1 |
Sultana, S. F. and Shubhangi, D. C. "Video encryption algorithm and key management using perfect shuffle", International Journal of Engineering Research and Applications, Vol.7, No.2, pp.1-5, 2017. http://dx.doi.org/10.9790/9622-0707030105
DOI
|
2 |
Ma, Y., Li, C. and Ou, B. "Cryptanalysis of an image block encryption algorithm based on chaotic maps", Journal of Information Security and Applications, Vol.54, pp.102566, 2020. https://doi.org/10.1016/j.jisa.2020.102566
DOI
|
3 |
Chatterjee, S., Kar, A. K. and Mustafa, S. Z. "Securing IoT devices in smart cities of India: from ethical and enterprise information system management perspective", Enterprise Information Systems, Vol.15, No.4, pp.585-615, 2021. https://doi.org/10.1080/17517575.2019.1654617
DOI
|
4 |
Kuemper, D., Iggena, T., Toenjes, R. and Pulvermueller, E. "Valid. IoT: a framework for sensor data quality analysis and interpolation", In Proceedings of the 9th ACM Multimedia Systems Conference, 2018, pp.294-303. https://doi.org/10.1145/3204949.3204972
DOI
|
5 |
Yoon, C., Huh, M., Kang, S. G., Park, J. and Lee, C. "Implement smart farm with IoT technology", In 2018 20th International Conference on Advanced Communication Technology (ICACT), pp.749-752, 2018. https://doi.org/10.23919/ICACT.2018.8323908
DOI
|
6 |
Sung-sik Mun, Mi-hui Kim, "Dos Attack Defense Using SDN and Honeypot", In Proceedings of Korea Information Processing Society Conference, pp.397-400. 2020. https://doi.org/10.3745/PKIPS.y2020m11a.397
DOI
|
7 |
Grosse, K., Manoharan, P., Papernot, N., Backes, M. and McDaniel, P., "On the (statistical) detection of adversarial examples", arXiv preprint, arXiv: 1702.06280, 2017. https://doi.org/10.48550/arXiv.1702.06280
DOI
|
8 |
Joon-hyuk Yoon, Mi-hui Kim, "Smart parking system using mobile crowdsensing: focus on removing privacy information", In Proceedings of the Korea Information Processing Society Conference, pp.32-35, 2018. https://doi.org/10.3745/PKIPS.y2018m05a.32
DOI
|
9 |
Kim, B., Abuadbba, A., Gao, Y., Zheng, Y., Ahmed, M. E., Kim, H. and Nepal, S. "Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks", arXiv preprint, arXiv:2010.03735, 2020. https://doi.org/10.48550/arXiv.2010.03735
DOI
|
10 |
Quiring, E., Klein, D., Arp, D., Johns, M. and Rieck, K. "Adversarial preprocessing: Understanding and preventing image-scaling attacks in machine learning", In 29th {USENIX} Security Symposium ({USENIX} Security 20), pp.1363-1380, 2020. https://www.usenix.org/conference/usenixsecurity20/pr esentation/quiring
|
11 |
Giuste, F. O. and Vizcarra, J. C., "CIFAR-10 Image Classification Using Feature Ensembles", arXiv preprint, arXiv:2002.03846, 2020. https://doi.org/10.48550/arXiv.2002.03846
DOI
|
12 |
Liu, H. and Wang, X. "Image encryption using DNA complementary rule and chaotic maps", Applied Soft Computing, Vol.12, No.5, pp.1457-1466, 2012. https://doi.org/10.1016/j.asoc.2012.01.016
DOI
|
13 |
Guo, Y. and Qu, J. "Study on intelligent logistics management information system based on IOT and cloud computation in big data era", The Open Cybernetics & Systemics Journal, Vol.9, No.1, 2015. http://dx.doi.org/10.2174/1874110X01509010934
DOI
|
14 |
Abbasi, A., Sarker, S. and Chiang, R. H., "Big data research in information systems: Toward an inclusive research agenda", Journal of the association for information systems, Vol.17, No.2, pp.3, 2016. http://dx.doi.org/10.17705/1jais.00423
DOI
|
15 |
