Large Sensing Data Flows Using Cryptic Techniques

[1]  Lu Hong Artificial Immune System for Anomaly Detection , 2008, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop.

[2]  Dipankar Dasgupta,et al.  Computational intelligence in cyber security , 2006 .

[3]  Rory C. Flemmer,et al.  A review of artificial intelligence , 2000, 2009 4th International Conference on Autonomous Robots and Agents.

[4]  Michael Stonebraker,et al.  The 8 requirements of real-time stream processing , 2005, SGMD.

[5]  Dan Liu,et al.  Review on the application of artificial intelligence in antivirus detection systemi , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.

[6]  Li Huang,et al.  A Lightweight Security Scheme for Wireless Body Area Networks: Design, Energy Evaluation and Proposed Microprocessor Design , 2011, Journal of Medical Systems.

[7]  Ahmed Patel,et al.  A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..

[8]  Hsinchun Chen,et al.  Guest Editors' Introduction: Artificial Intelligence for Homeland Security , 2005, IEEE Intell. Syst..

[9]  Architectural support for fast symmetric-key cryptography , 2000 .

[10]  Kian-Lee Tan,et al.  ACStream: Enforcing Access Control over Data Streams , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[11]  Toyotaro Suzumura,et al.  Automatic optimization of stream programs via source program operator graph transformations , 2013, Distributed and Parallel Databases.

[12]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[13]  Indrakshi Ray,et al.  Information flow control for stream processing in clouds , 2013, SACMAT '13.

[14]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[15]  Kang G. Shin,et al.  LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.

[16]  J. Huisken,et al.  Evaluation of 90 nm 6 T-SRAM as Physical Unclonable Function for Secure Key Generation in Wireless Sensor Nodes , 2010 .

[17]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[18]  Jinjun Chen,et al.  A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[19]  Rajiv Ranjan,et al.  SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams , 2019, IEEE Transactions on Big Data.

[20]  Michael Stonebraker,et al.  Retrospective on Aurora , 2004, The VLDB Journal.

[21]  Elisa Bertino,et al.  A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[22]  Evangelos P. Markatos,et al.  LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System , 2016, IEEE Transactions on Emerging Topics in Computing.

[23]  Dan Feng,et al.  Unifying intrusion detection and forensic analysis via provenance awareness , 2016, Future Gener. Comput. Syst..

[24]  Nurettin Dogan,et al.  Türkiye'de Bilişim Suçlarına Eğitimli İnsanların Bakışı , 2011 .

[25]  Rajiv Ranjan,et al.  Streaming Big Data Processing in Datacenter Clouds , 2014, IEEE Cloud Computing.

[26]  Richard Ford,et al.  On the definition and classification of cybercrime , 2006, Journal in Computer Virology.

[27]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[28]  Jinjun Chen,et al.  DLSeF , 2016, ACM Trans. Embed. Comput. Syst..

[29]  Claudio Soriente,et al.  StreamCloud: An Elastic and Scalable Data Streaming System , 2012, IEEE Transactions on Parallel and Distributed Systems.

[30]  Elisa Bertino,et al.  A Security Punctuation Framework for Enforcing Access Control on Streaming Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[31]  Jörg Meier,et al.  Securing the Borealis Data Stream Engine , 2006, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06).

[32]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[33]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[34]  Albert Y. Zomaya,et al.  A Lightweight Security Framework for Wireless Sensor Networks , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[35]  Indrakshi Ray,et al.  Multilevel secure data stream processing: Architecture and implementation , 2012, J. Comput. Secur..

[36]  K. P. Kaliyamurthie,et al.  Artificial Intelligence Technique Applied to Intrusion Detection , 2012 .

[37]  Jaime Lloret,et al.  Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.