Blockchain user digital identity big data and information security process protection based on network trust.
Feng WangYongjie GaiHaitao ZhangPublished in: J. King Saud Univ. Comput. Inf. Sci. (2024)
Keyphrases
- information security
- big data
- countermeasures
- security issues
- network security
- information systems
- intrusion detection
- critical infrastructure
- security level
- smart card
- privacy concerns
- business intelligence
- cloud computing
- security risks
- information security management
- data analysis
- data driven decision making
- big data analytics
- cyber defense
- information assurance
- smart grid
- sensitive data
- data mining
- user interface
- social media
- computer networks
- data processing
- data warehousing
- network traffic