Trustworthy data fusion and mining in Internet of Things

[1]  Yang Liu,et al.  Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..

[2]  Qinghua Li,et al.  A novel attack to spatial cloaking schemes in location-based services , 2015, Future Gener. Comput. Syst..

[3]  Ning Xi,et al.  Secure service composition with information flow control in service clouds , 2015, Future Gener. Comput. Syst..

[4]  Meikang Qiu,et al.  High reliable real-time bandwidth scheduling for virtual machines with hidden Markov predicting in telehealth platform , 2015, Future Gener. Comput. Syst..

[5]  Jinjun Chen,et al.  External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..

[6]  Young-Sik Jeong,et al.  A secure and scalable storage system for aggregate data in IoT , 2015, Future Gener. Comput. Syst..

[7]  Liang Chen,et al.  TruSMS: A trustworthy SMS spam control system based on trust management , 2015, Future Gener. Comput. Syst..

[8]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[9]  Félix Gómez Mármol,et al.  Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..

[10]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[11]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[12]  Ching-Hsien Hsu,et al.  Intelligent big data processing , 2014, Future Gener. Comput. Syst..

[13]  Fatos Xhafa,et al.  Semantics, intelligent processing and services for big data , 2014, Future Gener. Comput. Syst..

[14]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[15]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[16]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[17]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[18]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[19]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[20]  Shouhuai Xu,et al.  TEE: a virtual DRTM based execution environment for secure cloud-end computing , 2010, CCS '10.