Predictive Computing and Information Security
暂无分享,去创建一个
Vipin Tyagi | S. K. Singh | P. K. Gupta | S. Singh | V. Tyagi | P. Gupta
[1] Surendra Sarnikar,et al. A framework for developing a domain specific business intelligence maturity model: Application to healthcare , 2015, Int. J. Inf. Manag..
[2] Raul Aquino-Santos,et al. Ubiquitous computing and ambient intelligence for smart homes applications , 2012, World Automation Congress 2012.
[3] Devu Manikantan Shila,et al. Design, implementation and security analysis of Hardware Trojan Threats in FPGA , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[5] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[6] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[7] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[8] Hossein Nezamabadi-pour,et al. Combined A*-Ants Algorithm: A New Multi-Parameter Vehicle Navigation Scheme , 2015, ArXiv.
[9] Alessandro Bassi,et al. From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.
[10] Ciprian Dobre,et al. The Art of Advanced Healthcare Applications in Big Data and IoT Systems , 2017 .
[11] G. Singh,et al. A Novel Human Computer Interaction Aware Algorithm to Minimize Energy Consumption , 2015, Wirel. Pers. Commun..
[12] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[13] Simon Fong,et al. Predicting the next turn at road junction from big traffic data , 2017, The Journal of Supercomputing.
[14] Furrakh Shahzad,et al. An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS) , 2017, ArXiv.
[15] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[16] Radu Terec,et al. DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY , 2011 .
[17] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[18] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[19] A. Goldberg,et al. A heuristic improvement of the Bellman-Ford algorithm , 1993 .
[20] Guojun Peng,et al. Application of Internet of Things in Development of e-Navigation Architecture , 2015 .
[21] Chin-Ling Chen,et al. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing , 2017, J. Sensors.
[22] Muhammad Mostafa Monowar,et al. A Survey on Approaches of Data Confidentiality and Integrity Models in Cloud Computing Systems , 2015 .
[23] John Krumm,et al. Route Prediction from Trip Observations , 2008 .
[24] Jiafu Wan,et al. Energy Management Framework Designed for Autonomous Electric Vehicle with Sensor Networks Navigation , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[25] Zhu Zhenmin,et al. Heart rate measurement via smart phone acceleration sensor , 2014, 2014 International Conference on Smart Computing.
[26] Hendrik,et al. Trip Guidance: A Linked Data Based Mobile Tourists Guide , 2014 .
[27] Chih-Hung Chang,et al. Development of shortest path computing mechanism with consideration of commercial vehicles characteristics , 2014, 2014 International Conference on Smart Computing Workshops.
[28] Lin Xu,et al. Energy-efficient reliable data gathering scheme based on Enhanced Reed-Solomon code for wireless sensor networks , 2014, 2014 International Conference on Smart Computing.
[29] Svetha Venkatesh,et al. A predictive framework for modeling healthcare data with evolving clinical interventions , 2015, Stat. Anal. Data Min..
[30] William J. Buchanan,et al. Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[31] Saima Abdullah,et al. An Energy Efficient Message Scheduling Algorithm Considering Node Failure in IoT Environment , 2014, Wireless Personal Communications.
[32] Stefan Feuerriegel,et al. Understanding Consumer Behavior in Electronic Commerce with Image Sentiment , 2017, Wirtschaftsinformatik.
[33] Dongjian He,et al. Adaptive Kalman filtering based on optimal autoregressive predictive model , 2017, GPS Solutions.
[34] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[35] Punit Gupta,et al. A Framework of Creating Intelligent Power Profiles in Operating Systems to Minimize Power Consumption and Greenhouse Effect Caused by Computer Systems , 2011 .
[36] Roberto Baldoni,et al. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.
[37] S.K. Singh,et al. Smart real-time traffic congestion estimation and clustering technique for urban vehicular roads , 2016, 2016 IEEE Region 10 Conference (TENCON).
[38] Roberto Di Pietro,et al. Smart health: A context-aware health paradigm within smart cities , 2014, IEEE Communications Magazine.
[39] Jong Hyuk Park,et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..
[40] Albrecht Schmidt,et al. Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.
[41] Mo Chen,et al. FaSTrack: A modular framework for fast and guaranteed safe motion planning , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[42] K. R. Singh,et al. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[43] Yan Zhao,et al. Providing privacy preserving in Cloud computing , 2010, 3rd International Conference on Human System Interaction.
[44] Pavel Davidson,et al. Algorithms for Autonomous Personal Navigation Systems , 2013 .
[45] Qian Zhang,et al. Code-Centric RFID System Based on Software Agent Intelligence , 2010, IEEE Intelligent Systems.
[46] Young-Sik Jeong,et al. Large-Scale Middleware for Ubiquitous Sensor Networks , 2010, IEEE Intelligent Systems.
