This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
L. Janczewski and A. Colarik, Managerial guide for handling cyber-terrorism and information warfare. Idea Group Publishing, 2005. [Online]. Available: http://books.google.com/books?id=vnjfMHWdKHQC10.4018/978-1-59140-583-2Search in Google Scholar
T. Holt and B. Schell, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Igi Global, 2010. [Online]. Available: http://books.google.com/books?id=LAIjG_OGuIMC10.4018/978-1-61692-805-6Search in Google Scholar
D. Mortimer, “Homeland security public safety dive teams: how technology can help,” in OCEANS, 2005. Proceedings of MTS/IEEE, 2005, pp. 178 – 183 Vol. 1.Search in Google Scholar
A. Koyuncugil and N. Ozgulbas, Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection, ser. Premier Reference Source. Igi Global, 2010. [Online]. Available: http://books.google.com/books?id=l4Ir1nvyURIC10.4018/978-1-61692-865-0Search in Google Scholar
C. Reddick, Homeland security preparedness and information systems: strategies for managing public policy. Information Science Reference, 2010. [Online]. Available: http://books.google.com/books?id=NaT_Fob6lBIC10.4018/978-1-60566-834-5.ch001Search in Google Scholar
Warner Bros. Likes Facebook Rentals. http://online.wsj.com/article/SB10001424052748703386704576186913491751144.html.Search in Google Scholar
July 2011, Sensor Web Enablement. Available: http://www.opengeospatial.org/standards.Search in Google Scholar
M. Ortner, A. Nehorai, and A. Jeremic, “Biochemical transport modeling and bayesian source estimation in realistic environments,” Signal Processing, IEEE Transactions on, vol. 55, no. 6, pp. 2520 –2532, june 2007.Search in Google Scholar
2004-2006, MITRA: Monitoring and intervention for the transportation of dangerous goods. http://www.mitraproject.info/.Search in Google Scholar
F. Valente, G. Zacheo, P. Losito, andP. Camarda, “A telecommunications framework for real-time monitoring of dangerous goods transport,” in Intelligent Transport Systems Telecommunications,(ITST),2009 9th International Conference on, October 2009, pp. 13 –18.10.1109/ITST.2009.5399390Search in Google Scholar
Z. Yingjun, X. Shengwei, X. Peng, and W. Xinquan, “Shipping containers of dangerous goods condition monitoring system based on wireless sensor network,” in Networked Computing (INC), 2010 6th International Conference on, may 2010, pp. 1 –3.Search in Google Scholar
I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared,” in Grid Computing Environments Workshop, 2008. GCE ‘08, 2008, pp. 1–10.10.1109/GCE.2008.4738445Search in Google Scholar
NIST Cloud Computing Reference Architecture http://www.mstgov/customcf/get_pdf.cfm?pub_id=909505 December 2011.Search in Google Scholar
F. Tusa, M. Paone, M. Villari, and A. Puliafito., “CLEVER: A CLoud-Enabled Virtual EnviRonment,” in 15th IEEE Symposium on Computers and CommunicationsS Computing and Communications, 2010. ISCC ‘10. Riccione, June 2010.10.1109/ISCC.2010.5546555Search in Google Scholar
S. Pandey, W. Voorsluys, S. Niu, A. Khandoker, and R. Buyya, “An autonomic cloud environment for hosting ecg data analysis services,” Future Generation Computer Systems, vol. 55, no. 6, June 2011.Search in Google Scholar
S. Alam, M. Chowdhury, and J. Noll, “Senaas: An event-driven sensor virtualization approach for internet of things cloud,” in Networked Embedded Systems for Enterprise Applications (NESEA), 2010 IEEE International Conference on, nov. 2010, pp. 1 –6.10.1109/NESEA.2010.5678060Search in Google Scholar
V. Rajesh, J. Gnanasekar, R. Ponmagal, and P. Anbalagan, “Integration of wireless sensor network with cloud,” in Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on, march 2010, pp. 321 –323.10.1109/ITC.2010.88Search in Google Scholar
