Abstract is missing.
- A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing ProtocolMostafa Alawieh, Walid Fahs, Jamal Haydar, Fadlallah Chbib, Ahmad Fadlallah. 1-8 [doi]
- Towards an intelligent system to manage IDS for IoTHind Khoulimi, Mohamed Lahby, Othman Benammar. 9-16 [doi]
- Investigating the Robustness of IoT Security Cameras against Cyber AttacksZouheir Trabelsi. 17-23 [doi]
- Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic EnvironmentAntoine Boudermine, Rida Khatoun, Jean-Henri Choyer. 24-31 [doi]
- Recent review of Distributed Denial of Service Attacks in the Internet of ThingsHubert Djuitcheu, Maik Debes, Matthias Aumüller, Jochen Seitz 0001. 32-39 [doi]
- DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT EcosystemMeryeme Ayache, Amjad Gawanmeh, Jamal N. Al-Karaki. 40-47 [doi]
- A Blockchain-Based Fake Product Identification SystemYasmeen Dabbagh, Reem Khoja, Leena AlZahrani, Ghada AlShowaier, Nidal Nasser. 48-52 [doi]
- Towards Blockchain Based Architecture for Building Information Modelling (BIM)Soumaya Bachtobji, Djamel Eddine Kouicem, Mouna Ben Mabrouk. 53-59 [doi]
- Digesting smart contracts in Ethereum blockchain networksFabian Sparbrodt, Marisol García-Valls. 60-66 [doi]
- Adapting Deep Learning models to IoT environmentsSofien Resifi, Hassan Hassan 0002, Khalil Drira. 67-74 [doi]
- Simulating Distributed Wireless Sensor Networks for Edge-AIAmbar Prajapati, Bonny Banerjee. 75-82 [doi]
- Transforming Deep Learning Models for Resource-Efficient Activity Recognition on Mobile DevicesSevda Ozge Bursa, Özlem Durmaz Incel, Gülfem Isiklar Alptekin. 83-89 [doi]
- SEAWALL: Seamless Low Latency Cloud Platforms for the Industry 4.0Lorenzo Bacchiani, Giuseppe De Palma, Luca Sciullo, Mario Bravetti, Marco De Felice, Maurizio Gabbrielli, Gianluigi Zavattaro, Roberto Della Penna, Corrado Iorizzo, Andrea Livaldi, Luca Magnotta, Mirko Orsini. 90-91 [doi]
- An Efficient Strategy with High Availability for Dynamic Provisioning of Access Points in Large-Scale Wireless NetworksMatheus B. de A. Rodrigues, Ana Carolina R. Mendes, Marcos Paulo C. de Mendonça, Gabriel R. Carrara, Luiz Claudio Schara Magalhães, Célio Vinicius N. de Albuquerque, Dianne S. V. Medeiros, Diogo M. F. Mattos. 92-99 [doi]
- MS2M: A message-based approach for live stateful microservices migrationHai Dinh-Tuan, Felix Beierle. 100-107 [doi]
- Remote Healthcare Monitoring using Wearable IoT Devices and Cloud ServicesMenatalla Abdel-Gawad, Manar Usama, Haidy Hesham, Omar Ibrahim, Mohammad M. Abdellatif 0001. 108-113 [doi]
- Are Group Acknowledgements Worth Anything in IEEE 802.15.4 DSME: A Comparative AnalysisFlorian Meyer, Phil Malessa, Jan Niklas Diercks, Volker Turau. 114-121 [doi]
- Energy-saved and load-balanced wireless sensor network clustering in a multi-layered wireless networks structuresOthmane Dergaoui, Youssef Baddi, Abderrahim Hasbi. 122-128 [doi]
- A Roadmap to Smart Homes Security Aided SDN and MLTanzeela Altaf, Robin Braun. 129-136 [doi]
- An access control and authentication scheme for secure data sharing in the decentralized cloud storage systemPankaj Khatiwada, Bian Yang. 137-144 [doi]
- A Secure Authentication and Access Control Scheme for CoAP-based IoTMuath A. Obaidat, Jian Lim Choong, Kutub Thakur. 145-149 [doi]
- Forecasting the Energy Consumption of Cloud Data Centers Based on Container Placement with Ant Colony Optimization and Bin PackingAmine Bouaouda, Karim Afdel, Rachida Abounacer. 150-157 [doi]
- Towards a Cryptography Benchmark: A View on Attribute Based Encryption SchemesThomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, Alexandra Dmitrenko, Christian Krupitzer, Samuel Kounev. 158-165 [doi]
- Cloud Computing Security and Challenges: Issues, Threats, and SolutionsSadeem Hamad Alrasheed, Majid Aied Alhariri, Sulaiman Abdulaziz Adubaykhi, Salim el Khediri. 166-172 [doi]
- Inferring Autoscale Information from NFV MANO for Launching Attacks - An Experimental Study with Cloudified 5GP. C. Amogh, Dinil Mon Divakaran, Mohan Gurusamy. 173-179 [doi]
- Multipath-routing based load-balancing in SDN networksFarah Chahlaoui, Hamza Dahmouni, Hassan El Alami. 180-185 [doi]
- Towards a Cloud-Native 5G Service Chaining for IoT and Video Analytics in Smart CampusRamy Mohamed, Sofiane Zemouri. 186-188 [doi]
- MT-AODV: Resilient Communication in Military Mobile Ad-Hoc Networks through On-demand Multiple Routing TablesRicardo M. Firmino, Diogo M. F. Mattos, Dianne S. V. Medeiros, Pedro B. Velloso. 189-196 [doi]
- In-network Computation for IoT Data Processing with ActiveNDN in Wireless Sensor NetworksPreechai Mekbungwan, Giovanni Pau 0001, Kanchana Kanchanasut. 197-204 [doi]
- Cloud Computing Predictive Resource Management Framework Using Hidden Markov ModelAhmed Adel, Amr El-Mougy. 205-212 [doi]
- Cache Optimization Strategy for Mobile Edge Computing in Maritime IoTHailong Feng, Zhengqi Cui, Tingting Yang 0001. 213-219 [doi]
- MPaS: A Micro-services based Publish/Subscribe Middleware System Model for IoTNoor Ahmed. 220-225 [doi]
- Dog's Behaviour Classification Based on Wearable Sensor Accelerometer DataAnniek Eerdekens, Arne Callaert, Margot Deruyck, Luc Martens, Wout Joseph. 226-231 [doi]
- µJSON, a Lightweight Compression Scheme for Embedded GNSS Data Transmission on IoT NodesSérgio D. Correia 0001, Rafael Perez, João Pedro Matos-Carvalho, Valderi R. Q. Leithardt. 232-238 [doi]
- Internet of Things Platform for Real Time Automated Safety System Based on Multi Sensor Network and Bluetooth ModuleIrfanullah, Razaullah, Saleem Aslam, Fazal Muqeem. 239-246 [doi]
- Energy and Delay Aware Computation Offloading Scheme in MCC EnvironmentFarhan Sufyan, Mohd Sameen Chishti, Amit Banerjee. 247-254 [doi]