Predictive Computing and Information Security

[1]  Surendra Sarnikar,et al.  A framework for developing a domain specific business intelligence maturity model: Application to healthcare , 2015, Int. J. Inf. Manag..

[2]  Raul Aquino-Santos,et al.  Ubiquitous computing and ambient intelligence for smart homes applications , 2012, World Automation Congress 2012.

[3]  Devu Manikantan Shila,et al.  Design, implementation and security analysis of Hardware Trojan Threats in FPGA , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[5]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[6]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[7]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[8]  Hossein Nezamabadi-pour,et al.  Combined A*-Ants Algorithm: A New Multi-Parameter Vehicle Navigation Scheme , 2015, ArXiv.

[9]  Alessandro Bassi,et al.  From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.

[10]  Ciprian Dobre,et al.  The Art of Advanced Healthcare Applications in Big Data and IoT Systems , 2017 .

[11]  G. Singh,et al.  A Novel Human Computer Interaction Aware Algorithm to Minimize Energy Consumption , 2015, Wirel. Pers. Commun..

[12]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[13]  Simon Fong,et al.  Predicting the next turn at road junction from big traffic data , 2017, The Journal of Supercomputing.

[14]  Furrakh Shahzad,et al.  An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS) , 2017, ArXiv.

[15]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[16]  Radu Terec,et al.  DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY , 2011 .

[17]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[18]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[19]  A. Goldberg,et al.  A heuristic improvement of the Bellman-Ford algorithm , 1993 .

[20]  Guojun Peng,et al.  Application of Internet of Things in Development of e-Navigation Architecture , 2015 .

[21]  Chin-Ling Chen,et al.  An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing , 2017, J. Sensors.

[22]  Muhammad Mostafa Monowar,et al.  A Survey on Approaches of Data Confidentiality and Integrity Models in Cloud Computing Systems , 2015 .

[23]  John Krumm,et al.  Route Prediction from Trip Observations , 2008 .

[24]  Jiafu Wan,et al.  Energy Management Framework Designed for Autonomous Electric Vehicle with Sensor Networks Navigation , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[25]  Zhu Zhenmin,et al.  Heart rate measurement via smart phone acceleration sensor , 2014, 2014 International Conference on Smart Computing.

[26]  Hendrik,et al.  Trip Guidance: A Linked Data Based Mobile Tourists Guide , 2014 .

[27]  Chih-Hung Chang,et al.  Development of shortest path computing mechanism with consideration of commercial vehicles characteristics , 2014, 2014 International Conference on Smart Computing Workshops.

[28]  Lin Xu,et al.  Energy-efficient reliable data gathering scheme based on Enhanced Reed-Solomon code for wireless sensor networks , 2014, 2014 International Conference on Smart Computing.

[29]  Svetha Venkatesh,et al.  A predictive framework for modeling healthcare data with evolving clinical interventions , 2015, Stat. Anal. Data Min..

[30]  William J. Buchanan,et al.  Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[31]  Saima Abdullah,et al.  An Energy Efficient Message Scheduling Algorithm Considering Node Failure in IoT Environment , 2014, Wireless Personal Communications.

[32]  Stefan Feuerriegel,et al.  Understanding Consumer Behavior in Electronic Commerce with Image Sentiment , 2017, Wirtschaftsinformatik.

[33]  Dongjian He,et al.  Adaptive Kalman filtering based on optimal autoregressive predictive model , 2017, GPS Solutions.

[34]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[35]  Punit Gupta,et al.  A Framework of Creating Intelligent Power Profiles in Operating Systems to Minimize Power Consumption and Greenhouse Effect Caused by Computer Systems , 2011 .

[36]  Roberto Baldoni,et al.  Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.

[37]  S.K. Singh,et al.  Smart real-time traffic congestion estimation and clustering technique for urban vehicular roads , 2016, 2016 IEEE Region 10 Conference (TENCON).

[38]  Roberto Di Pietro,et al.  Smart health: A context-aware health paradigm within smart cities , 2014, IEEE Communications Magazine.

[39]  Jong Hyuk Park,et al.  Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..

[40]  Albrecht Schmidt,et al.  Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.

[41]  Mo Chen,et al.  FaSTrack: A modular framework for fast and guaranteed safe motion planning , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[42]  K. R. Singh,et al.  Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[43]  Yan Zhao,et al.  Providing privacy preserving in Cloud computing , 2010, 3rd International Conference on Human System Interaction.

[44]  Pavel Davidson,et al.  Algorithms for Autonomous Personal Navigation Systems , 2013 .

[45]  Qian Zhang,et al.  Code-Centric RFID System Based on Software Agent Intelligence , 2010, IEEE Intelligent Systems.

[46]  Young-Sik Jeong,et al.  Large-Scale Middleware for Ubiquitous Sensor Networks , 2010, IEEE Intelligent Systems.

