{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:54:49Z","timestamp":1775746489370,"version":"3.50.1"},"reference-count":143,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1658972"],"award-info":[{"award-number":["CNS-1658972"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1650831"],"award-info":[{"award-number":["CNS-1650831"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["HRD 1828811"],"award-info":[{"award-number":["HRD 1828811"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/tsc.2019.2907247","type":"journal-article","created":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T22:19:59Z","timestamp":1553552399000},"page":"2055-2072","source":"Crossref","is-referenced-by-count":134,"title":["Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Doku","sequence":"additional","affiliation":[]},{"given":"Moses","family":"Garuba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"125","article-title":"Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools","author":"mukkamala","year":"2005","journal-title":"Enhancing Computer Security With Smart Technology"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2017.45"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004228"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.66"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"ref37","first-page":"316","article-title":"Security evaluation of rc4 using big data analytics","author":"liu","year":"2016","journal-title":"Proc 7th IEEE Int Conf Softw Eng Serv Sci"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2015.46"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2715335"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2015.7381562"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7850078"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.33"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/Anti-Cybercrime.2017.7905301"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.73"},{"key":"ref22","article-title":"The human factor report people-centered threats define the landscape","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2016.7740303"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.44"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2017.8002481"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387574"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2017.0104"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2013.42"},{"key":"ref25","first-page":"1","article-title":"Big data analytics for security intelligence","author":"c\u00e1rdenas","year":"2013"},{"key":"ref50","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref51","article-title":"Towards the science of security and privacy in machine learning","author":"papernot","year":"2016","journal-title":"arXiv preprint arXiv 1611 03814"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040946"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2017.8078842"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7849907"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004471"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.41"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WCS.2012.6780876"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627557"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.126"},{"key":"ref3","author":"rawat","year":"2018","journal-title":"Smart Cities Cybersecurity and Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543859"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813688"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.7085614"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2016.7905621"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0007-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7841037"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856705"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref42","first-page":"56","article-title":"A big data architecture for large scale security monitoring","author":"marchal","year":"2014","journal-title":"Proc IEEE Int Congr Big Data"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2896825.2896829"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2017.8071525"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.71"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2563461"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2016.0063"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.53"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363960"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927253"},{"key":"ref72","first-page":"80","article-title":"Enhancement cast block algorithm to encrypt big data","author":"kadhim","year":"2017","journal-title":"Proc Annu Conf New Trends Inf Commun Technol Appl"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040943"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868481"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2017.7960253"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC.2015.7428539"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/Anti-Cybercrime.2017.7905266"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2016.7568374"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2458299"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.37"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.76"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.010"},{"key":"ref134","first-page":"1","article-title":"Evolving cauchy possibilistic clustering based on cosine similarity for monitoring cyber systems","author":"\u0161krjanc","year":"2017","journal-title":"Proc Evolving Adaptive Intell Syst"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813690"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGEA.2017.166"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2014.6914040"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CSIBIG.2014.7056963"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/GET.2016.7916770"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/OSSCOM.2016.7863685"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGEA.2017.91"},{"key":"ref137","first-page":"4035","article-title":"Meta-analysis of big data security and privacy: Scholarly literature gaps","author":"strang","year":"2016","journal-title":"Proc IEEE Int Conf Big Data"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2017.8078836"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP.2017.7944072"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.97"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2017.0041"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_6"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.17"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7295483"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016281"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.172"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997105"},{"key":"ref142","article-title":"Big Data Threat Landscape","author":"damiani","year":"2017","journal-title":"European Union Agency for Netw Inf Security"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939147"},{"key":"ref143","article-title":"Vanish: Increasing data privacy with self-destructing data","volume":"316","author":"geambasu","year":"2009","journal-title":"Proc Usenix Secur Symp"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2015.7040516"},{"key":"ref69","first-page":"3701","article-title":"Big data protection via neural and quantum cryptography","author":"sharma","year":"2016","journal-title":"Proc 3rd Int Conf Comput Sustainable Global Develop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.41"},{"key":"ref1","first-page":"1","article-title":"3d data management: Controlling data volume, velocity and variety","volume":"6","author":"laney","year":"2001","journal-title":"META Group Res Note"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2776459"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CSIBIG.2014.7056985"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECCT.2016.7942592"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2015.7160211"},{"key":"ref107","first-page":"1","article-title":"Big data for cybersecurity: Vulnerability disclosure trends and dependencies","author":"tang","year":"2018","journal-title":"IEEE Trans Big Data"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906942"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2017.31"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927414"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.160"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.68"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502966"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.79"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCRI.2016.14"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0782"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.68"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2016.7529438"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/KACSTIT.2016.7756065"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2015.54"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICS.2016.0135"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0068"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813727"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725337"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2015.83"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FTC.2016.7821747"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCI.2016.7778976"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.366"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/WIECON-ECE.2015.7443990"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363966"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7917961"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/NSysS.2017.7885820"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2013.6579427"},{"key":"ref18","article-title":"A case study in security big data analysis","volume":"9","author":"chickowski","year":"2012","journal-title":"Dark Reading"},{"key":"ref119","first-page":"762","article-title":"Big data security and privacy issues in healthcare","author":"patil","year":"2014","journal-title":"Proc IEEE Int Congr Big Data"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2013.6717808"},{"key":"ref19","first-page":"6132","article-title":"Big data analytics security issues in data driven information system","volume":"2","author":"raja","year":"2014","journal-title":"IJIRCCE"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7445514"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2017.4031321"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.136"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2017.34"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2016.0142"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2017.0033"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2524403"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058278"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2017.26"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/IICIP.2016.7975336"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757844"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CSIBIG.2014.7056922"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.79"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2616146"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4629386\/9642441\/8673585-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9642441\/08673585.pdf?arnumber=8673585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:49Z","timestamp":1652194369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8673585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":143,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2019.2907247","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,1]]}}}