Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Journal of Computer Sciences and Applications. 2015, 3(3A), 1-9
DOI: 10.12691/jcsa-3-3A-1
Open AccessResearch Article

Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems

William Hurst1, and Chelsea Dobbins1

1School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK

Pub. Date: July 16, 2015
(This article belongs to the Special Issue Big Data Analytics in Intelligent Systems)

Cite this paper:
William Hurst and Chelsea Dobbins. Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems. Journal of Computer Sciences and Applications. 2015; 3(3A):1-9. doi: 10.12691/jcsa-3-3A-1


The amount of information that is being created, every day, is quickly growing. As such, it is now more common than ever to deal with extremely large datasets. As systems develop and become more intelligent and adaptive, analysing their behaviour is a challenge. The heterogeneity, volume and speed of data generation are increasing rapidly. This is further exacerbated by the use of wireless networks, sensors, smartphones and the Internet. Such systems are capable of generating a phenomenal amount of information and the need to analyse their behaviour, to detect security anomalies or predict future demands for example, is becoming harder. Furthermore, securing such systems is a challenge. As threats evolve, so should security measures develop and adopt increasingly intelligent security techniques. Adaptive systems must be employed and existing methods built upon to provide well-structured defence in depth. Despite the clear need to develop effective protection methods, the task is a difficult one, as there are significant weaknesses in the existing security currently in place. Consequently, this special issue of the Journal of Computer Sciences and Applications discusses big data analytics in intelligent systems. The specific topics of discussion include the Internet of Things, Web Services, Cloud Computing, Security and Interconnected Systems.

critical infrastructure data analytics cyber security data analysis real time sensors machine learning intrusion detection control system cloud computing data fusion web services