[47]  M. Farhatullah,et al.  PccP: A model for Preserving cloud computing Privacy , 2012, 2012 International Conference on Data Science & Engineering (ICDSE).

[48]  Mirza Aamir Mehmood,et al.  Implementation of Eap with RSA for Enhancing The Security of Cloud Computing , 2012 .

[49]  Jiangtao Qiu A predictive Model for Customer Purchase Behavior in E-Commerce Context , 2014, PACIS.

[50]  Kaveh Ahmadi,et al.  Predicting e-Customer Behavior in B2C Relationships for CLV Model , 2011 .

[51]  Brett Browning,et al.  Learning to Predict Driver Route and Destination Intent , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[52]  W. Ochieng,et al.  An Extended Kalman Filter Algorithm for Integrating GPS and Low Cost Dead Reckoning System Data for Vehicle Performance and Emissions Monitoring , 2003 .

[53]  Yi Mu,et al.  Privacy-Preserved Access Control for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[54]  Jong Hyuk Park,et al.  An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.

[55]  D Bokefode Jayant,et al.  Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model , 2015 .

[56]  JongHyun Park,et al.  A middleware for smart object in ubiquitous computing environment , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).

[57]  Hassan Salmani,et al.  Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion , 2016, IEEE Transactions on Information Forensics and Security.

[58]  Laura Maria Badea Predicting Consumer Behavior with Artificial Neural Networks , 2014 .

[59]  S. Martin,et al.  Using context prediction for self-management in ubiquitous computing environments , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[60]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .

[61]  Yi-Ming Chen,et al.  Autonomic Navigation System Based on Predicted Traffic and VANETs , 2017, Wirel. Pers. Commun..

[62]  Mengyin Fu,et al.  A practical route planning algorithm for vehicle navigation system , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[63]  Hongming Cai,et al.  Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services , 2014, IEEE Transactions on Industrial Informatics.

[64]  Wei Huang,et al.  Design of a Fault Detection and Isolation System for Intelligent Vehicle Navigation System , 2015 .

[65]  Dinesha H.A,et al.  Evaluation of Secure Cloud Transmission Protocol , 2017 .

[66]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[67]  T. Sudha,et al.  Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud , 2018 .

[68]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[69]  Chung-Horng Lung,et al.  Smart Home: Integrating Internet of Things with Web Services and Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[70]  A. Kansal,et al.  Building a Sensor Network of Mobile Phones , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[71]  Sherif Sakr,et al.  Towards a Comprehensive Data Analytics Framework for Smart Healthcare Services , 2016, Big Data Res..

[72]  David C. Keezer,et al.  A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs , 2015, WESS.

[73]  Reza Malekian,et al.  Smart Vehicle Navigation System Using Hidden Markov Model and RFID Technology , 2016, Wirel. Pers. Commun..

[74]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[75]  Weiping Zhu,et al.  LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments , 2015, IEEE Transactions on Parallel and Distributed Systems.

[76]  Ammar Rayes,et al.  Internet of Things Security and Privacy , 2017 .

[77]  Juan A. Besada,et al.  Human Computer Interactions in Next-Generation of Aircraft Smart Navigation Management Systems: Task Analysis and Architecture under an Agent-Oriented Methodological Approach , 2015, Sensors.

[78]  M. Parulekar,et al.  Automatic vehicle navigation using Dijkstra's Algorithm , 2013, 2013 International Conference on Advances in Technology and Engineering (ICATE).

[79]  Xiaojun Cao,et al.  Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects , 2014, IEEE Internet of Things Journal.

[80]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[81]  Malcolm Clarke,et al.  Exploring a New Security Framework for Remote Patient Monitoring Devices , 2017, Comput..

[82]  Yi Mei,et al.  CAPRA: A contour-based accessible path routing algorithm , 2017, Inf. Sci..

[83]  Sudha Devi Dorairaj,et al.  An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment , 2015, TheScientificWorldJournal.

[84]  Hervé Rivano,et al.  On the use of city bikes to make the city even smarter , 2014, 2014 International Conference on Smart Computing Workshops.

[85]  Ulrich Greveler,et al.  A Privacy Preserving System for Cloud Computing , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[86]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[87]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[88]  Chun-Chieh Wang,et al.  Integration of Disaster Detection and Warning System for a Smart Vehicle , 2014 .

[89]  Ahmed E. Youssef,et al.  A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing , 2012 .

[90]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[91]  Gareth A. Taylor,et al.  Recent developments towards novel high performance computing and communications solutions for smart distribution network operation , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[92]  C. Brodley,et al.  Exploration of machine learning techniques in predicting multiple sclerosis disease course , 2017, PloS one.

[93]  Jiafu Wan,et al.  IoT sensing framework with inter-cloud computing capability in vehicular networking , 2014, Electron. Commer. Res..

[94]  Jimeng Sun,et al.  PARAMO: A PARAllel predictive MOdeling platform for healthcare analytic research using electronic health records , 2014, J. Biomed. Informatics.

