-
1
-
-
1142303663
-
STREAM: The Stanford stream data manager (demonstration description)
-
A. Arasu, et al, "STREAM: The Stanford stream data manager (demonstration description)," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2003, pp. 665-665.
-
(2003)
Proc. Acm Sigmod Int. Conf. Manage. Data
, pp. 665
-
-
Arasu, A.1
-
3
-
-
84874078551
-
A lightweight secure provenance scheme for wireless sensor networks
-
S. Sultana, G. Ghinita, E. Bertino and M. Shehab, "A lightweight secure provenance scheme for wireless sensor networks, " in Proc. 18th Int. Conf. Parallel Distrib. Syst., 2012, pp. 101-108.
-
(2012)
Proc. 18th Int. Conf. Parallel Distrib. Syst.
, pp. 101-108
-
-
Sultana, S.1
Ghinita, G.2
Bertino, E.3
Shehab, M.4
-
4
-
-
33750300697
-
LSec: Lightweight security protocol for distributed wireless sensor network
-
R. A. Shaikh, S. Lee, M. AU Khan and Y. J. Song, "LSec: Lightweight security protocol for distributed wireless sensor network, " in Proc. IFIP Int. Conf. PersonalWireless Commun., 2006, pp. 367-377.
-
(2006)
Proc. Ifip Int. Conf. PersonalWireless Commun
, pp. 367-377
-
-
Shaikh, R.A.1
Lee, S.2
Khan, M.A.U.3
Song, Y.J.4
-
5
-
-
84856212536
-
A lightweight security scheme for wireless body area networks: Design, energy evaluation and proposed microprocessor design
-
G. Selimis, et al., "A lightweight security scheme for wireless body area networks: Design, energy evaluation and proposed microprocessor design, " J. Med. Syst., vol. 35, no. 5, pp. 1289-1298, 2011.
-
(2011)
J. Med. Syst.
, vol.35
, Issue.5
, pp. 1289-1298
-
-
Selimis, G.1
-
6
-
-
79960888516
-
Evaluation of 90 nm 6 T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes
-
G. Selimis, et al., "Evaluation of 90 nm 6 T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes," in Proc. IEEE IEEE Int. Symp. Circuits Syst., 2011, pp. 567-570.
-
(2011)
Proc. Ieee Ieee Int. Symp. Circuits Syst.
, pp. 567-570
-
-
Selimis, G.1
-
7
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proc. 13th USENIX Conf. Syst. Administration, pp. 229-238. 1999.
-
(1999)
Proc. 13th Usenix Conf. Syst. Administration
, pp. 229-238
-
-
Roesch, M.1
-
8
-
-
84963778729
-
LEoNIDS: A low-latency and energy-efficient network-level intrusion detection system
-
Jan.-Mar.
-
N. Tsikoudis, A. Papadogiannakis and E. P. Markatos, "LEoNIDS: A low-latency and energy-efficient network-level intrusion detection system," IEEE Trans. Emerging Topics Comput., vol. 4, no. 1, pp. 142-155, Jan.-Mar. 2016.
-
(2016)
Ieee Trans. Emerging Topics Comput.
, vol.4
, Issue.1
, pp. 142-155
-
-
Tsikoudis, N.1
Papadogiannakis, A.2
Markatos, E.P.3
-
10
-
-
84960429448
-
Unifying intrusion detection and forensic analysis via provenance awareness
-
Y. Xie, D. Feng, Z. Tan, and J. Zhou, "Unifying intrusion detection and forensic analysis via provenance awareness," Future Generation Comput. Syst., vol. 61, pp. 26-36, 2016.
-
(2016)
Future Generation Comput. Syst.
, vol.61
, pp. 26-36
-
-
Xie, Y.1
Feng, D.2
Tan, Z.3
Zhou, J.4
-
11
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun., 2005, pp. 324-328.
-
(2005)
Proc. 3rd Ieee Int. Conf. Pervasive Comput. Commun
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
12
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks
-
T. Park and K. G. Shin, "LiSP: A lightweight security protocol for wireless sensor networks," ACM Trans. Embedded Comput. Syst., vol. 3, no. 3, pp. 634-660, 2004.
-
(2004)
Acm Trans. Embedded Comput. Syst.
