1,583
Views
16
CrossRef citations to date
0
Altmetric
Research Article

Big Data Analytics in Cyber Security: Network Traffic and Attacks

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Humza Naseer, Kevin Desouza, Sean B. Maynard & Atif Ahmad. (2023) Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics. European Journal of Information Systems 0:0, pages 1-21.
Read now
C. Matt Graham & Yonggang Lu. (2023) Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements. Journal of Computer Information Systems 63:4, pages 937-949.
Read now

Articles from other publishers (14)

H. Azath, G. Sathish Kumar, M. Menaka & S. John Justin Thangaraj. (2023) Blockchain Technology Based Privacy Protection Scheme for Large-Scale Distributed Systems. Blockchain Technology Based Privacy Protection Scheme for Large-Scale Distributed Systems.
V. Balamurugan, R. Karthikeyan, B. Sundaravadivazhagan & Robin Cyriac. (2022) Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security. Wireless Networks 29:2, pages 523-537.
Crossref
Suman Thapaliya & Pawan Kumar Sharma. (2023) Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures. International Journal of Information Security and Privacy 17:1, pages 1-22.
Crossref
Koppula Manasa & L. M. I. Leo Joseph. 2023. Communication and Intelligent Systems. Communication and Intelligent Systems 279 297 .
Jorge Luis Guerra, Carlos Catania & Eduardo Veas. (2022) Datasets are not Enough: Challenges in Labeling Network Traffic. Computers & Security, pages 102810.
Crossref
Hua Wu, Yujie Liu, Guang Cheng & Xiaoyan Hu. (2022) Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks. Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks.
I. Made Suartana & Ricky Eka Putra. 2022. Proceedings of the International Joint Conference on Science and Engineering 2022 (IJCSE 2022). Proceedings of the International Joint Conference on Science and Engineering 2022 (IJCSE 2022) 243 250 .
Yeftanus Antonio, Sapto Wahyu Indratno & Rinovia Simanjuntak. (2021) Cyber Insurance Ratemaking: A Graph Mining Approach. Risks 9:12, pages 224.
Crossref
Muhammad Ahmad, Qaiser Riaz, Muhammad Zeeshan, Hasan Tahir, Syed Ali Haider & Muhammad Safeer Khan. (2021) Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set. EURASIP Journal on Wireless Communications and Networking 2021:1.
Crossref
Farashazillah Yahya, Ryan Isaac W Mahibol, Chong Kim Ying, Magnus Bin Anai, Sidney Allister Frankie, Eric Ling Nin Wei & Rio Guntur Utomo. (2021) Detection of Phising Websites using Machine Learning Approaches. Detection of Phising Websites using Machine Learning Approaches.
Yongheng Liang, Qian Xu & Liyin Jin. (2021) The effect of smart and connected products on consumer brand choice concentration. Journal of Business Research 135, pages 163-172.
Crossref
Arman Aghdashi & Seyedeh Leili Mirtaheri. (2021) Novel dynamic load balancing algorithm for cloud-based big data analytics. The Journal of Supercomputing.
Crossref
Mohammad Hijji & Gulzar Alam. (2021) A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions. IEEE Access 9, pages 7152-7169.
Crossref
Gordon Haylett, Zahra Jadidi & Kien Nguyen Thanh. 2021. Artificial Intelligence Applications and Innovations. Artificial Intelligence Applications and Innovations 362 373 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.