Guest User

Untitled

a guest
Mar 23rd, 2018
117
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.69 KB | None | 0 0
  1. documentclass{IEEEtran}% http://www.ctan.org/pkg/ieeetran
  2.  
  3.  
  4. begin{document}
  5. begin{table}[]
  6. centering
  7. caption{My caption}
  8. label{my-label}
  9. begin{tabular}{|l|l|l|l|}
  10. hline
  11. textbf{Paper} & textbf{Goal} & textbf{Data} & multicolumn{1}{c|}{textbf{Tool/Technology}} \ hline
  12. Security threats for big data: A study on Enron e-mail dataset & Mitigating Phishing Attacks & Enron E-mail Dataset & Enronic Software \ hline
  13. A Big Data architecture for security data and its application to phishing characterization & Defending Against Spam and Phishing & begin{tabular}[c]{@{}l@{}}pcap\ files, logs from honey netend{tabular} & begin{tabular}[c]{@{}l@{}}Hadoop,\ Sparkend{tabular} \ hline
  14. Data mining methods for detection of new malicious executables & begin{tabular}[c]{@{}l@{}}Detect\ malicious malwareend{tabular} & begin{tabular}[c]{@{}l@{}}Malicious\ and benign executable binariesend{tabular} & begin{tabular}[c]{@{}l@{}}Data\ Mining Algorithmsend{tabular} \ hline
  15. A practical solution to improve cyber security on a global scale & begin{tabular}[c]{@{}l@{}}Security\ monitoring Toolend{tabular} & begin{tabular}[c]{@{}l@{}}Network\ flowend{tabular} & begin{tabular}[c]{@{}l@{}}Data\ Mining Techniques, High Functioning autistic graduatesend{tabular} \ hline
  16. Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process & begin{tabular}[c]{@{}l@{}}Help\ security analysts with data triageend{tabular} & Securityanalysts' operation traces & Data mining Techniques, Humans \ hline
  17. Analyzing and Predicting Security Event Anomalies: Lessons Learned from a Large Enterprise Big Data Streaming Analytics Deployment & Improve SIEM by adding important features. & Traditional SIEM systems & Data Mining, Graph Analytics \ hline
  18. Study on Network Information Security Based on Big Data & APT Detection & begin{tabular}[c]{@{}l@{}}Network\ data collectionend{tabular} & Big Data Analytics(BDA), Network event collection, Big Data correlation analysis \ hline
  19. Big data machine learning and graph analytics: Current state and future challenges & Combine batch and stream data processes for efficeincy & Hetereogeneous big data & Lambda architecture \ hline
  20. SIM in light of big data & Cyber attack detection & Security logs & Machine learning techniques \ hline
  21. Data fusion & visualization application for network forensic investigation-a case study & begin{tabular}[c]{@{}l@{}}Network\ forensic investigationend{tabular} & Network logs & begin{tabular}[c]{@{}l@{}}Data\ fusion techniques, visualization, Self Organizing Mapend{tabular} \ hline
  22. Owlsight: Platform for real-time detection and visualization of cyber threats & begin{tabular}[c]{@{}l@{}}Real\ time detection and visualization of threatsend{tabular} & Heterogeneous network data & begin{tabular}[c]{@{}l@{}}BDA,\ web services, data visualizationend{tabular} \ hline
  23. Predicting and fixing vulnerabilities before they occur: a big data approach & begin{tabular}[c]{@{}l@{}}Proactive\ (Prevention better than cure approach)end{tabular} & Heterogeneous network data & begin{tabular}[c]{@{}l@{}}BDA\ techniques, machine learningend{tabular} \ hline
  24. Machine learning classification model for Network based Intrusion Detection System & Network Intrusion Detection System in Android phones & Android OS data & Machine Learning Algorithms \ hline
  25. A big data architecture for large scale security monitoring & begin{tabular}[c]{@{}l@{}}Intrusion\ detection and prevention systemsend{tabular} & begin{tabular}[c]{@{}l@{}}NetFlow\ records, HTTP traffic and honeypot dataend{tabular} & Shark, Spark, machine learning algorithms \ hline
  26. end{tabular}
  27. end{table}
  28. end{document}
Add Comment
Please, Sign In to add comment