54 | -- | 0 | Giovanni Maria Sacco. SAES: An Introduction to Self-Adapting Exploratory Structures |
55 | -- | 0 | Sergej Svorobej, Patricia Takako Endo, Malika Bendechache, Christos K. Filelis-Papadopoulos, Konstantinos M. Giannoutakis, George A. Gravvanis, Dimitrios Tzovaras, James Byrne, Theo Lynn. Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges |
56 | -- | 0 | Luigi Lo Iacono, Hoai Viet Nguyen, Peter Leo Gorski. On the Need for a General REST-Security Framework |
57 | -- | 0 | Lorenzo Vangelista, Marco Centenaro. Worldwide Connectivity for the Internet of Things Through LoRaWAN |
58 | -- | 0 | Luis Gomes 0001, Carlos Ramos, Aria Jozi, Bruno Serra, Lucas Paiva, Zita A. Vale. IoH: A Platform for the Intelligence of Home with a Context Awareness and Ambient Intelligence Approach |
59 | -- | 0 | Mayank Kejriwal, Pedro Szekely. myDIG: Personalized Illicit Domain-Specific Knowledge Discovery with No Programming |
60 | -- | 0 | Xuan Wang, Bofeng Zhang, Furong Chang. Hot Topic Community Discovery on Cross Social Networks |
61 | -- | 0 | Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain, Muhammad Qasim Memon. A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs |
62 | -- | 0 | Alexander Geyda, Igor Lysenko. Modeling of Information Operations Effects: Technological Systems Example |
63 | -- | 0 | Abel Yeboah-Ofori, Shareeful Islam. Cyber Security Threat Modeling for Supply Chain Organizational Environments |
64 | -- | 0 | Xin Zheng, Gaocai Wang, Qifei Zhao. A Cache Placement Strategy with Energy Consumption Optimization in Information-Centric Networking |
65 | -- | 0 | Yang Li, Leyi Shi, Haijie Feng. A Game-Theoretic Analysis for Distributed Honeypots |
66 | -- | 0 | Samer Jaloudi. Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study |
67 | -- | 0 | Aikaterini-Georgia Mavroeidi, Angeliki Kitsiou, Christos Kalloniatis, Stefanos Gritzalis. Gamification vs. Privacy: Identifying and Analysing the Major Concerns |
68 | -- | 0 | Shigeru Kato, Naoki Wada, Ryuji Ito, Takaya Shiozaki, Yudai Nishiyama, Tomomichi Kagawa. Snack Texture Estimation System Using a Simple Equipment and Neural Network Model |
69 | -- | 0 | Aris Leivadeas, George Kesidis, Mohamed Ibnkahla, Ioannis Lambadaris. † |
70 | -- | 0 | Adnan Mahmood, Wei Emma Zhang, Quan Z. Sheng. Software-Defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges |
71 | -- | 0 | Vincenzo Eramo, Francesco Giacinto Lavacca, Tiziana Catena, Marco Polverini, Antonio Cianfrani. Effectiveness of Segment Routing Technology in Reducing the Bandwidth and Cloud Resources Provisioning Times in Network Function Virtualization Architectures |
72 | -- | 0 | Paul J. Croft. Environmental Hazards: A Coverage Response Approach |
73 | -- | 0 | Hussain Aldawood, Geoffrey Skinner. Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues |
74 | -- | 0 | Rute C. Sofia, Paulo Mendes 0001. An Overview on Push-Based Communication Models for Information-Centric Networking |
75 | -- | 0 | Hadar Sufiev, Yoram Haddad 0001, Leonid Barenboim, José Soler. Dynamic SDN Controller Load Balancing |
76 | -- | 0 | Tomasz Hyla, Jerzy Pejas. eHealth Integrity Model Based on Permissioned Blockchain |
77 | -- | 0 | Diego Corrales-Garay, Eva-María Mora-Valentín, Marta Ortiz-de-Urbina-Criado. Open Data for Open Innovation: An Analysis of Literature Characteristics |
78 | -- | 0 | Ioannis Galanis, Iraklis Anagnostopoulos, Priyaa Gurunathan, Dona Burkard. Environmental-Based Speed Recommendation for Future Smart Cars |
79 | -- | 0 | Xiangfeng Luo, Yawen Yi. Topic-Specific Emotion Mining Model for Online Comments |
80 | -- | 0 | Joan-Francesc Fondevila-Gascón, Gaspar Berbel, Mònica Muñoz-González. Experimental Study on the Utility and Future of Collaborative Consumption Platforms Offering Tourism Related Services |
81 | -- | 0 | Ning Zhao, Yuhe Liu, Junjie Shen. Nonlinear Analysis of Built-in Sensor in Smart Device under the Condition of Voice Actuating |
82 | -- | 0 | Ying Dong, Zhou Lei. An Access Control Model for Preventing Virtual Machine Hopping Attack |