Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

Artificial intelligence for satellite communication and non-terrestrial networks: A survey

G Fontanesi, F Ortíz, E Lagunas, VM Baeza… - arXiv preprint arXiv …, 2023 - arxiv.org
This paper surveys the application and development of Artificial Intelligence (AI) in Satellite
Communication (SatCom) and Non-Terrestrial Networks (NTN). We first present a …

Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques

MSA Ansari, K Pal, P Govil, MC Govil… - Physical …, 2023 - Elsevier
Microservice is considered a distributed cloud native approach where a standalone
application is composed of multiple loosely coupled and free-spirited deployable …

Addressing the effectiveness of DDoS-attack detection methods based on the clustering method using an ensemble method

A Zeinalpour, HA Ahmed - Electronics, 2022 - mdpi.com
The curse of dimensionality, due to lots of network-traffic attributes, has a negative impact on
machine learning algorithms in detecting distributed denial of service (DDoS) attacks. This …

[PDF][PDF] Diagnosis of Alzheimer disease using machine learning approaches

AR Vidushi, AK Shrivastava - Int. J. Adv. Sci. Technol, 2019 - researchgate.net
This article applies the machine learning paramount techniques for the early detection and
effective diagnosis of severe Alzheimer's disease (AD). AD is neurodegenerative chronic …

Data mining based dimensionality reduction techniques

A Soni, A Rasool, A Dubey… - … for Advancement in …, 2022 - ieeexplore.ieee.org
With the rapid advancement in the science domain, the explosion of available data is seen
in recent years. Laboratory instruments are becoming more advanced day by day and are …

Towards Big Data modeling and management systems: From DBMS to BDMS

RM Gahar, O Arfaoui, MS Hidri - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
To succeed in a Big Data strategy, you have to arm yourself with a wide range of data skills
and best practices. This strategy can result in an impressive asset that can streamline …

Open Research Issues and Tools for Visualization and Big Data Analytics

RM Gahar, O Arfaoui, MS Hidri - arXiv preprint arXiv:2404.12505, 2024 - arxiv.org
The new age of digital growth has marked all fields. This technological evolution has
impacted data flows which have witnessed a rapid expansion over the last decade that …

Addressing High False Positive Rates of DDoS Attack Detection Methods

A Zeinalpour - 2021 - search.proquest.com
Distributed denial of service (DDoS) attack detection methods based on the clustering
method are ineffective in detecting attacks correctly. Service interruptions caused by DDoS …

[PDF][PDF] Optimized auto encoder on high dimensional big data reduction: an analytical approach

A Shikalgar, S Sonavane - Turkish Journal of Computer and …, 2021 - turcomat.org
Optimized Auto Encoder on High Dimensional Big Data Reduction: an Analytical Approach
Page 1 Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 526-537 …