[1]
Zarei, S.M.; Fotohi, R.
Defense against flooding attacks using probabilistic thresholds in the internet
of things ecosystem. Secur. Priv. 2021, 4,
e152.
[2]
Zhou, Z.; Tian, Y.; Xiong, J.;
Ma, J.; Peng, C. Blockchain-enabled Secure and Trusted Federated Data Sharing
in IIoT. IEEE
Trans. Ind. Inform. 2022; Early Access.
[3]
Prvan, M.; Ožegović, J.
Methods in Teaching Computer Networks: A Literature Review. ACM Trans. Comput.
Educ. 2020, 20,
1–35.
[4]
Nour, B.; Mastorakis, S.;
Ullah, R.; Stergiou, N. Information-Centric Networking in Wireless
Environments: Security Risks and Challenges. IEEE Wirel. Commun. 2021, 28, 121–127
[5]
A. Ju, Y. Guo, and T. Li, “MCKC: a modified cyber kill chain model
for cognitive APTs analysis within Enterprise multimedia network,” Multimedia
Tools and Applications, vol. 79, no. 39-40, pp. 29923–29949, 2020.
[6]
Bhat, S. A., & Huang, N. F. (2021). Big data and ai revolution
in precision agriculture: Survey and challenges. Ieee Access, 9,
110209-110222.
[7]
C. Zhou, H. Wang, C. Wang et al., “Geoscience knowledge graph in
the big data era,” Science China Earth Sciences, vol. 64, no. 7, pp. 1105–1114,
2021.
[8]
D. Wang, J. Yu, B. Liu, C. Long, P. Chen, and Z. Chong, “Integrated
energy efficiency evaluation of a multi-source multi-load desalination
micro-energy network,” Global Energy Interconnection, vol. 3, no. 2, pp.
128–139, 2020.
[9]
R.
Vinayakumar, K. P. Soman, P. Poornachandran, “Applying convolutional neural
network for network intrusion detection,” In 2017 International Conference on
Advances in Computing, Communications and Informatics (ICACCI), IEEE, 2017,
September, pp. 1222–1228.
[10]
H. Sun, Z.
Yao, and Q. Miao, “Design of macroeconomic growth prediction algorithm based on
data mining,” Mob. Inf. Syst., vol. 2021, no. 7, pp. 1–8, 2021.
[11]
Jeyepalan, D. P., & Kirubakaran, E. (2019). High performance
network intrusion detection model using graph databases. International journal
of computational intelligence and information security December 2019.
[12]
Essid, M., & Jemili, F. (2016). Combining intrusion detection
datasets using MapReduce. proceedings of the International Conference on
Systems, Man, and Cybernetics.
[13]
Ben Fekih, R., & Jemili, F. (2018). Distributed architecture of
an Intrusion detection system based on cloud computing and big data techniques.
8th International Conference on Sciences of Electronics, Technologies of
Information and Telecommunications (SETIT 2018).
[14]
Radhakrishna, V., Aljawarneh, S., Kumar, P. V., Janaki, V., &
Cheruvu, A. (2019). Tree based data fusion approach for mining temporal
patterns. Proceedings of the 5th international conference on engineering and
MIS (ICEMIS ‘19). association for computing machinery, New York, NY, USA.
[15]
Singh, O. P., Singh, A. K., & Zhou, H. (2022). Multimodal
fusion-based image hiding algorithm for secure healthcare system. IEEE
Intelligent Systems.
[16]
Fadhil, S. A., Lubna, E. K., &Sayl, G. A.
(2021). Protection measurements of computer
network information security for big data. Journal of Discrete Mathematical
Sciences and Cryptography, 24(7), 1959–1965. doi:10. 1080/09720529.2021.1959996
doi:10.1080/09720529.2021.1959996
[17]
Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine
learning models for secure data analytics: A taxonomy and threat model. Computer Communications, 153, 406-440.
[18]
Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., &
Hussain, A. (2021). Big data and IoT-based applications in smart environments:
A systematic review. Computer
Science Review, 39,
100318.
[19]
Iqbal, R., Doctor, F., More, B., Mahmud, S., & Yousuf, U.
(2020). Big data analytics: Computational intelligence techniques and
application areas. Technological
Forecasting and Social Change, 153, 119253.
[20]
J. Hu, S. Cai, T. Huang et al., “Vehicle travel destination
prediction method based on multi-source data,” Automotive Innovation, vol. 4,
no. 3, pp. 315–327, 2021.
[21]
Khang, A., Abdullayev, V., Ali, R. N., Bali, S. Y., Mammadaga, G.
