Large Sensing Data Flows Using Cryptic Techniques
暂无分享,去创建一个
[1] Lu Hong. Artificial Immune System for Anomaly Detection , 2008, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop.
[2] Dipankar Dasgupta,et al. Computational intelligence in cyber security , 2006 .
[3] Rory C. Flemmer,et al. A review of artificial intelligence , 2000, 2009 4th International Conference on Autonomous Robots and Agents.
[4] Michael Stonebraker,et al. The 8 requirements of real-time stream processing , 2005, SGMD.
[5] Dan Liu,et al. Review on the application of artificial intelligence in antivirus detection systemi , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.
[6] Li Huang,et al. A Lightweight Security Scheme for Wireless Body Area Networks: Design, Energy Evaluation and Proposed Microprocessor Design , 2011, Journal of Medical Systems.
[7] Ahmed Patel,et al. A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..
[8] Hsinchun Chen,et al. Guest Editors' Introduction: Artificial Intelligence for Homeland Security , 2005, IEEE Intell. Syst..
[9] Architectural support for fast symmetric-key cryptography , 2000 .
[10] Kian-Lee Tan,et al. ACStream: Enforcing Access Control over Data Streams , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[11] Toyotaro Suzumura,et al. Automatic optimization of stream programs via source program operator graph transformations , 2013, Distributed and Parallel Databases.
[12] Jinjun Chen,et al. A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..
[13] Indrakshi Ray,et al. Information flow control for stream processing in clouds , 2013, SACMAT '13.
[14] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[15] Kang G. Shin,et al. LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.
[16] J. Huisken,et al. Evaluation of 90 nm 6 T-SRAM as Physical Unclonable Function for Secure Key Generation in Wireless Sensor Nodes , 2010 .
[17] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[18] Jinjun Chen,et al. A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[19] Rajiv Ranjan,et al. SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams , 2019, IEEE Transactions on Big Data.
[20] Michael Stonebraker,et al. Retrospective on Aurora , 2004, The VLDB Journal.
[21] Elisa Bertino,et al. A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.
[22] Evangelos P. Markatos,et al. LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System , 2016, IEEE Transactions on Emerging Topics in Computing.
[23] Dan Feng,et al. Unifying intrusion detection and forensic analysis via provenance awareness , 2016, Future Gener. Comput. Syst..
[24] Nurettin Dogan,et al. Türkiye'de Bilişim Suçlarına Eğitimli İnsanların Bakışı , 2011 .
[25] Rajiv Ranjan,et al. Streaming Big Data Processing in Datacenter Clouds , 2014, IEEE Cloud Computing.
[26] Richard Ford,et al. On the definition and classification of cybercrime , 2006, Journal in Computer Virology.
[27] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[28] Jinjun Chen,et al. DLSeF , 2016, ACM Trans. Embed. Comput. Syst..
[29] Claudio Soriente,et al. StreamCloud: An Elastic and Scalable Data Streaming System , 2012, IEEE Transactions on Parallel and Distributed Systems.
[30] Elisa Bertino,et al. A Security Punctuation Framework for Enforcing Access Control on Streaming Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[31] Jörg Meier,et al. Securing the Borealis Data Stream Engine , 2006, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06).
[32] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[33] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[34] Albert Y. Zomaya,et al. A Lightweight Security Framework for Wireless Sensor Networks , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[35] Indrakshi Ray,et al. Multilevel secure data stream processing: Architecture and implementation , 2012, J. Comput. Secur..
[36] K. P. Kaliyamurthie,et al. Artificial Intelligence Technique Applied to Intrusion Detection , 2012 .
[37] Jaime Lloret,et al. Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.