Cybersecurity for Cyber-Enabled Multimedia Applications

نویسندگان

  • Qun Jin
  • Yong Xiang
  • Guozi Sun
  • Yao Liu
  • Chin-Chen Chang
چکیده

Chin-Chen Chang Feng Chia University, Taiwan W ith the rapid popularity of social network applications and advanced digital devices, we have witnessed the explosive growth of multimedia big data in terms of both scale and variety over the last few years. A large amount of multimedia data has been produced from different platforms, applications, and environments, including from social networking services, surveillance systems, Internet of Things (IoT) remote sensing, and entertainment applications. Such increases in multimedia big data are influencing communication through seamless network connections, enhanced user experiences, and free information sharing. At the same time, security issues related to such multimedia big data have arisen.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics

Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber sec...

متن کامل

National Cyber Security Strategies: Global Trends in Cyberspace

Nations must define priorities, objectives, goals and scope when formulating a national strategy that covers cyberspace, cybersecurity, stakeholder engagement, capacity building, cyber governance, cybercrime and cyber defense. The goal of this article is to propose a National Cybersecurity Strategy Model (NCSSM) based on key pillars in order to tackle the completion of all the requirements in a...

متن کامل

Cybersecurity Practices for E-Government: An Assessment in Bhutan

The main goal of e-government implementation is to improve the effectiveness, efficiency and quality of public service delivery using Information and Communication Technologies (ICT). However, its success is dependent on the provision of information security goals such as confidentiality, integrity, availability and trust. Therefore, cybersecurity is vital for the successful adoption of e-gover...

متن کامل

Towards a Human Factors Ontology for Cyber Security

Traditional cybersecurity risk assessment is reactive and based on business risk assessment approach. The 2014 NIST Cybersecurity Framework provides businesses with an organizational tool to catalog cybersecurity efforts and areas that need additional support. As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human fact...

متن کامل

Cyber Responsibility to Protect: Legal Obligations of States Directly Affected by Cyber-Incidents

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481 R I. Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484 R II. Imposing Legal Responsibility on Directly Affected States . 491 R III. Responsibility of DAS Before, During, and After Cybersecurity Incidents . . . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE MultiMedia

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2017