Exploiting Flaws in Big Data Systems
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
Authors and Affiliations
Michael G. Brown, Paolina Centonze
A Word & Character N-Gram based Arabic OCR Error Simulation model
This paper provides a new model aimed to enhanceArabic OCR degraded text retrieval effectiveness. The proposed model based onsimulating the Arabic OCR recognition mistakesbased on both, word based and Character N-Gram ap...
A Review on Ontology Learning Approaches of Creating a Topic Map of Cybercrime Research
Conducting an academic research requires getting a firm grasp of ongoing research issues as well as locating research materials effectively. Often research in different fields on a similar topic can assume diverse approa...
Ghost-Free High Dynamic Range Imaging Using Histogram Separation and Edge Preserving Denoising
In this paper, we introduce a ghost-free High Dynamic Range imaging algorithm for obtaining ghost-free high dynamicrange (HDR) images. The multiple image fusion based HDR method work only on condition that there is no mo...
A FRAMEWORK FOR SUPPORT ON GENERATION OF MASSIVE OPEN ONLINE COURSE ADAPTATIVE MOOC USING TECHNIQUES OF CONTEXT ADAPTATION
This paper presents a proposal for a software framework to aid in the development of adaptive MOOC, using techniques adapted to the context. This solution will support the adaptation of the content of MOOCs according to...
Performance Comparison Of Ann Classifiers For Sleep Apnea Detection Based On Ecg Signal Analysis Using Hilbert Transform
In this paper, a methodology for sleep apnea detection based on ECG signal analysis using Hilbert transform is proposed. The proposed work comprises a sequential procedure of preprocessing, QRS complex detection using Hi...