@incollection{, 5D7CF2FCA2EA3F94736D99A19E96E453 , author={{Professor GabrielKabanda}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}212125 } @book{b0, , author={{ DSBerman } and { ALBuczak } and { JSChavis } and { CLCorbett }} 10.3390/info10040122 , title={{Survey of Deep Learning Methods for Cyber Security}} , year={2019. 2019} 10 122 } @incollection{b1, , title={{Cybersecurity data science: an overview from machine learning perspective}} , author={{ IHSarker } and { AS MKayes } and { SBadsha } and { HAlqahtani } and { PWatters } and { ANg }} 10.1186/s40537-020-00318-5 , journal={{Journal of Big Data}} , year={2020} } @book{b2, , title={{Bayesian Networks for Network Intrusion Detection}} , author={{ PBBringas } and { ISantos }} 10.1186/s40537-020-00318-5 , editor={Bayesian Network, Ahmed Rebai} , year={2010} , publisher={InTech} } @book{b3, , title={{A Tutorial on Machine Learning and Data Science Tools with Python}} , author={{ MBloice } and { AHolzinger }} , year={2018} , address={Graz, Austria} } @book{b4, , author={{ RNielsen }} , title={{CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan}} Los Alamos National Laboratory, USA , year={2015. January 2015} , note={Technical Report} } @book{b5, , title={{}} , author={{ KUmamaheswari } and { SSujatha }} , year={2017} } @incollection{b6, , title={{Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud}} DOI: 10.14 429/dsj.67.11118 , journal={{Defence Science Journal}} 67 6 , year={November 2017} } @incollection{b7, , title={{Artificial Intelligence Techniques for Network Intrusion Detection}} , author={{ KNapanda } and { HShah } and { LKurup }} , journal={{International Journal of Engineering Research & Technology (IJERT)}} 2278-0181 4 , year={2015. November-2015} } @book{b8, , author={{ EProko } and { AHyso } and { DGjylapi }} , title={{Machine Learning Algorithms in Cybersecurity}} , year={2018} } @book{b9, , title={{}} , author={{ TTruong }} } @book{b10, , title={{}} , author={{ QBDiep } and { IZelinka }} , year={2020} } @incollection{b11, , booktitle={{the Cyber Domain: Offense and Defense. Symmetry 2020}} 12 410 } @incollection{b12, , title={{Big Data and Cyber security: A visual Analytics perspective in}} , author={{ S &Mazumdar } and { JWang }} , booktitle={{Guide to Vulnerability Analysis for Computer Networks and Systems}} , editor={ SParkinson } , year={2018} } @incollection{b13, , title={{Enablers and barriers of cloud adoption among Small and Medium Enterprises in Tamil Nadu}} , author={{ BM RWilson } and { BKhazaei } and { LHirsch }} , booktitle={{2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)}} , publisher={IEEE} , year={2015. November} } @incollection{b14, , title={{The rise of "big data" on cloud computing: Review and open research issues}} , author={{ IA THashem } and { IYaqoob } and { NBAnuar } and { SMokhtar } and { AGani } and { SKhan }} 10.1016/j.is.2014.07.006 , booktitle={{Information Systems}} , year={2015} } @incollection{b15, , title={{An Analysis of Gamification Elements in Online Learning to Enhance Learning Engagement}} , author={{ MSiti Nurul Mahfuzah } and { SSazilah } and { BNorasiken }} , booktitle={{6th International Conference on Computing & Informatics}} , year={2017} } @incollection{b16, , title={{Data Classification with Binary Response through the Boosting Algorithm and Logistic Regression}} , author={{ FS DMenzes } and { GRLiska } and { MACirillo } and { MJ FVivanco }} 10.1016/j.eswa.2016.08.014 , journal={{Expert Systems with Applications}} 69 , year={2016} } @book{b17, , title={{Operating System Stability}} , author={{ WStallings }} , year={2015. Accessed on 27th March, 2019} } @book{b18, , title={{Predicting the US bank failure: A discriminant analysis}} , author={{ RCox } and { GWang }} , year={2014} , note={Economic Analysis and Policy} } @book{b19, , title={{Utilizing Cloud Computing to address big geospatial data challenges. Computers, Environment and Urban Systems}} , author={{ CYang } and { MYu } and { FHu } and { YJiang } and { YLi }} 10.1016/j.compenvurbsys.2016.10.010 , year={2017} } @incollection{b20, , title={{The health information system security threat lifecycle: An informatics theory}} , author={{ JIFernando } and { LLDawson }} 10.1016/j.ijmedinf.2009.08.006 , journal={{International Journal of Medical Informatics}} , year={2009} } @incollection{b21, , title={{An Analysis for Big Data and its Technologies}} , author={{ MMoorthy } and { RBaby } and { SSenthamaraiselvi }} , journal={{GWU Law School Public Law Research Paper}} 401 , year={2014} } @book{b22, , title={{}} , author={{ CPu } and { MKitsuregawa }} No. GIT-CERCS-13-09 , year={2019} , note={Technical Report} } @incollection{b23, , title={{Magnesium oxide nanoparticle-loaded polycaprolactone composite electrospun fiber scaffolds for bone-soft tissue engineering applications: in-vitro and in-vivo evaluation}} , author={{ ASuryavanshi }} 10.1088/1748-605X/aa792b/pdf , journal={{Biomed. Mater}} 12 55011 , year={2017. 2017} } @book{b24, , title={{}} , author={{ DBurt } and { PNicholas } and { KSullivan } and { TScoles }} , year={2013} Cybersecurity Risk Paradox. Microsoft SIR } @incollection{b25, , title={{Corporate Social Responsibility of TSL sector: attitude analysis in the light of research}} , author={{ Pai }} , journal={{Logistyka}} 5 , year={2017. 2015. 2014} , note={The basis of social responsibility in management, Poltext, Warszawa. 37. Marzantowicz} } @incollection{b26, , title={{Cloud Computing Patterns}} , author={{ CFehling } and { FLeymann } and { RRetter } and { WSchupeck } and { PArbitter }} 10.1007/978-3-7091-1568-8 , booktitle={{Cloud Computing Patterns}} , year={2014} } @book{b27, , author={{ Kpmg }} , title={{Clarity on Cybersecurity. Driving growth with confidence}} , year={2018} } @book{b28, , title={{Deploying Big Data Analytics Applications to the Cloud: Roadmap for Success}} , author={{ JKobielus }} , year={2018} , publisher={Cloud Standards Customer Council} } @incollection{b29, , title={{HACKING INTO CHINA' S CYBERSECURITY LAW}} , author={{ JLee }} , booktitle={{IEEE International Conference on Distributed Computing Systems}} , year={2017. 2017} } @book{b30, , title={{Bayesian-network-based safety risk analysis in construction projects. Reliability Engineering and System Safety}} , author={{ LZhang } and { XWu } and { MJSkibniewski } and { JZhong } and { YLu }} 10.1016/j.ress.2014.06.006 , year={2014} } @book{b31, , title={{From Big Data to Smart Data}} , author={{ FIafrate }} , year={2015. -848-21755-3 March, 2015. 190} , publisher={Wiley-ISTE} , note={Pages} } @book{b32, , title={{Improving intrusion detection systems using data mining techniques}} , author={{ AAlmutairi }} , year={2016. 2016} Loughborough University , note={Ph.D Thesis} } @incollection{b33, , title={{Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks}} , author={{ ABezemskij } and { GLoukas } and { DGan } and { Anthony } and { RJ }} , booktitle={{IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data}} , year={2017. 2017. June 2017} , note={Smart Data} } @incollection{b34, , title={{Intrusion detection in network flows based on an optimized clustering criterion}} , author={{ JKarimpour } and { SLotfi } and { ATSiahmarzkooh }} 17.07 , journal={{Turkish Journal of Electrical Engineering & Computer Sciences}} , year={2016. 2016} } @incollection{b35, , title={{Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems}} , author={{ ZSStefanova }} , booktitle={{Graduate Theses and Dissertations}} , year={2018. 2018} } @book{b36, , title={{Practical Artificial Intelligence for Dummies®, Narrative Science Edition}} , author={{ KHammond }} , year={2015} , publisher={John Wiley & Sons, Inc} , address={Hoboken, New Jersey} } @incollection{b37, , title={{Detection and prediction of insider threats to cyber security: A systematic Literature Review and Meta-Analysis}} , author={{ IAGheyas } and { AEAbdallah }} , booktitle={{Big Data Analytics}} , year={2016. 2016} 1 6 } @incollection{b38, , title={{Adversarial Data Mining: Big data meets cybersecurity}} , author={{ MKantarcioglu } and { BXi }} , journal={{CCS}} 16 , year={2016} } @book{b39, , title={{Research Methodology: A step by step guide for beginners 3 rd ed}} , author={{ RKumar }} , year={2011} , publisher={Sage Publishers} , address={London} } @book{b40, , title={{Research Methodology Methods and Techniques 2 nd Revised Edition}} , author={{ CRKothari }} , year={2004} , publisher={New Age International Publishers} }