Skip to main content
Erschienen in: World Wide Web 2/2020

03.01.2020

Smart computing and cyber technology for cyberization

verfasst von: Xiaokang Zhou, Flavia C. Delicato, Kevin I-Kai Wang, Runhe Huang

Erschienen in: World Wide Web | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

Following the well-known concepts of computerization and informatization, an emerging era of cyberization, which is considered as a reformation of the present physical, social and mental worlds, has become a hotly discussed trend in the new cyber world. Cyberization refers to using communication and computer technologies to interconnect computers and various electronic terminal devices distributed in different locations. It allows users to share software, hardware and data resources according to certain network protocols. Cyberization has greatly improved the practical utility of computers and has been widely applied in transportation, finance, business management, education, telecommunications, commerce, and so on in our daily life [1]. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Derhamy, H., Eliasson, J., Delsing, J.: IoT interoperability—on-demand and low latency transparent multiprotocol translator. IEEE Internet Things J. 4(5), 1754–1763 (2017)CrossRef Derhamy, H., Eliasson, J., Delsing, J.: IoT interoperability—on-demand and low latency transparent multiprotocol translator. IEEE Internet Things J. 4(5), 1754–1763 (2017)CrossRef
5.
Zurück zum Zitat Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)CrossRef Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)CrossRef
6.
Zurück zum Zitat M. Al-Rakhami, M. Alsahli, M. M. Hassan, A. Alamri, A. Guerrieri and G. Fortino, "Cost Efficient Edge Intelligence Framework Using Docker Containers," 2018 IEEE 16th Intl Conf on dependable, autonomic and secure computing, 16th Intl Conf on pervasive intelligence and computing, 4th Intl Conf on big data intelligence and computing and cyber science and technology congress, Athens, 2018, pp. 800–807. doi: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00138 M. Al-Rakhami, M. Alsahli, M. M. Hassan, A. Alamri, A. Guerrieri and G. Fortino, "Cost Efficient Edge Intelligence Framework Using Docker Containers," 2018 IEEE 16th Intl Conf on dependable, autonomic and secure computing, 16th Intl Conf on pervasive intelligence and computing, 4th Intl Conf on big data intelligence and computing and cyber science and technology congress, Athens, 2018, pp. 800–807. doi: https://​doi.​org/​10.​1109/​DASC/​PiCom/​DataCom/​CyberSciTec.​2018.​00138
8.
Zurück zum Zitat Chun Zhao, Lei Ren, Ziqiao Zhang, and Zihao Meng, “Master Data Management for Manufacturing Big Data: A Method of Evaluation for Data Network,” World Wide Web (2019) Chun Zhao, Lei Ren, Ziqiao Zhang, and Zihao Meng, “Master Data Management for Manufacturing Big Data: A Method of Evaluation for Data Network,” World Wide Web (2019)
10.
Zurück zum Zitat Raza, U., Camerra, A., Murphy, A.L., Palpanas, T., Picco, G.P.: Practical data prediction for real-world wireless sensor networks. IEEE Transactions on Knowledge and Data Engineering. 27(8), 2231–2244 (2015)CrossRef Raza, U., Camerra, A., Murphy, A.L., Palpanas, T., Picco, G.P.: Practical data prediction for real-world wireless sensor networks. IEEE Transactions on Knowledge and Data Engineering. 27(8), 2231–2244 (2015)CrossRef
11.
Zurück zum Zitat Tan, L., Wu, M.: Data reduction in wireless sensor networks: A hierarchical lms prediction approach. IEEE Sensors Journal. 16(6), 1708–1715 (2016)CrossRef Tan, L., Wu, M.: Data reduction in wireless sensor networks: A hierarchical lms prediction approach. IEEE Sensors Journal. 16(6), 1708–1715 (2016)CrossRef
12.
Zurück zum Zitat Wu, M., Tan, L., Xiong, N.: Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications. Information Sciences. 329(Supplement C), 800–818 (2016)CrossRef Wu, M., Tan, L., Xiong, N.: Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications. Information Sciences. 329(Supplement C), 800–818 (2016)CrossRef
13.
Zurück zum Zitat Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques Bahi. Fault Tolerant Data Transmission Reduction Technique in Wireless Sensor Networks. World Wide Web (2019) Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques Bahi. Fault Tolerant Data Transmission Reduction Technique in Wireless Sensor Networks. World Wide Web (2019)
14.
Zurück zum Zitat Tayeh, G.B., Makhoul, A., Demerjian, J., Laiymani, D.: A new autonomous data transmission reduction method for wireless sensors networks. In: 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1{6 (2018) Tayeh, G.B., Makhoul, A., Demerjian, J., Laiymani, D.: A new autonomous data transmission reduction method for wireless sensors networks. In: 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1{6 (2018)
