Predictive Computing and Information Security: A Technical Review
暂无分享,去创建一个
[1] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[2] Weiping Zhu,et al. LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments , 2015, IEEE Transactions on Parallel and Distributed Systems.
[3] Jong Hyuk Park,et al. An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.
[4] Hervé Rivano,et al. On the use of city bikes to make the city even smarter , 2014, 2014 International Conference on Smart Computing Workshops.
[5] Hassan Salmani,et al. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion , 2016, IEEE Transactions on Information Forensics and Security.
[6] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[7] Vangelis Metsis,et al. IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.
[8] S. Martin,et al. Using context prediction for self-management in ubiquitous computing environments , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[9] Reza Malekian,et al. Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud , 2016 .
[10] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[11] Gareth A. Taylor,et al. Recent developments towards novel high performance computing and communications solutions for smart distribution network operation , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.
[12] C. Brodley,et al. Exploration of machine learning techniques in predicting multiple sclerosis disease course , 2017, PloS one.
[13] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[14] Svetha Venkatesh,et al. A predictive framework for modeling healthcare data with evolving clinical interventions , 2015, Stat. Anal. Data Min..
[15] Ciprian Dobre,et al. The Art of Advanced Healthcare Applications in Big Data and IoT Systems , 2017 .
[16] Simon Fong,et al. Predicting the next turn at road junction from big traffic data , 2017, The Journal of Supercomputing.
[17] Lin Xu,et al. Energy-efficient reliable data gathering scheme based on Enhanced Reed-Solomon code for wireless sensor networks , 2014, 2014 International Conference on Smart Computing.
[18] Furrakh Shahzad,et al. An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS) , 2017, ArXiv.
[19] A. Kansal,et al. Building a Sensor Network of Mobile Phones , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[20] Radu Terec,et al. DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY , 2011 .
[21] Stefan Feuerriegel,et al. Understanding Consumer Behavior in Electronic Commerce with Image Sentiment , 2017, Wirtschaftsinformatik.
[22] Dongjian He,et al. Adaptive Kalman filtering based on optimal autoregressive predictive model , 2017, GPS Solutions.
[23] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[24] Rajan Gupta,et al. A Machine Learning Framework for Predicting Purchase by Online Customers based on Dynamic Pricing , 2014, Complex Adaptive Systems.
[25] Manuel Mazzara,et al. Link Prediction Using Top-k Shortest Distances , 2017, BICOD.
[26] Ammar Rayes,et al. Internet of Things Security and Privacy , 2017 .
[27] Antonio Puliafito,et al. AllJoyn Lambda: An architecture for the management of smart environments in IoT , 2014, 2014 International Conference on Smart Computing Workshops.
[28] Harjot Kaur,et al. K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration , 2017 .
[29] Kaveh Ahmadi,et al. Predicting e-Customer Behavior in B2C Relationships for CLV Model , 2011 .
[30] Brett Browning,et al. Learning to Predict Driver Route and Destination Intent , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[31] W. Ochieng,et al. An Extended Kalman Filter Algorithm for Integrating GPS and Low Cost Dead Reckoning System Data for Vehicle Performance and Emissions Monitoring , 2003 .
[32] Juan A. Besada,et al. Human Computer Interactions in Next-Generation of Aircraft Smart Navigation Management Systems: Task Analysis and Architecture under an Agent-Oriented Methodological Approach , 2015, Sensors.
[33] M. Parulekar,et al. Automatic vehicle navigation using Dijkstra's Algorithm , 2013, 2013 International Conference on Advances in Technology and Engineering (ICATE).
[34] Hui Zhao,et al. A Finite Equivalence of Verifiable Multi-secret Sharing , 2012, Int. J. Comput. Intell. Syst..
[35] Jin B. Hong,et al. A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..
[36] Miriam Seoane Santos,et al. Predicting Breast Cancer Recurrence Using Machine Learning Techniques , 2016, ACM Comput. Surv..
[37] Soma Bandyopadhyay,et al. Privacy for IoT: Involuntary privacy enablement for smart energy systems , 2015, 2015 IEEE International Conference on Communications (ICC).
[38] Rinusha Irudeen,et al. Big data solution for Sri Lankan development: A case study from travel and tourism , 2013, 2013 International Conference on Advances in ICT for Emerging Regions (ICTer).
[39] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[40] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[41] Punit Gupta,et al. A Framework of Creating Intelligent Power Profiles in Operating Systems to Minimize Power Consumption and Greenhouse Effect Caused by Computer Systems , 2011 .
[42] Cheng Hu,et al. Complex data collection in large-scale RFID systems , 2014, 2014 International Conference on Smart Computing.
[43] Zhu Zhenmin,et al. Heart rate measurement via smart phone acceleration sensor , 2014, 2014 International Conference on Smart Computing.
[44] Albrecht Schmidt,et al. Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.
