References
- KHANNA, P.: Connectography: mapping the global network revolution, Weidenfeld & Nicolson, No. 2016 (466) ISBN 978-1474604253 https://doi.org/10.1111/1468-2346.12768
- JAAFAR, G. A., et al.: Review of Recent Detection Methods for HTTP DDoS Attack, Journal of Computer Networks and Communications, grade. 2019 doi.org, No. 18 (1) 20191–10 https://doi.org/10.1155/2019/1283472
- ZIED, A. – PEKÁR, A.: NFStream, Computer Networks, grade. 204, No. 18 (2) 2022108719 https://doi.org/10.1016/j.comnet.2021.108719
- von SOLMS, R. – van NIEKERK, J.: From Information Security to Cyber Security, Computers & Security, grade. 38, No. 18 (10) 201397–102 https://doi.org/10.1016/j.cose.2013.04.004
- KILINCER, I. F., et al.: Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study, Computer Networks, grade. 188, No. 18 (4) 2021107840 https://doi.org/10.1016/j.comnet.2021.107840
- VAJDA, D., et al.: Towards Machine Learning-based Anomaly Detection on Time-Series Data, Infocommunications journal, grade. 13, No. 18 (1) 202135–44 https://doi.org/10.36244/ICJ.2021.1.5
- PEKÁR, A., et al.: Adaptive Aggregation of Flow Records, Computing and Informatics, grade. 37, No. 1 (1) 2018142–164 https://doi.org/10.4149/cai_2018_1_142
- KHUMMANEE, S., et al.: Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), Khon Kaen, Thailand 2013, No. 93-98 () doi:10.1109/JCSSE.2013.6567326
- PAPADAKI, M. – FURNELL, S.: IDS or IPS: What Is Best?, Network Security, grade. 2004 doi.org, No. 7 (7) 200415–19 https://doi.org/10.1016/S1353-4858(04)00106-0
- ASHOOR, A. S. – GORE, S.: Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications CNSA 2011, No. Communications in Computer and Information Science (Springer, Berlin, Heidelberg) 2011196 https://doi.org/10.1007/978-3-642-22540-6_48
- CANETTI, R., et al.: Proactive security: Long-term protection against break-ins, RSA Laboratories’ CryptoBytes, No. 3 (1) 19971-8 https://www.researchgate.net/publication/2708104_Proactive_Security_Long-term_protection_against_break-ins
- GALINEC, D., et al.: Cybersecurity and Cyber Defence: National Level Strategic Approach, Automatika, grade. 58,č. 3 (Crossref) doi.org, No. 18 (7) 2017273–286 https://doi.org/10.1080/00051144.2017.1407022
- MILOSLAVSKAYA, N. – TOLSTOY, A.: Big Data, Fast Data and Data Lake Concepts, Procedia Computer Science 88, No. 2016 (300-305) ISSN 1877-0509 https://doi.org/10.1016/j.procs.2016.07.439
- MATHIS, Ch.: Data Lakes, Datenbank-Spektrum Jeju Island, No. Korea (South) (289) 20211610-1995 https://doi.org/10.1007/s13222-017-0272-7
- CUZZOCREA, A.: Big Data Lakes: Models, Frameworks, and Techniques, 2021 IEEE International Conference on Big Data and Smart Computing (Big-Comp) Jeju Island, No. Korea (South) () 20211-4 https://doi:10.1109/BigComp51126.2021.00010
- KONONENKO, O., et al.: Mining modern repositories with elasticsearch., Proceedings of the 11th working conference on mining software repositories., No. () 2014328–331 https://doi.org/10.1145/2597073.2597091
