Accesso libero

Research on the Impact of Combining Big Data and Deep Learning Technology on Network Security Information Security Protection

  
19 mar 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313-1329. Shiravi H. Shiravi A. Ghorbani A. A. ( 2011 ). A survey of visualization systems for network security . IEEE Transactions on visualization and computer graphics , 18 ( 8 ), 1313 - 1329 . Search in Google Scholar

Mistry, H. K., Mavani, C., Goswami, A., & Patel, R. (2024). A Survey Visualization Systems For Network Security. Educational Administration: Theory and Practice, 30(7), 805-812. Mistry H. K. Mavani C. Goswami A. Patel R. ( 2024 ). A Survey Visualization Systems For Network Security . Educational Administration: Theory and Practice , 30 ( 7 ), 805 - 812 . Search in Google Scholar

Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708. Parvin S. Hussain F. K. Hussain O. K. Han S. Tian B. Chang E. ( 2012 ). Cognitive radio network security: A survey . Journal of Network and Computer Applications , 35 ( 6 ), 1691 - 1708 . Search in Google Scholar

Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion. Journal of Economic Theory, 166, 536-585. Acemoglu D. Malekian A. Ozdaglar A. ( 2016 ). Network security and contagion . Journal of Economic Theory , 166 , 536 - 585 . Search in Google Scholar

Kaur, G. (2016). Network Security: Anti-virus. International Journal of Advanced Research in Computer Science, 7(6). Kaur G. ( 2016 ). Network Security: Anti-virus . International Journal of Advanced Research in Computer Science , 7 ( 6 ). Search in Google Scholar

Petrenko, S. A., & Makoveichuk, K. A. (2017). Big data technologies for cybersecurity. In CEUR workshop (pp. 107-111). Petrenko S. A. Makoveichuk K. A. ( 2017 ). Big data technologies for cybersecurity . In CEUR workshop (pp. 107 - 111 ). Search in Google Scholar

Alazab, M., & Tang, M. (Eds.). (2019). Deep learning applications for cyber security. Springer. Alazab M. Tang M. (Eds.). ( 2019 ). Deep learning applications for cyber security . Springer . Search in Google Scholar

Alani, M. M. (2021). Big data in cybersecurity: a survey of applications and future trends. Journal of Reliable Intelligent Environments, 7(2), 85-114. Alani M. M. ( 2021 ). Big data in cybersecurity: a survey of applications and future trends . Journal of Reliable Intelligent Environments , 7 ( 2 ), 85 - 114 . Search in Google Scholar

Mahmood, T., & Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd national conference on Information assurance (ncia) (pp. 129-134). IEEE. Mahmood T. Afzal U. ( 2013 , December ). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools . In 2013 2nd national conference on Information assurance (ncia) (pp. 129 - 134 ). IEEE . Search in Google Scholar

Kotenko, I., Saenko, I., & Branitskiy, A. (2020). Machine learning and big data processing for cybersecurity data analysis. Data science in cybersecurity and cyberthreat intelligence, 61-85. Kotenko I. Saenko I. Branitskiy A. ( 2020 ). Machine learning and big data processing for cybersecurity data analysis . Data science in cybersecurity and cyberthreat intelligence , 61 - 85 . Search in Google Scholar

Ullah, F., & Babar, M. A. (2019). Architectural tactics for big data cybersecurity analytics systems: a review. Journal of Systems and Software, 151, 81-118. Ullah F. Babar M. A. ( 2019 ). Architectural tactics for big data cybersecurity analytics systems: a review . Journal of Systems and Software , 151 , 81 - 118 . Search in Google Scholar

Nwobodo, L. K., Nwaimo, C. S., & Adegbola, A. E. (2024). Enhancing cybersecurity protocols in the era of big data and advanced analytics. GSC Advanced Research and Reviews, 19(3), 203-214. Nwobodo L. K. Nwaimo C. S. Adegbola A. E. ( 2024 ). Enhancing cybersecurity protocols in the era of big data and advanced analytics . GSC Advanced Research and Reviews , 19 ( 3 ), 203 - 214 . Search in Google Scholar

Tang, M., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data, 5(3), 317-329. Tang M. Alazab M. Luo Y. ( 2017 ). Big data for cybersecurity: Vulnerability disclosure trends and dependencies . IEEE Transactions on Big Data , 5 ( 3 ), 317 - 329 . Search in Google Scholar

