Abstract is missing.
- Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT ManipulationWael Alsabbagh, Chaerin Kim, Nitin Sanjay Patil, Peter Langendörfer. 1-7 [doi]
- Blockchain for Securing CI/CD Pipeline: A Review on Tools, Frameworks, and ChallengesSabbir M. Saleh, Nazim H. Madhavji, John Steinbacher. 1-5 [doi]
- Secure Cloud-Based Provisioning and Managing the Complete Life Cycle of IoT MetalsMorteza Moghaddassian, J. J. Garcia-Luna-Aceves. 1-8 [doi]
- Enhancing IoT Connectivity with Matching Theory-Based Spectrum Sharing for IRS-Aided Multi-Cell SystemsLilatul Ferdouse, Faria Khandaker. 1-7 [doi]
- SKELETRACK: Efficient Tracking of Skeleton in Blurry Videos for Human Activity RecognitionHaoran Qi, Zihan Zhang, Farhana H. Zulkernine. 1-5 [doi]
- xApps for DDoS Attacks Detection and Mitigation in 5G-V2X O-RAN NetworksMirna Awad, Adam Ait Hamid, Yeogeuch Ranganathan, Nizar Choubik, Rami Langar, Wael Jaafar. 1-2 [doi]
- A Deep Dive into Congestion Control and Buffer Management for Fluctuation-Prone 5G-A/6G LinksJorge Ignacio Sandoval, Sandra Céspedes, Agustín González, Diego Torreblanca, Ignacio G. Bugueño-Córdova. 1-8 [doi]
- Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities and Research Road MapNeelanjana Subin Ferdous, Md. Zoheb Hassan, Imtiaz Ahmed 0001, Lutfa Akter. 1-8 [doi]
- IoT-Enabled Pediatric Pain Care Leveraging Majority Vote-Based Transfer Learning ModelsNupur Gaikwad, Darshana Upadhyay, Jaume Manero, Srinivas Sampalli. 1-8 [doi]
- Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A Comparative StudyAnes Abdennebi, Reda Morsli, Nadjia Kara, Hakima Ould-Slimane. 1-9 [doi]
- Optimizing multi-service migration and downtime at the network edge using deep reinforcement learningArshin Rezazadeh, Davood Abednezhad, Duff Jones, Hanan Lutfiyya. 1-8 [doi]
- Sustainability of AI - Energy consumption estimation of an mMTC admission controlLucas Otávio Nascimento De Araújo, Abdelkader Outtagarts. 1-7 [doi]
- An Architectural Approach for Enhanced Data Interoperability Across Building SystemsPeter Yefi, Sikandar Ejaz, Ramanunni Parakkal Menon, Ursula Eicker, Yann-Gaël Guéhéneuc. 1-8 [doi]
- Demo-ScanIoT, an Application to collect IoT dataset for HomeGuardAbdul Fareed Jamali, Carol Fung. 1-2 [doi]
- Deep Reinforcement Learning-Enabled Resilient Radio Resource Allocation for Internet-of-Things Networks with Receiver Non-LinearityNahed Belhadj Mohamed, Md. Zoheb Hassan, Georges Kaddoum. 1-5 [doi]
- Efficient Resource Allocation for Multi-Robot Collaboration via Traffic-Aware Pod AutoscalingSwarnabha Roy, Reece Dobson, Jack Campbell, Stavros Kalafatis. 1-8 [doi]
- Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning AlgorithmsJean-Bernard Altidor, Chamseddine Talhi. 1-7 [doi]
- Effective IDS under constraints of modern enterprise networks: revisiting the OpTC datasetVictor Nikulshin, Chamseddine Talhi. 1-8 [doi]
- S4HI: A Novel Learning-Based Human Identification Method From Behavioural DataKhalil Snoussi, Wael Jaafar, Rami Langar. 1-6 [doi]
- Metamorphic Testing for Investigation of Context Recognition from Smart Home Voice CommandsFahima Hasan Athina, Jeniya Sultana, Debaleen Das Spandan, Razib Iqbal. 1-4 [doi]
- DEMO: Non-Reciprocal RIS Solution for Power Mismatch in WiFi-Connected IoT DevicesMohamed Ibrahim, Zahra Taheri, Octavio Barrera, Artmiz Golkaramnay. 1-2 [doi]
- Computation Offloading on 5G Core Network for a Highly Delay Sensitive Real Time AppPierre Domachowski, Haga Randrianaly, Marie-José Montpetit, Noël Crespi. 1-4 [doi]
