Match!
IEEE Transactions on Big Data
Papers
352
Papers 339
1 page of 34 pages (339 results)
Newest
#1Deepak Puthal (UTS: University of Technology, Sydney)H-Index: 17
#2Xindong Wu (University of Louisiana at Lafayette)H-Index: 51
Last.Jinjun Chen (Swinburne University of Technology)H-Index: 38
view all 5 authors...
Resource constrained sensing devices are being used widely to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems. Many such devices sense the deployed environment and generate a variety of data and send them to the server for analysis as data streams. A Data Stream Manager (DSM) at the server collects the data streams (often called big data) to perform real time ...
#1Arezou Soltani Panah (RMIT: RMIT University)H-Index: 4
#2Ali Yavari (RMIT: RMIT University)H-Index: 3
Last.Xun Yi (RMIT: RMIT University)H-Index: 25
view all 5 authors...
The Internet of Things (IoT) represents a technology revolution transforming the current environment into a ubiquitous world, whereby everything that benefits from being connected will be connected. Despite the benefits, the privacy of these things becomes a great concern and therefore it is imperative to apply privacy preservation techniques to IoT data collection. One such technique is called data obfuscation in which data is deliberately modified to blur the sensitive information, while prese...
#1Zheng Yan (Xidian University)H-Index: 22
#2Lifang Zhang (Aalto University)H-Index: 3
Last.Qinghua Zheng (Xi'an Jiaotong University)H-Index: 24
view all 4 authors...
Cloud storage as one of the most important services of cloud computing helps cloud users break the bottleneck of restricted resources and expand their storage without upgrading their devices. In order to guarantee the security and privacy of cloud users, data are always outsourced in an encrypted form. However, encrypted data could incur much waste of cloud storage and complicate data sharing among authorized users. We are still facing challenges on encrypted data storage and management with ded...
#1MingJian Tang (UNSW: University of New South Wales)H-Index: 2
#2Mamoun Alazab (ANU: Australian National University)H-Index: 12
Last.Yuxiu Luo (IBM)H-Index: 2
view all 3 authors...
Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised attacks will increasingly be crafted to exploit vulnerabilities and weaknesses. With the ever-increasing trend of cybercrime and incidents due to these vulnerabilities, effective vulnerability management is imperative for modern organisations regardless of their size. However, organisations struggle to manage the sheer volume of vulnerabilit...
#1Jemal H. Abawajy (Deakin University)H-Index: 29
#2Andrei V. Kelarev (Deakin University)H-Index: 23
Malicious software (malware) pose serious challenges for security of big data. The number and complexity of malware targeting Android devices have been exponentially increasing with the ever growing popularity of Android devices. To address this problem, multi-classifier fusion systems have long been used to increase the accuracy of malware detection for personal computers. However, previously developed systems are quite large and they cannot be transferred to Android platform. To this end, we p...
#1Xiaofeng Ding (HUST: Huazhong University of Science and Technology)H-Index: 1
#2Li Wang (HUST: Huazhong University of Science and Technology)H-Index: 1
Last.Hai Jin (HUST: Huazhong University of Science and Technology)H-Index: 49
view all 4 authors...
Many data owners are required to release the data in a variety of real world application, since it is of vital importance to discovery valuable information stay behind the data. However, existing re-identification attacks on the AOL and ADULTS datasets have shown that publish such data directly may cause tremendous threads to the individual privacy. Thus, it is urgent to resolve all kinds of re-identification risks by recommending effective de-identification policies to guarantee both privacy an...
#1Kim-Kwang Raymond Choo (UTSA: University of Texas at San Antonio)H-Index: 46
#2Mauro Conti (UNIPD: University of Padua)H-Index: 36
Last.Ali Dehghantanha (U of G: University of Guelph)H-Index: 22
view all 3 authors...
The papers in this special section examine Big Data applications in cyber security and threat intelligence. This last decade has witnessed a tremendous rapid increase in volume, veracity, velocity and variety of data generated by different cyber security solutions and as part of cyber investigation cases. When a significant amount of data is collected from or generated by different devices and sources, intelligent big-data analytical techniques are necessary to mine, interpret and visualize such...
#1Abdelrahman AlMahmoud (Khalifa University)H-Index: 2
#2Ernesto Damiani (Khalifa University)H-Index: 41
Last.Yousof Al-Hammadi (Khalifa University)H-Index: 10
view all 4 authors...
Spam has become the platform of choice used by cyber-criminals to spread malicious payloads such as viruses and trojans. In this paper, we consider the problem of early detection of spam campaigns. Collaborative spam detection techniques can deal with large scale e-mail data contributed by multiple sources; however, they have the well-known problem of requiring disclosure of e-mail content. Distance-preserving hashes are one of the common solutions used for preserving the privacy of e-mail conte...
#1Waqas Haider (UNSW: University of New South Wales)H-Index: 7
#2Jian-KunHu (UNSW: University of New South Wales)H-Index: 40
Last.Qianhong Wu (Beihang University)H-Index: 17
view all 5 authors...
Anomaly detection for cloud servers is important for detecting zero-day attacks. However, it is very challenging due to the large amount of accumulated data. In this paper, a new mathematical model for modeling dynamic usage behavior and detecting anomalies is proposed. It is constructed using state summarization and a novel nested-arc hidden semi-Markov model (NAHSMM). State summarization is designed to extract usage behavior reflective states from a raw sequence. The NAHSMM is comprised of ext...
#1Weixian Liao (Case Western Reserve University)H-Index: 6
#2Changqing Luo (Case Western Reserve University)H-Index: 15
Last.Pan Li (Case Western Reserve University)H-Index: 28
view all 4 authors...
Big data has become a key basis of innovation and intelligence, potentially making our lives more convenient and bringing new opportunities to the modern society. Towards this goal, a critical underlying task is to solve a series of large-scale fundamental problems. Conducting such large-scale data analytics in a timely manner requires a large amount of computing resources, which may not be available for individuals and small companies in practice. By outsourcing their computations to the cloud,...
12345678910