Nguyen et al., 2020 - Google Patents
A systematic review of big data analytics for oil and gas industry 4.0Nguyen et al., 2020
View PDF- Document ID
- 9273291048703574836
- Author
- Nguyen T
- Gosine R
- Warrian P
- Publication year
- Publication venue
- IEEE access
External Links
Snippet
Big data (BD) analytics is one of the critical components in the digitalization of the oil and gas (O&G) industry. Its focus is managing and processing a high volume of data to improve operational efficiency, enhance decision making and mitigate risks in the workplace …
- 238000011161 development 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Nguyen et al. | A systematic review of big data analytics for oil and gas industry 4.0 | |
| Madhavram et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
| Souri et al. | A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things | |
| Tendikov et al. | Security Information Event Management data acquisition and analysis methods with machine learning principles | |
| Bishukarma | Adaptive AI-based anomaly detection framework for SaaS platform security | |
| Reddy et al. | Automating incident response: AI-driven approaches to cloud security incident management | |
| Rajagopal et al. | Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0 | |
| Ekundayo | Big data and machine learning in digital forensics: Predictive technology for proactive crime prevention,' | |
| Huang et al. | Security modelling for cyber-physical systems: A systematic literature review | |
| Badawy et al. | Legacy ICS cybersecurity assessment using hybrid threat modeling—An oil and gas sector case study | |
| Mishra | Scaling rule based anomaly and fraud detection and business process monitoring through Apache Flink | |
| Eze et al. | Enhancing threat intelligence for critical infrastructure protection through Artificial Intelligence: A proactive cyber defence approach | |
| Jiang | Communication network security situation analysis based on time series data mining technology | |
| Sayles | Aligning AI Governance with Other Internal Governance Models for Trustworthy AI:“The Convergence of Governance Frameworks” | |
| Dhongade et al. | Enhancing cyber security: a study of data preprocessing techniques for cyber security datasets | |
| Kakoulli et al. | Intelligent cyber defense: leveraging LLMs for real-time threat detection and analysis | |
| Soomro et al. | Big data complexity, dependability and emerging applications | |
| Sarker | Cybersecurity data science: Toward advanced analytics, knowledge, and rule discovery for explainable AI modeling | |
| Boamah et al. | Artificial intelligence integration in cyber incident response teams to enable faster containment, forensic accuracy, and resilient business continuity | |
| Bruse et al. | Real-Time Financial Fraud Detection for Small and Medium-Sized Enterprises (SMEs): Investigating the Potential of Cloud-Based Solutions | |
| Avcı | Cybersecurity design of data-intensive systems | |
| Shoemaker | Exploring strategies for developing a big data cybersecurity analytics system for industry 4.0 cyber-physical architectures | |
| Özer et al. | Transformers Architecture Oriented Intrusion Detection Systems: A Systematic Review | |
| Abdi et al. | Secure Data Analysis and Data Privacy | |
| Rao et al. | Privacy-preserving AI: a comprehensive approach to big data security |