[45] Qian Wang,et al. Predictive Guidance and Control Framework for (Semi-)Autonomous Vehicles in Public Traffic , 2017, IEEE Transactions on Control Systems Technology.
[46] Sajal K. Das,et al. Ensuring energy efficient coverage for participatory sensing in urban streets , 2014, 2014 International Conference on Smart Computing.
[47] Hendrik,et al. Trip Guidance: A Linked Data Based Mobile Tourists Guide , 2014 .
[48] Chih-Hung Chang,et al. Development of shortest path computing mechanism with consideration of commercial vehicles characteristics , 2014, 2014 International Conference on Smart Computing Workshops.
[49] Weigang Wu,et al. A navigation route based minimum dominating set algorithm in VANETs , 2014, 2014 International Conference on Smart Computing Workshops.
[50] Myeonggil Choi,et al. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations , 2015 .
[51] Jong Hyuk Park,et al. Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors , 2010, IEEE Intelligent Systems.
[52] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[53] William J. Buchanan,et al. Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[54] Mengyin Fu,et al. A practical route planning algorithm for vehicle navigation system , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[55] David Lillethun,et al. Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.
[56] Jure Leskovec,et al. Understanding Behaviors that Lead to Purchasing: A Case Study of Pinterest , 2016, KDD.
[57] Matthew Barth,et al. Vehicle route prediction and time of arrival estimation techniques for improved transportation system management , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).
[58] Pan Li,et al. Context-aware scheduling algorithm in smart home system , 2013, China Communications.
[59] Mostafa Azizi,et al. Classification of major security attacks against RFID systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[60] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[61] Adeel Anjum,et al. BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication , 2017, Comput..
[62] Hongming Cai,et al. Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services , 2014, IEEE Transactions on Industrial Informatics.
[63] G. Singh,et al. User centric framework of power schemes for minimizing energy consumption by computer systems , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).
[64] Abdul Hanan Abdullah,et al. Design of accurate vehicle location system using RFID , 2013 .
[65] Rebecca Montanari,et al. Context-Aware Middleware for Anytime, Anywhere Social Networks , 2007, IEEE Intelligent Systems.
[66] Saima Abdullah,et al. An Energy Efficient Message Scheduling Algorithm Considering Node Failure in IoT Environment , 2014, Wireless Personal Communications.
[67] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[68] Surendra Sarnikar,et al. A framework for developing a domain specific business intelligence maturity model: Application to healthcare , 2015, Int. J. Inf. Manag..
[69] Raul Aquino-Santos,et al. Ubiquitous computing and ambient intelligence for smart homes applications , 2012, World Automation Congress 2012.
[70] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[71] Mo Chen,et al. FaSTrack: A modular framework for fast and guaranteed safe motion planning , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[72] Devu Manikantan Shila,et al. Design, implementation and security analysis of Hardware Trojan Threats in FPGA , 2014, 2014 IEEE International Conference on Communications (ICC).
[73] Adnan Shahzada,et al. Dynamic vehicle navigation: An A* algorithm based approach using traffic and road information , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).
[74] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[75] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[76] Yi-Ming Chen,et al. Autonomic Navigation System Based on Predicted Traffic and VANETs , 2017, Wirel. Pers. Commun..
[77] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[78] Sudha Devi Dorairaj,et al. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment , 2015, TheScientificWorldJournal.
[79] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[80] Jiafu Wan,et al. Energy Management Framework Designed for Autonomous Electric Vehicle with Sensor Networks Navigation , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[81] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[82] Roberto Baldoni,et al. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.
[83] Tossapon Boongoen,et al. Generating descriptive model for student dropout: a review of clustering approach , 2017, Human-centric Computing and Information Sciences.
[84] S.K. Singh,et al. Smart real-time traffic congestion estimation and clustering technique for urban vehicular roads , 2016, 2016 IEEE Region 10 Conference (TENCON).
[85] Jiafu Wan,et al. IoT sensing framework with inter-cloud computing capability in vehicular networking , 2014, Electron. Commer. Res..
[86] David Eppstein,et al. Finding the k Shortest Paths , 1999, SIAM J. Comput..
[87] Karen Kent,et al. Guide to Computer Security Log Management , 2006 .
[88] G. Singh,et al. A Novel Human Computer Interaction Aware Algorithm to Minimize Energy Consumption , 2015, Wirel. Pers. Commun..
[89] Tze Wei Liew,et al. Exploring the effects of a non-interactive talking avatar on social presence, credibility, trust, and patronage intention in an e-commerce website , 2017, Human-centric Computing and Information Sciences.
[90] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[91] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[92] S. Ventylees Raj. Implementation of pervasive computing based high-secure smart home system , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[93] Wen-Zhan Song,et al. DCTP: Data collecting based on trajectory prediction in Smart Environment , 2014, 2014 International Conference on Smart Computing Workshops.
[94] Giuseppe Anastasi,et al. E-Net-Manager: A power management system for networked PCs based on soft sensors , 2014, 2014 International Conference on Smart Computing.
