2020
DOI: 10.1016/j.procs.2020.07.108
|View full text |Cite
|
Sign up to set email alerts
|

Network Security Strategies in Big Data Context

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 29 publications
0
6
0
1
Order By: Relevance
“…According to literature [17], government intervention should be avoided or avoided to the greatest extent possible by relying on the support of a large number of passengers and their monopoly position. According to the literature [18], the OCH platform should be the primary focus of government oversight, with unfair standards reduced and the use of information technology strengthened to ensure the safety of OCH operations. In literature [19], through sorting out and analyzing the OCH management measures formu-lated by various cities, it is considered that it is necessary and reasonable for OCH authorities to adopt safety supervision measures.…”
Section: Related Workmentioning
confidence: 99%
“…According to literature [17], government intervention should be avoided or avoided to the greatest extent possible by relying on the support of a large number of passengers and their monopoly position. According to the literature [18], the OCH platform should be the primary focus of government oversight, with unfair standards reduced and the use of information technology strengthened to ensure the safety of OCH operations. In literature [19], through sorting out and analyzing the OCH management measures formu-lated by various cities, it is considered that it is necessary and reasonable for OCH authorities to adopt safety supervision measures.…”
Section: Related Workmentioning
confidence: 99%
“…All modules work independently [53], communicating asynchronously via a queue system. Consequently, the software is vertically scalable and the system is configured from the administrator panel.…”
Section: System Data Life Cycle and Analysismentioning
confidence: 99%
“…Then using machine learning, optimization of traffic analysis becomes an intriguing topic of study. Several researchers use big data and machine learning technology to support traffic analysis, Such as [1] examine the factors influencing network security platforms in the era of big data. [2] Applying duplicate data detection and deletion, detection of missing value, and data quality analysis to the big data methodology.…”
Section: Introductionmentioning
confidence: 99%