PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Introduction to Big Data Management Based on Agent Oriented Cyber Security

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper deals with information security and safety issues in public open spaces. Public open spaces include high streets, street markets, shopping centers, community gardens, parks, and playgrounds, each of which plays a vital role in the social, cultural and economic life of a community. Those outdoor public places are mashed up with various ICT tools, such as video surveillance, smartphone apps, Internet of Things (IoT) technologies, and biometric big data (called Cyber Parks). Security and safety in public places may include video surveillance of movement and the securing of personalized information and location-based services. The article introduces technologies used in Cyber Parks to achieve information security in big data era.
Słowa kluczowe
Rocznik
Tom
Strony
65--70
Opis fizyczny
Bibliogr. 15 poz., rys.
Twórcy
autor
  • Computer Science Department Al Qasmi Academic College Baqa Al Gharbiah, Israel
Bibliografia
  • [1] D. Che, M. Safran, and Z. Peng, “From big data to big data mining: challenges, issues, and opportunities”, in Database Systems for Advanced Applications, Berlin: Springer, 2013, pp. 1–15.
  • [2] S. Madden, “From databases to big data”, IEEE Internet Comput., vol. 16, no. 3, pp. 4–6, 2012 (doi: 10.1109/MIC.2012.50).
  • [3] K. Michael and K. W. Miller, “Big data: new opportunities and new challenges”, Computer, vol. 46, no. 6, pp. 22–24, 2013 (doi: 10.1109/MC.2013.196).
  • [4] J. Raiyn, “Using cognitive radio scheme for big data traffic management in cellular systems”, Int. J. of Inform. Technol. & Manag., vol. 14, no. 2-3, 2015.
  • [5] J. Raiyn, “Toward developing real-time online course based interactive technology tools”, Adv. in Internet of Things, vol. 4, no. 3, pp. 13–19, 2014 (doi: 10.4236/ait.2014.43003).
  • [6] J. Raiyn, “A Survey of cyber attack detection strategies”, Int. J. of Secur. & Its Appl., vol. 8, no. 1, pp. 247–256, 2014.
  • [7] C. A. Steed et al., “Big data visual analytics for exploratory earth system simulation analysis”, Computers & Geosciences, vol. 61, pp. 71–82, 2013 (doi: 10.1016/j.cageo.2013.07.025).
  • [8] N. Khan, I. Yaqoob, I. A. T. Hashem, Z. Inayat, W. K. M. Ali, M. Shiraz, and A. Gani, “Big data: Survey, technologies, opportunities, and challenges”, Scientif. World J., pp. 1–18, 2014 (doi: 10.1155/2014/712826).
  • [9] J. Raiyn, “Information security and safety in Cyberpark”, Global J. of Adv. Engin., vol. 2, no. 8, pp. 73–78, 2015.
  • [10] J. Raiyn, “Modern information and communication technology and their application in Cyberpark”, J. of Multidiscip. Sci. & Technol., vol. 2, no. 8, pp. 2178-2183, 2015.
  • [11] M. Wooldridge and N. R. Jennings, “Intelligent agents: Theory and practice”, The Knowl. Engin. Rev., vol. 10, no. 2, pp. 115–152, 1995.
  • [12] S. Russel and P. Norvig, Artificial Intelligence: A Modern Approach, Englewood Cliffs, NJ: Prentice Hall, 1995.
  • [13] M. Luck, V. Marik, O. Stepankova and R. Trappl, Eds., MultiAgent Systems and Applications. 9th ECCAI Advanced Course ACAI 2001 and Agent Link’s 3rd European Agent Systems Summer School, EASSS 2001, Prague, Czech Republic, July 2-13, 2001. Selected Tutorial Papers, LNAI, vol. 2086. Springer, 2001.
  • [14] T. Springer, T. Ziegert, and A. Schill, “Mobile agents as an enabling technology for mobile computing applications”, Kuenstliche Intelligenz, vol. 14, no. 4, pp. 55–61, 2000.
  • [15] Z. Lin and K. Carley, “Proactive or reactive: An analysis of the effect of agent style on organization decision-making performance”, Intell. System in Account. Finance and Manag., vol. 2, no. 4, pp. 271–287, 1993.
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-5a9279e1-0efe-445b-b312-db84617e80d4
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.