2018 International Conference on Computational Science and Computational Intelligence (CSCI) 2018
DOI: 10.1109/csci46756.2018.00026
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Security Tasks Using Big Data Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…The smart city model includes a sensing layer and data analytics processes to understand in real-time the patterns of the city services in different areas such as health, energy, transport, waste management, and environment. In recent years, the development of smart cities has been supported by the evolution of communication systems and the inclusion of emerging technologies such as the Internet of Things (IoT), Big Data, and Cloud Computing [3]- [5]. The integration of these technologies and their direct application to the urban space has promoted urban computing development.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The smart city model includes a sensing layer and data analytics processes to understand in real-time the patterns of the city services in different areas such as health, energy, transport, waste management, and environment. In recent years, the development of smart cities has been supported by the evolution of communication systems and the inclusion of emerging technologies such as the Internet of Things (IoT), Big Data, and Cloud Computing [3]- [5]. The integration of these technologies and their direct application to the urban space has promoted urban computing development.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, NIST, in its special publication SP 800-61, defines five phases: (i) preparation, (ii) detection and analysis, (iii) containment, (iv) eradication and recovery, and (v) post-incident [43], [44]. In particular, the post-incident phase constitutes the final phase once an incident has been resolved.…”
Section: Introductionmentioning
confidence: 99%