Identificación de amenazas informáticas aplicando arquitecturas de Big Data.
Labrinidis, A., & Jagadish, H. V. (2012). Challenges and Opportunities with Big Data. 2.
Ley Orgánica de Protección de Datos Personales. (2021). Ley Orgánica de Protección de Datos
Personales.
Ley Orgánica de Telecomunicaciones. (2015). Ley Orgánica de Telecomunicaciones.
Liu, R., Li, Q., Li, F., Mei, L., Lee, J. (2014, octubre). Liu2014.pdf.
&
https://doi.org/10.1109/SOLI.2014.6960762
Lněnička, M., Máchová, R., & Komárková, J. (2017). Components of Big Data Analytics for
Strategic Management of Enterprise Architecture. Conference: 12th International
Conference on Strategic Management and Its Support by Information Systems 2017, 8.
Maeda, N., Agetsuma, N., Kamimura, K., Suenaga, Y., Takebayashi, S., & Yamashita, K. (2018).
Achieving Greater Work Efficiency in Systems Failure Analysis Using Elastic Stack. 16(2),
6
.
Mujawar, S., & Kulkarni, S. (2015). Big Data: Tools and Applications. International Journal of
Computer Applications, 115(23), 7-11. https://doi.org/10.5120/20289-2113
Nadeem, S. F., & Huang, C.-Y. (2018). Data Visualization in Cybersecurity. 2018 International
Conference on Computational Science and Computational Intelligence (CSCI), 48-52.
https://doi.org/10.1109/CSCI46756.2018.00017
P., R. M., & C., I. M. (2019). 2551-Article Text-4005-1-10-20191230.pdf. International Journal
of Advanced Science and Technology, Vol. 28, No. 19, 425-432.
Pérez Marqués, M. (2015). Big Data ecnicas herramientas y aplicaciones (Primera Edición).
Alfaomega Grupo Editor, S.A. de C. V.
Rohit, Gupta, B., Kumar, R., & Kumar, A. (2018). Towards Information Discovery On Large Scale
Data: State-of-the-art. 2018 International Conference on Soft-Computing and Network
Security (ICSNS), 1-9. https://doi.org/10.1109/ICSNS.2018.8573666
Roji, K., & Sharma, G. (2019). Cyber Security Challenges and Big Data Analytics. 4.
Subburaj, T., Department of Computer Applications, Kalasalingam Academy of Research and
Education, Krishnankoil - 626126, Tamilnadu, India, Suthendran, K., & Department of
Information Technology, Kalasalingam Academy of Research and Education,
Krishnankoil - 626126, Tamilnadu, India. (2018). DigitalWatering Hole Attack
DetectionUsing Sequential Pattern. Journal of Cyber Security and Mobility, 7(1), 1-12.
https://doi.org/10.13052/jcsm2245-1439.711
Talas, A., Pop, F., & Neagu, G. (2017). Elastic stack in action for smart cities: Making sense of
big data. 2017 13th IEEE International Conference on Intelligent Computer
Communication 469-476.
https://doi.org/10.1109/ICCP.2017.8117049
Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated
cyber attacks. Computers Security, 72, 212-233.
https://doi.org/10.1016/j.cose.2017.09.001
Veiga, A. D., & Eloff, J. H. P. (2007). An Information Security Governance Framework.
Information Systems Management, 24(4), 361-372.
https://doi.org/10.1080/10580530701586136
wazuh. (2021a). Overview—User manual
https://documentation.wazuh.com/current/user-manual/overview.html
(2021b). Welcome to Wazuh Wazuh 4.1
https://documentation.wazuh.com/current/index.html
and
Processing
(ICCP),
&
·
Wazuh 4.1 documentation. Overview.
wazuh.
·
documentation.
Esta obra se comparte bajo la licencia Creative Common Atribución-No Comercial 4.0 International (CC BY-NC 4.0)
Revista de la Universidad Internacional del Ecuador. URL: https://www.uide.edu.ec/
167