Abstract is missing.
- A Method for Estimating the Number of Diseases in Computed Tomography Reports of the Japanese Medical Image Database (J-MID): Variations Among FacilitiesKoji Sakai, Yu Ohara, Yosuke Maehara, Takeshi Takahashi, Kei Yamada. 1-8 [doi]
- Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic GraphJakkarin Lapmoon, Thunpisit Kosolsriwiwat, Sirinyaporn Jiraporn, Somchart Fugkeaw. 9-21 [doi]
- Discovery of RESTful Web Services Based on the OpenAPI 3.0 Standard with Semantic AnnotationsAlberto Tuti Soki, Frank Siqueira. 22-34 [doi]
- PerfResolv: A Geo-Distributed Approach for Performance Analysis of Public DNS Resolvers Based on Domain PopularityMarcelo Almeida Silva, Muriel Figueredo Franco, Eder John Scheid, Luciano Zembruzki, Lisandro Zambenedetti Granville. 35-47 [doi]
- DARS: Empowering Trust in Blockchain-Based Real-World Applications with a Decentralized Anonymous Reputation SystemMouhamed Amine Bouchiha, Yacine Ghamri-Doudane, Mourad Rabah, Ronan Champagnat. 48-61 [doi]
- An Empirical Comparison of Outlier Detection Methods for Identifying Grey-Sheep Users in Recommender SystemsYong Zheng. 62-73 [doi]
- Adaptive Consensus: Enhancing Robustness in Dynamic EnvironmentsKshitij Mandyal, Dharmendra Prasad Mahato. 74-84 [doi]
- COTTONTRUST: Reliability and Traceability in Cotton Supply Chain Using Self-sovereign IdentityJanaína F. B. Duarte, Gilson S. Junior, Gabriel F. C. da Silva, Maurício A. Pillon, Guilherme P. Koslovski, Charles Christian Miers. 85-97 [doi]
- Interoperability Between EVM-Based BlockchainsAlessandro Bigiotti, Leonardo Mostarda, Alfredo Navarra, Andrea Pinna 0002, Roberto Tonelli, Matteo Vaccargiu. 98-109 [doi]
- Stand-Up Indulgent Gathering on Lines for Myopic Luminous RobotsQuentin Bramas, Hirotsugu Kakugawa, Sayaka Kamei, Anissa Lamani, Fukuhito Ooshita, Masahiro Shibata, Sébastien Tixeuil. 110-121 [doi]
- IoT Identity Management Systems: The State-of-the-Art, Challenges and a Novel ArchitectureSamson Kahsay Gebresilassie, Joseph Rafferty, Liming Chen 0001, Zhan Cui, Mamun I. Abu-Tair. 122-135 [doi]
- STARM: STreaming Association Rules Mining in High-Dimensional DataRania Mkhinini Gahar, Olfa Arfaoui, Adel Hidri, Suleiman Ali Alsaif, Minyar Sassi Hidri. 136-146 [doi]
- Regulation Compliance System for IoT Environments: GDPR Compliance as a Use-CaseMamun I. Abu-Tair, Aftab Ali, Samson Kahsay Gebresilassie, Joseph Rafferty, Zhan Cui. 147-160 [doi]
- Two-Dimensional Models of Markov Processes for System AvailabilityOrhan Gemikonakli, Eser Gemikonakli, Enver Ever. 161-172 [doi]
- Enabling AI in Agriculture 4.0: A Blockchain-Based Mobile CrowdSensing ArchitectureAnkit Agrawal 0003, Bhaskar Mangal, Ashutosh Bhatia, Kamlesh Tiwari. 173-186 [doi]
- HPC-SBC: An Experimental Effort to Evaluate Storage in High-Performance Computing Configurations Using a Context ApproachFernando de Almeida Silva, João Pedro de Souza Jardim da Costa, José Maria N. David, Mario A. R. Dantas. 187-198 [doi]
- Effective Parallel Formal Verification of Reconfigurable Discrete-Event Systems Formalizing with Isabelle/HOLSohaib Soualah, Mohamed Khalgui, Allaoua Chaoui. 199-212 [doi]
- Data Poisoning Attacks in Gossip LearningAlexandre Pham, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida. 213-224 [doi]
- The Home-Delivery Analysis of Prescription Drugs for Chronic Diseases in the Post-Pandemic Era-An Example of Local Community PharmacyWei-Yuan Ho, Hsing-Chung Chen. 225-234 [doi]