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit


[1]  G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy, “Smart objects as building blocks for the Internet of things,” IEEE Internet Comput, vol. 14, no. 1, pp. 44-51, 2010.
[2]  L. Atzori, A. Iera, and G. Morabit, “L. Atzori, A. Iera, and G. Morabit,” Comput. Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
[3]  L. Mainetti, L. Patrono, and A. Vilei, “Evolution of wireless sensor networks towards the Internet of Things: A survey,” in In 19th International Conference on Software, Telecommunications and Computer Networks, 2011, pp. 1-6.
[4]  N. Group, “More than 400 Million Devices are Connected in U.S. Homes, According to The NPD Group,” [Accessed: 08-Jan-2013].
[5]  Cisco, “Cisco Visual Networking Index Forecast Projects 18-Fold Growth in Global Mobile Internet Data Traffic From 2011 to 2016,” Available: [Accessed: 01-Aug-2012].
[6]  Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018,” pp. 1-40, 2014.
[7]  M. Weiser, “The Computer for the 21st Century,” Sci. Am, vol. 265, no. 3, pp. 94-104, 1991.
[8]  L. Da Xu, W. He, and S. Li, “Internet of Things in Industries: A Survey,” IEEE Trans. Ind. Informatics, vol. 10, no. 4, pp. 2233-2243, 2014.
[9]  Intel, “Intel,” Mark. Appl. 2012, vol. Available.
[10]  D. for B. I. & S. UK, “Smart Cities: Background paper,” vol. 2013, pp. 3-11.
[11]  S. Mitchell, N. Villa, M. Stewart-Weeks, and A. Lange, “S. Mitchell, N. Villa, M. Stewart-Weeks, and A. Lange,” 2013, pp. 1-21.
[12]  A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,” IEEE Internet Things J, vol. 1, no. 1, pp. 22-32, 2014.
[13]  E. Tok, F. Al Mohammad, and M. Al Merekhi, “Crafting Smart Cities in the Gulf Region: A Comparison of Masdar and Lusail,” Eur. Sci. J, vol. 2, pp. 130-140, 2014.
[14]  M. Naphade, G. Banavar, C. Harrison, J. Paraszczak, and R. Morris, “Smarter Cities and Their Innovation Challenges,” Comput. (Long. Beach. Calif), vol. 44, no. 6, pp. 32-39, 2011.
[15]  M. N. K. Boulos and N. M. Al-Shorbaji, “On the Internet of Things, smart cities and the WHO Healthy Cities,” Int. J. Heal. Geogr., vol. 13, no. 10, pp. 1-6, 2014.
[16]  W. H. O. (WHO), “Healthy Cities,” [Online]. Available: [Accessed: 11-Jun-2015]., 2015.
[17]  D. Niewolny, “How the Internet of Things Is Revolutionizing Healthcare,” 2013.
[18]  C. Dobbins, P. Fergus, G. Stratton, M. Rosenberg, and M. Merabti, “Monitoring and reducing sedentary behavior in the elderly with the aid of human digital memories,” Telemed. e-Health, vol. 19, no. 3, pp. 173-185, 2013.
[19]  S. Luo, J. S. Jin, and J. Li, “A Smart Fridge with an Ability to Enhance Health and Enable Better Nutrition,” Int. J. Multimed. Ubiquitous Eng, vol. 4, no. 2, pp. 69-80, 2009.
[20]  A. Pantelopoulos and N. G. Bourbakis, “Prognosis-A Wearable Health-Monitoring System for People at Risk: Methodology and Modeling,” IEEE Trans. Inf. Technol. Biomed, vol. 14, no. 3, pp. 613-621, 2010.
[21]  W. Hirt, “Ultra-wideband radio technology: overview and future research,” Comput. Commun, vol. 26, no. 1, pp. 46-52, 2003.
[22]  J. Haartsen, “Bluetooth-The universal radio interface for ad hoc, wireless connectivity,” Ericsson Rev, vol. 1, no. 3, pp. 110-117, 1998.
[23]  J.-J. Wang and S. Wang, “Wireless sensor networks for Home Appliance Energy Management based on ZigBee technology,” in in 2010 International Conference on Machine Learning and Cybernetics, 2010, pp. 1041-1046.
[24]  M. Swan, “Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0,” J. Sens. Actuator Networks, vol. 1, no. 3, pp. 217-253, 2012.
[25]  M. Merabti, M. Kennedy, and W. Hurst, “Critical Infrastructure Protection: A 21st Century Challenge,” in 2011 International Conference on Communications and Information Technology (ICCIT), 2011, pp. 1-6.
[26]  Á. MacDermott, Q. Shi, M. Merabti, and K. Kifiyat, “Considering an elastic scaling model for cloud security,” in International Conference for Internet Technology and Secured Transactions (ICITST), 2013.
[27]  S. Sridhar and G. Manimaran, “Data integrity attacks and their impacts on SCADA control system,” in IEEE PES General Meeting, 2010, pp. 1-6.
[28]  J. Walker, B. J. Williams, and G. W. Skelton, “Cyber security for emergency management,” in 2010 IEEE International Conference on Technologies for Homeland Security (HST), 2010, pp. 476-480.
[29]  E. J. Kartaltepe, “Towards Blocking Outgoing Malicious Impostor Emails,” in 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06), 2006, pp. 657-661.
[30]  R. Amin, J. Ryan, and J. van Dorp, “Detecting Targeted Malicious Email Using Persistent Threat and Recipient Oriented Features,” IEEE Secur. Priv. Mag., no. 99, pp. 1-1, 2011.
[31]  S. Tang, “The Detection of Trojan Horse Based on the Data Mining,” in 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009, pp. 311-314.