[95] Jimeng Sun,et al. PARAMO: A PARAllel predictive MOdeling platform for healthcare analytic research using electronic health records , 2014, J. Biomed. Informatics.
[96] Wei Huang,et al. Design of a Fault Detection and Isolation System for Intelligent Vehicle Navigation System , 2015 .
[97] Dinesha H.A,et al. Evaluation of Secure Cloud Transmission Protocol , 2017 .
[98] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[99] Sherif Sakr,et al. Towards a Comprehensive Data Analytics Framework for Smart Healthcare Services , 2016, Big Data Res..
[100] David C. Keezer,et al. A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs , 2015, WESS.
[101] L. Arockiam,et al. A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storageq , 2014 .
[102] Reza Malekian,et al. A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.
[103] Erik Jenelius,et al. Integrated framework for real-time urban network travel time prediction on sparse probe data , 2018 .
[104] Ghanshyam Singh,et al. Energy-Sustainable Framework and Performance Analysis of Power Scheme for Operating Systems: A Tool , 2012 .
[105] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[106] Kim-Kwang Raymond Choo,et al. Applications of computational intelligence in vehicle traffic congestion problem: a survey , 2017, Soft Computing.
[107] Roberto Di Pietro,et al. Smart health: A context-aware health paradigm within smart cities , 2014, IEEE Communications Magazine.
[108] Jong Hyuk Park,et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..
[109] Jiangtao Qiu. A predictive Model for Customer Purchase Behavior in E-Commerce Context , 2014, PACIS.
[110] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[111] A. Goldberg,et al. A heuristic improvement of the Bellman-Ford algorithm , 1993 .
[112] Guojun Peng,et al. Application of Internet of Things in Development of e-Navigation Architecture , 2015 .
[113] John Krumm,et al. Route Prediction from Trip Observations , 2008 .
[114] G. Dong,et al. Journey to the east: Diverse routes and variable flowering times for wheat and barley en route to prehistoric China , 2017, PloS one.
[115] Keon Chul Park,et al. Security assessment framework for IoT service , 2016, Telecommunication Systems.
[116] Wu Chen,et al. Adaptive Kalman Filtering for Vehicle Navigation , 2003 .
[117] Xiaojun Cao,et al. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects , 2014, IEEE Internet of Things Journal.
[118] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[119] Malcolm Clarke,et al. Exploring a New Security Framework for Remote Patient Monitoring Devices , 2017, Comput..
[120] Yi Mei,et al. CAPRA: A contour-based accessible path routing algorithm , 2017, Inf. Sci..
[121] Young-Sik Jeong,et al. Large-Scale Middleware for Ubiquitous Sensor Networks , 2010, IEEE Intelligent Systems.
[122] Yi Mu,et al. Privacy-Preserved Access Control for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[123] D Bokefode Jayant,et al. Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model , 2015 .
[124] JongHyun Park,et al. A middleware for smart object in ubiquitous computing environment , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).
[125] Laura Maria Badea. Predicting Consumer Behavior with Artificial Neural Networks , 2014 .
[126] Alessandro Bassi,et al. From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.
[127] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[128] Chin-Ling Chen,et al. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing , 2017, J. Sensors.
[129] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[130] Qingquan Li,et al. A Sensor-Fusion Drivable-Region and Lane-Detection System for Autonomous Vehicle Navigation in Challenging Road Scenarios , 2014, IEEE Transactions on Vehicular Technology.
[131] Yu Zhang,et al. A new data aggregation technique in multi-sink wireless sensor networks , 2014, 2014 International Conference on Smart Computing Workshops.
[132] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[133] Reza Malekian,et al. Smart Vehicle Navigation System Using Hidden Markov Model and RFID Technology , 2016, Wirel. Pers. Commun..
[134] Yan Zhao,et al. Providing privacy preserving in cloud computing , 2009, 2009 International Conference on Test and Measurement.
[135] Ulrich Greveler,et al. A Privacy Preserving System for Cloud Computing , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[136] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[137] Chun-Chieh Wang,et al. Integration of Disaster Detection and Warning System for a Smart Vehicle , 2014 .
[138] K. R. Singh,et al. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[139] Qian Zhang,et al. Code-Centric RFID System Based on Software Agent Intelligence , 2010, IEEE Intelligent Systems.
[140] M. Farhatullah,et al. PccP: A model for Preserving cloud computing Privacy , 2012, 2012 International Conference on Data Science & Engineering (ICDSE).
[141] Mirza Aamir Mehmood,et al. Implementation of Eap with RSA for Enhancing The Security of Cloud Computing , 2012 .
[142] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[143] Chung-Horng Lung,et al. Smart Home: Integrating Internet of Things with Web Services and Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[144] Kashif Munir,et al. FRAMEWORK FOR SECURE CLOUD COMPUTING , 2013, CloudCom 2013.
[145] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[146] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.