Geetha, R., & Thilagam, T. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4), 2861-2879. Geetha R. Thilagam T. ( 2021 ). A review on the effectiveness of machine learning and deep learning algorithms for cyber security . Archives of Computational Methods in Engineering , 28 ( 4 ), 2861 - 2879 . Search in Google Scholar

Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE access, 8, 222310-222354. Shaukat K. Luo S. Varadharajan V. Hameed I. A. Xu M. ( 2020 ). A survey on machine learning techniques for cyber security in the last decade . IEEE access , 8 , 222310 - 222354 . Search in Google Scholar

Liu, Q., & Zhang, T. (2023). Deep learning technology of computer network security detection based on artificial intelligence. Computers and Electrical Engineering, 110, 108813. Liu Q. Zhang T. ( 2023 ). Deep learning technology of computer network security detection based on artificial intelligence . Computers and Electrical Engineering , 110 , 108813 . Search in Google Scholar

Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020, March). Machine learning and deep learning techniques for cybersecurity: a review. In The International Conference on Artificial Intelligence and Computer Vision (pp. 50-57). Cham: Springer International Publishing. Salloum S. A. Alshurideh M. Elnagar A. Shaalan K. ( 2020 , March ). Machine learning and deep learning techniques for cybersecurity: a review . In The International Conference on Artificial Intelligence and Computer Vision (pp. 50 - 57 ). Cham : Springer International Publishing . Search in Google Scholar

Du, M. (2022). Application of information communication network security management and control based on big data technology. International Journal of Communication Systems, 35(5), e4643. Du M. ( 2022 ). Application of information communication network security management and control based on big data technology . International Journal of Communication Systems , 35 ( 5 ), e4643 . Search in Google Scholar

Zhang, Q., & Ma, D. (2021, February). Research on network security analysis based on big data technology application. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032199). IOP Publishing. Zhang Q. Ma D. ( 2021 , February ). Research on network security analysis based on big data technology application . In Journal of Physics: Conference Series (Vol. 1744 , No. 3 , p. 032199 ). IOP Publishing . Search in Google Scholar

Ning, Y. (2021, June). Research on the Application of Big Data Technology in Network Security Analysis. In Journal of Physics: Conference Series (Vol. 1955, No. 1, p. 012015). IOP Publishing. Ning Y. ( 2021 , June ). Research on the Application of Big Data Technology in Network Security Analysis . In Journal of Physics: Conference Series (Vol. 1955 , No. 1 , p. 012015 ). IOP Publishing . Search in Google Scholar

Wang, L., & Jones, R. (2021). Big data analytics in cyber security: network traffic and attacks. Journal of Computer Information Systems, 61(5), 410-417. Wang L. Jones R. ( 2021 ). Big data analytics in cyber security: network traffic and attacks . Journal of Computer Information Systems , 61 ( 5 ), 410 - 417 . Search in Google Scholar

Bachupally, Y. R., Yuan, X., & Roy, K. (2016, March). Network security analysis using Big Data technology. In SoutheastCon 2016 (pp. 1-4). IEEE. Bachupally Y. R. Yuan X. Roy K. ( 2016 , March ). Network security analysis using Big Data technology . In SoutheastCon 2016 (pp. 1 - 4 ). IEEE . Search in Google Scholar

Wang, L., & Jones, R. (2017). Big data analytics for network intrusion detection: A survey. International Journal of Networks and communications, 7(1), 24-31. Wang L. Jones R. ( 2017 ). Big data analytics for network intrusion detection: A survey . International Journal of Networks and communications , 7 ( 1 ), 24 - 31 . Search in Google Scholar

Cárdenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE security & privacy, 11(6), 74-76. Cárdenas A. A. Manadhata P. K. Rajan S. P. ( 2013 ). Big data analytics for security . IEEE security & privacy , 11 ( 6 ), 74 - 76 . Search in Google Scholar

Zeng, H., Liu, Z., & Cai, H. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing. Zeng H. Liu Z. Cai H. ( 2020 , October ). Research on the application of deep learning in computer network information security . In Journal of Physics: Conference Series (Vol. 1650 , No. 3 , p. 032117 ). IOP Publishing . Search in Google Scholar

Zhou, P., & Zhang, W. (2020, September). Research on computer network information security and protection strategy based on deep learning algorithm. In 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI) (pp. 181-184). IEEE. Zhou P. Zhang W. ( 2020 , September ). Research on computer network information security and protection strategy based on deep learning algorithm . In 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI) (pp. 181 - 184 ). IEEE . Search in Google Scholar

