메뉴 건너뛰기




Volumn , Issue , 2017, Pages 1218-1225

A secure big data stream analytics framework for disaster management on the cloud

Author keywords

Big data analysis; Cloud computing; Data security; Disaster management

Indexed keywords

ARCHITECTURE; CLOUD COMPUTING; DATA ACQUISITION; DATA COMMUNICATION SYSTEMS; DATA HANDLING; DISASTER PREVENTION; DISASTERS; INFORMATION ANALYSIS; MOBILE TELECOMMUNICATION SYSTEMS; SEARCH ENGINES; SECURITY OF DATA; SMART CITY;

EID: 85013661536     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HPCC-SmartCity-DSS.2016.0170     Document Type: Conference Paper
Times cited : (39)

References (25)
  • 8
    • 84961627543 scopus 로고    scopus 로고
    • Streaming big data processing in datacenter clouds
    • Ranjan, Rajiv. "Streaming big data processing in datacenter clouds. " IEEE Cloud Computing 1, no. 1 (2014): 78-83.
    • (2014) IEEE Cloud Computing , vol.1 , Issue.1 , pp. 78-83
    • Ranjan, R.1
  • 11
    • 85009896635 scopus 로고    scopus 로고
    • A dynamic prime number based efficient security mechanism for big sensing data streams
    • Puthal, Deepak, Surya Nepal, Rajiv Ranjan, and Jinjun Chen. "A dynamic prime number based efficient security mechanism for big sensing data streams. " Journal of Computer and System Sciences (2016).
    • (2016) Journal of Computer and System Sciences
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 12
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • Park, Taejoon, and Kang G. Shin. "LiSP: A lightweight security protocol for wireless sensor networks. " ACM Transactions on Embedded Computing Systems (TECS) 3, no. 3 (2004): 634-660
    • (2004) ACM Transactions on Embedded Computing Systems (TECS) , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 14
    • 84923224316 scopus 로고    scopus 로고
    • Towards scalable systems for big data analytics: A technology tutorial
    • Hu, Han, Y. O. N. G. G. A. N. G. Wen, T. Chua, and X. U. E. L. O. N. G. Li. "Towards Scalable Systems for Big Data Analytics: A Technology Tutorial. " IEEE Access, Vol. 2, pp. 652-687, 2014.
    • (2014) IEEE Access , vol.2 , pp. 652-687
    • Hu, H.1    Wen, Y.O.N.2    Chua, T.3    Li, X.U.4
  • 15
    • 84865239545 scopus 로고    scopus 로고
    • On formula to compute primes and the nth prime
    • Kaddoura, Issam, and Samih Abdul-Nabi. "On formula to compute primes and the nth prime. " Applied Mathematical science, 6 (76), pp. 3751-3757, 2012.
    • (2012) Applied Mathematical Science , vol.6 , Issue.76 , pp. 3751-3757
    • Kaddoura, I.1    Abdul-Nabi, S.2
  • 17
    • 33646369640 scopus 로고    scopus 로고
    • Applying multi-agent system technology in practice: Automated management and analysis of SCADA and digital fault recorder data
    • Davidson, Euan M., Stephen DJ McArthur, James R. McDonald, Tom Cumming, and Ian Watt. "Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data. " Power Systems, IEEE Transactions on 21, no. 2 (2006): 559-567.
    • (2006) Power Systems, IEEE Transactions on , vol.21 , Issue.2 , pp. 559-567
    • Davidson, E.M.1    McArthur, S.D.J.2    McDonald, J.R.3    Cumming, T.4    Watt, I.5
  • 19
    • 84855320262 scopus 로고    scopus 로고
    • Natural disaster management mechanisms for probabilistic earthquake loss
    • Tseng, Chun-Pin, and Cheng-Wu Chen. "Natural disaster management mechanisms for probabilistic earthquake loss. " Natural Hazards 60, no. 3 (2012): 1055-1063.
    • (2012) Natural Hazards , vol.60 , Issue.3 , pp. 1055-1063
    • Tseng, C.-P.1    Chen, C.-W.2
  • 22
    • 0012551338 scopus 로고
    • Lattice-based enforcement of Chinese walls
    • Sandhu, Ravi S. "Lattice-based enforcement of chinese walls. " Computers & Security 11, no. 8 (1992): 753-763.
    • (1992) Computers & Security , vol.11 , Issue.8 , pp. 753-763
    • Sandhu, R.S.1
  • 24
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Roesch, Martin. "Snort: Lightweight Intrusion Detection for Networks. " InLISA, vol. 99, no. 1, pp. 229-238. 1999.
    • (1999) InLISA , vol.99 , Issue.1 , pp. 229-238
    • Roesch, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.