15.
Zurück zum Zitat Li, J., McCann, J., Pollard, N., Faloutsos, C.: Dynammo: Mining and summarization of coevolving sequences with missing values. ACM SIGKDD, June/July 2009, pp 527{ 534 (CMU-RI-TR-) (2009) Li, J., McCann, J., Pollard, N., Faloutsos, C.: Dynammo: Mining and summarization of coevolving sequences with missing values. ACM SIGKDD, June/July 2009, pp 527{ 534 (CMU-RI-TR-) (2009)
16.
Zurück zum Zitat Sabri Allani, Taoufik Yeferny, Richard Chbeir, Sadok Ben Yahia. Towards a Smarter Directional Data Aggregation in VANETs. World Wide Web (2019) Sabri Allani, Taoufik Yeferny, Richard Chbeir, Sadok Ben Yahia. Towards a Smarter Directional Data Aggregation in VANETs. World Wide Web (2019)
17.
Zurück zum Zitat Reekie, L., Chow, Y.T., Dakin, J.P.: Optical in-fibre grating high pressure sensor. Electron. Lett. 29(4), 398–399 (1993)CrossRef Reekie, L., Chow, Y.T., Dakin, J.P.: Optical in-fibre grating high pressure sensor. Electron. Lett. 29(4), 398–399 (1993)CrossRef
18.
Zurück zum Zitat H. T. Nguyen, “State-of-the-art in mac protocols for underwater acoustics sensor networks,” in Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17–20, 2007, Proceedings, 2007, pp. 482–493 H. T. Nguyen, “State-of-the-art in mac protocols for underwater acoustics sensor networks,” in Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17–20, 2007, Proceedings, 2007, pp. 482–493
19.
Zurück zum Zitat P. K. Dutta, A. K. Arora, and S. B. Bibyk, “Towards radar-enabled sensor networks,” in International Conference on Information Processing in Sensor Networks, 2006, pp. 467–474 P. K. Dutta, A. K. Arora, and S. B. Bibyk, “Towards radar-enabled sensor networks,” in International Conference on Information Processing in Sensor Networks, 2006, pp. 467–474
20.
Zurück zum Zitat X. Gong, J. Zhang, and D. Cochran, “When target motion matters: Doppler coverage in radar sensor networks,” in IEEE INFOCOM, 2013, pp. 1169–1177 X. Gong, J. Zhang, and D. Cochran, “When target motion matters: Doppler coverage in radar sensor networks,” in IEEE INFOCOM, 2013, pp. 1169–1177
21.
Zurück zum Zitat Xianghua Xu, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, and Jinjun Chen, “Optimal Placement of Barrier Coverage in Heterogeneous Bistatic Radar Sensor Networks,” World Wide Web (2019) Xianghua Xu, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, and Jinjun Chen, “Optimal Placement of Barrier Coverage in Heterogeneous Bistatic Radar Sensor Networks,” World Wide Web (2019)
22.
Zurück zum Zitat Tong Wang, Yunfeng Wang, Xibo Wang, and Yue Cao, “A Detailed Review of D2D Cache in Helper Selection,” World Wide Web (2019) Tong Wang, Yunfeng Wang, Xibo Wang, and Yue Cao, “A Detailed Review of D2D Cache in Helper Selection,” World Wide Web (2019)
23.
Zurück zum Zitat Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, and Tao Chi, “ICFR: An Effective Incremental Collaborative Filtering based Recommendation Architecture for Personalized Websites,” World Wide Web (2019) Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, and Tao Chi, “ICFR: An Effective Incremental Collaborative Filtering based Recommendation Architecture for Personalized Websites,” World Wide Web (2019)
24.
Zurück zum Zitat Bin Guo, Huihui Chen, Yan Liu, Chao Chen, Qi Han, and Zhiwen Yu, “From Crowdsourcing to Crowdmining: Using Implicit Human Intelligence for Better Understanding of Crowdsourced Data,” World Wide Web (2019) Bin Guo, Huihui Chen, Yan Liu, Chao Chen, Qi Han, and Zhiwen Yu, “From Crowdsourcing to Crowdmining: Using Implicit Human Intelligence for Better Understanding of Crowdsourced Data,” World Wide Web (2019)
25.
Zurück zum Zitat Xiangjie Kong, Feng Xia, Zhenhuan Fu, Xiaoran Yan, Amr Tolba, and Zafer Almakhadmeh, “TBI2Flow: Travel Behavioral Inertia Based Long-Term Taxi Passenger Flow Prediction,” World Wide Web (2019) Xiangjie Kong, Feng Xia, Zhenhuan Fu, Xiaoran Yan, Amr Tolba, and Zafer Almakhadmeh, “TBI2Flow: Travel Behavioral Inertia Based Long-Term Taxi Passenger Flow Prediction,” World Wide Web (2019)
26.
Zurück zum Zitat Weimin Li, Yuting Fan, Jun Mo, Wei Liu, Can, Wang, Minjun Xin, and Qun Jin, “Three-hop Velocity Attenuation Propagation Model for Influence Maximization in Social Networks” Weimin Li, Yuting Fan, Jun Mo, Wei Liu, Can, Wang, Minjun Xin, and Qun Jin, “Three-hop Velocity Attenuation Propagation Model for Influence Maximization in Social Networks”
27.
Zurück zum Zitat Weifeng Wang, Bing Lou, Xiong Li, Xizhong Lou, Ning Jin, and Ke Yan, “Intelligent Maintenance Frameworks of Large-scale Grid using Genetic Algorithm and K-Mediods Clustering Methods,” World Wide Web (2019) Weifeng Wang, Bing Lou, Xiong Li, Xizhong Lou, Ning Jin, and Ke Yan, “Intelligent Maintenance Frameworks of Large-scale Grid using Genetic Algorithm and K-Mediods Clustering Methods,” World Wide Web (2019)
