{"id":"https://openalex.org/W4390402140","doi":"https://doi.org/10.1109/cloudtech58737.2023.10366149","title":"Data Security Patterns for Critical Big Data Systems","display_name":"Data Security Patterns for Critical Big Data Systems","publication_year":2023,"publication_date":"2023-11-21","ids":{"openalex":"https://openalex.org/W4390402140","doi":"https://doi.org/10.1109/cloudtech58737.2023.10366149"},"language":"en","primary_location":{"id":"doi:10.1109/cloudtech58737.2023.10366149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudtech58737.2023.10366149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093611508","display_name":"Chaymae Majdoubi","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Chaymae Majdoubi","raw_affiliation_strings":["National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco","National School of Applied Sciences Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036912465","display_name":"Saida El Mendili","orcid":"https://orcid.org/0000-0002-1938-621X"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Saida El mendili","raw_affiliation_strings":["National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco","National School of Applied Sciences Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021756636","display_name":"Youssef Gahi","orcid":"https://orcid.org/0000-0001-8010-9206"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Youssef Gahi","raw_affiliation_strings":["National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco","National School of Applied Sciences Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"National School of Applied Sciences Ibn Tofail University,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093611508"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.3497,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67680663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"08"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8410066366195679},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6534422636032104},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6502152681350708},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4936002492904663},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49195119738578796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4767640233039856},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4210056662559509},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36298421025276184},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24044877290725708}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8410066366195679},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6534422636032104},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6502152681350708},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4936002492904663},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49195119738578796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4767640233039856},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4210056662559509},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36298421025276184},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24044877290725708}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudtech58737.2023.10366149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudtech58737.2023.10366149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1564285798","https://openalex.org/W2582948973","https://openalex.org/W2612534924","https://openalex.org/W2790914452","https://openalex.org/W2925000784","https://openalex.org/W2944643572","https://openalex.org/W2947934595","https://openalex.org/W2952066300","https://openalex.org/W2962874122","https://openalex.org/W2974685678","https://openalex.org/W2982126231","https://openalex.org/W2989565103","https://openalex.org/W2989786302","https://openalex.org/W2991820798","https://openalex.org/W3013019084","https://openalex.org/W3017855299","https://openalex.org/W3024801014","https://openalex.org/W3028852288","https://openalex.org/W3048031588","https://openalex.org/W3049171182","https://openalex.org/W3097839885","https://openalex.org/W3110233352","https://openalex.org/W3113280383","https://openalex.org/W3181108657","https://openalex.org/W3198426207","https://openalex.org/W4205135204","https://openalex.org/W4220733388","https://openalex.org/W4220762779","https://openalex.org/W4281693361","https://openalex.org/W4285049363","https://openalex.org/W4296993032","https://openalex.org/W4300003543","https://openalex.org/W4310428374","https://openalex.org/W4317622562","https://openalex.org/W4327739826","https://openalex.org/W4327948860","https://openalex.org/W4328129293","https://openalex.org/W4365504037","https://openalex.org/W4366091323","https://openalex.org/W6805728855","https://openalex.org/W6844369334"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3133861977","https://openalex.org/W2951211570","https://openalex.org/W3103566983","https://openalex.org/W3167935049","https://openalex.org/W3029198973","https://openalex.org/W4380075502"],"abstract_inverted_index":{"With":[0],"the":[1,184],"words'":[2],"current":[3],"growth":[4],"in":[5,11,49,186],"technologies":[6],"and":[7,26,30,54,79,107,132,144,169,190,214,217],"digitalization,":[8],"protecting":[9],"data":[10,127,142,225],"massive":[12],"data-driven":[13],"systems":[14],"has":[15],"become":[16],"a":[17,187],"new":[18],"challenge":[19],"to":[20,34,46,86,109,125,154,160,182,202,222],"overcome.":[21],"Therefore,":[22],"many":[23],"measures,":[24],"algorithms,":[25],"protocols":[27],"are":[28,84],"used":[29],"still":[31],"under":[32],"development":[33],"minimize":[35],"risks":[36],"of":[37,51,99,166,179],"Data":[38,88],"loss,":[39],"manipulation,":[40],"sniffing,":[41],"or":[42,113],"spying\u2026":[43],"In":[44,90],"order":[45],"gain":[47],"more":[48],"terms":[50],"security,":[52,226],"privacy,":[53],"integrity":[55],"levels.":[56],"As":[57],"important":[58],"as":[59],"this":[60,91],"issue":[61],"is,":[62],"combined":[63],"efforts":[64],"from":[65],"different":[66],"disciplines":[67],"(Network":[68],"Security,":[69],"Security":[70],"Operations":[71],"Center":[72],"Analysis":[73],"(SOC":[74],"Analysis),":[75],"Machine":[76],"Learning":[77,81],"(ML),":[78],"Deep":[80],"(DL)":[82],"algorithms)":[83],"necessary":[85],"enhance":[87],"protection.":[89],"paper,":[92],"we":[93,175],"will":[94,120,158,176],"expose":[95,191],"some":[96,206,210],"natural":[97,207],"threats":[98],"Big":[100],"Data,":[101],"based":[102,129],"on":[103,130,135,149],"its":[104],"definition,":[105],"ethics,":[106],"suggestions":[108],"avoid":[110],"these":[111],"threats,":[112,208],"at":[114],"least":[115],"limit":[116],"their":[117],"effects.":[118],"We":[119,157],"also":[121],"show":[122],"works":[123],"related":[124],"big":[126],"security":[128],"ML":[131],"shed":[133],"light":[134],"Artificial":[136],"Neural":[137,151],"Networks":[138,152],"(ANN)":[139],"applications":[140],"for":[141,163],"classification":[143],"threat":[145],"detection.":[146],"Then":[147],"focus":[148],"Convolutional":[150],"(CNN)":[153],"optimize":[155],"parameters.":[156],"try":[159],"find":[161],"solutions":[162,193],"CNN":[164,230],"limitations":[165],"hyperparameters":[167],"tuning":[168],"rotating":[170],"image":[171],"feature":[172],"extraction.":[173],"Furthermore,":[174],"discuss":[177,215],"state":[178],"art":[180],"results":[181],"understand":[183],"matter":[185],"deeper":[188],"sense":[189],"high-accuracy":[192],"with":[194,205],"improvement":[195],"path":[196],"suggestions.":[197],"Our":[198],"work":[199],"is":[200],"going":[201],"come":[203],"up":[204],"compare":[209],"existing":[211],"methods,":[212],"expose,":[213],"results,":[216],"then":[218],"suggest":[219],"optimal":[220],"ways":[221],"help":[223],"increase":[224],"especially":[227],"through":[228],"improving":[229],"limitations.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