Moo-kyung Jung, Chang-yong Choi, Ho-cheol Lee and Dong-myung Lee, "A Design of Platform of Portable Cultural Asset Surveilance System", In Proceedings of Korea Institute of Information and Communication Engineering Conference, pp.599-600, 2013. https://koreascience.kr/article/CFKO201331751950292.page
|
16 |
Dziak, D., Jachimczyk, B. and Kulesza, W. J. "IoT-based information system for healthcare application: design methodology approach", Applied Sciences, Vol.7, No.6, pp.596, 2017. https://doi.org/10.3390/app7060596
DOI
|
17 |
Apache, "Apache Hadoop", https://hadoop.apache.org
|
18 |
Tharayil, K. S., Farshteindiker, B., Eyal, S., Hasidim, N., Hershkovitz, R., Houri, S. and Oren, Y. "Sensor defense in-software (SDI): Practical software based detection of spoofing attacks on position sensors", Engineering Applications of Artificial Intelligence, Vol.95, pp.103904, 2020. https://doi.org/10.1016/j.engappai.2020.103904
DOI
|
19 |
Xiao, Q., Chen, Y., Shen, C., Chen, Y. and Li, K. "Seeing is not believing: Camouflage attacks on image scaling algorithms", In 28th {USENIX} Security Symposium ({USENIX} Security 19), pp.443-460, 2019. https://www.usenix.org/conference/usenixsecurity19/presentation/xiao
|
20 |
Dean, J. and Ghemawat, S. "MapReduce: simplified data processing on large clusters", Communications of the ACM, Vol.51, No.1, pp.107-113, 2008. https://doi.org/10.1145/1327452.1327492
DOI
|
21 |
Sharma, P. S., Roy, P. K., Ahmad, N., Ahuja, J. and Kumar, N., "Localisation of License Plate and Character Recognition Using Haar Cascade", In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), pp.971-974, 2019. https://ieeexplore.ieee.org/abstract/document/8991267
|
22 |
Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A. and Mukhopadhyay, D. "Adversarial attacks and defences: A survey", arXiv preprint, arXiv:1810.00069, 2018. https://doi.org/10.48550/arXiv.1810.00069
DOI
|
23 |
Apache, "Apache Spark", https://spark.apache.org
|
24 |
Tcheumadjeu, L. C. T., Luber, A., Brockfeld, E., Gurczik, G., Sohr, A. and Sauerlander, A. "Integration of mobile wireless RF sensors into a traffic information system", Transportation research procedia, Vol.25, pp.1865-1883, 2017. https://doi.org/10.1016/j.trpro.2017.05.168
DOI
|
25 |
Qureshi, A. U. H., Larijani, H., Yousefi, M., Adeel, A. and Mtetwa, N. "An adversarial approach for intrusion detection systems using Jacobian Saliency Map Attacks (JSMA)", Algorithm. Computers, Vol.9, No.3, p. 58, 2020. https://doi.org/10.3390/computers9030058
DOI
|
26 |
Kapalova, N., Khompysh, A., Arici, M. and Algazy, K. "A block encryption algorithm based on exponentiation transform", Cogent Engineering, Vol.7 No.1, pp.1788292, 2020. https://doi.org/10.1080/23311916.2020.1788292
DOI
|
27 |
Boukerche, A., Zheng, L. and Alfandi, O. "Outlier detection: Methods, models, and classification", ACM Computing Surveys (CSUR), Vol.53, No.3, pp.1-37, 2020. https://doi.org/10.1145/3381028
DOI
|
28 |
Angelin, B. and Geethe, A., "Outlier Detection using Clustering Techniques-K-means and K-median", In 2020 4th International Conference on Intelligent Computing and Control Systems, pp.373-378, 2020. https://doi.org/10.1109/ICICCS48265.2020.9120990
DOI
|
29 |
Anaya, E., Patel, J., Shah, P., Shah, V. and Cheng, Y. "A Performance Study on Cryptographic Algorithms for IoT Devices", In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp.159-161. 2020. https://doi.org/10.1145/3374664.3379531
DOI
|
30 |
Mo, Y. and Sinopoli, B. "False data injection attacks in control systems", In Preprints of the 1st workshop on Secure Control Systems, pp.1-6, 2010. https://ptolemy.berkeley.edu/projects/truststc/conferenc es/10/CPSWeek/papers/scs1_paper_7.pdf
|