{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:58Z","timestamp":1750306978529,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264474","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Big Data Analytics Architecture for Security Intelligence"],"prefix":"10.1145","author":[{"given":"Ahmed","family":"Dauda","sequence":"first","affiliation":[{"name":"University of Ontario Institute of Technology, Oshawa, Ontario, Canada"}]},{"given":"Scott","family":"Mclean","sequence":"additional","affiliation":[{"name":"University of Ontario Institute of Technology, Oshawa, Ontario, Canada"}]},{"given":"Abdulaziz","family":"Almehmadi","sequence":"additional","affiliation":[{"name":"University of Tabuk, Tabuk, Saudi Arabia"}]},{"given":"Khalil","family":"El-Khatib","sequence":"additional","affiliation":[{"name":"University of Ontario Institute of Technology, Oshawa, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Internet Security Threat Report (ISTR 23). Volume 23 available At: https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf  Internet Security Threat Report (ISTR 23). Volume 23 available At: https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"McAfee Labs 2018 Threats Predictions available at https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/2018-threatspredictions\/  McAfee Labs 2018 Threats Predictions available at https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/2018-threatspredictions\/"},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE ANCS","author":"Jiang H.","year":"2013","unstructured":"H. Jiang , G. Zhang , G. Xie , K. Salamatian , and L. Mathy , \" Scalable high performance parallel design for network intrusion detection systems on many-core processors,\" in Proc . IEEE ANCS , 2013 . H. Jiang, G. Zhang, G. Xie, K. Salamatian, and L. Mathy, \"Scalable high performance parallel design for network intrusion detection systems on many-core processors,\" in Proc. IEEE ANCS, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493123.2462905"},{"key":"e_1_3_2_1_5_1","volume-title":"2014 IEEE 15th International Conference on. IEEE","author":"Schales D.L.","year":"2014","unstructured":"D.L. Schales computing for large-scale, multi-channel cyber threat analytics,\" Information Reuse and Integration (IRI) , 2014 IEEE 15th International Conference on. IEEE , 2014 . D.L. Schales et al. \"Stream computing for large-scale, multi-channel cyber threat analytics,\" Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on. IEEE, 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-007-9078-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/280136.280168"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.12"},{"key":"e_1_3_2_1_10_1","first-page":"314","volume-title":"challenges, techniques, and technologies: A survey on Big Data","author":"Philip Chen C.L.","year":"2014","unstructured":"C.L. Philip Chen , C.-Y. Zhang , \"Data-intensive applications , challenges, techniques, and technologies: A survey on Big Data \", 2014 Information Sciences 275 (2014), pp. 314 -- 347 C.L. Philip Chen, C.-Y. Zhang, \"Data-intensive applications, challenges, techniques, and technologies: A survey on Big Data\", 2014 Information Sciences 275 (2014), pp. 314--347"},{"key":"e_1_3_2_1_11_1","first-page":"36","volume-title":"A Big Data Architecture for Security Data and Its Application to Phishing Characterization","author":"Las-Casas P. H. B.","year":"2016","unstructured":"P. H. B. Las-Casas , V. S. Dias , W. Meira and D. Guedes , \" A Big Data Architecture for Security Data and Its Application to Phishing Characterization \", 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY , 2016, pp. 36 -- 41 . P. H. B. Las-Casas, V. S. Dias, W. Meira and D. Guedes, \"A Big Data Architecture for Security Data and Its Application to Phishing Characterization\", 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, 2016, pp. 36--41."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.18"},{"key":"e_1_3_2_1_13_1","first-page":"685","volume-title":"Application for NoSQL Data Stores","author":"Heni H.","year":"2015","unstructured":"H. Heni , F. Gargouri , \" A Methodolical Approach for Big Data Security : Application for NoSQL Data Stores \", Springer International Publishing Switzerland 2015 pp. 685 -- 692 H. Heni, F. Gargouri, \"A Methodolical Approach for Big Data Security: Application for NoSQL Data Stores\", Springer International Publishing Switzerland 2015 pp. 685--692"},{"key":"e_1_3_2_1_14_1","first-page":"55","volume-title":"A Scalable Meta-Model for Big Data Security Analyses","author":"Yang B.","year":"2016","unstructured":"B. Yang and T. Zhang , \" A Scalable Meta-Model for Big Data Security Analyses \", 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY , 2016, pp. 55 -- 60 . B. Yang and T. Zhang, \"A Scalable Meta-Model for Big Data Security Analyses\", 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, 2016, pp. 55--60."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2014.7238418"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.645"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2377295"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.53"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725337"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2010.5569282"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051865"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2947626.2947637"},{"key":"e_1_3_2_1_25_1","unstructured":"Big DataWorking Group https:\/\/drive.google.com\/file\/d\/0B8oKLIXynZZWTdoWGlDekIwVjA\/view?usp=sharing  Big DataWorking Group https:\/\/drive.google.com\/file\/d\/0B8oKLIXynZZWTdoWGlDekIwVjA\/view?usp=sharing"}],"event":{"name":"SIN '18: 11th International Conference On Security Of Information and Networks","sponsor":["Cardiff University Cardiff University"],"location":"Cardiff United Kingdom","acronym":"SIN '18"},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":25,"alternative-id":["10.1145\/3264437.3264474","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264474","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}