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
14
-
-
84860685134
-
A lightweight security framework for wireless sensor networks
-
T. A. Zia and A. Y. Zomaya, "A lightweight security framework for wireless sensor networks," J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl., vol. 2, no. 3, pp. 53-73, 2011.
-
(2011)
J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl.
, vol.2
, Issue.3
, pp. 53-73
-
-
Zia, T.A.1
Zomaya, A.Y.2
-
15
-
-
84958967653
-
Combining the self-organizing map and k-means clustering for on-line classification of sensor data
-
K. Van Laerhoven, "Combining the self-organizing map and k-means clustering for on-line classification of sensor data," in Proc. Int. Conf. Artif. Neural Netw., 2001, pp. 464-469.
-
(2001)
Proc. Int. Conf. Artif. Neural Netw
, pp. 464-469
-
-
Van Laerhoven, K.1
-
17
-
-
20544440223
-
DIMENSIONS: Why do we need a new data handling architecture for sensor networks?
-
D. Ganesan, D. Estrin and J. Heidemann, "DIMENSIONS: Why do we need a new data handling architecture for sensor networks?," ACM SIGCOMM Comput. Commun. Rev., vol. 33, no. 1. pp. 143-148, 2003.
-
(2003)
Acm Sigcomm Comput. Commun. Rev.
, vol.33
, Issue.1
, pp. 143-148
-
-
Ganesan, D.1
Estrin, D.2
Heidemann, J.3
-
18
-
-
85013661536
-
A secure big data stream analytics framework for disaster management on the cloud
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "A secure big data stream analytics framework for disaster management on the cloud," in Proc. 18th Int. Conf. High Performance Comput. Commun., 2016, pp. 1218-1225.
-
(2016)
Proc. 18th Int. Conf. High Performance Comput. Commun
, pp. 1218-1225
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
19
-
-
84962052195
-
A dynamic prime number based efficient security mechanism for big sensing data streams
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "A dynamic prime number based efficient security mechanism for big sensing data streams," J. Comput. Syst. Sci., vol. 83, no. 1, pp. 22-24, 2017.
-
(2017)
J. Comput. Syst. Sci.
, vol.83
, Issue.1
, pp. 22-24
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
20
-
-
85008884270
-
DLSeF: A dynamic key length based efficient real-time security verification model for big data stream
-
Art. no. 51
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "DLSeF: A dynamic key length based efficient real-time security verification model for big data stream," ACM Trans. Embedded Comput. Syst., vol. 16, no. 2, 2017, Art. no. 51.
-
(2017)
Acm Trans. Embedded Comput. Syst.
, vol.16
, Issue.2
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
21
-
-
84961627543
-
Streaming big data processing in datacenter clouds
-
May
-
R. Ranjan, "Streaming big data processing in datacenter clouds," IEEE Cloud Comput., vol. 1, no. 1, pp. 78-83, May 2014.
-
(2014)
Ieee Cloud Comput.
, vol.1
, Issue.1
, pp. 78-83
-
-
Ranjan, R.1
-
22
-
-
85091965174
-
-
Accessed On: 04.08.2014
-
[Onl ine]. Avai lable: www.cloudflare.com, Accessed On: 04.08.2014
-
-
-
-
23
-
-
0034444066
-
Architectural support for fast symmetric-key cryptography
-
J. Burke, J. McDonald, and T. Austin, "Architectural support for fast symmetric-key cryptography," ACM SIGARCH Comput. Archit. News, vol. 28, no. 5, pp. 178-189, 2000.
-
(2000)
Acm Sigarch Comput. Archit. News
, vol.28
, Issue.5
, pp. 178-189
-
-
Burke, J.1
McDonald, J.2
Austin, T.3
-
24
-
-
84892446001
-
-
Accessed on: 30.07.2016
-
Crypto- Benchmarks. [Online]. Available: Http://www. cryptopp.com/benchmarks.html, Accessed on: 30.07.2016.
-
Crypto-Benchmarks
-
-
-
25
-
-
0016973732
-
Ethernet: Distributed packet switching for local computer networks
-
R. M. Metcalfe and D. R. Boggs, "Ethernet: Distributed packet switching for local computer networks," Commun. ACM, vol. 19, no. 7, pp. 395-404, 1976.
