N. Dedi? and C. Stanier, Towards Differentiating Business Intelligence, Big Data, Data Analytics and Knowledge Discovery, 2017.

M. Kiran, P. Murphy, I. Monga, J. Dugan, and S. S. Baveja, Lambda architecture for cost-effective batch and speed big data processing, IEEE International Conference on Big Data (Big Data), pp.2785-2792, 2015.

J. Lin, The Lambda and the Kappa, IEEE Internet Computing, vol.21, pp.60-66, 2017.

K. Demertzis and L. Iliadis, A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification. e-Democracy, Communications in Computer and Information Science, vol.441, pp.11-23, 2013.
URL : https://hal.archives-ouvertes.fr/hal-02155919

B. Krawczyk and A. Cano, Online ensemble learning with abstaining classifiers for drifting and noisy data streams, Applied Soft Computing Journal Article in Press, 2018.

I. M. Baytas, A. K. Yan, J. Jain, and . Zhou, Asynchronous multi-task learning ICDM, pp.11-20, 2016.

Y. Zhang, Parallel multi-task learning, ICDM, pp.629-638, 2015.

Q. Chen and S. Abdelwahed, A model-based approach to self-protection in computing system, Proceeding CAC '13 Proc of the ACM Cloud and Autonomic Computing Conference, 2013.

, Yannis Soupionis, Stavros Ntalampiras and Georgios Giannopoulos, vol.8985, 2016.

W. Zhu and . Tao, Detecting node replication attacks in wireless sensor networks: a survey, Journal of Network and Computer Applications, vol.35, pp.1022-1034, 2012.

T. Cruz, J. Proença, P. Simões, M. Aubigny, M. Ouedrago et al., Improving Cyber-Security Awareness on Industrial Control Systems: The CockpitCI Approach, Journal of Information Warfare -ISSN 1445, vol.3347, issue.4, 2015.

Y. Zhang and D. Yeung, A convex formulation for learning task relationships in multi-task learning, UAI, pp.733-442, 2010.

J. Wang, M. Kolar, and N. Srebro, Distributed multi-task learning, AISTATS, pp.751-760, 2016.

E. P. Xing, Q. Ho, P. Xie, and D. Wei, Strategies and Principles of Distributed Machine Learning on Big Data. Engineering, vol.2, pp.179-195, 2016.

G. Cavallanti, C. Nicol`o-cesa-bianchi, and . Gentile, Linear algorithms for online multitask classification, COLT'08, 2008.

K. Demertzis, L. Iliadis, and V. Anezakis, MOLESTRA: A Multi-Task Learning Approach for Real-Time Big Data Analytics, 2018 Innovations in Intelligent Systems and Applications (INISTA), pp.1-8, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02155891

K. Demertzis, L. Iliadis, and S. Spartalis, A Spiking One-Class Anomaly Detection Framework for Cyber-Security on Industrial Control Systems, Communications in Computer and Information Science, vol.744, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02155903

K. Demertzis, S. Lazaros, . Iliadis, and . Vardis-dimitrios-anezakis, An innovative soft computing system for smart energy grids cybersecurity, Advances in Building Energy Research, vol.12, issue.1, pp.3-24, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02155876

K. Demertzis and L. Iliadis, A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids, Modern Discrete Mathematics and Analysis. Springer Optimization and Its Applications, vol.131, 2018.

K. Demertzis, P. Kikiras, N. Tziritas, S. L. Sanchez, and L. Iliadis, The Next Generation Cognitive Security Operations Center, Network Flow Forensics Using Cybersecurity Intelligence. Big Data Cogn. Comput, vol.2, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02157103

K. Demertzis, N. Tziritas, P. Kikiras, S. L. Sanchez, and L. Iliadis, The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks, Big Data Cogn. Comput, vol.3, p.6, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02157104

, Series: Cybercrime and Cybersecurity Research, NOVA science publishers

G. Huang, Q. Zhu, and C. Siew, Extreme learning machine: theory and applications, Neurocomputing, vol.70, issue.1-3, pp.489-501, 2006.

R. El-yaniv and M. Nisenson, Optimal single-class classification strategies -google scholar, Proc. of the 2006 NIPS Conference, vol.19, pp.377-384, 2007.

D. T. Munroe and M. G. Madden, Multi-class and single-class classification approaches to vehicle model recognition from images, Proc. of Artificial Intelligence and Cognitive Science, 2005.

N. Zhang, S. Ding, J. Zhang, and Y. Xue, An overview on Restricted Boltzmann Machines, Neurocomputing, vol.275, pp.1186-1199, 2018.

X. Ma and X. Wang, Convergence Analysis of Contrastive Divergence Algorithm Based on Gradient Method with Errors, 2015.

T. G. Dietterich, Machine Learning for Sequential Data: A Review, Structural, Syntactic, and Statistical Pattern Recognition. SSPR /SPR, 2002.

H. Thomas, Z. Morris, I. Thornton, and . Turnipseed, Industrial Control System Simulation and Data Logging for Intrusion Detection System Research, International Journal of Network Security (IJNS), vol.17, issue.2, pp.174-188, 2015.

D. Zwillinger and S. Kokoska, CRC Standard Probability and Statistics Tables and Formulae, 2000.

T. Fawcett, An introduction to ROC analysis, Pattern Recognition Letters, vol.27, issue.8, pp.861-874, 2006.

K. Demertzis and L. Iliadis, A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02155884

K. Demertzis and L. Iliadis, SAME: An Intelligent Anti-malware Extension for Android ART Virtual Machine, Computational Collective Intelligence, vol.9330, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02155913

K. Demertzis, L. Iliadis, A. Gammerman, V. Vovk, and H. Papadopoulos, Evolving Smart URL Filter in a Zone-Based Policy Firewall for Detecting Algorithmically Generated Malicious Domains, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02155914

, Statistical Learning and Data Sciences. SLDS, vol.9047, 2015.