Big promises for information security

Author keywords

Analytics; Big Data; Data visualization; Hadoop; Information security

Indexed keywords

DATA MINING; DATA VISUALIZATION; SECURITY OF DATA;

EID: 84988241421     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAICT.2014.7035946     Document Type: Conference Paper
Times cited : (42)

References (29)
  • 1
    • 84988301588 scopus 로고    scopus 로고
    • How to use big data technologies to optimize operations in upstream petroleum industry
    • A. Baaziz, and L. Quoniam, "How to use Big Data technologies to optimize operations in Upstream Petroleum Industry," International Journal of Innovation, Vol. 1, no. 1, pp. 19-29, 2013.
    • (2013) International Journal of Innovation , vol.1 , Issue.1 , pp. 19-29
    • Baaziz, A.1    Quoniam, L.2
  • 2
    • 84945510035 scopus 로고    scopus 로고
    • Community cleverness required
    • Editorial 4 September
    • Editorial: "Community cleverness required," Nature, Vol. 455, No. 7209, pp. 1-1, 4 September 2008. http://www.nature.com/news/specials/bigdata/index.html
    • (2008) Nature , vol.455 , Issue.7209 , pp. 1-1
  • 4
    • 84893547380 scopus 로고    scopus 로고
    • March
    • Big Data Research and Development Initiative. March 2012. http://www.whitehouse.gov/sites/default/files/microsites/ostp/big-data-press-release-final-2.pdf.
    • (2012) Big Data Research and Development Initiative
  • 8
    • 84887058308 scopus 로고    scopus 로고
    • Big data: New opportunities and new challenges
    • June
    • K. Michael, and K. Miller, "Big Data: New Opportunities and New Challenges," IEEE Security & Privacy, Vol. 46, no. 6, pp. 22-24, June 2013.
    • (2013) IEEE Security & Privacy , vol.46 , Issue.6 , pp. 22-24
    • Michael, K.1    Miller, K.2
  • 14
    • 84873369793 scopus 로고    scopus 로고
    • Targeted cyberattacks: A superset of advanced persistent threats
    • A.K. Sood, R.J. Enbody, "Targeted Cyberattacks: A Superset of Advanced Persistent Threats," IEEE Security & Privacy, Vol. 11, no. 1, pp. 54-61, 2013.
    • (2013) IEEE Security & Privacy , vol.11 , Issue.1 , pp. 54-61
    • Sood, A.K.1    Enbody, R.J.2
  • 20
    • 84904208174 scopus 로고    scopus 로고
    • September
    • Cloud Security Alliance (CSA): Big Data Analytics for Security Intelligence. September 2013. https://cloudsecurityalliance.org/download/big-data-analytics-for-security-intelligence
    • (2013) Big Data Analytics for Security Intelligence
  • 21
    • 79958736290 scopus 로고    scopus 로고
    • Toward a standard benchmark for computer security research: The worldwide intelligence network environment (WINE)
    • ACM
    • Dumitras T., Shou D., Toward a Standard Benchmark for Computer Security Research: The Worldwide Intelligence Network Environment (WINE) / Proc. EuroSys BADGERS Workshop, ACM, 2011, pp. 89-96.
    • (2011) Proc. EuroSys BADGERS Workshop , pp. 89-96
    • Dumitras, T.1    Shou, D.2
  • 23
    • 84893295028 scopus 로고    scopus 로고
    • Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
    • Dec.
    • T.-F. Yen et al., "Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks," Proc. Ann. Computer Security ApplicationsConference (ACSAC 13), pp. 199-208, Dec. 2013.
    • (2013) Proc. Ann. Computer Security ApplicationsConference (ACSAC 13) , pp. 199-208
    • Yen, T.-F.1
  • 24
    • 84988274498 scopus 로고    scopus 로고
    • High performance cryptography: Need of the hour
    • September
    • Ganugula U., Saxena A., "High Performance Cryptography: Need of the Hour," CSI Communications, pp. 16-17, September 2013.
    • (2013) CSI Communications , pp. 16-17
    • Ganugula, U.1    Saxena, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.