-
(1976)
Commun. Acm
, vol.19
, Issue.7
, pp. 395-404
-
-
Metcalfe, R.M.1
Boggs, D.R.2
-
26
-
-
31444440239
-
The 8 requirements of real-time stream processing
-
M. Stonebraker, U. Çetintemel, and S. Zdonik, "The 8 requirements of real-time stream processing," ACM SIGMOD Rec., vol. 34, no. 4, pp. 42-47, 2005.
-
(2005)
Acm Sigmod Rec.
, vol.34
, Issue.4
, pp. 42-47
-
-
Stonebraker, M.1
Çetintemel, U.2
Zdonik, S.3
-
27
-
-
70849105916
-
StreamShield: A stream-centric approach towards security and privacy in data stream environments
-
R. V. Nehme, H-S. Lim, E. Bertino, and E. A. Rundensteiner, "StreamShield: A stream-centric approach towards security and privacy in data stream environments, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 1027-1030.
-
(2009)
Proc. Acm Sigmod Int. Conf. Manage. Data
, pp. 1027-1030
-
-
Nehme, R.V.1
Lim, H.-S.2
Bertino, E.3
Rundensteiner, E.A.4
-
28
-
-
85091979004
-
-
Scyther, Accessed on: 30.07.2016.
-
Scyther. [Online]. Available: Http://www.cs.ox.ac.uk/people/cas.cremers/scyther/, Accessed on: 30.07.2016.
-
-
-
-
29
-
-
26444562678
-
-
Boston, MA, USA: Addison-Wesley Professional
-
N. Nagaratnam, L. Koved, and A. Nadalin, Enterprise Java Security: Building Secure J2EE Applications. Boston, MA, USA: Addison-Wesley Professional, 2004.
-
(2004)
Enterprise Java Security: Building Secure J2EE Applications
-
-
Nagaratnam, N.1
Koved, L.2
Nadalin, A.3
-
30
-
-
85091985693
-
-
Matlab, Accessed on: 30.07.2016.
-
Matlab. [Onl ine]. Avai lable: Http://au.mathworks.com/products/matlab/, Accessed on: 30.07.2016.
-
-
-
-
31
-
-
70449496394
-
-
Accessed on: 30.07.2016.
-
Contiki operating system. [Online]. Available: Http://www. contiki-os.org/, Accessed on: 30.07.2016.
-
Contiki Operating System
-
-
-
32
-
-
28044469868
-
-
Stanford InfoLab, Stanford, CA, USA, Tech. Rep. 2004-20
-
A. Arasu, et al., "Stream: The stanford data stream management system," Stanford InfoLab, Stanford, CA, USA, Tech. Rep. 2004-20, 2004.
-
(2004)
Stream: The Stanford Data Stream Management System
-
-
Arasu, A.1
-
33
-
-
10644281455
-
Retrospective on aurora
-
H. Balakrishnan, et al., "Retrospective on aurora," VLDB J., vol. 13, no. 4, pp. 370-383, 2004.
-
(2004)
Vldb J.
, vol.13
, Issue.4
, pp. 370-383
-
-
Balakrishnan, H.1
-
35
-
-
85009936481
-
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
-
(In press)
-
F. Wu, et al., "An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment," J. Netw. Comput. Appl., (In press), 2016, https://doi. org/10.1016/j.jnca.2016.12.008
-
(2016)
J. Netw. Comput. Appl.
-
-
Wu, F.1
-
36
-
-
84869444719
-
Streamcloud: An elastic and scalable data streaming system
-
Dec.
-
V. Gulisano, et al., "Streamcloud: An elastic and scalable data streaming system," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2351-2365, Dec. 2012.
-
(2012)
Ieee Trans. Parallel Distrib. Syst.
, vol.23
, Issue.12
, pp. 2351-2365
-
-
Gulisano, V.1
-
38
-
-
84872236493
-
Multilevel secure data stream processing: Architecture and implementation
-
R. Adaikkalavan, X. Xie, and I. Ray, "Multilevel secure data stream processing: Architecture and implementation," J. Comput. Secur., vol. 20, no. 5, pp. 547-581, 2012.
-
(2012)
J. Comput. Secur.
, vol.20
, Issue.5
, pp. 547-581
-
-
Adaikkalavan, R.1
Xie, X.2
Ray, I.3
-
39
-
-
67649659827
-
Acstream: Enforcing access control over data streams
-
J. Cao, B. Carminati, E. Ferrari, and K.-L. Tan, "Acstream: Enforcing access control over data streams," in Proc. IEEE 25th Int. Conf. Data Eng., 2009, pp. 1495-1498.