S. Rusitschka, K. Eger, and C. Gerdes, “Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain,” in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, oct. 2010, pp. 483 –488.10.1109/SMARTGRID.2010.5622089Search in Google Scholar
K. Egami, S. Matsumoto, and M. Nakamura, “Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing,” in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, march 2011, pp. 123 –128.10.1109/PERCOMW.2011.5766853Search in Google Scholar
M. Yuriyama and T. Kushida, “Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing,” in Network-Based Information Systems (NBiS), 2010 13th International Conference on, sept. 2010, pp. 1 –8.10.1109/NBiS.2010.32Search in Google Scholar
The Extensible Messaging and Presence Protocol (XMPP) protocol: http://tools.ietf.org/html/rfc3920.Search in Google Scholar
Ejabberd, the Erlang Jabber/XMPP daemon, http://www.ejabberd.im/ December 2011.Search in Google Scholar
Sedna, Native XML Database System: http://modis.ispras.ru/sedna/ December 2011.Search in Google Scholar
The Apache Cassandra Project develops a highly scalable second-generation distributed database http://cassandra.apache.org/.Search in Google Scholar
A. Kerrouche, J. Leighton, W. Boyle, Y. Gebremichael, T. Sun, K. Grattan, and B. Taljsten, “Strain measurement on a rail bridge loaded to failure using a fiber bragg grating-based distributed sensor system,” Sensors Journal, IEEE, vol. 8, no. 12, pp. 2059 –2065, dec. 2008.Search in Google Scholar
Q. Li, T. Zhang, and Y. Yu, “Using cloud computing to process intensive floating car data for urban traffic surveillance,” Int. J. Geogr. Inf. Sci., vol. 25, pp. 1303–1322, August 2011. [Online]. Available: http://dx.doi.org/10.1080/13658816.2011.57774610.1080/13658816.2011.577746Search in Google Scholar
N. Sahli, N. Jabeur, and M. Badra, “Agent-based approach to plan sensors relocation in a virtual geographic environment,” in New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, feb. 2011, pp. 1 –5.10.1109/NTMS.2011.5721149Search in Google Scholar
C.-T. Yang, L.-T. Chen, W.-L. Chou, and K.-C. Wang, “Implementation of a medical image file accessing system on cloud computing,” in Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on, dec. 2010, pp. 321 –326.10.1109/CSE.2010.48Search in Google Scholar
J. Wang, B. Huang, A. Huang, and M. D. Goldberg, “Parallel computation of the weather research and forecast (wrf) wdm5 cloud microphysics on a many-core gpu,” in Parallel and Distributed Systems (ICPADS), 2011 IEEE 17th International Conference on, dec. 2011, pp. 1032 –1037.10.1109/ICPADS.2011.160Search in Google Scholar
M. Saini, W. Xiangyu, P. Atrey, and M. Kankanhalli, “Dynamic workload assignment in video surveillance systems,” in Multimedia and Expo (ICME), 2011 IEEE International Conference on, july 2011, pp. 1 –6.10.1109/ICME.2011.6012076Search in Google Scholar
C. Reed, M. Botts, J. Davidson, and G. Percivall, “OGC Sensor Web Enablement: Overview and High Level Architecture,” IEEE Autotestcon, pp. 372–380, 2007.10.1109/AUTEST.2007.4374243Search in Google Scholar
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, “How to Enhance Cloud Architectures to Enable Cross-Federation,” in IEEE 3rd International Conference on Cloud Computing (CLOUD’10), Miami, FL, 5-10 July 2010, pp. 337 –345.10.1109/CLOUD.2010.46Search in Google Scholar
A. Dunkels, B. Grnvall, and T. Voigt, “Contiki - a lightweight and flexible operating system for tiny networked sensors,” in Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN ‘04), 2004.Search in Google Scholar