- A Language-Agnostic Compression Framework for the Bitcoin BlockchainOrestes Papanastassiou, Alex Thomo. 235-249 [doi]
- Analyzing Topic Models: A Tourism Recommender System PerspectiveMaryam Kamal, Gianfranco Romani, Giuseppe Ricciuti, Aris Anagnostopoulos, Ioannis Chatzigiannakis. 250-262 [doi]
- Dissecting the Hype: A Study of WallStreetBets' Sentiment and Network Correlation on Financial MarketsKevin Wang, Bill Wong, Mohammad Ali Khoshkholghi, Purav Shah, Ranesh Naha, Aniket Mahanti, Jong-Kyou Kim. 263-273 [doi]
- Transformative Intelligence in Data Analysis and Knowledge ExplorationLidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. 274-281 [doi]
- Enhancing Effectiveness and Efficiency of Customers Reviews Data Collection Through Multithreaded Web Scraping ApproachDahlan Nariman. 282-291 [doi]
- Investigating BERT Layer Performance and SMOTE Through MLP-Driven Ablation on GittercomBathini Sai Akash, Vikram Singh, Aneesh Krishna, Lalita Bhanu Murthy Neti, Lov Kumar. 292-302 [doi]
- Detecting Signs of Depression in Social Networks Users: A Framework for Enhancing the Quality of Machine Learning ModelsAbir Gorrab, Nourhène Ben Rabah, Bénédicte Le Grand, Rébecca Deneckère, Thomas Bonnerot. 303-315 [doi]
- Sweeping Knowledge Graphs with SPARQL Queries to Palliate Q/A ProblemsWiem Baazouzi, Marouen Kachroudi, Sami Faïz. 316-330 [doi]
- Trustworthiness of $\mathbb {X}$ Users: A One-Class Classification ApproachTanveer Khan, Fahad Sohrab, Antonis Michalas, Moncef Gabbouj. 331-343 [doi]
- Entity Co-occurrence Graph-Based Clustering for Twitter Event DetectionBundit Manaskasemsak, Natthakit Netsiwawichian, Arnon Rungsawang. 344-355 [doi]
- Anomaly Detection with Generalized Isolation ForestBrett E. Downey, Carson K. Leung, Adam G. M. Pazdor, Ryan A. L. Petrillo, Denys Popov, Benjamin R. Schneider. 356-368 [doi]
- Toward a Deep Multimodal Interactive Query Expansion for Healthcare Information Retrieval EffectivenessSabrine Benzarti, Wafa Tebourski, Wahiba Ben Abdessalem Karaa. 369-379 [doi]
- Multi-level Frequent Pattern Mining on Pipeline Incident DataConnor C. J. Hryhoruk, Carson K. Leung, Jingyuan Li, Brandon A. Narine, Felix Wedel. 380-392 [doi]
- Real-Time Task Scheduling and Dynamic Resource Allocation in Fog InfrastructureMayssa Trabelsi, Samir Ben Ahmed. 393-403 [doi]
- Secure Lightweight Data Communication Between the IoT Devices and Cloud ServiceTran Viet Xuan Phuong, Tho Thi Ngoc Le, Huy Le Ngoc. 404-415 [doi]
- IoT Based Road State Sensing System Toward Autonomous Driving in Snow CountryYoshitaka Shibata, Yasushi Bansho, Shoichi Noguchi. 416-423 [doi]
- An Approach to Attack Modeling for the IoT: Creating Attack Trees from System DescriptionsJoão B. F. Sequeiros, Francisco Tchissaquila Chimuco, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio. 424-436 [doi]
- A Distributed Platform for Cycle Detection and Analysis in Cyber-Physical SystemsGabriel Iuhasz, Silviu Panica, Florin Fortis, Alecsandru Duma. 437-450 [doi]
- From Fault Tree Analysis to Runtime Model-Based Assurance CasesLuís Nascimento, André Luíz de Oliveira, Regina Villela 0001, Ran Wei, Richard Hawkins, Tim Kelly. 451-464 [doi]
- An Energy Consumption Model to Change the TBFC Model of the IoTDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 465-475 [doi]
- Automotive User Interface Based on LSTM-Grid Search Deep Learning Model for IoT Security Change Request ClassificationZaineb Sakhrawi, Taher Labidi, Asma Sellami, Nadia Bouassida. 476-486 [doi]