Abstract is missing.
- Integration and Evaluation of Blockchain Consensus Algorithms for IoT EnvironmentsAnderson Melo de Morais, Fernando Antônio Aires Lins, Nelson Souto Rosa. 1-13 [doi]
- Nexus: Proxy Service for the Web of ThingsIsidoros Paterakis, Euripides G. M. Petrakis. 14-25 [doi]
- ABIDI: A Reference Architecture for Reliable Industrial Internet of ThingsGianluca Rizzo, Alberto Franzin, Miia Lillstrang, Guillermo del Campo, Moisés Silva-Muñoz, Lluc Bono, Mina Aghaei Dinani, Xiaoli Liu 0005, Joonas Tuutijärvi, Satu Tamminen, Edgar Saavedra, Asunción Santamaria, Xiang Su, Juha Röning. 26-39 [doi]
- DASA: An Efficient Data Aggregation Algorithm for LoRa Enabled Fog Layer in Smart AgricultureMayank Vyas, Garv Anand, Ram Narayan Yadav, Sanjeet Kumar Nayak. 40-52 [doi]
- FSET: Fast Structure Embedding Technique for Self-reconfigurable Modular Robotic SystemsAliah Majed, Hassan Harb, Abbass Nasser, Benoit Clement. 53-66 [doi]
- A Blockchain Based Authentication Mechanism for IoT in Agriculture 4.0Oumayma Jouini, Kaouthar Sethom. 67-76 [doi]
- Performance Evaluation of FC-RDVM and LDIWM Router Placement Methods for WMNs by WMN-PSODGA Hybrid Simulation System Considering Load Balancing and Chi-Square Distribution of Mesh ClientsAdmir Barolli, Shinji Sakamoto, Elis Kulla, Leonard Barolli, Makoto Takizawa 0001. 77-85 [doi]
- Uncertainty Handling with Type-2 Interval-Valued Fuzzy Logic in IoT Resource ClassificationRenato Dilli, Renata Reiser, Adenauer C. Yamin, Hélida Salles Santos, Giancarlo Lucca. 86-98 [doi]
- An Analysis of Representative Works of Japanese Literature Based on Emotions and TopicsMiki Amano, Kenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi. 99-112 [doi]
- Analysis and Comparison of Machine Learning Models for Glucose ForecastingThéodore Simon, Jianfei Zhang 0002, Shengrui Wang. 113-123 [doi]
- On Enhancing Network Slicing Life-Cycle Through an AI-Native Orchestration ArchitectureRodrigo Moreira, Joberto S. B. Martins, Tereza Cristina M. B. Carvalho, Flávio de Oliveira Silva 0001. 124-136 [doi]
- Adaptive Inference on Reconfigurable SmartNICs for Traffic ClassificationJulio Costella Vicenzi, Guilherme Korol, Michael Guilherme Jordan, Mateus Beck Rutzig, Antonio Carlos Schneider Beck Filho. 137-148 [doi]
- eDeepRFID-IPS: Enhanced RFID Indoor Positioning with Deep Learning for Internet of ThingsBelal Alsinglawi, Khaled Rabie. 149-158 [doi]
- A Model for Artificial Conscience to Control Artificial IntelligenceDavinder Kaur, Suleyman Uslu, Arjan Durresi. 159-170 [doi]
- A Vulnerability Risk Assessment Methodology Using Active LearningFrancisco R. P. da Ponte, Emanuel B. Rodrigues, César L. C. Mattos. 171-182 [doi]
- A Fuzzy Inference and Posture Detection Based Soldering Motion Monitoring SystemKyohei Toyoshima, Chihiro Yukawa, Yuki Nagai, Genki Moriya, Sora Asada, Tetsuya Oda, Leonard Barolli. 183-191 [doi]
- An Anomaly Detection System for Intelligent Robot Vision Using LSTMChihiro Yukawa, Kyohei Toyoshima, Yuki Nagai, Masahiro Niihara, Yuma Yamashita, Tetsuya Oda, Leonard Barolli. 192-198 [doi]
- GDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local SearchEstêvão F. C. Silva, Nícolas Naves, Silvio E. Quincozes, Vagner E. Quincozes, Juliano F. Kazienko, Omar Cheikhrouhou. 199-210 [doi]
- Multi-agent Deep Q-Learning Based NavigationAmar Nath, Rajdeep Niyogi, Tajinder Singh, Virendra Kumar. 211-221 [doi]
- Identifying Network Congestion on SDN-Based Data Centers with Supervised ClassificationFilipe da Silva de Oliveira, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piêgas Koslovski. 222-234 [doi]
- Detection of Malicious Sites Using Graph Machine LearningRhayane da Silva Monteiro, Leonardo Sampaio Rocha. 235-246 [doi]
- Bonet Detection Mechanism Using Graph Neural NetworkAleksander Maksimoski, Isaac Woungang, Issa Traoré, Sanjay K. Dhurandher. 247-257 [doi]
- Object Placement Algorithm with Information Flow Control in Fog Computing ModelShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 258-267 [doi]
