An effective security measures for nuclear power plant using big data analysis approach
暂无分享,去创建一个
[1] Colin Tankard,et al. Big data security , 2012, Netw. Secur..
[2] Jun-Ho Huh,et al. Big Data Analysis for Personalized Health Activities: Machine Learning Processing for Automatic Keyword Extraction Approach , 2018, Symmetry.
[3] Alvaro A. Cárdenas,et al. Big Data Analytics for Security , 2013, IEEE Security & Privacy.
[4] Gary F. Birkenmeier,et al. Principally Quasi-Baer Ring Hulls , 2010 .
[5] Harsh Kupwade Patil,et al. Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.
[6] Han Liu,et al. Rule Based Systems for Big Data , 2015 .
[7] Sinan Aral,et al. The spread of true and false news online , 2018, Science.
[8] Jun-Ho Huh,et al. Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment , 2018, J. Ambient Intell. Humaniz. Comput..
[9] Rubén San-Segundo-Hernández,et al. Feature extraction for robust physical activity recognition , 2017, Human-centric Computing and Information Sciences.
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Katsumi Hirose,et al. 2011 Fukushima Dai-ichi nuclear power plant accident: summary of regional radioactive deposition monitoring results. , 2012, Journal of environmental radioactivity.
[12] Tianbo Lu,et al. Next Big Thing in Big Data: The Security of the ICT Supply Chain , 2013, 2013 International Conference on Social Computing.
[13] P. Dhavachelvan,et al. Big Data and Hadoop-a Study in Security Perspective , 2015 .
[14] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[15] Muhammad Younas,et al. Transaction processing in consistency-aware user’s applications deployed on NoSQL databases , 2017, Human-centric Computing and Information Sciences.
[16] Agnieszka Jakobik,et al. Big Data Security , 2016, Resource Management for Big Data Platforms.
[17] Jun-Ho Huh,et al. PLC-based design of monitoring system for ICT-integrated vertical fish farm , 2017, Human-centric Computing and Information Sciences.
[18] J. Sola,et al. Importance of input data normalization for the application of neural networks to complex industrial problems , 1997 .
[19] Jun-Ho Huh,et al. Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system , 2016, The Journal of Supercomputing.
[20] Dongpo Zhang. Big Data Security and Privacy Protection , 2018 .
[21] Jun-Ho Huh,et al. A location-based mobile health care facility search system for senior citizens , 2018, The Journal of Supercomputing.
[22] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[23] Fei Hao,et al. Treatment Planning in Smart Medical: A Sustainable Strategy , 2016, J. Inf. Process. Syst..
[24] Roberto Schirru,et al. Identification of nuclear power plant transients using the Particle Swarm Optimization algorithm , 2008 .
[25] Gary F. Birkenmeier,et al. Ring Hulls of Semiprime Homomorphic Images , 2008 .
[26] Jun-Ho Huh,et al. Design and test bed experiments of server operation system using virtualization technology , 2016, Human-centric Computing and Information Sciences.
[27] Jun-Ho Huh,et al. Smart Grid Test Bed Using OPNET and Power Line Communication , 2017 .
[28] Brett Lantz,et al. Machine learning with R : learn how to use R to apply powerful machine learning methods and gain an insight into real-world applications , 2013 .
[29] Atsushi Nagai,et al. A Hierarchical Structure for the Sharp Constants of Discrete Sobolev Inequalities on a Weighted Complete Graph , 2017, Symmetry.
[30] R. Kitchin. The real-time city? Big data and smart urbanism , 2013 .
[31] Silvana Trimi,et al. Big-data applications in the government sector , 2014, Commun. ACM.
[32] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[33] Carl Hewitt,et al. Open Information Systems Semantics for Distributed Artificial Intelligence , 1991, Artif. Intell..
[34] Jun-Ho Huh,et al. B+-tree construction on massive data with Hadoop , 2017, Cluster Computing.
[35] Chun Chen,et al. Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.
[36] Jun-Ho Huh,et al. Implementation of lightweight intrusion detection model for security of smart green house and vertical farm , 2018, Int. J. Distributed Sens. Networks.
[37] Martin Gilje Jaatun,et al. Reference deployment models for eliminating user concerns on cloud security , 2010, The Journal of Supercomputing.
[38] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[39] Jong Hyuk Park,et al. Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..