{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:41:39Z","timestamp":1772642499877,"version":"3.50.1"},"reference-count":30,"publisher":"Informa UK Limited","issue":"5","funder":[{"name":"U.S. Army TACOM Life Cycle Command","award":["W56HZV-08-C-0236"],"award-info":[{"award-number":["W56HZV-08-C-0236"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2021,9,3]]},"DOI":"10.1080\/08874417.2019.1688731","type":"journal-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T21:40:31Z","timestamp":1578519631000},"page":"410-417","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":31,"title":["Big Data Analytics in Cyber Security: Network Traffic and Attacks"],"prefix":"10.1080","volume":"61","author":[{"given":"Lidong","family":"Wang","sequence":"first","affiliation":[{"name":"Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS, USA"}]},{"given":"Randy","family":"Jones","sequence":"additional","affiliation":[{"name":"Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"cit0001","unstructured":"Ponemon I. Big data analytics in cyber defense. Ponemon Institute; Feb 2013. Report No: EB-7499 02.13."},{"key":"cit0002","unstructured":"Gjelten T. Cyberattacks, terrorism top U.S. security threat report. Washington (DC): National Public Radio; (http:\/\/www.npr.org); 2013 Mar 12. http:\/\/www.npr.org\/2013\/03\/12\/174135800\/cyber-attacks-terrorism-top-u-s-security-threat-report."},{"issue":"2","key":"cit0003","first-page":"289","volume":"11","author":"Flowers A","year":"2014","journal-title":"J Homel Secur Emerg Manag"},{"key":"cit0004","first-page":"59","volume":"24","author":"P\u0103trascu A","year":"2014","journal-title":"MTA Rev Mil Tech Acad Publishing House"},{"key":"cit0005","unstructured":"Crawford S, Piesse D. Cyber insurance, security and data integrity, Part 1: insights into cyber security and risk-2014. Ernst & Young LLP; 2014. Technical Report, p. 1\u201317."},{"issue":"6","key":"cit0006","first-page":"87","volume":"3","author":"Youssef A","year":"2011","journal-title":"Int J Comput Sci Inf Technol"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"cit0008","first-page":"41","volume":"9","author":"Rajesh KV","year":"2013","journal-title":"J Inf Technol"},{"key":"cit0009","first-page":"39","volume":"7","author":"Wang L","year":"2017","journal-title":"Am J Intell Syst"},{"key":"cit0010","volume-title":"Data mining: concepts and techniques","author":"Han J","year":"2011"},{"key":"cit0011","first-page":"3","volume":"23","author":"Rahm E","year":"2000","journal-title":"IEEE Data Eng Bull"},{"key":"cit0012","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/CoDIT.2019.8820303","volume-title":"2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)","author":"Kewo A","year":"2019"},{"issue":"1","key":"cit0013","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TBDATA.2017.2688360","volume":"4","author":"Cong Y","year":"2017","journal-title":"IEEE Trans Big Data"},{"key":"cit0014","first-page":"1","volume-title":"2019 4th MEC International Conference on Big Data and Smart City (ICBDSC)","author":"Kancharla GR","year":"2019"},{"key":"cit0015","first-page":"27","volume":"5","author":"Balasubramanian R","year":"2016","journal-title":"Int J Adv Res Comput Commun Eng"},{"issue":"3","key":"cit0016","first-page":"466","volume":"7","author":"Talent M","year":"2019","journal-title":"J Sustainable Dev Energy Water Environ Syst"},{"key":"cit0017","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/CIST.2018.8596389","volume-title":"2018 IEEE 5th International Congress on Information Science and Technology (CiSt)","author":"Ezzine I","year":"2018"},{"issue":"8","key":"cit0018","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1109\/JPROC.2018.2847041","volume":"106","author":"Balzano L","year":"2018","journal-title":"Proc IEEE"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9457821"},{"key":"cit0020","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/BDS\/HPSC\/IDS18.2018.00058","volume-title":"2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)","author":"Chen Y","year":"2018"},{"key":"cit0021","first-page":"450","volume-title":"2018 International Conference on Machine Learning and Cybernetics (ICMLC)","volume":"2","author":"Jea KF","year":"2018"},{"key":"cit0022","first-page":"1","volume-title":"2018 International Joint Conference on Neural Networks (IJCNN)","author":"Petrozziello A","year":"2018"},{"key":"cit0023","volume-title":"Statistics: A first course","author":"Freund JE","year":"2004","edition":"8"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1201\/9781420089653"},{"key":"cit0025","unstructured":"Wang K, Stolfo S. One-class training for masquerade detection. Workshop on Data Mining for Computer Security; 2003 November; Melbourne (FL). p. 10\u201319."},{"key":"cit0026","doi-asserted-by":"crossref","unstructured":"Garchery M, Granitzer M Identifying and clustering users for unsupervised intrusion detection in corporate audit sessions. 2019 IEEE International Conference on Cognitive Computing (ICCC) 2019 Jul 8, IEEE. p. 19\u201327.","DOI":"10.1109\/ICCC.2019.00016"},{"key":"cit0027","unstructured":"Kholidy HA, Abdulrahman AZ, Baiardi F. Data-driven semi-global alignment technique for masquerade detection in stand-alone and cloud computing systems. United States patent US10,193,904. 2019 Jan 29."},{"key":"cit0028","first-page":"1","volume-title":"2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)","author":"Xu S","year":"2018"},{"issue":"5","key":"cit0029","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1007\/s00138-018-0957-4","volume":"30","author":"Cami\u00f1a JB","year":"2019","journal-title":"Mach Vis Appl"},{"key":"cit0030","first-page":"360","volume-title":"2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Wang J","year":"2018"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2019.1688731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T20:02:19Z","timestamp":1632945739000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2019.1688731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,8]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9,3]]}},"alternative-id":["10.1080\/08874417.2019.1688731"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2019.1688731","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-01-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}