A Study On Tools And Techniques For Business Models

  • Enita Rosmika
  • Phong Thanh Nguyen
  • Oksana M. Gushchina
  • E. Laxmi Lydia
  • K. Shankar
Palabras clave: Data Science, Cyber Security, Threat Detection

Resumen

In this new time of digitalization, cyber-attack are constrained by in- ventive, wise and profoundly expert people. Continuous synchroniza- tion enables an attacker to bit by bit get familiar with the objective system, adjust to any protective measures, and advance the attack after some time. On the off chance that we have not actualized any system security risk recognition benefits from our association, it will uncover the closure of our forthcoming overwhelming voyage. System securi- ty threat identification centers around individual stages, frameworks, systems, endpoints or practically some other IT asset. System security threats recognition is juvenile (and remarkable) in real digital security tasks. By and by digital protectors by and large rebate these methodologies for mark location and instinct. The progression for this is most like- ly special, including getting designs, chance hunger and choice focuses. We require a total comprehension of all parts of the information age process. Information science will deliver specialized information that takes into consideration “strategic” revelation of a potential trade off on a framework that choose when to square and when to alert on something. This paper ex- pects to actualize the idea of information science for system security risk identification.

Biografía del autor/a

Enita Rosmika
Universitas Amir Hamzah, Medan, Indonesia
Phong Thanh Nguyen
Department of Project Management, Ho Chi Minh City Open University, Vietnam
Oksana M. Gushchina
Togliatti State University, Russia
E. Laxmi Lydia
Professor, Vignan’s Institute of Information Technology(A), Department of Computer Science and Engineering, Visakhapatnam, Andhra Pradesh, India
K. Shankar
Department of Computer Applications, Alagappa University, India

Citas

Adams, N., Heard, N., Adams, N. and Heard, N., 2014. Data analysis for network cyber-security. World Scientific Publishing Co., Inc..

Alnasser, A., Sun, H. and Jiang, J., 2019. Cyber security challenges and solutions for V2X communications: A survey. Computer Networks, 151, pp.52-67.

Bilal, K., Malik, S.U.R., Khalid, O., Hameed, A., Alvarez, E., Wijayseka- ra, V., Irfan, R., Shrestha, S., Dwivedy, D., Ali, M. and Khan, U.S., 2014. A taxonomy and survey on green data center networks. Future Generation Computer Systems, 36, pp.189-208.

Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communi- cations Surveys & Tutorials, 18(2), pp.1153-1176.

Di, M., 2019, February. Design of the Network Security Intrusion Detec- tion System Based on the Cloud Computing. In The International Confer- ence on Cyber Security Intelligence and Analytics (pp. 68-73). Springer, Cham.

Kantarcioglu, M., 2019, May. Securing Big Data: New Access Control Challenges and Approaches. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (pp. 1-2). ACM.

Mahmood, T. and Afzal, U., 2013, December. Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd national conference on Information assurance (ncia) (pp. 129- 134). IEEE.

Mäurer, N. and Schmitt, C., 2019, April. Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis. In 2019 Integrated Communications, Naviga- tion and Surveillance Conference (ICNS) (pp. 1-13). IEEE.

Sani, A.S., Yuan, D., Jin, J., Gao, L., Yu, S. and Dong, Z.Y., 2019. Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93, pp.849-859.

Srinivas, J., Das, A.K. and Kumar, N., 2019. Government regulations in cyber security: Framework, standards and recommendations. Future Gen- eration Computer Systems, 92, pp.178-188.

Verma, A., Khanna, A., Agrawal, A., Darwish, A. and Hassanien, A.E., 2019. Security and Privacy in Smart City Applications and Services: Op- portunities and Challenges. In Cybersecurity and Secure Information Sys- tems (pp. 1-15). Springer, Cham.

Wu, J., Guo, S., Li, J. and Zeng, D., 2016. Big data meet green challenges: Greening big data. IEEE Systems Journal, 10(3), pp.873-887.

Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X. and Lu, C., 2015. A cloud computing based system for cyber security management. In- ternational Journal of Parallel, Emergent and Distributed Systems, 30(1), pp.29-45.

Zhao, R., Liu, Y., Zhang, N. and Huang, T., 2017. An optimization model for green supply chain management by using a big data analytic approach. Journal of Cleaner Production, 142, pp.1085-1097.

Zhong, S., Zhong, H., Huang, X., Yang, P., Shi, J., Xie, L. and Wang, K., 2019. Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks. In Security and Privacy for Next-Generation Wireless Networks (pp. 33-48). Springer, Cham.

Publicado
2019-08-03
Cómo citar
Rosmika, E., Thanh Nguyen, P., M. Gushchina, O., Laxmi Lydia, E., & Shankar, K. (2019). A Study On Tools And Techniques For Business Models. Opción, 35, 533-548. Recuperado a partir de https://produccioncientificaluz.org/index.php/opcion/article/view/30947

Artículos más leídos del mismo autor/a

1 2 3 > >>