Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting.
Junaid ChaudhryUvais QidwaiMahdi H. MirazPublished in: CoRR (2019)
Keyphrases
- big data
- data streams
- cloud computing
- data processing
- data management
- peer to peer
- control system
- social media
- high volume
- data analysis
- big data analytics
- data sets
- sensor networks
- business intelligence
- unstructured data
- massive datasets
- data science
- vast amounts of data
- data warehousing
- computer networks
- knowledge discovery
- statistical data mining
- data analytics
- social computing
- massive data
- network traffic
- intrusion detection
- wireless sensor networks
- decision making