메뉴 건너뛰기




Volumn 17, Issue 5, 2015, Pages 983-986

Advances in secure knowledge management in the big data era

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84942191538     PISSN: 13873326     EISSN: 15729419     Source Type: Journal    
DOI: 10.1007/s10796-015-9593-y     Document Type: Editorial
Times cited : (31)

References (11)
  • 3
    • 84942197384 scopus 로고    scopus 로고
    • Message diffusion through social network service: The case of rumor and non-rumor related tweets during boston bombing 2013
    • Lee, J., Agrawal, M., & Rao, H. (2015). Message diffusion through social network service: The case of rumor and non-rumor related tweets during boston bombing 2013. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9568-z.
    • (2015) Information Systems Frontiers , vol.17 , Issue.5
    • Lee, J.1    Agrawal, M.2    Rao, H.3
  • 4
    • 84942197423 scopus 로고    scopus 로고
    • Surviving advanced persistent threats in a distributed environment–architecture and analysis
    • Mehresh, R., & Upadhyaya, S. (2015). Surviving advanced persistent threats in a distributed environment–architecture and analysis. Information Systems Frontiers, 17 (5). doi:10.1007/s10796-015-9569-y.
    • (2015) Information Systems Frontiers , vol.17 , Issue.5
    • Mehresh, R.1    Upadhyaya, S.2
  • 5
    • 84942105224 scopus 로고    scopus 로고
    • Game-theoretic strategies for ids deployment in peer-to-peer networks
    • Narang, P., & Hota, C. (2015). Game-theoretic strategies for ids deployment in peer-to-peer networks. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9582-1.
    • (2015) Information Systems Frontiers , vol.17 , Issue.5
    • Narang, P.1    Hota, C.2
  • 6
    • 84942196847 scopus 로고    scopus 로고
    • Analysis of a multistage attack embedded in a video file
    • Nath, H.V., & Mehtre, B. (2015). Analysis of a multistage attack embedded in a video file. doi:Information Systems Frontiers, 17(5), 1–9. doi:10.1007/s10796-015-9570-5.
    • (2015) Information Systems Frontiers , vol.17 , Issue.5 , pp. 1-9
    • Nath, H.V.1    Mehtre, B.2
  • 7
    • 84942205015 scopus 로고    scopus 로고
    • Knowledge from big data analytics in product development, TCS white paper
    • Rajpathak, T., & Narsingpurkar, A. (2013). Knowledge from big data analytics in product development. TCS white paper.
    • (2013)
    • Rajpathak, T.1
  • 8
    • 84942195676 scopus 로고    scopus 로고
    • Secure and privacy-preserving data processing support for active authentication
    • Sun, Y., & Upadhyaya, S. (2015). Secure and privacy-preserving data processing support for active authentication. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9587-9.
    • (2015) Information Systems Frontiers , vol.17 , Issue.5
    • Sun, Y.1    Upadhyaya, S.2
  • 9
    • 63149181058 scopus 로고    scopus 로고
    • IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
    • Thuraisingham, B., & Parikh, P. (2008). Trustworthy semantic web technologies for secure knowledge management. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, IEEE, pp 186–193.
    • (2008) IEEE , pp. 186-193
  • 10
    • 84942205017 scopus 로고    scopus 로고
    • Padmanabhan, G: Secure knowledge management. Idea group inc
    • Upadhyaya, S., Rao, H.R., & Padmanabhan, G. (2006). Secure knowledge management. Idea group inc.
    • (2006)
    • Upadhyaya, S.1    Rao, H.R.2
  • 11
    • 84942205018 scopus 로고    scopus 로고
    • Wolf, S. Security management for knowledge assets
    • Wolf, S. (2012). Security management for knowledge assets.
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.