|
No. | Method | Year | Citation |
|
1 | Analytics big data and IoT in healthcare | 2019 | [1] |
2 | Clustering of data streams | 2018 | [2] |
3 | Industrial surveillance through fog-enabled IoT and big data | 2018 | [6] |
4 | SDN-based IIoT with edge computing | 2018 | [7] |
5 | Performance assessment of companies under IIoT architectures | 2018 | [11] |
6 | Data compression and prediction for IIoT | 2018 | [12] |
7 | Cloud of things based on linked data | 2018 | [13] |
8 | Depth estimation approach of light field imaging | 2018 | [14] |
9 | Location privacy protection for big data in IIoT | 2018 | [15] |
10 | Secure high-order CFS algorithm on clouds for IIoT | 2018 | [16] |
11 | Social big-data-based content dissemination in Internet of Vehicles | 2018 | [17] |
12 | FSO2 life extension program through IIoT and big data | 2019 | [18] |
13 | Outlier detection method towards big sensor data in IoT | 2019 | [19] |
14 | Data acquisition and storage system for designing industrial data | 2019 | [20] |
15 | Cybersecurity in an environment of IIoT | 2019 | [21] |
16 | Secure fabric blockchain-based data transmission for IIoT | 2019 | [22] |
17 | Concept drift detection and adaption in big IIoT data | 2019 | [23] |
18 | City geospatial dashboard | 2019 | [24] |
19 | IoT service platform for locally disseminating socially valuable data | 2019 | [25] |
20 | Spatiotemporal modelling and integration of manufacturing big data | 2020 | [26] |
21 | Data transmission scheme in industrial IoT | 2020 | [27] |
22 | Big data-enabled framework for energy efficient software-defined data centres in IoT | 2020 | [28] |
23 | Federated tensor mining for secure IIoT | 2020 | [29] |
24 | BIM big data storage in WebVRGIS | 2020 | [30] |
25 | Clustering big data in cognitive IIoT | 2020 | [31] |
26 | Big data cleaning based on mobile edge computing | 2020 | [32] |
27 | ADTT | 2020 | [32] |
28 | Big data driven edge-cloud collaboration architecture | 2020 | [33] |
29 | Dynamic data mining of sensor data | 2020 | [34] |
30 | Open ecosystem for future IIoT | 2020 | [35] |
31 | Deterministic virtualization in the IIoT | 2019 | [36] |
32 | IIoT based ransomware detection | 2019 | [37] |
33 | HCI and CSCW within industry settings | 2018 | [38] |
34 | Microservice architecture for the IIoT | 2018 | [39] |
35 | Intrusion detection for edge system in brownfield IIoT | 2019 | [40] |
36 | IIoT monitoring application | 2017 | [41] |
37 | Big data analytics tools and applications | 2019 | [42] |
38 | Precautions against security threats for computer networks in SMEs | 2017 | [43] |
39 | IIoT, principles, processes, and protocols | 2019 | [44] |
40 | Industrial networks and IIoT | 2020 | [45] |
41 | Awareness of Industry 4.0 | 2018 | [46] |
42 | IoT and big data analytics in healthcare | 2019 | [1] |
43 | Big data & disruptive computing platforms braced IoT | 2020 | [47] |
44 | Big data, privacy regulations, open data, intellectual property, and competition law in an IoT | 2018 | [48] |
45 | Big data challenges for the IoT | 2017 | [49] |
46 | Big data and IoT | 2016 | [50] |
47 | Equipment design assisted by cognitive IoT and industrial big data | 2020 | [51] |
48 | IoT and big data | 2018 | [52] |
49 | Accurate vehicle state estimation | 2019 | [53] |
|