Evolutionary Computing Environments: Implementing Security Risks Management and Benchmarking

作者: Vinita Malik , Sukhdip Singh

DOI: 10.1016/J.PROCS.2020.03.430

关键词:

摘要: Abstract This research makes a focus on evolutionary computing environments i.e. Pervasive, Internet of Things, Artificially Intelligent (AI) and Big Data risks management. The contribution paper lies in identifying, managing advanced paradigms, mitigating security benchmarking smart softwares. As the privacy big volume data is heated discussion these days due to several vulnerabilities posed by its pervasive nature so has implemented mitigation projects. In addition, software done with help an intelligent tool for detecting application frameworks vulnerabilities. scanned, quantifies severity levels provide possible solutions. also collects metrices benchmark it against technology, business drivers properties improve quantitative Performance software. puts analytical foundation various management concepts AI, Things Data.

参考文章(46)
B Saraladevi, N Pazhaniraja, P Victer Paul, MS Saleem Basha, P Dhavachelvan, None, Big Data and Hadoop-a Study in Security Perspective Procedia Computer Science. ,vol. 50, pp. 596- 601 ,(2015) , 10.1016/J.PROCS.2015.04.091
Hongbing Cheng, Chunming Rong, Kai Hwang, Weihong Wang, Yanyan Li, Secure big data storage and sharing scheme for cloud tenants China Communications. ,vol. 12, pp. 106- 115 ,(2015) , 10.1109/CC.2015.7122469
Thomas Lederm, Nathan L. Clarke, Risk assessment for mobile devices trust and privacy in digital business. pp. 210- 221 ,(2011) , 10.1007/978-3-642-22890-2_18
D.M. Rodvold, A software development process model for artificial neural networks in critical applications international joint conference on neural network. ,vol. 5, pp. 3317- 3322 ,(1999) , 10.1109/IJCNN.1999.836192
Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang, Hadoop eco system for big data security and privacy long island systems, applications and technology conference. pp. 1- 6 ,(2015) , 10.1109/LISAT.2015.7160211
Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad, Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges Recent Trends in Network Security and Applications. ,vol. 89, pp. 430- 439 ,(2010) , 10.1007/978-3-642-14478-3_43
Samuel Marchal, Xiuyan Jiang, Radu State, Thomas Engel, A Big Data Architecture for Large Scale Security Monitoring international congress on big data. pp. 56- 63 ,(2014) , 10.1109/BIGDATA.CONGRESS.2014.18
Cristiano Andre da Costa, Adenauer Correa Yamin, Claudio Fernando Resin Geyer, Toward a General Software Infrastructure for Ubiquitous Computing IEEE Pervasive Computing. ,vol. 7, pp. 64- 73 ,(2008) , 10.1109/MPRV.2008.21
J.W. Balde, Workshop Report Computer Packaging Computer. ,vol. 9, pp. 51- 52 ,(1976) , 10.1109/C-M.1976.218411
Wen-Tao Guo, Van-Nam Huynh, Yoshiteru Nakamori, A proportional 3-tuple fuzzy linguistic representation model for screening new product projects Journal of Systems Science and Systems Engineering. ,vol. 25, pp. 1- 22 ,(2016) , 10.1007/S11518-015-5269-X