Blockchain for 5G and beyond networks: A state of the art survey

DC Nguyen, PN Pathirana, M Ding… - Journal of Network and …, 2020 - Elsevier
The fifth generation (5G) wireless networks are on the way to be deployed around the world.
The 5G technologies target to support diverse vertical applications by connecting …

Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

[HTML][HTML] Critical analysis of Big Data challenges and analytical methods

U Sivarajah, MM Kamal, Z Irani… - Journal of business …, 2017 - Elsevier
Big Data (BD), with their potential to ascertain valued insights for enhanced decision-making
process, have recently attracted substantial interest from both academics and practitioners …

Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Fog based intelligent transportation big data analytics in the internet of vehicles environment: motivations, architecture, challenges, and critical issues

TSJ Darwish, KA Bakar - IEEE Access, 2018 - ieeexplore.ieee.org
The intelligent transportation system (ITS) concept was introduced to increase road safety,
manage traffic efficiently, and preserve our green environment. Nowadays, ITS applications …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Enhancing false negative and positive rates for efficient insider threat detection

M AlSlaiman, MI Salman, MM Saleh, B Wang - Computers & Security, 2023 - Elsevier
Insider threats on information security can become a burden for organizations. However,
outsider attacks have received more attention compared to insider attacks. Many …

Big data analytics: Security and privacy challenges

Y Gahi, M Guennoun… - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The digitalization of our day-to-day activities has resulted in a huge volume of data. This
data, called Big Data, is used by many organizations to extract valuable information either to …