Neural Network Models in Big Data Analytics and Cyber Security

被引:0
作者
Ghimes, Ana-Maria [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Fac Mil Elect & Informat Syst, Bucharest, Romania
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017 | 2017年
关键词
big data analytics; neural networks; cyber security; training strategies; pruning;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, big data analytics has gained more popularity than any other domain in the research world. Its uses in domains like cyber security, but also the security of data itself, represent great challenges for researchers. Neural Network approaches have been of interest in developing models and architectures for discovering patterns and malicious activity of the users. In certain cases, the right model of a neural network can give better results than any other approach used for the same purpose. The pruning techniques for avoiding underfitting or overfitting and the training strategies can improve performance and deliver the best results.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] SECURITY ISSUES AND CHALLENGES OF BIG DATA ANALYTICS AND VISUALIZATION
    Jayasingh, Bipin Bihari
    Patra, M. R.
    Mahesh, D. Bhanu
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 204 - 208
  • [22] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193
  • [23] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
    Pawlicki, Marek
    Kozik, Rafal
    Choras, Michal
    NEUROCOMPUTING, 2022, 500 : 1075 - 1087
  • [24] Reviewing the security surveillance of AMI using big data analytics
    Lighari, Sheeraz Niaz
    Hussain, Dil Muhammad Akbar
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 230 - 233
  • [25] Visual Analytics for cyber security and intelligence
    Lavigne, Valerie
    Gouin, Denis
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2014, 11 (02): : 175 - 199
  • [26] Bayesian Network Models in Cyber Security: A Systematic Review
    Chockalingam, Sabarathinam
    Pieters, Wolter
    Teixeira, Andre
    van Gelder, Pieter
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 105 - 122
  • [28] Social-Network-Sourced Big Data Analytics
    Tan, Wei
    Blake, M. Brian
    Saleh, Iman
    Dustdar, Schahram
    IEEE INTERNET COMPUTING, 2013, 17 (05) : 62 - 69
  • [29] Big data analytics - enabled cyber-physical system: model and applications
    Luo, Shuai
    Liu, Hongwei
    Qi, Ershi
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2019, 119 (05) : 1072 - 1088
  • [30] Progress on Artificial Neural Networks for Big Data Analytics: A Survey
    Chiroma, Haruna
    Abdullahi, Usman Ali
    Abdulhamid, Shafi'i Muhammad
    Alarood, Ala Abdulsalam
    Gabralla, Lubna A.
    Rana, Nadim
    Shuib, Liyana
    Hashem, Ibrahim Abaker Targio
    Gbenga, Dada Emmanuel
    Abubakar, Adamu, I
    Zeki, Akram M.
    Herawan, Tutut
    IEEE ACCESS, 2019, 7 : 70535 - 70551