{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:22:48Z","timestamp":1742995368787,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031451614"},{"type":"electronic","value":"9783031451621"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-45162-1_10","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:04:44Z","timestamp":1701381884000},"page":"163-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Big Data Analytics for Cybersecurity in IoE Networks"],"prefix":"10.1007","author":[{"given":"Faisal","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Hanan","family":"Sharif","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Naveed","family":"Riaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-16528-8_11","volume-title":"New Contributions in Information Systems and Technologies","author":"I Dias","year":"2015","unstructured":"Dias I, Sousa MJ Business Intelligence applied to Human resources management. In: New Contributions in Information Systems and Technologies: Volume 2, 2015. Springer, pp. 105\u2013113"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.comnet.2015.12.023","volume":"101","author":"MM Rathore","year":"2016","unstructured":"Rathore MM, Ahmad A, Paul A, Rho S (2016) Urban planning and building smart cities based on the internet of things using big data analytics. Computer networks 101:63\u201380. doi:https:\/\/doi.org\/10.1016\/j.comnet.2015.12.023","journal-title":"Computer networks"},{"issue":"4","key":"10_CR3","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1089\/big.2020.0282","volume":"9","author":"AA Kashif Naseer Qureshi","year":"2021","unstructured":"Kashif Naseer Qureshi AA, Raja Waseem Anwar, Shahid Nazir Bhati, and Gwanggil Jeon (2021) Fully Integrated Data Communication Framework by Using Visualization Augmented Reality for Internet of Things Networks. Big Data 9 (4):253\u2013264. doi:https:\/\/doi.org\/10.1089\/big.2020.0282","journal-title":"Big Data"},{"key":"10_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103363","volume":"80","author":"K Zhan","year":"2021","unstructured":"Zhan K (2021) Sports and health big data system based on 5G network and Internet of Things system. Microprocessors and Microsystems 80:103363","journal-title":"Microprocessors and Microsystems"},{"key":"10_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1208","volume":"7","author":"M Pramanik","year":"2017","unstructured":"Pramanik M, Lau R, Youe W, Ye Y, Li C (2017) Big data analytics for security and criminal investigation. WIREs Data Min Knowl Discov 7: e1208. doi:https:\/\/doi.org\/10.1002\/widm.1208","journal-title":"WIREs Data Min Knowl Discov"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Qureshi MA, Qureshi KN, Jeon G, Piccialli F (2021) Deep learning-based ambient assisted living for self-management of cardiovascular conditions. Neural Computing and Applications. doi:https:\/\/doi.org\/10.1007\/s00521-020-05678-w","DOI":"10.1007\/s00521-020-05678-w"},{"key":"10_CR7","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2019.1575621","volume-title":"Internet of everything, networks, applications, and computing systems (IoENACS)","author":"M Shojafar","year":"2020","unstructured":"Shojafar M, Sookhak M (2020) Internet of everything, networks, applications, and computing systems (IoENACS). vol 42. Taylor & Francis. doi:https:\/\/doi.org\/10.1080\/1206212X.2019.1575621"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Bandre SR, Nandimath JN Design consideration of Network Intrusion detection system using Hadoop and GPGPU. In: 2015 international conference on pervasive computing (ICPC), 2015. IEEE, pp 1\u20136. doi:https:\/\/doi.org\/10.1109\/PERVASIVE.2015.7087201","DOI":"10.1109\/PERVASIVE.2015.7087201"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Qureshi KN, Qayyum S, Ul Islam MN, Jeon G (2021) A secure data parallel processing based embedded system for internet of things computer vision using field programmable gate array devices. International Journal of Circuit Theory and Applications n\/a (n\/a). doi:https:\/\/doi.org\/10.1002\/cta.2964","DOI":"10.1002\/cta.2964"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.comnet.2017.06.013","volume":"129","author":"E Ahmed","year":"2017","unstructured":"Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in Internet of Things. Computer Networks 129:459\u2013471. doi:https:\/\/doi.org\/10.1016\/j.comnet.2017.06.013","journal-title":"Computer Networks"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.bushor.2017.01.004","volume":"60","author":"I Lee","year":"2017","unstructured":"Lee I (2017) Big data: Dimensions, evolution, impacts, and challenges. Business horizons 60 (3):293\u2013303. doi:https:\/\/doi.org\/10.1016\/j.bushor.2017.01.004","journal-title":"Business horizons"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Sheriff CI, Naqishbandi T, Geetha A Healthcare informatics and analytics framework. In: 2015 International Conference on Computer Communication and Informatics (ICCCI), 2015. IEEE, pp 1\u20136. doi:https:\/\/doi.org\/10.1109\/ICCCI.2015.7218108","DOI":"10.1109\/ICCCI.2015.7218108"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Marchal S, Jiang X, State R, Engel T A big data architecture for large scale security monitoring. In: 2014 IEEE International Congress on Big Data, 2014. IEEE, pp 56\u201363. doi:https:\/\/doi.org\/10.1109\/BigData.Congress.2014.18","DOI":"10.1109\/BigData.Congress.2014.18"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Chen Z, Zhang H, Hatcher WG, Nguyen J, Yu W A streaming-based network monitoring and threat detection system. In: 