ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Heterogeneous Network Security Monitoring and Association Algorithm for Big Data
Application of Intelligent Systems in Multi-modal Information Analytics - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-030-51431-0_111
◽
2020
◽
pp. 767-772
Author(s):
Zhenqi Liu
◽
Yangchun Gao
◽
Deqiang Shao
Keyword(s):
Big Data
◽
Network Security
◽
Heterogeneous Network
◽
Security Monitoring
◽
Association Algorithm
Download Full-text
Related Documents
Cited By
References
Some Special Issues of Network Security Monitoring on Big Data Environments
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
◽
10.1109/dasc.2013.30
◽
2013
◽
Cited By ~ 3
Author(s):
Liu Lan
◽
Lin Jun
Keyword(s):
Big Data
◽
Network Security
◽
Security Monitoring
Download Full-text
Security monitoring of heterogeneous networks for big data based on distributed association algorithm
Computer Communications
◽
10.1016/j.comcom.2020.01.045
◽
2020
◽
Vol 152
◽
pp. 206-214
Author(s):
Wei Hu
◽
Jing Li
◽
Jie Cheng
◽
Han Guo
◽
Hui Xie
Keyword(s):
Big Data
◽
Heterogeneous Networks
◽
Security Monitoring
◽
Distributed Association
◽
Association Algorithm
Download Full-text
Computer Network Security Problems and Solutions Based on Big Data
The 2nd International Conference on Computing and Data Science
◽
10.1145/3448734.3450838
◽
2021
◽
Author(s):
Liu Xu
Keyword(s):
Big Data
◽
Network Security
◽
Computer Network
◽
Computer Network Security
◽
Problems And Solutions
Download Full-text
Application and Implementation of Big Data Visualization Technology in Network Security System
Journal of Physics Conference Series
◽
10.1088/1742-6596/1955/1/012002
◽
2021
◽
Vol 1955
(1)
◽
pp. 012002
Author(s):
Chao Tang
◽
Jie Zhang
◽
Sheng Wang
◽
Linghao Zhang
◽
Hai Wang
◽
...
Keyword(s):
Big Data
◽
Network Security
◽
Data Visualization
◽
Security System
◽
Big Data Visualization
◽
Visualization Technology
◽
Network Security System
Download Full-text
Big Data Analytics Using Fuzzy Clustering for Network Security
10.1109/bigdata52589.2021.9671554
◽
2021
◽
Author(s):
Terrence P. Fries
Keyword(s):
Big Data
◽
Network Security
◽
Fuzzy Clustering
◽
Data Analytics
◽
Big Data Analytics
Download Full-text
Big data network security index correlation measure based on the fusion of modified two order cone programming model
International Journal of Internet Protocol Technology
◽
10.1504/ijipt.2021.113899
◽
2021
◽
Vol 14
(1)
◽
pp. 16
Author(s):
Xiaohai Lan
Keyword(s):
Big Data
◽
Network Security
◽
Programming Model
◽
Correlation Measure
◽
Data Network
◽
Cone Programming
◽
Security Index
Download Full-text
Big data network security index correlation measure based on the fusion of modified two order cone programming model
International Journal of Internet Protocol Technology
◽
10.1504/ijipt.2021.10036583
◽
2021
◽
Vol 14
(1)
◽
pp. 16
Author(s):
Xiaohai Lan
Keyword(s):
Big Data
◽
Network Security
◽
Programming Model
◽
Correlation Measure
◽
Data Network
◽
Cone Programming
◽
Security Index
Download Full-text
Intelligent Network Security Monitoring Based on Optimum-Path Forest Clustering
IEEE Network
◽
10.1109/mnet.2018.1800151
◽
2019
◽
Vol 33
(2)
◽
pp. 126-131
◽
Cited By ~ 7
Author(s):
Raniere Rocha Guimaraes
◽
Leandro A. Passos
◽
Raimir Holanda Filho
◽
Victor Hugo C. de Albuquerque
◽
Joel J. P. C. Rodrigues
◽
...
Keyword(s):
Network Security
◽
Intelligent Network
◽
Security Monitoring
◽
Optimum Path
Download Full-text
Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning
IEEE Access
◽
10.1109/access.2018.2881998
◽
2018
◽
Vol 6
◽
pp. 72714-72723
◽
Cited By ~ 13
Author(s):
Igor Kotenko
◽
Igor Saenko
◽
Alexander Branitskiy
Keyword(s):
Machine Learning
◽
Big Data
◽
Internet Of Things
◽
Data Processing
◽
Mobile Internet
◽
Big Data Processing
◽
Security Monitoring
Download Full-text
Awareness of Problems and Defies with Big Data Involved in Network Security Management with Revised Data Fusion-Based Digital Investigation Model
Big Data Analytics and Computing for Digital Forensic Investigations
◽
10.1201/9781003024743-7
◽
2020
◽
pp. 151-170
Author(s):
Sateesh Kumar Pradhan
◽
Satyasundara Mahapatra
◽
Chandrakant Mallick
Keyword(s):
Big Data
◽
Network Security
◽
Data Fusion
◽
Security Management
◽
Digital Investigation
◽
Network Security Management
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close