Big Data Analytics for Cyber Security

Download
2019-09-08
Angın, Pelin
Ranchal, Rohit

Suggestions

Incremental view maintenance in object-oriented databases
Alhajj, R; Polat, Faruk (Association for Computing Machinery (ACM), 1998-06-01)
A database management system should support views to facilitate filtering of information in order to have only necessary and required information available to users with minimal delay Although a lot of research efforts concentrated on views within the conventional relational model, much more effort is required when object-oriented models are considered. However, supporting views is only a step forward in achieving the purpose that requires improving the performance of the system by considering incremental m...
The Sphere Packing Bound for Memoryless Channels
Nakiboğlu, Barış (Pleiades Publishing Ltd, 2020-07-01)
Sphere packing bounds (SPBs)-with prefactors that are polynomial in the block length-are derived for codes on two families of memoryless channels using Augustin's method: (possibly nonstationary) memoryless channels with (possibly multiple) additive cost constraints and stationary memoryless channels with convex constraints on the composition (i.e., empirical distribution, type) of the input codewords. A variant of Gallager's bound is derived in order to show that these sphere packing bounds are tight in te...
A time-evolution model for the privacy degree of information disseminated in online social networks
Othmane, Lotfi Ben; Weffers, Harold; Angın, Pelin; Bhargava, Bharat (Inderscience Publishers, 2013-01-01)
People tend to share private information with their friends on online social networks (OSNs). The common position is that the shared information eventually reaches all users of the network since OSNs exhibit the small-world property. However, dissemination of private information in an OSN exhibits a set of factors that need to be accounted for in order to create more realistic models of the evolution of the privacy degree of information disseminated in an OSN. Among these factors are relationship strength b...
A computation-implementation parallelization approach to the vehicle loading and routing problem
Çavdar, Bahar; Sokol, Joel (Wiley, 2019-01-01)
In this article, we address a version of the capacitated vehicle routing problem where there is a constraint on the total time that can be spent on computing delivery routes and loading the vehicles. This problem, which we call the vehicle loading and routing problem (VLRP), can arise, for example, in the delivery of small, quick-turnaround orders from a warehouse. We propose a computation-implementation parallelization (CIP) approach to solving large VLRP instances, and present computational results showin...
A Semantic-Based Solution for UBL Schema Interoperability
Yarimagan, Yalin; Doğaç, Asuman (Institute of Electrical and Electronics Engineers (IEEE), 2009-05-01)
The Universal Business Language (UBL) is an initiative to develop common business document schemas for interoperability. However, businesses operate in different industry, geopolitical, and regulatory contexts and have different rules and requirements for the information they exchange. So, several trading communities are tailoring UBL schemas to their needs, requiring that these schemas translate to each other. In this article, the authors describe how to enhance UBL with semantics-based translation mechani...
Citation Formats
P. Angın and R. Ranchal, “Big Data Analytics for Cyber Security,” SECURITY AND COMMUNICATION NETWORKS, pp. 0–0, 2019, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/41549.