Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Big Data Analytics for Cyber Security
Download
index.pdf
Date
2019-09-08
Author
Angın, Pelin
Ranchal, Rohit
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
75
views
223
downloads
Cite This
Subject Keywords
Computer Networks and Communications
,
Information Systems
URI
https://hdl.handle.net/11511/41549
Journal
SECURITY AND COMMUNICATION NETWORKS
DOI
https://doi.org/10.1155/2019/4109836
Collections
Department of Computer Engineering, Article
Suggestions
OpenMETU
Core
Incremental view maintenance in object-oriented databases
Alhajj, R; Polat, Faruk (Association for Computing Machinery (ACM), 1998-06-01)
A database management system should support views to facilitate filtering of information in order to have only necessary and required information available to users with minimal delay Although a lot of research efforts concentrated on views within the conventional relational model, much more effort is required when object-oriented models are considered. However, supporting views is only a step forward in achieving the purpose that requires improving the performance of the system by considering incremental m...
The Sphere Packing Bound for Memoryless Channels
Nakiboğlu, Barış (Pleiades Publishing Ltd, 2020-07-01)
Sphere packing bounds (SPBs)-with prefactors that are polynomial in the block length-are derived for codes on two families of memoryless channels using Augustin's method: (possibly nonstationary) memoryless channels with (possibly multiple) additive cost constraints and stationary memoryless channels with convex constraints on the composition (i.e., empirical distribution, type) of the input codewords. A variant of Gallager's bound is derived in order to show that these sphere packing bounds are tight in te...
A time-evolution model for the privacy degree of information disseminated in online social networks
Othmane, Lotfi Ben; Weffers, Harold; Angın, Pelin; Bhargava, Bharat (Inderscience Publishers, 2013-01-01)
People tend to share private information with their friends on online social networks (OSNs). The common position is that the shared information eventually reaches all users of the network since OSNs exhibit the small-world property. However, dissemination of private information in an OSN exhibits a set of factors that need to be accounted for in order to create more realistic models of the evolution of the privacy degree of information disseminated in an OSN. Among these factors are relationship strength b...
A computation-implementation parallelization approach to the vehicle loading and routing problem
Çavdar, Bahar; Sokol, Joel (Wiley, 2019-01-01)
In this article, we address a version of the capacitated vehicle routing problem where there is a constraint on the total time that can be spent on computing delivery routes and loading the vehicles. This problem, which we call the vehicle loading and routing problem (VLRP), can arise, for example, in the delivery of small, quick-turnaround orders from a warehouse. We propose a computation-implementation parallelization (CIP) approach to solving large VLRP instances, and present computational results showin...
A Semantic-Based Solution for UBL Schema Interoperability
Yarimagan, Yalin; Doğaç, Asuman (Institute of Electrical and Electronics Engineers (IEEE), 2009-05-01)
The Universal Business Language (UBL) is an initiative to develop common business document schemas for interoperability. However, businesses operate in different industry, geopolitical, and regulatory contexts and have different rules and requirements for the information they exchange. So, several trading communities are tailoring UBL schemas to their needs, requiring that these schemas translate to each other. In this article, the authors describe how to enhance UBL with semantics-based translation mechani...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
P. Angın and R. Ranchal, “Big Data Analytics for Cyber Security,”
SECURITY AND COMMUNICATION NETWORKS
, pp. 0–0, 2019, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/41549.