Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- documentclass{IEEEtran}% http://www.ctan.org/pkg/ieeetran
- begin{document}
- begin{table}[]
- centering
- caption{My caption}
- label{my-label}
- begin{tabular}{|l|l|l|l|}
- hline
- textbf{Paper} & textbf{Goal} & textbf{Data} & multicolumn{1}{c|}{textbf{Tool/Technology}} \ hline
- Security threats for big data: A study on Enron e-mail dataset & Mitigating Phishing Attacks & Enron E-mail Dataset & Enronic Software \ hline
- A Big Data architecture for security data and its application to phishing characterization & Defending Against Spam and Phishing & begin{tabular}[c]{@{}l@{}}pcap\ files, logs from honey netend{tabular} & begin{tabular}[c]{@{}l@{}}Hadoop,\ Sparkend{tabular} \ hline
- Data mining methods for detection of new malicious executables & begin{tabular}[c]{@{}l@{}}Detect\ malicious malwareend{tabular} & begin{tabular}[c]{@{}l@{}}Malicious\ and benign executable binariesend{tabular} & begin{tabular}[c]{@{}l@{}}Data\ Mining Algorithmsend{tabular} \ hline
- A practical solution to improve cyber security on a global scale & begin{tabular}[c]{@{}l@{}}Security\ monitoring Toolend{tabular} & begin{tabular}[c]{@{}l@{}}Network\ flowend{tabular} & begin{tabular}[c]{@{}l@{}}Data\ Mining Techniques, High Functioning autistic graduatesend{tabular} \ hline
- Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process & begin{tabular}[c]{@{}l@{}}Help\ security analysts with data triageend{tabular} & Securityanalysts' operation traces & Data mining Techniques, Humans \ hline
- Analyzing and Predicting Security Event Anomalies: Lessons Learned from a Large Enterprise Big Data Streaming Analytics Deployment & Improve SIEM by adding important features. & Traditional SIEM systems & Data Mining, Graph Analytics \ hline
- Study on Network Information Security Based on Big Data & APT Detection & begin{tabular}[c]{@{}l@{}}Network\ data collectionend{tabular} & Big Data Analytics(BDA), Network event collection, Big Data correlation analysis \ hline
- Big data machine learning and graph analytics: Current state and future challenges & Combine batch and stream data processes for efficeincy & Hetereogeneous big data & Lambda architecture \ hline
- SIM in light of big data & Cyber attack detection & Security logs & Machine learning techniques \ hline
- Data fusion & visualization application for network forensic investigation-a case study & begin{tabular}[c]{@{}l@{}}Network\ forensic investigationend{tabular} & Network logs & begin{tabular}[c]{@{}l@{}}Data\ fusion techniques, visualization, Self Organizing Mapend{tabular} \ hline
- Owlsight: Platform for real-time detection and visualization of cyber threats & begin{tabular}[c]{@{}l@{}}Real\ time detection and visualization of threatsend{tabular} & Heterogeneous network data & begin{tabular}[c]{@{}l@{}}BDA,\ web services, data visualizationend{tabular} \ hline
- Predicting and fixing vulnerabilities before they occur: a big data approach & begin{tabular}[c]{@{}l@{}}Proactive\ (Prevention better than cure approach)end{tabular} & Heterogeneous network data & begin{tabular}[c]{@{}l@{}}BDA\ techniques, machine learningend{tabular} \ hline
- Machine learning classification model for Network based Intrusion Detection System & Network Intrusion Detection System in Android phones & Android OS data & Machine Learning Algorithms \ hline
- A big data architecture for large scale security monitoring & begin{tabular}[c]{@{}l@{}}Intrusion\ detection and prevention systemsend{tabular} & begin{tabular}[c]{@{}l@{}}NetFlow\ records, HTTP traffic and honeypot dataend{tabular} & Shark, Spark, machine learning algorithms \ hline
- end{tabular}
- end{table}
- end{document}
Add Comment
Please, Sign In to add comment