[47] M. Farhatullah,et al. PccP: A model for Preserving cloud computing Privacy , 2012, 2012 International Conference on Data Science & Engineering (ICDSE).
[48] Mirza Aamir Mehmood,et al. Implementation of Eap with RSA for Enhancing The Security of Cloud Computing , 2012 .
[49] Jiangtao Qiu. A predictive Model for Customer Purchase Behavior in E-Commerce Context , 2014, PACIS.
[50] Kaveh Ahmadi,et al. Predicting e-Customer Behavior in B2C Relationships for CLV Model , 2011 .
[51] Brett Browning,et al. Learning to Predict Driver Route and Destination Intent , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[52] W. Ochieng,et al. An Extended Kalman Filter Algorithm for Integrating GPS and Low Cost Dead Reckoning System Data for Vehicle Performance and Emissions Monitoring , 2003 .
[53] Yi Mu,et al. Privacy-Preserved Access Control for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[54] Jong Hyuk Park,et al. An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.
[55] D Bokefode Jayant,et al. Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model , 2015 .
[56] JongHyun Park,et al. A middleware for smart object in ubiquitous computing environment , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).
[57] Hassan Salmani,et al. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion , 2016, IEEE Transactions on Information Forensics and Security.
[58] Laura Maria Badea. Predicting Consumer Behavior with Artificial Neural Networks , 2014 .
[59] S. Martin,et al. Using context prediction for self-management in ubiquitous computing environments , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[60] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[61] Yi-Ming Chen,et al. Autonomic Navigation System Based on Predicted Traffic and VANETs , 2017, Wirel. Pers. Commun..
[62] Mengyin Fu,et al. A practical route planning algorithm for vehicle navigation system , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[63] Hongming Cai,et al. Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services , 2014, IEEE Transactions on Industrial Informatics.
[64] Wei Huang,et al. Design of a Fault Detection and Isolation System for Intelligent Vehicle Navigation System , 2015 .
[65] Dinesha H.A,et al. Evaluation of Secure Cloud Transmission Protocol , 2017 .
[66] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[67] T. Sudha,et al. Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud , 2018 .
[68] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[69] Chung-Horng Lung,et al. Smart Home: Integrating Internet of Things with Web Services and Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[70] A. Kansal,et al. Building a Sensor Network of Mobile Phones , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[71] Sherif Sakr,et al. Towards a Comprehensive Data Analytics Framework for Smart Healthcare Services , 2016, Big Data Res..
[72] David C. Keezer,et al. A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs , 2015, WESS.
[73] Reza Malekian,et al. Smart Vehicle Navigation System Using Hidden Markov Model and RFID Technology , 2016, Wirel. Pers. Commun..
[74] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[75] Weiping Zhu,et al. LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments , 2015, IEEE Transactions on Parallel and Distributed Systems.
[76] Ammar Rayes,et al. Internet of Things Security and Privacy , 2017 .
[77] Juan A. Besada,et al. Human Computer Interactions in Next-Generation of Aircraft Smart Navigation Management Systems: Task Analysis and Architecture under an Agent-Oriented Methodological Approach , 2015, Sensors.
[78] M. Parulekar,et al. Automatic vehicle navigation using Dijkstra's Algorithm , 2013, 2013 International Conference on Advances in Technology and Engineering (ICATE).
[79] Xiaojun Cao,et al. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects , 2014, IEEE Internet of Things Journal.
[80] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[81] Malcolm Clarke,et al. Exploring a New Security Framework for Remote Patient Monitoring Devices , 2017, Comput..
[82] Yi Mei,et al. CAPRA: A contour-based accessible path routing algorithm , 2017, Inf. Sci..
[83] Sudha Devi Dorairaj,et al. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment , 2015, TheScientificWorldJournal.
[84] Hervé Rivano,et al. On the use of city bikes to make the city even smarter , 2014, 2014 International Conference on Smart Computing Workshops.
[85] Ulrich Greveler,et al. A Privacy Preserving System for Cloud Computing , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[86] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[87] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[88] Chun-Chieh Wang,et al. Integration of Disaster Detection and Warning System for a Smart Vehicle , 2014 .
[89] Ahmed E. Youssef,et al. A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing , 2012 .
[90] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[91] Gareth A. Taylor,et al. Recent developments towards novel high performance computing and communications solutions for smart distribution network operation , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.
[92] C. Brodley,et al. Exploration of machine learning techniques in predicting multiple sclerosis disease course , 2017, PloS one.
[93] Jiafu Wan,et al. IoT sensing framework with inter-cloud computing capability in vehicular networking , 2014, Electron. Commer. Res..
