Some Special Issues of Network Security Monitoring on Big Data Environments
暂无分享,去创建一个
[1] R. Katz,et al. Interactive Query Processing in Big Data Systems: A Cross Industry Study of MapReduce Workloads , 2012 .
[2] Huajun Chen,et al. A Security Event Management Framework Using Wavelet and Data-Mining Technique , 2006, 2006 International Conference on Communications, Circuits and Systems.
[3] J. Manyika. Big data: The next frontier for innovation, competition, and productivity , 2011 .
[4] Lan Liu,et al. A Kind of Fuzzy Constraint Correlation Algorithm Based on Prerequisites and Consequences of Security Event , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[5] Yanpei Chen,et al. Interactive Analytical Processing in Big Data Systems: A Cross-Industry Study of MapReduce Workloads , 2012, Proc. VLDB Endow..
[6] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[7] Chengkai Li,et al. An optimization framework for map-reduce queries , 2012, EDBT '12.