- An Energy-Aware Algorithm for Changing Tree Structure and Process Migration in the Flexible Tree-Based Fog Computing ModelDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 268-278 [doi]
- SANKMO: An Approach for Ingestion, Processing, Storing, and Sharing IoT Data in Near Real-TimeAgmar A. Torres, Flávio de Oliveira Silva 0001. 279-291 [doi]
- A Polystore Proposed Environment Supported by an Edge-Fog InfrastructureLudmila Ribeiro Bôscaro Yung, Victor Ströele, Mário Antônio Ribeiro Dantas. 292-302 [doi]
- OASL: SPARQL Query Language for OpenAPI OntologiesNikolaos Lagogiannis, Nikolaos Mainas, Chrisa Tsinaraki, Euripides G. M. Petrakis. 303-317 [doi]
- Orchestrating Fog Computing Resources Based on the Multi-dimensional Multiple Knapsacks ProblemDaniel E. Macedo, Marcus M. Bezerra, Danilo F. S. Santos, Angelo Perkusich. 318-329 [doi]
- Profit Maximization for Resource Providers Using Dynamic Programming in Edge ComputingRajendra Prajapat, Ram Narayan Yadav. 330-342 [doi]
- Stability and Availability Optimization of Distributed ERP Systems During Cloud MigrationGerard Christopher Aloysius, Ashutosh Bhatia, Kamlesh Tiwari. 343-354 [doi]
- Prison Break: From Proprietary Data Sources to SSI Verifiable CredentialsKatja Assaf, Alexander Mühle, Daniel Köhler, Christoph Meinel. 355-366 [doi]
- A Post-quantum Cryptosystem with a Hybrid Quantum Random Number GeneratorMaksim Iavich, Tamari Kuchukhidze, Razvan Bocu. 367-378 [doi]
- Supervised Machine Learning and Detection of Unknown Attacks: An Empirical EvaluationMiguel S. Rocha, Gustavo D. G. Bernardo, Luan Mundim, Bruno Bogaz Zarpelão, Rodrigo Sanches Miani. 379-391 [doi]
- Machine Learning Anomaly-Based Network Intrusion Detection: Experimental EvaluationAhmed Ramzi Bahlali, Abdelmalik Bachir. 392-403 [doi]
- Applied Machine Learning for Securing the Internet of Medical Things in HealthcareWei Lu. 404-416 [doi]
- Early-Stage Ransomware Detection Based on Pre-attack Internal API CallsFilippo Coglio, Ahmed Lekssays, Barbara Carminati, Elena Ferrari. 417-429 [doi]
- User-Oriented Cybersecurity SystemsMarek R. Ogiela, Urszula Ogiela. 430-433 [doi]
- Cybersecurity of Distributed Systems and Dispersed ComputingUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 434-438 [doi]
- A Dynamic Machine Learning Scheme for Reliable Network-Based Intrusion DetectionEduardo K. Viegas, Everton de Matos, Paulo R. de Oliveira, Altair O. Santin. 439-451 [doi]
- A Roadmap to Blockchain Technology Adoption in Saudi Public HospitalsAdel Khwaji, Yaser Alsahafi, Farookh Khadeer Hussain. 452-460 [doi]
- Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic EncryptionEmanuele Scala, Changyu Dong, Flavio Corradini, Leonardo Mostarda. 461-472 [doi]
- MTA Extension for User-Friendly Enforcement of Mandatory TLS EncryptionMax Körber, Leo V. Dessani, Ronald Petrlic. 473-486 [doi]
- Secure and Privacy Preserving Proxy Biometric IdentitiesHarkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna. 487-500 [doi]
- Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential PrivacyHikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu. 501-512 [doi]
- MPolKA-INT: Stateless Multipath Source Routing for In-Band Network TelemetryIsis de O. Pereira, Cristina K. Dominicini, Rafael S. Guimarães, Rodolfo da Silva Villaça, Lucas R. Almeida, Gilmar L. Vassoler. 513-524 [doi]
- A Vulnerability Detection Method for SDN with Optimized FuzzingXiaofeng Chi, Bingquan Wang, Jingling Zhao, Baojiang Cui. 525-536 [doi]
- Energy Efficient Virtual Network Function Placement in NFV Enabled NetworksSudha Dubba, Balaprakasa Rao Killi. 537-548 [doi]
- Rational Identification of Suitable Classification Models for Detecting DDoS Attacks in Software-Defined NetworksAbhirath Anupam Joshi, K. Haribabu 0001. 549-561 [doi]
- Make Before Degrade: A Context-Aware Software-Defined WiFi HandoverVictor M. Garcia Martinez, Rafael S. Guimarães, Ricardo C. de Mello, Alexandre Pereira do Carmo, Raquel Frizera Vassallo, Rodolfo da Silva Villaça, Moisés R. N. Ribeiro, Magnos Martinello. 562-572 [doi]