{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:15:04Z","timestamp":1730283304970,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9652997","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"69-76","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Cybersecurity Into a Big Data Ecosystem"],"prefix":"10.1109","author":[{"given":"Anne M.","family":"Tall","sequence":"first","affiliation":[]},{"given":"Cliff C.","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2021","journal-title":"2021 Cyber Security Statistics The Ultimate List of Stats Data & Trends","key":"ref39"},{"year":"2020","journal-title":"AT&T","article-title":"Understanding cyber attacker motivations to best apply controls","key":"ref38"},{"year":"2019","journal-title":"Apache Atlas","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/BigData.2015.7364047"},{"year":"2020","journal-title":"Apache Ranger","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.array.2019.100002"},{"year":"2019","journal-title":"Simple Big Data Made","article-title":"Cybersecurity: the motivation behind cyber-hacks","key":"ref37"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1177\/1548512917715342"},{"year":"2004","journal-title":"Standards for Security Categorization of Federal Information and Informatoin Systems FIPS PUB 199","key":"ref35"},{"year":"2021","author":"tall","journal-title":"SE-BigData","key":"ref34"},{"year":"2021","author":"ronan","journal-title":"The hadoop ecosystem table","key":"ref10"},{"year":"2021","journal-title":"Data Breach Investigations Report (DBIR)","key":"ref40"},{"year":"2015","author":"white","journal-title":"Hadoop The Definitive Guide","key":"ref11"},{"year":"2021","author":"berrier","journal-title":"Statement for the Record Worldwide Threat Assessment Armed Services Committee U S Senate","key":"ref12"},{"year":"2021","journal-title":"IEEE CTS\/SC Standards Committee","article-title":"IEEE 2813–2020 - IEEE Standard for Big Data Business Security Risk Assessment","key":"ref13"},{"year":"2020","journal-title":"Measurements for Information Security","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-319-11391-3_13"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/MITP.2018.021921653"},{"key":"ref17","article-title":"Probabilistic modeling and anlaysis of sequential cyber-attacks","volume":"1","author":"liu","year":"2019","journal-title":"Wiley Engineering Reports"},{"key":"ref18","article-title":"A data-driven finite state machine model for analyzing security vulnerabilities","author":"chen","year":"2003","journal-title":"International Conference on Dependable Systems and Networks"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/IICSPI51290.2020.9332352"},{"year":"2019","journal-title":"NIST Big Data Ineroperability Framework Volume 4 Security and Privacy Version 3 SP 1500–4r2","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2046707.2046767"},{"year":"2019","journal-title":"Big Data Interoperability Framework","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s12243-013-0365-8"},{"year":"2021","journal-title":"ATT&CK™","key":"ref6"},{"year":"0","journal-title":"Big Data Interest Group (IG)","key":"ref5"},{"key":"ref29","article-title":"Performance Evaluation of Big Data Technology on Designing Big Netowrk Traffic Data Analysis System","author":"khamphakdee","year":"2016","journal-title":"ISCIS"},{"year":"2021","journal-title":"Risk Management Framework","key":"ref8"},{"year":"2020","author":"strom","journal-title":"MITRE ATT&CK™ Design and Philosophy","key":"ref7"},{"year":"2010","journal-title":"IASG - STE 6737","article-title":"Defense in Depth: A practical strategy for achieving Information Assurance in today's highly networked environments","key":"ref2"},{"year":"2020","journal-title":"Security Control Mappings A Bridge to Threat-Informed Defense","key":"ref9"},{"year":"2020","journal-title":"DoD Data Strategy","key":"ref1"},{"year":"2014","journal-title":"Forbes","article-title":"Forbes Insights Fallout The Reputational Impact of IT Risk","key":"ref46"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/IAEAC50856.2021.9391025"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/52.2014"},{"year":"2015","author":"spivey","journal-title":"Hadoop Security Protecting Your Big Data Platform","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/MSEC.2018.2882122"},{"year":"2020","journal-title":"attack-control-framework-mappings","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICCCIS48478.2019.8974535"},{"year":"2018","journal-title":"The Department of Defense Cyber Table Top Guidebook","key":"ref41"},{"year":"2017","author":"velthuis","journal-title":"New authentication mechanism using certificates for big data analytic tools","key":"ref23"},{"year":"2020","journal-title":"Cybersecurity Maturity Model Certification","key":"ref44"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/BigDataService.2016.35"},{"year":"2017","journal-title":"Common Criteria for Information Technology Security Evaluation","key":"ref43"},{"year":"2020","journal-title":"Apache Knox","key":"ref25"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09652997.pdf?arnumber=9652997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:03Z","timestamp":1652202003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9652997","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}