-
(2009)
Proc. Ieee 25th Int. Conf. Data Eng.
, pp. 1495-1498
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.-L.4
-
40
-
-
84978224275
-
Threats to networking cloud and edge datacenters in the internet of thing
-
May-Jun.
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "Threats to networking cloud and edge datacenters in the internet of thing," IEEE Cloud Comput., vol. 3, no. 3, pp. 64-71, May-Jun. 2016.
-
(2016)
Ieee Cloud Comput.
, vol.3
, Issue.3
, pp. 64-71
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
42
-
-
84883115366
-
Information flow control for stream processing in clouds
-
X. Xie, I. Ray, R. Adaikkalavan, and R. Gamble, "Information flow control for stream processing in clouds," in Proc. 18th ACM Symp. Access Control Models Technol., 2013, pp. 89-100.
-
(2013)
Proc. 18th Acm Symp. Access Control Models Technol.
, pp. 89-100
-
-
Xie, X.1
Ray, I.2
Adaikkalavan, R.3
Gamble, R.4
-
43
-
-
52649140439
-
A security punctuation framework for enforcing access control on streaming data
-
R. V. Nehme, E. A. Rundensteiner, and E. Bertino, "A security punctuation framework for enforcing access control on streaming data," in Proc. IEEE 24th Int. Conf. Data Eng., 2008, pp. 406-415.
-
(2008)
Proc. Ieee 24th Int. Conf. Data Eng.
, pp. 406-415
-
-
Nehme, R.V.1
Rundensteiner, E.A.2
Bertino, E.3
-
44
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
May
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2008.
-
(2008)
Ieee Trans. Mobile Comput.
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
45
-
-
67749118172
-
Confidentiality and integrity for data aggregation in WSN using peer monitoring
-
R. Di Pietro, P. Michiardi, and R. Molva, "Confidentiality and integrity for data aggregation in WSN using peer monitoring," Secur. Commun. Netw., vol. 2, no. 2, pp. 181-194, 2009.
-
(2009)
Secur. Commun. Netw.
, vol.2
, Issue.2
, pp. 181-194
-
-
Di Pietro, R.1
Michiardi, P.2
Molva, R.3
-
46
-
-
85008193408
-
Internet of things (IoT): Smart and secure service delivery
-
Art. no. 22
-
E. Bertino, K-K R. Choo, D. Georgakopolous, and S. Nepal, "Internet of things (IoT): Smart and secure service delivery," ACM Trans. Internet Technol., vol. 16, no. 4, 2016, Art. no. 22.
-
(2016)
Acm Trans. Internet Technol.
, vol.16
, Issue.4
-
-
Bertino, E.1
Choo, K.-K.R.2
Georgakopolous, D.3
Nepal, S.4
-
47
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, et al., "SPINS: Security protocols for sensor networks," Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
-
48
-
-
85047486986
-
A selective encryption scheme for protecting H. 264/AVC video in multimedia social network
-
F. Peng, X.-Q. Gong, M. Long, and X.-M. Sun, "A selective encryption scheme for protecting H. 264/AVC video in multimedia social network," Multimedia Tools Appl., pp. 1-19, 2016.
-
(2016)
Multimedia Tools Appl
, pp. 1-19
-
-
Peng, F.1
Gong, X.-Q.2
Long, M.3
Sun, X.-M.4
-
49
-
-
85108192267
-
A synchronized shared key generation method for maintaining end-to-end security of big data streams
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "A synchronized shared key generation method for maintaining end-to-end security of big data streams," in Proc. 50th Hawaii Int. Conf. Syst. Sci., 2017, pp. 6011-6020.
-
(2017)
Proc. 50th Hawaii Int. Conf. Syst. Sci.
, pp. 6011-6020
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
50
-
-
84883147431
-
Automatic optimization of stream programs via source program operator graph transformations
-
M. Dayarathna and T. Suzumura, "Automatic optimization of stream programs via source program operator graph transformations," Distrib. Parallel Databases, vol. 31, no. 4, pp. 543-599, 2013
-
(2013)
Distrib. Parallel Databases
, vol.31
, Issue.4
, pp. 543-599
-
-
Dayarathna, M.1
Suzumura, T.2
|