Verification and validation techniques for streaming big data analytics in internet of things environment
暂无分享,去创建一个
Neeraj Kumar | Sudeep Tanwar | Sudhanshu Tyagi | Aparna Kumari | Neeraj Kumar | S. Tanwar | Sudhanshu Tyagi | Aparna Kumari
[1] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[2] Kim-Kwang Raymond Choo,et al. Multimedia big data computing and Internet of Things applications: A taxonomy and process model , 2018, J. Netw. Comput. Appl..
[3] Neeraj Kumar,et al. Fog computing for Healthcare 4.0 environment: Opportunities and challenges , 2018, Comput. Electr. Eng..
[4] Mouzhi Ge,et al. Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..
[5] Mohammad S. Obaidat,et al. A systematic review on security issues in vehicular ad hoc network , 2018, Secur. Priv..
[6] Mohammad S. Obaidat,et al. Ensuring Privacy and Security in E- Health Records , 2018, 2018 International Conference on Computer, Information and Telecommunication Systems (CITS).
[7] Mohammad S. Obaidat,et al. Blind Signatures Based Secured E-Healthcare System , 2018, 2018 International Conference on Computer, Information and Telecommunication Systems (CITS).
[8] George Ghinea,et al. An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks , 2018, Secur. Commun. Networks.
[9] Weigang Li,et al. Protecting Your Own Private Key in Cloud: Security, Scalability and Performance , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[10] Mahalakshmi Jeyabalu,et al. A Brief Review on Cloud Security Scenarios , 2018 .
[11] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[12] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[13] Narina Thakur,et al. Seguro Digital storage of documents using Blockchain , 2018 .
[14] Mamta Mittal,et al. Big Data and Machine Learning Based Secure Healthcare Framework , 2018 .
[15] Anandakumar Haldorai,et al. The Impact of Big Data Analytics and Challenges to Cyber Security , 2018 .
[16] A. B. Hssane,et al. Big healthcare data: preserving security and privacy , 2018, Journal of Big Data.
[17] Joel J. P. C. Rodrigues,et al. Home-based exercise system for patients using IoT enabled smart speaker , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).
[18] Joel J. P. C. Rodrigues,et al. FAAL: Fog computing-based patient monitoring system for ambient assisted living , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).
[19] Mohsen Guizani,et al. Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection , 2017, IEEE Communications Surveys & Tutorials.
[20] Shadi Aljawarneh,et al. Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..
[21] Sakir Sezer,et al. Dynamic Analysis of Malware using Run Time Opcodes , 2017 .
[22] Mohammad S. Obaidat,et al. An advanced Internet of Thing based Security Alert System for Smart Home , 2017, 2017 International Conference on Computer, Information and Telecommunication Systems (CITS).
[23] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[24] Shiuh-Pyng Shieh,et al. Web Application Security: Threats, Countermeasures, and Pitfalls , 2017, Computer.
[25] Nikunj Joshi,et al. Big data security and privacy issues — A survey , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).
[26] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[27] R. Udayakumar,et al. Cloud Security and Compliance - A Semantic Approach in End to End Security , 2017 .
[28] Soumya Ray,et al. Big Data Security: Survey on Frameworks and Algorithms , 2017, 2017 IEEE 7th International Advance Computing Conference (IACC).
[29] Iván Palomares Carrascosa,et al. Data Analytics and Decision Support for Cybersecurity , 2017, Data Analytics.
[30] Abderrazak Jemai,et al. A survey on security of IoT in the context of eHealth and clouds , 2016, 2016 11th International Design & Test Symposium (IDT).
[31] Ong Bi Lynn,et al. Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).
[32] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[33] Mohamed Cheriet,et al. Taxonomy of information security risk assessment (ISRA) , 2016, Comput. Secur..
[34] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[35] Shahriar Mirabbasi,et al. Wireless Energy Harvesting for Internet of Things , 2014 .
[36] Eric Gossett,et al. Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .
[37] Cheryl Ann Alexander,et al. Big Data in Medical Applications and Health Care , 2015 .
[38] Guillermo Lafuente,et al. The big data security challenge , 2015, Netw. Secur..
[39] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[40] Debashis De,et al. Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.
[41] Li Shuai,et al. Big Data security and privacy: A review , 2014, China Communications.
[42] Ernesto Damiani,et al. Business intelligence meets big data : an overview on security and privacy , 2014 .
[43] Tariq Mahmood,et al. Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[44] Richard Cumbley,et al. Is "Big Data" creepy? , 2013, Comput. Law Secur. Rev..
[45] Paul P. Tallon. Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost , 2013, Computer.
[46] Piyush Malik,et al. Governing Big Data: Principles and practices , 2013, IBM J. Res. Dev..
[47] Saima Maqbool,et al. Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes , 2013 .
[48] David Loshin,et al. Data Governance for Big Data Analytics , 2013 .
[49] A. White. VULNERABILITY MANAGEMENT , 2013 .
[50] Ronald S. Ross,et al. Guide for Conducting Risk Assessments , 2012 .
[51] Katina Michael,et al. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up , 2012, Comput. Secur..
[52] Michel Dagenais,et al. Intrusion Response Systems: Survey and Taxonomy , 2012 .
[53] John Gantz,et al. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .
[54] Zakaria I. Saleh,et al. Proposed Framework for Security Risk Assessment , 2011, J. Information Security.
[55] 브라이언티. 스타벅크,et al. Advanced spam detection techniques , 2004 .