Big Data Security by Shibakali Gupta Indradip Banerjee Siddhartha Bhattacharyya
Author:Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
Language: eng
Format: epub
Publisher: De Gruyter
Published: 2019-10-04T19:45:57.863000+00:00
References
[1]Bertino, Elisa âBig Data â Security and Privacyâ, 2015 IEEE International Congress on Big Data, (2015), doi: 10.1109/BigDataCongress.2015.126.ââ
[2]Moreno, Julio, Serrano, Manuel A., & Fernández-Medina, Eduardo âMain Issues in Big Data Securityâ, Alarcos Research Group, University of Castilla-La Mancha, 2016.âa, b
[3]Bertino, E., Jonker, W., & Pektovic, M. âData Security â Challenges and Research Opportunitiesâ, SDM, 2013.ââ
[4]Toshniwal, Raghav, Dastidar, Kanishka Ghosh, & Nath, Asoke âBig Data Security Issues and Challengesâ. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2016, ISSN: 2349â2163.ââ
[5]Chen, M. et al. âBig Data: A Surveyâ. Mobile Networks and Applications, 19(2), 171â209, Jan. 2014.âa, b
[6]Mayer-Schönberger, Viktor, & Cukier, Kenneth Big Data: A Revolution that Will Transform How We Live. Work, and Think. Houghton Mifflin Harcourt., 2013. ISBN 9781299903029. OCLC 828620988.âa, b
[7]Paulet, R., Kaosar, Md. G., Yi, X., & Bertino, E. Privacy-Preserving and Content-Protecting Location Based Queries IEEE Transactions on Knowledge and Data Engineering, 2014, 26(5), 1200â1210.âa, b
[8]Ongsulee, Pariwat, Chotchaung, Veena, Bamrungsi, Eak, & Rodcheewit, Thanaporn âBig Data, Predictive Analytics and Machine Learningâ, 2018 16th International Conference on ICT and Knowledge Engineering(ICT&KE), 2018.ââ
[9]Kappler, Karolin, Schrape, Jan-Felix, Ulbricht, Lena, & Weyer, Johannes âSocietal Implications of Big Dataâ, (2018). KI â Künstliche Intelligenz. 32(1), Springer. doi:10.1007/s13218-017-0520-x.âa, b
[10]Peter Kinnaird, Inbal Talgam-Cohen, eds. âBig Dataâ. XRDS: Crossroads. The ACM Magazine for Students. 2012, 19(1), Association for Computing Machinery. ISSN 1528â4980. OCLC 779657714.
[11]Jagadish, H.V. et al. âChallenges and Opportunities with Big Dataâ, 2011, [online] Available: http://docs.lib.purdue.edu/cctech/1/.
[12]Leskovec, Jure, Rajaraman, Anand, & Ullman, Jeffrey D. Mining of massive datasets. Cambridge University Press, (2014). ISBN 9781107077232. OCLC 888463433.
[13]Press, Gil. (9 May 2013). âA Very Short History of Big Dataâ. forbes.com. Jersey City, NJ: Forbes Magazine. Retrieved 17 September 2016.
[14]Carminati, B., Ferrari, E., & Viviani, M. âSecurity and Trust in Online Social Networksâ, Morgan & Claypoo, 2013.
[15]Bag, Monark, & Singh, Vrijendra. (2012) âA Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Modelâ, DOI: 10.11591/ijins.v1i2.426
[16]Andrew McAfee & Erik Brynjolfsson âBig Data: The Management Revolutionâ. hbr.org. Harvard Business Review.
[17]OâNeil, Cathy (2017). Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Broadway Books. ISBN 978-0553418835.
[18]Batini, C., & Scannapieco, M. âData Quality: Concepts Methodologies and Techniquesâ, 2006.
[19]Breur, Tom âStatistical Power Analysis and the contemporary âcrisisâ in social sciencesâ. Journal of Marketing Analytics, July 2016, 4(2â3), 61â65. doi:10.1057/s41270-016-0001-3. ISSN 2050-3318.
[20]Sh. Hajirahimova, Makrufa Sciences, Institute of Information Technology of Azerbaijan National Academy of; str., B. Vahabzade; Baku; AZ1141; Azerbaijan; Aliyeva, Aybeniz S. âAbout Big Data Measurement Methodologies and Indicatorsâ. International Journal of Modern Education and Computer Science. 9 (10), 1â9. doi:10.5815/ijmecs.2017.10.01.
[21][online] Available: https://searchbusinessanalytics.techtarget.com/definition/big-data-analytics
[22][online] Available: https://www.dataspace.com/big-data-applications/big-data-helps-detect-hacking/
[23][online] Available: https://www.cnbc.com/2016/03/09/the-next-big-threat-in-hackingâdata-sabotage.html
[24][online] Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6790)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6765)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6652)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6438)
Driving Data Quality with Data Contracts by Andrew Jones(6379)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(6140)
Learning SQL by Alan Beaulieu(6004)
Weapons of Math Destruction by Cathy O'Neil(5795)
Big Data Analysis with Python by Ivan Marin(5389)
Data Engineering with dbt by Roberto Zagni(4393)
Solidity Programming Essentials by Ritesh Modi(4043)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3901)
Pandas Cookbook by Theodore Petrou(3601)
Blockchain Basics by Daniel Drescher(3305)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2914)
Feature Store for Machine Learning by Jayanth Kumar M J(2819)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2802)
Mastering Python for Finance by Unknown(2748)
