Big Data Security by Shibakali Gupta Indradip Banerjee Siddhartha Bhattacharyya

Big Data Security by Shibakali Gupta Indradip Banerjee Siddhartha Bhattacharyya

Author:Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
Language: eng
Format: epub
Publisher: De Gruyter
Published: 2019-10-04T19:45:57.863000+00:00


References

[1]Bertino, Elisa “Big Data – Security and Privacy”, 2015 IEEE International Congress on Big Data, (2015), doi: 10.1109/BigDataCongress.2015.126. →

[2]Moreno, Julio, Serrano, Manuel A., & Fernández-Medina, Eduardo “Main Issues in Big Data Security”, Alarcos Research Group, University of Castilla-La Mancha, 2016. a, b

[3]Bertino, E., Jonker, W., & Pektovic, M. “Data Security – Challenges and Research Opportunities”, SDM, 2013. →

[4]Toshniwal, Raghav, Dastidar, Kanishka Ghosh, & Nath, Asoke “Big Data Security Issues and Challenges”. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2016, ISSN: 2349–2163. →

[5]Chen, M. et al. “Big Data: A Survey”. Mobile Networks and Applications, 19(2), 171–209, Jan. 2014. a, b

[6]Mayer-Schönberger, Viktor, & Cukier, Kenneth Big Data: A Revolution that Will Transform How We Live. Work, and Think. Houghton Mifflin Harcourt., 2013. ISBN 9781299903029. OCLC 828620988. a, b

[7]Paulet, R., Kaosar, Md. G., Yi, X., & Bertino, E. Privacy-Preserving and Content-Protecting Location Based Queries IEEE Transactions on Knowledge and Data Engineering, 2014, 26(5), 1200–1210. a, b

[8]Ongsulee, Pariwat, Chotchaung, Veena, Bamrungsi, Eak, & Rodcheewit, Thanaporn “Big Data, Predictive Analytics and Machine Learning”, 2018 16th International Conference on ICT and Knowledge Engineering(ICT&KE), 2018. →

[9]Kappler, Karolin, Schrape, Jan-Felix, Ulbricht, Lena, & Weyer, Johannes “Societal Implications of Big Data”, (2018). KI – Künstliche Intelligenz. 32(1), Springer. doi:10.1007/s13218-017-0520-x. a, b

[10]Peter Kinnaird, Inbal Talgam-Cohen, eds. “Big Data”. XRDS: Crossroads. The ACM Magazine for Students. 2012, 19(1), Association for Computing Machinery. ISSN 1528–4980. OCLC 779657714.

[11]Jagadish, H.V. et al. “Challenges and Opportunities with Big Data”, 2011, [online] Available: http://docs.lib.purdue.edu/cctech/1/.

[12]Leskovec, Jure, Rajaraman, Anand, & Ullman, Jeffrey D. Mining of massive datasets. Cambridge University Press, (2014). ISBN 9781107077232. OCLC 888463433.

[13]Press, Gil. (9 May 2013). “A Very Short History of Big Data”. forbes.com. Jersey City, NJ: Forbes Magazine. Retrieved 17 September 2016.

[14]Carminati, B., Ferrari, E., & Viviani, M. “Security and Trust in Online Social Networks”, Morgan & Claypoo, 2013.

[15]Bag, Monark, & Singh, Vrijendra. (2012) “A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model”, DOI: 10.11591/ijins.v1i2.426

[16]Andrew McAfee & Erik Brynjolfsson “Big Data: The Management Revolution”. hbr.org. Harvard Business Review.

[17]O’Neil, Cathy (2017). Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Broadway Books. ISBN 978-0553418835.

[18]Batini, C., & Scannapieco, M. “Data Quality: Concepts Methodologies and Techniques”, 2006.

[19]Breur, Tom “Statistical Power Analysis and the contemporary “crisis” in social sciences”. Journal of Marketing Analytics, July 2016, 4(2–3), 61–65. doi:10.1057/s41270-016-0001-3. ISSN 2050-3318.

[20]Sh. Hajirahimova, Makrufa Sciences, Institute of Information Technology of Azerbaijan National Academy of; str., B. Vahabzade; Baku; AZ1141; Azerbaijan; Aliyeva, Aybeniz S. “About Big Data Measurement Methodologies and Indicators”. International Journal of Modern Education and Computer Science. 9 (10), 1–9. doi:10.5815/ijmecs.2017.10.01.

[21][online] Available: https://searchbusinessanalytics.techtarget.com/definition/big-data-analytics

[22][online] Available: https://www.dataspace.com/big-data-applications/big-data-helps-detect-hacking/

[23][online] Available: https://www.cnbc.com/2016/03/09/the-next-big-threat-in-hacking–data-sabotage.html

[24][online] Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.