28.
Zurück zum Zitat Sidra Aleem, Po Yang, Saleha Masood, Ping Li, and Bin Sheng, “An Accurate Multi-Modal Biometric Identification System for Person Identification via Fusion of Face and Finger Print,” World Wide Web (2019) Sidra Aleem, Po Yang, Saleha Masood, Ping Li, and Bin Sheng, “An Accurate Multi-Modal Biometric Identification System for Person Identification via Fusion of Face and Finger Print,” World Wide Web (2019)
29.
Zurück zum Zitat Ao Guo, Jianhua Ma, Shunxiang Tan, and Guanqun Sun, “From Affect, Behavior, and Cognition to Personality: An Integrated Personal Character Model for Individual-like Intelligent Artifacts,” World Wide Web (2019) Ao Guo, Jianhua Ma, Shunxiang Tan, and Guanqun Sun, “From Affect, Behavior, and Cognition to Personality: An Integrated Personal Character Model for Individual-like Intelligent Artifacts,” World Wide Web (2019)
30.
Zurück zum Zitat Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Computers & Security. 87, 101573 (2019)CrossRef Nguyen-Vu, L., Ahn, J., Jung, S.: Android fragmentation in malware detection. Computers & Security. 87, 101573 (2019)CrossRef
31.
Zurück zum Zitat Cui, H., Zhou, Y., Wang, C., Li, Q., Ren, K.: Towards privacy-preserving malware detection systems for android. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp. 545{552. IEEE (2018) Cui, H., Zhou, Y., Wang, C., Li, Q., Ren, K.: Towards privacy-preserving malware detection systems for android. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp. 545{552. IEEE (2018)
32.
Zurück zum Zitat Darabian, H., Dehghantanha, A., Hashemi, S., Homayoun, S., Choo, K.K.R.: An opcode-based technique for polymorphic internet of things malware detection. Concurrency and Computation: Practice and Experience p.e5173 (2019) Darabian, H., Dehghantanha, A., Hashemi, S., Homayoun, S., Choo, K.K.R.: An opcode-based technique for polymorphic internet of things malware detection. Concurrency and Computation: Practice and Experience p.e5173 (2019)
34.
Zurück zum Zitat Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza Parizi, a Multiview Learning Method for Malware Threat Hunting: Windows, IoT and Android as Case Studies. World Wide Web (2019) Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza Parizi, a Multiview Learning Method for Malware Threat Hunting: Windows, IoT and Android as Case Studies. World Wide Web (2019)
35.
Zurück zum Zitat Prayudi, Y., Riadi, I., et al.: Implementation of malware analysis using static and dynamic analysis method. International Journal of Computer Applications 117(6) (2015) Prayudi, Y., Riadi, I., et al.: Implementation of malware analysis using static and dynamic analysis method. International Journal of Computer Applications 117(6) (2015)
36.
Zurück zum Zitat Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: Opem: A static-dynamic approach for machine-learning- based malware detection. In: International Joint Conference CISIS'12-ICEUTE 12-SOCO 12 Special Sessions, pp. 271{280. Springer (2013) Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: Opem: A static-dynamic approach for machine-learning- based malware detection. In: International Joint Conference CISIS'12-ICEUTE 12-SOCO 12 Special Sessions, pp. 271{280. Springer (2013)
37.
Zurück zum Zitat S. Bauer and D. Schreckling, "Data provenance in the internet of things," in Proceedings of 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018, pp.727–731 S. Bauer and D. Schreckling, "Data provenance in the internet of things," in Proceedings of 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018, pp.727–731
38.
Zurück zum Zitat Youliang Tian, Qiuxian Li, Jia Hu, and Hui Lin, “Secure Limitation Analysis of Public-key Cryptography for Smart Card Settings,” World Wide Web (2019) Youliang Tian, Qiuxian Li, Jia Hu, and Hui Lin, “Secure Limitation Analysis of Public-key Cryptography for Smart Card Settings,” World Wide Web (2019)
39.
Zurück zum Zitat Shijo, P., Salim, A.: Integrated static and dynamic analysis for malware detection. Procedia Computer Science. 46, 804–811 (2015)CrossRef Shijo, P., Salim, A.: Integrated static and dynamic analysis for malware detection. Procedia Computer Science. 46, 804–811 (2015)CrossRef
Metadaten
Titel
Smart computing and cyber technology for cyberization
verfasst von
Xiaokang Zhou
Flavia C. Delicato
Kevin I-Kai Wang
Runhe Huang
Publikationsdatum
03.01.2020
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 2/2020
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-019-00773-y

Weitere Artikel der Ausgabe 2/2020

World Wide Web 2/2020 Zur Ausgabe

Premium Partner