[95]  Rajan Gupta,et al.  A Machine Learning Framework for Predicting Purchase by Online Customers based on Dynamic Pricing , 2014, Complex Adaptive Systems.

[96]  Manuel Mazzara,et al.  Link Prediction Using Top-k Shortest Distances , 2017, BICOD.

[97]  Antonio Puliafito,et al.  AllJoyn Lambda: An architecture for the management of smart environments in IoT , 2014, 2014 International Conference on Smart Computing Workshops.

[98]  Mostafa Azizi,et al.  Classification of major security attacks against RFID systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[99]  Blaine Nelson,et al.  Can machine learning be secure? , 2006, ASIACCS '06.

[100]  Adnan Shahzada,et al.  Dynamic vehicle navigation: An A* algorithm based approach using traffic and road information , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).

[101]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[102]  S. Ventylees Raj Implementation of pervasive computing based high-secure smart home system , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[103]  Wen-Zhan Song,et al.  DCTP: Data collecting based on trajectory prediction in Smart Environment , 2014, 2014 International Conference on Smart Computing Workshops.

[104]  Giuseppe Anastasi,et al.  E-Net-Manager: A power management system for networked PCs based on soft sensors , 2014, 2014 International Conference on Smart Computing.

[105]  SURESH JAGANATHAN CIADS : A Framework for Secured Storage of Patients Medical Data in Cloud , 2015 .

[106]  Keon Chul Park,et al.  Security assessment framework for IoT service , 2016, Telecommunication Systems.

[107]  Wu Chen,et al.  Adaptive Kalman Filtering for Vehicle Navigation , 2003 .

[108]  Jin B. Hong,et al.  A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..

[109]  Miriam Seoane Santos,et al.  Predicting Breast Cancer Recurrence Using Machine Learning Techniques , 2016, ACM Comput. Surv..

[110]  David Eppstein,et al.  Finding the k shortest paths , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[111]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[112]  Weigang Wu,et al.  A navigation route based minimum dominating set algorithm in VANETs , 2014, 2014 International Conference on Smart Computing Workshops.

[113]  Myeonggil Choi,et al.  Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations , 2015 .

[114]  Soma Bandyopadhyay,et al.  Privacy for IoT: Involuntary privacy enablement for smart energy systems , 2015, 2015 IEEE International Conference on Communications (ICC).

[115]  Rinusha Irudeen,et al.  Big data solution for Sri Lankan development: A case study from travel and tourism , 2013, 2013 International Conference on Advances in ICT for Emerging Regions (ICTer).

[116]  L. Arockiam,et al.  A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storageq , 2014 .

[117]  Reza Malekian,et al.  A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.

[118]  Erik Jenelius,et al.  Integrated framework for real-time urban network travel time prediction on sparse probe data , 2018 .

[119]  Ghanshyam Singh,et al.  Energy-Sustainable Framework and Performance Analysis of Power Scheme for Operating Systems: A Tool , 2012 .

[120]  Nick Feamster,et al.  A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.

[121]  Cheng Hu,et al.  Complex data collection in large-scale RFID systems , 2014, 2014 International Conference on Smart Computing.

[122]  Rebecca Montanari,et al.  Context-Aware Middleware for Anytime, Anywhere Social Networks , 2007, IEEE Intelligent Systems.

[123]  Sajal K. Das,et al.  Ensuring energy efficient coverage for participatory sensing in urban streets , 2014, 2014 International Conference on Smart Computing.

[124]  Jong Hyuk Park,et al.  Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors , 2010, IEEE Intelligent Systems.

[125]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[126]  Jure Leskovec,et al.  Understanding Behaviors that Lead to Purchasing: A Case Study of Pinterest , 2016, KDD.

[127]  Matthew Barth,et al.  Vehicle route prediction and time of arrival estimation techniques for improved transportation system management , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).

[128]  Pan Li,et al.  Context-aware scheduling algorithm in smart home system , 2013, China Communications.

[129]  Qian Wang,et al.  Predictive Guidance and Control Framework for (Semi-)Autonomous Vehicles in Public Traffic , 2017, IEEE Transactions on Control Systems Technology.

[130]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[131]  G. Singh,et al.  User centric framework of power schemes for minimizing energy consumption by computer systems , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).

[132]  Abdul Hanan Abdullah,et al.  Design of accurate vehicle location system using RFID , 2013 .

[133]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[134]  Mengzhe Zhang Path planning for autonomous vehicles , 2014 .

[135]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[136]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[137]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[138]  Qingquan Li,et al.  A Sensor-Fusion Drivable-Region and Lane-Detection System for Autonomous Vehicle Navigation in Challenging Road Scenarios , 2014, IEEE Transactions on Vehicular Technology.

[139]  Yu Zhang,et al.  A new data aggregation technique in multi-sink wireless sensor networks , 2014, 2014 International Conference on Smart Computing Workshops.