[94] Jimeng Sun,et al. PARAMO: A PARAllel predictive MOdeling platform for healthcare analytic research using electronic health records , 2014, J. Biomed. Informatics.
[95] Rajan Gupta,et al. A Machine Learning Framework for Predicting Purchase by Online Customers based on Dynamic Pricing , 2014, Complex Adaptive Systems.
[96] Manuel Mazzara,et al. Link Prediction Using Top-k Shortest Distances , 2017, BICOD.
[97] Antonio Puliafito,et al. AllJoyn Lambda: An architecture for the management of smart environments in IoT , 2014, 2014 International Conference on Smart Computing Workshops.
[98] Mostafa Azizi,et al. Classification of major security attacks against RFID systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[99] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[100] Adnan Shahzada,et al. Dynamic vehicle navigation: An A* algorithm based approach using traffic and road information , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).
[101] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[102] S. Ventylees Raj. Implementation of pervasive computing based high-secure smart home system , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[103] Wen-Zhan Song,et al. DCTP: Data collecting based on trajectory prediction in Smart Environment , 2014, 2014 International Conference on Smart Computing Workshops.
[104] Giuseppe Anastasi,et al. E-Net-Manager: A power management system for networked PCs based on soft sensors , 2014, 2014 International Conference on Smart Computing.
[105] SURESH JAGANATHAN. CIADS : A Framework for Secured Storage of Patients Medical Data in Cloud , 2015 .
[106] Keon Chul Park,et al. Security assessment framework for IoT service , 2016, Telecommunication Systems.
[107] Wu Chen,et al. Adaptive Kalman Filtering for Vehicle Navigation , 2003 .
[108] Jin B. Hong,et al. A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..
[109] Miriam Seoane Santos,et al. Predicting Breast Cancer Recurrence Using Machine Learning Techniques , 2016, ACM Comput. Surv..
[110] David Eppstein,et al. Finding the k shortest paths , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[111] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[112] Weigang Wu,et al. A navigation route based minimum dominating set algorithm in VANETs , 2014, 2014 International Conference on Smart Computing Workshops.
[113] Myeonggil Choi,et al. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations , 2015 .
[114] Soma Bandyopadhyay,et al. Privacy for IoT: Involuntary privacy enablement for smart energy systems , 2015, 2015 IEEE International Conference on Communications (ICC).
[115] Rinusha Irudeen,et al. Big data solution for Sri Lankan development: A case study from travel and tourism , 2013, 2013 International Conference on Advances in ICT for Emerging Regions (ICTer).
[116] L. Arockiam,et al. A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storageq , 2014 .
[117] Reza Malekian,et al. A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.
[118] Erik Jenelius,et al. Integrated framework for real-time urban network travel time prediction on sparse probe data , 2018 .
[119] Ghanshyam Singh,et al. Energy-Sustainable Framework and Performance Analysis of Power Scheme for Operating Systems: A Tool , 2012 .
[120] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[121] Cheng Hu,et al. Complex data collection in large-scale RFID systems , 2014, 2014 International Conference on Smart Computing.
[122] Rebecca Montanari,et al. Context-Aware Middleware for Anytime, Anywhere Social Networks , 2007, IEEE Intelligent Systems.
[123] Sajal K. Das,et al. Ensuring energy efficient coverage for participatory sensing in urban streets , 2014, 2014 International Conference on Smart Computing.
[124] Jong Hyuk Park,et al. Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors , 2010, IEEE Intelligent Systems.
[125] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[126] Jure Leskovec,et al. Understanding Behaviors that Lead to Purchasing: A Case Study of Pinterest , 2016, KDD.
[127] Matthew Barth,et al. Vehicle route prediction and time of arrival estimation techniques for improved transportation system management , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).
[128] Pan Li,et al. Context-aware scheduling algorithm in smart home system , 2013, China Communications.
[129] Qian Wang,et al. Predictive Guidance and Control Framework for (Semi-)Autonomous Vehicles in Public Traffic , 2017, IEEE Transactions on Control Systems Technology.
[130] David Lillethun,et al. Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.
[131] G. Singh,et al. User centric framework of power schemes for minimizing energy consumption by computer systems , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).
[132] Abdul Hanan Abdullah,et al. Design of accurate vehicle location system using RFID , 2013 .
[133] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[134] Mengzhe Zhang. Path planning for autonomous vehicles , 2014 .
[135] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[136] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[137] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[138] Qingquan Li,et al. A Sensor-Fusion Drivable-Region and Lane-Detection System for Autonomous Vehicle Navigation in Challenging Road Scenarios , 2014, IEEE Transactions on Vehicular Technology.
[139] Yu Zhang,et al. A new data aggregation technique in multi-sink wireless sensor networks , 2014, 2014 International Conference on Smart Computing Workshops.