Cybersecurity for Cyber-Enabled Multimedia Applications

被引:3
|
作者
Jin, Qun [1 ]
Xiang, Yong [2 ]
Sun, Guozi [3 ]
Liu, Yao [4 ]
Chang, Chin-Chen [5 ]
机构
[1] Waseda Univ, Fac Human Sci, Dept Human Informat & Cognit Sci, Tokyo, Japan
[2] Deakin Univ, Sch Informat Technol, Artificial Intelligence & Data Analyt Res Cluster, Geelong, Vic, Australia
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[4] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
[5] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
关键词
big data; cyber technology; cybersecurity; data analysis; mobile; multimedia; security;
D O I
10.1109/MMUL.2017.4031321
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid popularity of social network applications and advanced digital devices, we have witnessed the explosive growth of multimedia big data in terms of both scale and variety over the last few years. Yet at the same time, security issues related to multimedia big data have arisen. An urgent demand has emerged for novel technologies that deal with copyright protection, multimedia forgery detection, and cybersecurity - especially for cyber-enabled multimedia applications. This special issue brings together research efforts in cybersecurity for cyber-enabled multimedia applications. © 1994-2012 IEEE.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 50 条
  • [1] Cyber-enabled chemistry
    Ellis, AB
    Kim, S
    CHEMICAL & ENGINEERING NEWS, 2005, 83 (11) : 3 - 3
  • [2] 'Cyber-enabled' chemistry
    Morrissey, SR
    CHEMICAL & ENGINEERING NEWS, 2005, 83 (42) : 28 - 30
  • [3] Building Multimedia Artifacts Using a Cyber-enabled Video Repository: The VMCAnalytic
    Hmelo-Silver, Cindy E.
    Maher, Carolyn A.
    Palius, Marjory F.
    Sigley, Robert
    Alston, Alice
    Agnew, Grace
    Mills, Chad
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3078 - 3087
  • [4] Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications
    Zhou, Xiaokang
    Zomaya, Albert Y.
    Li, Weimin
    Ruchkin, Ivan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 350 - 353
  • [5] Scalable platforms and advanced algorithms for loT and cyber-enabled applications
    Zhou, Xiaokang
    Xu, Guangquan
    Ma, Jianhua
    Ruchkin, Ivan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 118 : 1 - 4
  • [6] Managing Cyber Security Risks of the Cyber-Enabled Ship
    Kavallieratos, Georgios
    Katsikas, Sokratis
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2020, 8 (10) : 1 - 19
  • [7] Stuxnet as Cyber-Enabled Sanctions Enforcement
    Yannakogeorgos, Panayotis A.
    Tikk, Eneken
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 160 - 165
  • [8] Cyber-Enabled Collaborative Design Studio
    Muramoto, Katsuhiko
    Jemtrud, Michael
    Kumar, Sonali
    Balakrishnan, Bimal
    Wiley, Danielle
    INTERNATIONAL JOURNAL OF ARCHITECTURAL COMPUTING, 2009, 7 (02) : 268 - 288
  • [9] Cyber-enabled Traditional Chinese Medicine
    Chen, Yujia
    Peng, Yifeng
    Wang, Leiqi
    Zhang, Yuanyu
    Zhu, Tao
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 449 - 450
  • [10] Cyber-enabled burglary of smart homes
    Hodges, Duncan
    COMPUTERS & SECURITY, 2021, 110