Systems", Graduate Theses and Dissertations, 2018,
https://scholarcommons.usf.edu/etd/7367
Proko, E., Hyso, A., and Gjylapi, D. (2018). Machine
Learning Algorithms in Cybersecurity,
http://www.CEURS-WS.org/Vol-2280/paper-32.pdf
Mazumdar, S & Wang J (2018). Big Data and Cyber
security: A visual Analytics perspective in S.
Parkinson et al (Eds), Guide to Vulnerability Analysis
for Computer Networks and Systems.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S.,
Gani, A., & Ullah Khan, S. (2015). The rise of “big
data” on cloud computing: Review and open research
issues. In Information Systems. https://doi.org/
10.1016/j.is.2014.07.006
Siti Nurul Mahfuzah, M., Sazilah, S., & Norasiken, B.
(2017). An Analysis of Gamification Elements in
Online Learning To Enhance Learning Engagement.
6th International Conference on Computing &
Informatics.
Moorthy, M., Baby, R. & Senthamaraiselvi, S., 2014. An
Analysis for Big Data and its Technologies.
International Journal of Computer Science
Engineering and Technology( IJCSET), 4(12), pp.
413-415.
Cox, R. & Wang, G., 2014. Predicting the US bank
failure: A discriminant analysis. Economic Analysis
and Policy, Issue 44.2, pp. 201-211.
Hammond, K., 2015. Practical Artificial Intelligence For
Dummies®, Narrative Science Edition. Hoboken, New
Jersey: John Wiley & Sons, Inc.
Yang, C., Yu, M., Hu, F., Jiang, Y., & Li, Y. (2017).
Utilizing Cloud Computing to address big geospatial
data challenges. Computers, Environment and Urban
Systems.
https://doi.org/10.1016/j.compenvurbsys.2016.10.010
Jiang, W., Wang, L., & Lin, H. (2016). The role of
cognitive processes and individual differences in the
relationship between abusive supervision and
employee career satisfaction. Personality and
Individual Differences. https://doi.org/10.1016/
j.paid.2016.04.088
Fernando, J. I., & Dawson, L. L. (2009). The health
information system security threat lifecycle: An
informatics theory. International Journal of Medical
Informatics.
https://doi.org/10.1016/j.ijmedinf.2009.08.006
Menzes, F.S.D., Liska, G.R., Cirillo, M.A. and Vivanco,
M.J.F. (2016) Data Classification with Binary
Response through the Boosting Algorithm and
Logistic Regression. Expert Systems with
Applications, 69, 62-73. https://doi.org/10.1016/
j.eswa.2016.08.014
Petrenko, S A & Makovechuk K A (2020). Big Data
Technologies for Cybersecurity.
Pense (2014), Pesquisa Nacional de Saude do Escolar, Rio
de Janeiro, RJ - Brazil.
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao,
M., Hou, H., & Wang, C. (2018). Machine Learning
and Deep Learning Methods for Cybersecurity. IEEE
Access, 6, 35365–35381. https://doi.org/10.1109/
ACCESS.2018.2836950
Umamaheswari, K., and Sujatha, S., (2017). Impregnable
Defence Architecture using Dynamic Correlation-
based Graded Intrusion Detection System for Cloud,
Defence Science Journal, Vol. 67, No. 6, November
2017, pp. 645-653, DOI : 10.14429/dsj.67.11118.
Gheyas, I. A. & Abdallah, A. E. (2016). Detection and
prediction of insider threats to cyber security: A
systematic Literature Review and Meta-Analysis., Big
Data Analytics (2016) 1:6.
Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market-
oriented cloud computing: Vision, hype, and reality
for delivering IT services as computing utilities.
Proceedings - 10th IEEE International Conference on
High Performance Computing and Communications,
HPCC 2008. https://doi.org/10.1109/HPCC.2008.172
Hadi, J., (2015) ‘Big Data and Five V’S Characteristics’,
International Journal of Advances in Electronics and
Computer Science, (2), pp. 2393–2835.
Suryavanshi, A., (2017), “Magnesium oxide nanoparticle-
loaded polycaprolactone composite electrospun fiber
scaffolds for bone–soft tissue engineering
applications: in-vitro and in-vivo evaluation”, 2017
Biomed. Mater. 12 055011, https://iopscience.iop.org/
article/10.1088/1748-605X/aa792b/pdf
Burt, D., Nicholas, P., Sullivan, K., & Scoles, T. (2013).
Cybersecurity Risk Paradox. Microsoft SIR.
Napanda, K., Shah, H., and Kurup, L., (2015). Artificial
Intelligence Techniques for Network Intrusion
Detection, International Journal of Engineering
Research & Technology (IJERT), ISSN: 2278-0181,
IJERTV4IS110283 www.ijert.org, Vol. 4 Issue 11,
November-2015.
Marzantowicz, (2015), Corporate Social Responsibility of
TSL sector: attitude analysis in the light of research,
„Logistyka” 2014, No. 5, pp. 1773—1785.
Sen and Tiwari, (2017). Port sustainability and stakeholder
management in supply chains: A framework on
resource dependence theory, The Asian Journal of
Shipping and Logistics, No. 28 (3): 301-319.
Fehling, C., Leymann, F., Retter, R., Schupeck, W., &
Arbitter, P. (2014). Cloud Computing Patterns. In
Cloud Computing Patterns. https://doi.org/10.1007/
978-3-7091-1568-8
KPMG (2018) , Clarity on Cybersecurity. Driving growth
with confidence.
Kobielus, J., (2018). Deploying Big Data Analytics
Applica-
tions to the Cloud: Roadmap for Success.
Cloud Standards Customer
Council
Lee, J. (2017). Hacking into China’s cybersecurity law, In:
IEEE International Conference on Distributed
Computing Systems (2017).
Iafrate, F., (2015), From Big Data to Smart Data, ISBN:
978-1-848-21755-3 March, 2015, Wiley-ISTE, 190
Pages.
Pavan Vadapalli, (2020). “AI vs Human Intelligence:
Difference Between AI & Human Intelligence”, 15th
September, 2020, https://www.upgrad.com/blog/ai-vs-
human-intelligence/
Almutairi, A., (2016). Improving intrusion detection
systems using data mining techniques, Ph.D Thesis,
Loughborough University, 2016.