M., & Hafiz, M. K. (2024). Using Big Data to Solve Problems in the Field of
Medicine. In Computer Vision and
AI-Integrated IoT Technologies in the Medical Ecosystem (pp.
407-418). CRC Press.
[22]
L. Wang, M. Peng, and Q. Zhou, “Pre-impact fall detection based on
multi-source CNN ensemble,” IEEE Sensors Journal, vol. 20, no. 10, pp.
5442–5451, 2020.
[23]
M. S. Tehrany, S. Jones, F. Shabani, F. Mart´ınez-Alvarez, and ´ D.
Tien Bui, “A novel ensemble modeling approach for the spatial prediction of
tropical forest fire susceptibility using Logit Boost machine learning
classifier and multi-source geospatial data,” 5eoretical and Applied
Climatology, vol. 137, no. 1-2, pp. 637–653, 2019.
[24]
N. Sanden and G. Neideck, “Learnings from the development of public
sector multi-source enduring linked data assets,” Australian Journal of Social
Issues, vol. 56, no. 2, pp. 288–300, 2021.
[25]
Oluwafunmilayo G . An Assessment of Cybersecurity Technologies in
the Selected Universities in Southwestern Nigeria[J]. International Journal of
Computer Applications; 2019; 178(50):11-18.
[26]
Pramanik, S., & Bandyopadhyay, S. K. (2023). Analysis of big
data. In Encyclopedia of data
science and machine learning (pp. 97-115). IGI Global.
[27]
Anjum, N., Latif, Z., Lee, C., Shoukat, I. A., & Iqbal, U.
(2021). MIND: A multi-source data fusion schemefor intrusion detection in
networks.Sensors,21(14), 494.
[28]
Aleroud, A., & Karabatis, G. (2017). Contextual information
fusion for intrusion detection: a surveyand taxonomy.Knowledge and Information
Systems,52(3), 563–619.
[29]
Q. Guo, S. Jin, M. Li et al., “Application of deep learning in
ecological resource research: theories, methods, and challenges,” Science China
Earth Sciences, vol. 63, no. 10, pp. 1457–1474, 2020.
[30]
Ragazou, K., Passas, I., Garefalakis, A.,
Galariotis, E., &Zopounidis, C. (2023). Big data analytics applications in information management driving
operational efficiencies and decision-making: mapping the field of knowledge
with bibliometric analysis using R. Big
Data and Cognitive Computing, 7(1), 13.
[31]
S. S. Harsha, H. Simhadri, and K. Raghu, “Distinctly trained
multi-source CNN for multi camera based vehicle tracking system,” International
Journal of Recent Technology and Engineering, vol. 8, no. 2, pp. 624–634, 2019.
[32]
Tao, D., Yang, P., & Feng, H. (2020). Utilization of text
mining as a big data analysis tool for food science and nutrition. Comprehensive reviews in food science and
food safety, 19(2),
875-894.
[33]
Ullah, F., Salam, A., Abrar, M., & Amin, F. (2023). Brain tumor
segmentation using a patch-based convolutional neural network: A big data
analysis approach. Mathematics, 11(7), 1635.
[34]
Widad
Elouataoui, Saida El Mendili, and Youssef
Gahi, “An Automated Big Data Quality Anomaly Correction Framework Using
Predictive Analysis” Journal Data, MDPI, December 2023.
[35]
Gahi, Y.; El Alaoui, I. A Secure Multi-User Database-as-a-Service
Approach for Cloud Computing Privacy. Procedia Comput. Sci. 2019, 160, 811–818.
[36]
Vasa, J., & Thakkar, A. (2023). Deep learning: Differential
privacy preservation in the era of big data. Journal of Computer Information Systems, 63(3), 608-631.
[37]
Wu, J., Wang, J., Nicholas, S., Maitland, E., & Fan, Q. (2020).
Application of big data technology for COVID-19 prevention and control in
China: lessons and recommendations. Journal
of medical Internet research, 22(10), e21980.
[38]
X. Chen, D. Zhao, W. Zhong, and Y. Jiufeng, “Research on
information sharing technology of mental health alliance based on multi-source
heterogeneous data fusion algorithms,” Academic Journal of Computing &
Information Science, vol. 2, no. 1, pp. 74–80, 2019.
[39]
Y. Xiong and F. Zhang, “Effect of human settlements on urban
thermal environment and factor analysis based on multisource data: a case study
of Changsha city,” Journal of Geographical Sciences, vol. 31, no. 6, pp.
819–838, 2021.
[40] Z.
Xiong, H. Xu, W. Li, and Z. Cai, “Multi-source adversarial sample attack on
autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 70, no.
3, pp. 2822–2835, 2021.