Real time cyber attack analysis on Hadoop ecosystem using machine learning algorithms
暂无分享,去创建一个
[1] A B M Shawkat Ali,et al. Classifying different denial-of-service attacks in cloud computing using rule-based learning , 2012, Secur. Commun. Networks.
[2] Jie Huang,et al. HiTune: Dataflow-Based Performance Analysis for Big Data Cloud , 2011, USENIX Annual Technical Conference.
[3] Dursun Delen,et al. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud , 2013, Decis. Support Syst..
[4] Alvaro A. Cárdenas,et al. Big Data Analytics for Security , 2013, IEEE Security & Privacy.
[5] Liang Dong,et al. Starfish: A Self-tuning System for Big Data Analytics , 2011, CIDR.
[6] A. B. M. Shawkat Ali,et al. Securing the Smart Grid: A Machine Learning Approach , 2013 .
[7] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[8] A. B. M. Shawkat Ali,et al. Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[9] Divyakant Agrawal,et al. Big data and cloud computing: current state and future opportunities , 2011, EDBT/ICDT '11.
[10] A. B. M. Shawkat Ali,et al. Trust Issues that Create Threats for Cyber Attacks in Cloud Computing , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[11] J. Hanley,et al. The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.
[12] Surajit Chaudhuri,et al. What next?: a half-dozen data management research goals for big data and the cloud , 2012, PODS.
[13] A. B. M. Shawkat Ali,et al. Combating Cyber Attacks in Cloud Systems Using Machine Learning , 2014 .