2021
DOI: 10.1007/978-981-16-3153-5_46
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity for Data Science: Issues, Opportunities, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…This review can give important insights into the current state of the art, highlight gaps and limits, and influence future research paths in this subject. In our investigation of Sybil attack detection in Mobile Ad Hoc Networks (MANETs), our research builds upon foundational insights presented in [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48][49]…”
Section: Looking Into the Above-mentioned Tablementioning
confidence: 99%
“…This review can give important insights into the current state of the art, highlight gaps and limits, and influence future research paths in this subject. In our investigation of Sybil attack detection in Mobile Ad Hoc Networks (MANETs), our research builds upon foundational insights presented in [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48][49]…”
Section: Looking Into the Above-mentioned Tablementioning
confidence: 99%
“…In this research, the authors [33] introduced a method that runs on the Android platform and encrypts texts before they are sent over the network by the user allowing them to encrypt communications before transmitting data over the network. In the continuum of fortifying SMS security measures, this study builds upon earlier works [34][35][36][37][38][39][40][41][42][43][44][45][46][47][48] to address the persistent threats posed by plaintext and dictionary attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cybersecurity is data, ranging from network logs to SA and DA results. This relationship between collected data, Artificial Intelligence (AI) and ML technologies results in an important instrument called the dataset, which brings together the collection of evidence needed to represent the background to be studied [ 17 ].…”
Section: Aim and Motivation—the Problem With Cyber Threat Datasetsmentioning
confidence: 99%