[go: up one dir, main page]

Nguyen et al., 2020 - Google Patents

A systematic review of big data analytics for oil and gas industry 4.0

Nguyen et al., 2020

View PDF
Document ID
9273291048703574836
Author
Nguyen T
Gosine R
Warrian P
Publication year
Publication venue
IEEE access

External Links

Snippet

Big data (BD) analytics is one of the critical components in the digitalization of the oil and gas (O&G) industry. Its focus is managing and processing a high volume of data to improve operational efficiency, enhance decision making and mitigate risks in the workplace …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
Nguyen et al. A systematic review of big data analytics for oil and gas industry 4.0
Madhavram et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
Souri et al. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
Tendikov et al. Security Information Event Management data acquisition and analysis methods with machine learning principles
Bishukarma Adaptive AI-based anomaly detection framework for SaaS platform security
Reddy et al. Automating incident response: AI-driven approaches to cloud security incident management
Rajagopal et al. Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0
Ekundayo Big data and machine learning in digital forensics: Predictive technology for proactive crime prevention,'
Huang et al. Security modelling for cyber-physical systems: A systematic literature review
Badawy et al. Legacy ICS cybersecurity assessment using hybrid threat modeling—An oil and gas sector case study
Mishra Scaling rule based anomaly and fraud detection and business process monitoring through Apache Flink
Eze et al. Enhancing threat intelligence for critical infrastructure protection through Artificial Intelligence: A proactive cyber defence approach
Jiang Communication network security situation analysis based on time series data mining technology
Sayles Aligning AI Governance with Other Internal Governance Models for Trustworthy AI:“The Convergence of Governance Frameworks”
Dhongade et al. Enhancing cyber security: a study of data preprocessing techniques for cyber security datasets
Kakoulli et al. Intelligent cyber defense: leveraging LLMs for real-time threat detection and analysis
Soomro et al. Big data complexity, dependability and emerging applications
Sarker Cybersecurity data science: Toward advanced analytics, knowledge, and rule discovery for explainable AI modeling
Boamah et al. Artificial intelligence integration in cyber incident response teams to enable faster containment, forensic accuracy, and resilient business continuity
Bruse et al. Real-Time Financial Fraud Detection for Small and Medium-Sized Enterprises (SMEs): Investigating the Potential of Cloud-Based Solutions
Avcı Cybersecurity design of data-intensive systems
Shoemaker Exploring strategies for developing a big data cybersecurity analytics system for industry 4.0 cyber-physical architectures
Özer et al. Transformers Architecture Oriented Intrusion Detection Systems: A Systematic Review
Abdi et al. Secure Data Analysis and Data Privacy
Rao et al. Privacy-preserving AI: a comprehensive approach to big data security