Dushyant, K., Muskan, G., Annu, Gupta, A., & Pramanik, S. (2022). Utilizing machine learning and deep learning in cybesecurity: an innovative approach. Cyber security and digital forensics, 271-293. Dushyant K. Muskan G. Annu Gupta A. Pramanik S. ( 2022 ). Utilizing machine learning and deep learning in cybesecurity: an innovative approach . Cyber security and digital forensics , 271 - 293 . Search in Google Scholar

Sathya, K., Premalatha, J., & Suwathika, S. (2020, July). Reinforcing cyber world security with deep learning approaches. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0766-0769). IEEE. Sathya K. Premalatha J. Suwathika S. ( 2020 , July ). Reinforcing cyber world security with deep learning approaches . In 2020 international conference on communication and signal processing (ICCSP) (pp. 0766 - 0769 ). IEEE . Search in Google Scholar

Liao, X., & Xie, J. (2021, July). Research on network intrusion detection method based on deep learning algorithm. In Journal of Physics: Conference Series (Vol. 1982, No. 1, p. 012121). IOP Publishing. Liao X. Xie J. ( 2021 , July ). Research on network intrusion detection method based on deep learning algorithm. In Journal of Physics: Conference Series (Vol. 1982 , No. 1 , p. 012121 ). IOP Publishing . Search in Google Scholar

Li, G., Sharma, P., Pan, L., Rajasegarar, S., Karmakar, C., & Patterson, N. (2021). Deep learning algorithms for cyber security applications: A survey. Journal of Computer Security, 29(5), 447-471. Li G. Sharma P. Pan L. Rajasegarar S. Karmakar C. Patterson N. ( 2021 ). Deep learning algorithms for cyber security applications: A survey . Journal of Computer Security , 29 ( 5 ), 447 - 471 . Search in Google Scholar

Alsyaibani, O. M. A., Utami, E., & Hartanto, A. D. (2021). Survey on deep learning based intrusion detection system. Telematika, 14(2), 86-100. Alsyaibani O. M. A. Utami E. Hartanto A. D. ( 2021 ). Survey on deep learning based intrusion detection system . Telematika , 14 ( 2 ), 86 - 100 . Search in Google Scholar

Vitalina Holubenko,Diogo Gaspar,Rúben Leal & Paulo Silva. (2024). Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach. International Journal of Information Security(1),7-7. Vitalina Holubenko Diogo Gaspar Rúben Leal Paulo Silva ( 2024 ). Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach . International Journal of Information Security(1) , 7 - 7 . Search in Google Scholar

Mostafa Mahmoud El Gayar,Faheed A. F. Alrslani & Shaker El Sappagh. (2024). Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model. Information(10),583-583. Mostafa Mahmoud El Gayar Faheed A. F. Alrslani Shaker El Sappagh ( 2024 ). Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model . Information(10) , 583 - 583 . Search in Google Scholar

Abdullah Baihan,Ahmed I. Alutaibi,Mohammed Alshehri & Sunil Kumar Sharma. (2024). Sign language recognition using modified deep learning network and hybrid optimization: a hybrid optimizer (HO) based optimized CNNSa-LSTM approach. Scientific Reports(1),26111-26111. Abdullah Baihan Ahmed I. Alutaibi Mohammed Alshehri Sunil Kumar Sharma ( 2024 ). Sign language recognition using modified deep learning network and hybrid optimization: a hybrid optimizer (HO) based optimized CNNSa-LSTM approach . Scientific Reports(1) , 26111 - 26111 . Search in Google Scholar

Yang B.,Liu Y.,Zhang G.,Dai J. & Men K.. (2023). Prediction of Anatomical Presentation during Radiotherapy of Nasopharyngeal Carcinoma Using GAN-LSTM for Plan Adaption Decision. International Journal of Radiation Oncology, Biology, Physics(2S),S156-S157. Yang B. Liu Y. Zhang G. Dai J. Men K. ( 2023 ). Prediction of Anatomical Presentation during Radiotherapy of Nasopharyngeal Carcinoma Using GAN-LSTM for Plan Adaption Decision . International Journal of Radiation Oncology, Biology, Physics(2S) , S156 - S157 . Search in Google Scholar

Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro