Systems",  Graduate  Theses  and  Dissertations,  2018, 
https://scholarcommons.usf.edu/etd/7367 
Proko,  E.,  Hyso,  A.,  and  Gjylapi,  D.  (2018).  Machine 
Learning  Algorithms  in  Cybersecurity, 
http://www.CEURS-WS.org/Vol-2280/paper-32.pdf 
Mazumdar,  S  &  Wang  J  (2018).  Big  Data  and  Cyber 
security:  A  visual  Analytics  perspective  in  S. 
Parkinson et al (Eds), Guide to Vulnerability Analysis 
for Computer Networks and Systems.  
Hashem, I.  A.  T.,  Yaqoob,  I., Anuar, N.  B.,  Mokhtar,  S., 
Gani,  A.,  &  Ullah  Khan,  S.  (2015).  The  rise  of  “big 
data” on cloud computing: Review and open  research 
issues.  In  Information Systems.  https://doi.org/ 
10.1016/j.is.2014.07.006 
Siti  Nurul  Mahfuzah,  M.,  Sazilah,  S.,  &  Norasiken,  B. 
(2017).  An  Analysis  of  Gamification  Elements  in 
Online  Learning  To  Enhance  Learning  Engagement. 
6th International Conference on Computing & 
Informatics. 
Moorthy, M.,  Baby, R. &  Senthamaraiselvi, S., 2014. An 
Analysis  for  Big  Data  and  its  Technologies. 
International Journal of Computer Science 
Engineering and Technology( IJCSET), 4(12),  pp. 
413-415. 
Cox,  R.  &  Wang,  G.,  2014.  Predicting  the  US  bank 
failure:  A  discriminant  analysis.  Economic Analysis 
and Policy, Issue 44.2, pp. 201-211. 
Hammond, K., 2015. Practical Artificial Intelligence For 
Dummies®, Narrative Science Edition. Hoboken, New 
Jersey: John Wiley & Sons, Inc. 
Yang,  C.,  Yu,  M.,  Hu,  F.,  Jiang,  Y.,  &  Li,  Y.  (2017). 
Utilizing  Cloud  Computing  to  address  big  geospatial 
data  challenges.  Computers, Environment and Urban 
Systems. 
https://doi.org/10.1016/j.compenvurbsys.2016.10.010 
Jiang,  W.,  Wang,  L.,  &  Lin,  H.  (2016).  The  role  of 
cognitive  processes  and  individual  differences  in  the 
relationship  between  abusive  supervision  and 
employee  career  satisfaction.  Personality and 
Individual Differences.  https://doi.org/10.1016/ 
j.paid.2016.04.088 
Fernando,  J.  I.,  &  Dawson,  L.  L.  (2009).  The  health 
information  system  security  threat  lifecycle:  An 
informatics  theory.  International Journal of Medical 
Informatics. 
https://doi.org/10.1016/j.ijmedinf.2009.08.006 
Menzes,  F.S.D.,  Liska,  G.R.,  Cirillo,  M.A.  and  Vivanco, 
M.J.F.  (2016)  Data  Classification  with  Binary 
Response  through  the  Boosting  Algorithm  and 
Logistic  Regression.  Expert  Systems  with 
Applications,  69,  62-73.  https://doi.org/10.1016/ 
j.eswa.2016.08.014 
Petrenko,  S  A  &  Makovechuk  K  A  (2020).  Big  Data 
Technologies for Cybersecurity. 
Pense (2014), Pesquisa Nacional de Saude do Escolar, Rio 
de Janeiro, RJ - Brazil. 
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, 
M.,  Hou,  H.,  &  Wang,  C.  (2018).  Machine  Learning 
and  Deep  Learning  Methods  for  Cybersecurity.  IEEE 
Access,  6,  35365–35381.  https://doi.org/10.1109/ 
ACCESS.2018.2836950 
Umamaheswari, K., and  Sujatha,  S.,  (2017).  Impregnable 
Defence  Architecture  using  Dynamic  Correlation-
based  Graded  Intrusion  Detection  System  for  Cloud, 
Defence  Science  Journal,  Vol.  67,  No.  6,  November 
2017, pp. 645-653, DOI : 10.14429/dsj.67.11118. 
Gheyas,  I.  A.  &  Abdallah,  A.  E.  (2016).  Detection  and 
prediction  of  insider  threats  to  cyber  security:  A 
systematic Literature Review and Meta-Analysis., Big 
Data Analytics (2016) 1:6. 
Buyya,  R.,  Yeo, C.  S.,  &  Venugopal,  S.  (2008).  Market-
oriented  cloud  computing:  Vision,  hype,  and  reality 
for  delivering  IT  services  as  computing  utilities. 
Proceedings - 10th IEEE International Conference on 
High Performance Computing and Communications, 
HPCC 2008. https://doi.org/10.1109/HPCC.2008.172 
Hadi, J.,  (2015)  ‘Big  Data  and  Five V’S  Characteristics’, 
International Journal of Advances in Electronics and 
Computer Science, (2), pp. 2393–2835. 
Suryavanshi, A., (2017), “Magnesium oxide nanoparticle-
loaded  polycaprolactone  composite  electrospun  fiber 
scaffolds  for  bone–soft  tissue  engineering 
applications:  in-vitro  and  in-vivo  evaluation”,  2017 
Biomed. Mater. 12 055011, https://iopscience.iop.org/ 
article/10.1088/1748-605X/aa792b/pdf 
Burt,  D.,  Nicholas,  P.,  Sullivan, K., &  Scoles,  T.  (2013). 
Cybersecurity Risk Paradox. Microsoft SIR. 
Napanda,  K.,  Shah,  H.,  and  Kurup,  L.,  (2015).  Artificial 
Intelligence  Techniques  for  Network  Intrusion 
Detection,  International  Journal  of  Engineering 
Research  &  Technology  (IJERT),  ISSN:  2278-0181, 
IJERTV4IS110283  www.ijert.org,  Vol.  4  Issue  11, 
November-2015. 
Marzantowicz, (2015), Corporate Social Responsibility of 
TSL  sector:  attitude  analysis  in  the  light  of  research, 
„Logistyka” 2014, No. 5, pp. 1773—1785. 
Sen and Tiwari, (2017). Port sustainability and stakeholder 
management  in  supply  chains:  A  framework  on 
resource  dependence  theory,  The  Asian  Journal  of 
Shipping and Logistics, No. 28 (3): 301-319.  
Fehling,  C.,  Leymann,  F.,  Retter,  R.,  Schupeck,  W.,  & 
Arbitter,  P.  (2014).  Cloud  Computing  Patterns.  In 
Cloud Computing Patterns.  https://doi.org/10.1007/ 
978-3-7091-1568-8 
KPMG (2018) , Clarity on Cybersecurity. Driving growth 
with confidence. 
Kobielus,  J.,  (2018).  Deploying  Big  Data  Analytics 
Applica- 
tions  to  the  Cloud:  Roadmap  for  Success. 
Cloud Standards  Customer 
Council
 
Lee, J. (2017). Hacking into China’s cybersecurity law, In: 
IEEE  International  Conference  on  Distributed 
Computing Systems (2017). 
Iafrate, F., (2015), From Big Data to Smart Data, ISBN: 
978-1-848-21755-3  March,  2015,  Wiley-ISTE,  190 
Pages. 
Pavan  Vadapalli,  (2020).  “AI  vs  Human  Intelligence: 
Difference  Between  AI  &  Human  Intelligence”, 15th 
September, 2020,  https://www.upgrad.com/blog/ai-vs-
human-intelligence/ 
Almutairi,  A.,  (2016).  Improving  intrusion  detection 
systems  using  data  mining  techniques,  Ph.D  Thesis, 
Loughborough University, 2016.