[32]  C. Barrett, R. Beckman, K. Channakeshava, F. Huang, V. Kumar, A. Marathe, and M. Marathe, “Cascading Failures in Multiple Infrastructures: From Transportation to Communication Network,” in IEEE International Conference on Critical Infrastructures, 2010, pp. 1-8.
[33]  E. Knapp and J. Broad, “Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems,” Syngress, Elsevier, 2011.
[34]  Y. Chao, C. Bingyao, D. Jiaying, and G. Wei, “The research and implementation of UTM,” Wirel. Mob. Comput. (CCWMC 2009), IET Int. Commun. Conf., pp. 389-392, 2009.
[35]  Y. Zhang, F. Deng, Z. Chen, Y. Xue, and C. Lin, UTM-CM: A Practical Control Mechanism Solution for UTM System. IEEE, 2010.
[36]  F. Deng, A. Luo, Y. Zhang, Z. Chen, X. Peng, X. Jiang, and D. Peng, TNC-UTM: A Holistic Solution to Secure Enterprise Networks. IEEE, 2008.
[37]  B. Mukherjee, L. T. Heberlein, and K. N. Levitt, “Network intrusion detection,” IEEE Netw., vol. 8, no. 3, pp. 26-41, 1994.
[38]  E. Brezhnev and V. Kharchenko, “BBN-based approach for assessment of Smart Grid and nuclear power plant interaction,” in East-West Design & Test Symposium (EWDTS 2013), 2013, pp. 1-7.
[39]  M. Erol-Kantarci and H. T. Mouftah, “Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues,” IEEE Commun. Surv. Tutorials, vol. 17, no. 1, pp. 179-197, 2015.
[40]  R. Berthier, J. G. Jetcheva, D. Mashima, J. H. Huh, D. Grochocki, R. B. Bobba, A. A. Cardenas, and W. H. Sanders, “Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures,” in 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, pp. 450-455.
[41]  D. Li and B. Hu, “Advanced metering standard infrastructure for smart grid,” in 2012 China International Conference on Electricity Distribution, 2012, pp. 1-4.
[42]  C. Chalmers, W. Hurst, M. Mackay, and P. Fergus, “Smart Meter Profiling For Health Applications,” in The Internal Joint Conference on Neural Networks, 2015.
[43]  C. Chalmers, W. Hurst, M. Mackay, and P. Fergus, “Profiling Users in the Smart Grid,” in The Seventh International Conference on Emerging Networks and Systems Intelligence, 2015.
[44]  N. Nicholson, “SCADA Security in the light of Cyber-Warfare,” Elsevier Comput. Secur. J., vol. 31, no. 4, pp. 418-436, 2012.
[45]  H. Zhang, J. Ma, Y. Wang, and Q. Pei, “An Active Defense Model and Framework of Insider Threats Detection and Sense,” in 2009 Fifth International Conference on Information Assurance and Security, 2009, pp. 258-261.
[46]  L. Buttyan, D. Gessner, A. Hessler, and P. Langendoerfer, “Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks,” IEEE Wirel. Commun., vol. 17, no. 5, pp. 44-49, Oct. 2010.
[47]  A. K. Jain, “Data Clustering: 50 years beyond K-means,” Pattern Recognit. Lett, vol. 31, no. 8, pp. 651-666, 2010.
[48]  G. a. Wilkin and X. Huang, “K-Means Clustering Algorithms: Implementation and Comparison,” in in Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2007), 2007, pp. 133-136.
[49]  X. Wu, V. Kumar, J. R. Quinlan, J. Ghosh, Q. Yang, H. Motoda, G. J. McLachlan, A. Ng, B. Liu, P. S. Yu, Z.-H. Zhou, M. Steinbach, D. J. Hand, and D. Steinberg, “Top 10 algorithms in data mining,” Knowl. Inf. Syst, vol. 14, no. 1, pp. 1-37, 2007.
[50]  B. Kikhia, A. Boytsov, J. Hallberg, Z. ul H. Sani, H. Jonsson, and K. Synnes, “Structuring and Presenting Lifelogs based on Location Data,” Image (IN), vol. 4, pp. 5-24, 2011.
[51]  B. Fischer and J. M. Buhmann, “Bagging for path-based clustering,” IEEE Trans. Pattern Anal. Mach. Intell, vol. 25, no. 11, pp. 1411-1415, 2003.
[52]  P. J. Rousseeuw, “Silhouettes: A graphical aid to the interpretation and validation of cluster analysis,” J. Comput. Appl. Math, vol. 20, pp. 53-65, 1987.
[53]  M. G. Forero, F. Sroubek, and G. Cristóbal, “Identification of tuberculosis bacteria based on shape and color,” Real-Time Imaging, vol. 10, no. 4, pp. 251-262, 2004.
[54]  D. Birant and A. Kut, “ST-DBSCAN: An algorithm for clustering spatial-temporal data,” Data Knowl. Eng, vol. 60, no. 1, pp. 208-221, 2007.
[55]  G. McArdle, A. Tahir, and M. Bertolotto, “Spatio-temporal clustering of movement data: An application to trajectories generated by human-computer interaction,” ISPRS Ann. Photogramm. Remote Sens. Spat. Inf. Sci, vol. 1, no. 2, pp. 147-152, 2012.
[56]  E. Kuncheva, L, Combining Pattern Classifiers: Methods and Algorithms, IEEE Transactions Neural Networks, vol. 18, issue: 3, 2004.
[57]  P. Fergus, P. Cheung, A. Hussain, D. Al-Jumeily, C. Dobbins, and S. Iram, Prediction of Preterm Deliveries from EHG Signals Using Machine Learning, PLoS One, vol. 8, no. 10, p. e77154, Oct. 2013.
[58]  R. P. Duin, P. Juszczak, P. Paclik, P. Pakalska, D. De Ridder, D. M. Tax, and S. Verzakov, A Matlab Toolbox for Pattern Recognition, Version 4. Delft Pattern Recognition Research, 2007.
[59]  F. Lotte, Study of Electroencephalographic Signal Processing and Classification Techniques towards the use of Brain-Computer Interfaces in Virtual Reality Applications, 2009.
[60]  S. B. Kotsiantis, Supervised Machine Learning: A Review of Classification Techniques. Informatica 31:249-268, 2007.