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), 2016. IEEE, pp 31\u201337. doi:https:\/\/doi.org\/10.1109\/SERA.2016.7516125","DOI":"10.1109\/SERA.2016.7516125"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Lighari SN Testing of algorithms for anomaly detection in Big data using Apache spark. In: 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), 2017. IEEE, pp 97\u2013100. doi:https:\/\/doi.org\/10.1109\/CICN.2017.8319364","DOI":"10.1109\/CICN.2017.8319364"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Jia Z, Shen C, Yi X, Chen Y, Yu T, Guan X Big-data analysis of multi-source logs for anomaly detection on network-based system. In: 2017 13th IEEE conference on automation science and engineering (CASE), 2017. IEEE, pp 1136\u20131141. doi:https:\/\/doi.org\/10.1109\/COASE.2017.8256257","DOI":"10.1109\/COASE.2017.8256257"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1016\/j.procs.2016.07.238","volume":"93","author":"GP Gupta","year":"2016","unstructured":"Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using Apache spark. Procedia Computer Science 93:824\u2013831. doi:https:\/\/doi.org\/10.1016\/j.procs.2016.07.238.","journal-title":"Procedia Computer Science"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Fontugne R, Mazel J, Fukuda K Hashdoop: A MapReduce framework for network anomaly detection. In: 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS), 2014. IEEE, pp 494\u2013499. doi:https:\/\/doi.org\/10.1109\/INFCOMW.2014.6849281","DOI":"10.1109\/INFCOMW.2014.6849281"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.procs.2018.05.169","volume":"132","author":"P Dahiya","year":"2018","unstructured":"Dahiya P, Srivastava DK (2018) Network intrusion detection in big dataset using spark. Procedia computer science 132:253\u2013262. doi:https:\/\/doi.org\/10.1016\/j.procs.2018.05.169","journal-title":"Procedia computer science"},{"key":"10_CR20","unstructured":"Vangara RVB, Vangara SP, Thirupathur V (2020) A survey on natural language processing in context with machine learning. Int J Anal Exp Modal Anal: 1390\u20131395"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/ssdm.1997.621141","volume-title":"Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No. 97TB100150)","author":"U Fayyad","year":"1997","unstructured":"Fayyad U Data mining and knowledge discovery in databases: implications for scientific databases. In: Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No. 97TB100150), 1997. IEEE, pp. 2\u201311. doi:https:\/\/doi.org\/10.1109\/ssdm.1997.621141"},{"issue":"2","key":"10_CR22","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J Srivastava","year":"2000","unstructured":"Srivastava J, Cooley R, Deshpande M, Tan P-N (2000) Web usage mining: Discovery and applications of usage patterns from web data. Acm Sigkdd Explorations Newsletter 1 (2):12\u201323. doi:https:\/\/doi.org\/10.1145\/846183.846188.","journal-title":"Acm Sigkdd Explorations Newsletter"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.procs.2019.08.084","volume":"155","author":"L Rabhi","year":"2019","unstructured":"Rabhi L, Falih N, Afraites A, Bouikhalene B (2019) Big data approach and its applications in various fields. Procedia Computer Science 155:599\u2013605. doi:https:\/\/doi.org\/10.1016\/j.procs.2019.08.084","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3378448","volume":"1","author":"C-W Tien","year":"2020","unstructured":"Tien C-W, Chen S-W, Ban T, Kuo S-Y (2020) Machine learning framework to analyze IOT malware using ELF and opcode features. Digital Threats: Research and Practice 1 (1):1\u201319. doi:https:\/\/doi.org\/10.1145\/3378448","journal-title":"Digital Threats: Research and Practice"},{"issue":"3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11416-016-0281-3","volume":"13","author":"J Ming","year":"2017","unstructured":"Ming J, Xin Z (2017) Impeding behavior-based malware analysis via replacement attacks to malware specifications. Journal of Computer Virology and Hacking Techniques 13 (3):193\u2013207. doi:https:\/\/doi.org\/10.1007\/s11416-016-0281-3","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2016.05.138","volume":"87","author":"G Manogaran","year":"2016","unstructured":"Manogaran G, Thota C, Kumar MV (2016) MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Computer Science 87:128\u2013133. doi:https:\/\/doi.org\/10.1016\/j.procs.2016.05.138","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3970\/cmc.2018.055.095","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng J, Xu R, Tang X, Sheng VS, Cai C (2018) An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput Mater Continua 55 (1):95\u2013119. doi:https:\/\/doi.org\/10.3970\/cmc.2018.055.095","journal-title":"Comput Mater Continua"},{"issue":"2","key":"10_CR28","first-page":"59","volume":"13","author":"RR Valle","year":"2013","unstructured":"Valle RR, Manzanares FV (2013) Concentration of goods traffic in Spanish ports during the period 2000\u20132009. Regional and Sectoral Economic Studies 13 (2):59\u201372","journal-title":"Regional and Sectoral Economic Studies"}],"container-title":["Internet of Things","Cybersecurity Vigilance and Security Engineering of Internet of Everything"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45162-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:05:39Z","timestamp":1701381939000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45162-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031451614","9783031451621"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45162-1_10","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}