Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
472
result(s) for
"Big data Security measures."
Sort by:
Information security analytics : finding security insights, patterns, and anomalies in big data
2015,2014
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.Information Security Analytics dispels the myth that analytics within the information.
Securing IoT and big data : next generation intelligence
\"This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader\"-- Provided by publisher.
Cybersecurity data science: an overview from machine learning perspective
by
Alqahtani, Hamed
,
Sarker, Iqbal H.
,
Badsha, Shahriar
in
Big Data
,
Communications Engineering
,
Computation
2020
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting
security incident patterns
or insights from cybersecurity data and building corresponding
data-driven model
, is the key to make a security system automated and intelligent. To understand and analyze the actual phenomena with data, various scientific methods, machine learning techniques, processes, and systems are used, which is commonly known as data science. In this paper, we focus and briefly discuss on
cybersecurity data science
, where the data is being gathered from relevant cybersecurity sources, and the analytics complement the
latest data-driven patterns
for providing more effective security solutions. The concept of cybersecurity data science allows making the computing process more actionable and intelligent as compared to traditional ones in the domain of cybersecurity. We then discuss and summarize a number of associated
research issues and future directions
. Furthermore, we provide a
machine learning
based
multi-layered framework
for the purpose of cybersecurity modeling. Overall, our goal is not only to discuss cybersecurity data science and relevant methods but also to focus the applicability towards data-driven intelligent decision making for protecting the systems from cyber-attacks.
Journal Article
Big data analytics in fog-enabled IoT networks : towards a privacy and security perspective
\"Integration of Fog computing with the resource limited IoT network, formulate the concept of Fog-enabled IoT system. Due to large number of deployments of IoT devices, a IoT is a main source of Big data and a very high volume of sensing data is generated by IoT system such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT system is a very fundamental research issue. This book focus on Big data Analytics in Fog-enabled-IoT system and provides a comprehensive collection of chapters that are touches different issues related to Healthcare system, Cyber threat detection, Malware detection, security and privacy of big IoT data and IoT network. This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to overcome the vulnerabilities of the Fog-enabled IoT system\"-- Provided by publisher.
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
by
Srinivasa Rao, Madala
,
Hemalatha, Kivudujogappa Lingappa
,
Lai, Wen Cheng
in
Access control
,
Algorithms
,
Analysis
2022
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of big data has become an emerging issue that restricts the organization to utilize Cloud services. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance, and completely rely on third party. In order to overcome such an issue, the Triple Data Encryption Standard (TDES) methodology is proposed to provide security for big data in the Cloud environment. The proposed TDES methodology provides a relatively simpler technique by increasing the sizes of keys in Data Encryption Standard (DES) to protect against attacks and defend the privacy of data. The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment. The proposed TDES methodology showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare Data Security (IFHDS) method.
Journal Article
Evaluating the effectiveness of data governance frameworks in ensuring security and privacy of healthcare data: A quantitative analysis of ISO standards, GDPR, and HIPAA in blockchain technology
2025
Blockchain technology is widely used in almost every domain of life nowadays including healthcare sector. Although there are existing frameworks to govern healthcare data but they have certain limitations in effectiveness of data governance to ensure security and privacy. This study aimed to evaluate effectiveness of health care data governance frameworks, examining security and privacy concerns and limitations within the existing frameworks of ISO Standards, GDPR, and HIPAA. In this study quantitative research approach was followed. A sample of 250 participants from Islamabad, Lahore and Karachi based healthcare experts, IT specialist, blockchain research and developer, administrator was selected. The collected data was analyzed though frequencies and descriptive statistical tests with the help of SPSS. The results revealed un-satisfaction for data governance frameworks, i.e., ISO standards, GDPR, and HIPAA in terms of security concerns, i.e., data encryption, access controls, audit trails, interoperability and standards, smart contracts for compliance, data integrity, regulatory compliance monitoring and privacy concerns, i.e., consent management, anonymization and pseudonymization, data minimization. The participants agreed that there is a need of integration of reliable data governance framework in health care data management. Various personalized governance techniques, targeted security upgrades, and continuous improvement in the specific customized data governance framework has been presented based on the findings of the study. An implementation of blockchain-based systems is recommended in order to ensure and expand the security and privacy of healthcare data management.
Journal Article
Intrusion detection systems for IoT-based smart environments: a survey
by
Elrawy, Mohamed Faisal
,
Ali Ismail Awad
,
Hamed, Hesham F A
in
Architecture
,
Cybersecurity
,
Internet of Things
2018
One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a technology for building smart environments. Security and privacy are considered key issues in any real-world smart environment based on the IoT model. The security vulnerabilities in IoT-based systems create security threats that affect smart environment applications. Thus, there is a crucial need for intrusion detection systems (IDSs) designed for IoT environments to mitigate IoT-related security attacks that exploit some of these security vulnerabilities. Due to the limited computing and storage capabilities of IoT devices and the specific protocols used, conventional IDSs may not be an option for IoT environments. This article presents a comprehensive survey of the latest IDSs designed for the IoT model, with a focus on the corresponding methods, features, and mechanisms. This article also provides deep insight into the IoT architecture, emerging security vulnerabilities, and their relation to the layers of the IoT architecture. This work demonstrates that despite previous studies regarding the design and implementation of IDSs for the IoT paradigm, developing efficient, reliable and robust IDSs for IoT-based smart environments is still a crucial task. Key considerations for the development of such IDSs are introduced as a future outlook at the end of this survey.
Journal Article