منابع مشابه
Sex, Lies and Cyber-crime Survey
Much of the information we have on cyber-crime losses is derived from surveys. We examine some of the difficulties of forming an accurate estimate by survey. First, losses are extremely concentrated, so that representative sampling of the population does not give representative sampling of the losses. Second, losses are based on unverified self-reported numbers. Not only is it possible for a si...
متن کاملA Survey On Cyber-Crime Prediction Techniques
This paper is a review paper of journal and conference papers published in the field of crime prediction. Crime prediction is a growing field in the field of prediction. More and more law enforcement agencies are using or going to implement crime prediction software. In this paper firstly, data collection methods and findings of this paper are described and afterward the collected papers are de...
متن کاملBig Data for Combating Cyber Attacks
This position paper explores a means of improving cybersecurity using Big Data technologies augmented by ontology for preventing or reducing losses from cyber attacks. Because of the priority of this threat to national security, it is necessary to attain results far superior to those found in modernday security operations centers (SOCs). Focus is on the potential application of ontology enginee...
متن کاملBig Data for Cyber-attack Management
Big Data has become big business. This paper explores a means of improving Cyber-security using Big Data technologies, ontology, and decision support for preventing or reducing losses from cyber-attacks. Because of the priority of this threat to national security it is necessary to attain results far superior to those found in modern-day security operations centers. Focus is on the potential ap...
متن کاملBig Data: A Survey
In this paper, we review the background and state-of-the-art of big data. We first introduce the general background of big data and review related technologies, such as could computing, Internet of Things, data centers, and Hadoop. We then focus on the four phases of the value chain of big data, i.e., data generation, data acquisition, data storage, and data analysis. For each phase, we introdu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2017
ISSN: 1757-8981,1757-899X
DOI: 10.1088/1757-899x/263/4/042053