- Privacy Preserved IoT Data Inquiry System using DoTHayato Sagara, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai. 1-6 [doi]
- (DEMO) An IoT toolbox for media artsSarah Al Mamoun, Pía Baltazar, Charles Bicari, Marek Blottière, Jean-Michaël Celerier, Rochana Fardon, Olivier Gauthier, Eduardo A. L. Meneses, Maggie Needham, Guillaume Riou. 1-2 [doi]
- On the Joint Placement of Blockchain and Users' Virtualized Services in the Internet of VehiclesMessaoud Ait Yahia, Mouhamadou Mouctar Gueye, Wael Jaafar, Rami Langar. 1-8 [doi]
- Non-reciprocal RIS-Aided Full-Duplex Communications: IoT ApplicationsZahra Taheri, Mohamed Ibrahim, Mohammad Reza Soleymani, Paul Tornatta. 1-5 [doi]
- A Novel Communication-Efficient and Blockchain-Secured Distributed Federated LearningSouad Beguenane, Wael Jaafar. 1-6 [doi]
- An Exploratory Study on Code Quality, Testing, Data Accuracy, and Practical Use Cases of IoT WearablesJean Baptiste Minani, Yahia El Fellah, Sanam Ahmed, Fatima Sabir, Naouel Moha, Yann-Gaël Guéhéneuc. 1-5 [doi]
- Query Prediction for Log Search for Distributed Tracing with External Monitoring AlertsTomoyuki Koyama, Takayuki Kushida, Soichiro Ikuno. 1-7 [doi]
- Anomaly Detection in Federated Learning: A Comprehensive Study on Data Poisoning and Energy Consumption Patterns in IoT DevicesAbdelkader Tounsi, Osman Salem, Ahmed Mehaoua. 1-8 [doi]
- (POSTER) Cloud Monitoring and Prediction of Indoor LoRa-based Air Quality DataShuyan Han, Evelyn Hui Kai Soon, Shihang Ruan, Haoming He, Morteza Moghaddassian, Alberto Leon-Garcia. 1-2 [doi]
- VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph AnalysisHafidh Zouahi, Chamseddine Talhi, Oussama Boudar. 1-8 [doi]
- Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud ContinuumAdriana Arteaga Arce, Alexandre Veremme, Carol Habib, Nathalie Mitton. 1-2 [doi]
- DEMO of: A Policy-based System for Service Provisioning in Edge ComputingDalal Direm, Zakaria Maamar, Amel Benna. 1-2 [doi]
- (DEMO) WTTool: A Visual Web-based Topology Generator and 5G Network Simulator with ns-3Nicholas Accurso, Samir Si-Mohammed, Diptangshu De, Filippo Malandra. 1-2 [doi]
- Comparative Performance Analysis of NDN Protocol in IoT EnvironmentsMohamed Ahmed M. Hail, Arne Matthes, Stefan Fischer. 1-8 [doi]
- An Analysis on CVE Vulnerabilities of the Internet of ThingsAnurag Kumar, Carol Fung. 1-6 [doi]
- ElectroBlock: Reinforcement Learning and Blockchain-based Energy Trade to Optimize TariffsRidwan Arefin Islam, Rezwan-Ul-Islam, Swakkhar Shatabda, Salekul Islam. 1-5 [doi]
- Selective Excitation Technique for Wireless Power Transfer in Wearable Devices Using CMAFerdaous Abderrazak, Peyman Pourmohammadi, Larbi Talbi, Eva Antonino-Daviu, Tayeb A. Denidni, Miguel Ferrando Bataller. 1-6 [doi]
- Optimizing IoT Network Intrusion Detection: A Deep Learning ApproachKhorshed Alam, Md Fahad Monir, Zoheb Hassan, Md. Tarek Habib. 1-5 [doi]
- End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed DatabasesSalman Ali, Cedric Gondro, Qiben Yan, Wolfgang Banzhaf. 1-8 [doi]
- Informed Network Routing for SD-WAN enabled SaaS Optimization: An M365 Proof of ConceptSai Suchandan Reddy, Nikolai Pitaev, Aris Leivadeas. 1-7 [doi]
- Anomaly Detection in IoT Sensor Energy Consumption Using LSTM Neural Networks and Isolation ForestQuôc Vo, Philippe Ea, Selma Benzouaoua, Osman Salem, Ahmed Mehaoua. 1-8 [doi]