1. Yadav, G., Dalal, S.: Improvisation of network security using encryption technique for BD technology. Int. J. Comput. Appl. 124(11), 27–30 (2015)
2. Zhou, L.: Big data based on fuzzy grey information system security intrusion detection research. Adv. Mater. Res. 1079–1080, 668–671 (2015)
3. Cohen, B., Vawdrey, D.K., Liu, J.: Challenges associated with using large data sets for quality assessment and research in clinical settings. Policy Politics Nurs. Pract. 16(3), 243–250 (2015)
4. Chen, Z., Li, X., Yang, B.: A self-adaptive wireless sensor network coverage method for intrusion tolerance based on trust value. J. Sens. 2015(4), 1–10 (2015)
5. Yan, Y., Shyu, M.-L.: Correlation-assisted imbalance multimedia concept mining and retrieval. Int. J. Semant. Comput. 11(2), 209–227 (2017)