Abstract is missing.
- AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of ThingsGokhan Sagirlar, Barbara Carminati, Elena Ferrari. 1-8 [doi]
- Blockchain-Based PKI Solutions for IoTAnkush Singla, Elisa Bertino. 9-15 [doi]
- Monitor: An Abnormality Detection Approach in Buildings Energy ConsumptionHaroon Rashid, Pushpendra Singh. 16-25 [doi]
- Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data RepositoriesJongho Won, Elisa Bertino. 26-35 [doi]
- Link-Sign Prediction in Dynamic Signed Directed NetworksQuang-Vinh Dang 0001, Claudia-Lavinia Ignat. 36-45 [doi]
- Mining the Best Observational Window to Model Social PhenomenaChao Yan, Zhijun Yin, Stanley Xiang, You Chen, Yevgeniy Vorobeychik, Daniel Fabbri, Abel N. Kho, David M. Liebovitz, Bradley Malin. 46-55 [doi]
- Investigating Aspects of Platform Growth on Crowdsource Driven Recommendation ServicesJulian Jarrett, M. Brian Blake. 56-63 [doi]
- Parallel Schedule of Live Migrations for Virtual Machine PlacementsM. P. Gilesh, Sanjay Satheesh, Athul Chandran, S. D. Madhu Kumar, Lillykutty Jacob. 64-70 [doi]
- Link-Quality and Traffic-Load Aware Routing for UAV Ad Hoc NetworksCong Pu. 71-79 [doi]
- Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an AttackJagannadh Vempati, Ram Dantu. 80-89 [doi]
- A Decentralized Marketplace Application on the Ethereum BlockchainVishnu Prasad Ranganthan, Ram Dantu, Aditya Paul, Paula Mears, Kirill Morozov. 90-97 [doi]
- A QoS Framework for SDN-Based NetworksHaitham Ghalwash, Chun-Hsi Huang. 98-105 [doi]
- Lightweight Web Services Migration Framework in Hybrid CloudsAlaeddine Saadaoui, Stephen L. Scott. 106-113 [doi]
- Collaborative and Accountable Hardware Governance Using BlockchainAshish Kundu, Zehra Sura, Upendra Sharma. 114-121 [doi]
- Blockchain as a Platform for Secure Inter-Organizational Business ProcessesBarbara Carminati, Elena Ferrari, Christian Rondanini. 122-129 [doi]
- Towards Modernizing the Future of American VotingLeRoy Carr III, Anthony Newtson, James Joshi. 130-135 [doi]
- RIPA: Real-Time Image Privacy Alert SystemDakshak Keerthi Chandra, Weerdhawal Chowgule, Yanjie Fu, Dan Lin. 136-145 [doi]
- Detection of Temporal Data Ex-Filtration Threats to Relational DatabasesAsmaa Sallam, Elisa Bertino. 146-155 [doi]
- Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative SystemsVictorien Elvinger, Gérald Oster, François Charoy. 156-165 [doi]
- Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled EnvironmentsDaniel Petrov, Taieb Znati. 166-175 [doi]
- Alcatraz: Data Exfiltration-Resilient Corporate Network ArchitectureDaniele Enrico Asoni, Takayuki Sasaki, Adrian Perrig. 176-187 [doi]
- Supporting Virtual Organizations Using Attribute-Based Encryption in Named Data NetworkingCraig A. Lee, Zhiyi Zhang, Yukai Tu, Alexander Afanasyev, Lixia Zhang 0001. 188-196 [doi]
- The Impact of Malicious Accounts on Political Tweet SentimentBrian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar. 197-202 [doi]
- Policy and Resource Orchestration in Software-Defined NetworksAnduo Wang, Jie Wu. 203-206 [doi]
- Facilitating Data-Centric Recommendation in Knowledge GraphJia Zhang, Maryam Pourreza, Rahul Ramachandran, Tsengdar J. Lee, Patrick Gatlin, Manil Maskey, Amanda Marie Weigel. 207-216 [doi]
- New Algorithms and Methods for Collaborative Co-Editing Using HTML DOM SynchronizationCristian Gadea, Bogdan Ionescu, Dan Ionescu. 217-226 [doi]
- A Teacher Dashboard for Real-Time InterventionSebastian Hernandez, Nelson Baloian, José A. Pino, Xiaojun Yuan. 227-235 [doi]
- Automated Threat Report Classification over Multi-Source DataGbadebo Ayoade, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Bhavani M. Thuraisingham. 236-245 [doi]
- Transfer Learning of Deep Neural Networks for Visual Collaborative Maritime Asset IdentificationNicholas Warren, Benjamin Garrard, Elliot Staudt, Jelena Tesic. 246-255 [doi]
- Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNNSeyed Yahya Nikouei, Yu Chen 0002, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan. 256-265 [doi]
- Envisioning an Information Assurance and Performance Infrastructure for the Internet of ThingsJamie Payton, Xiaojiang Du, Xubin He, Jie Wu 0001. 266-271 [doi]
- MEDUSA: Malware Detection Using Statistical Analysis of System's BehaviorMuhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim. 272-278 [doi]
- Next Generation Trustworthy Fraud DetectionSihong Xie, Philip S. Yu. 279-282 [doi]
- Storage Service Orchestration with Container ElasticityAmit Warke, Mohamed Mohamed 0001, Robert Engel, Heiko Ludwig, Wayne Sawdon, Ling Liu 0001. 283-292 [doi]
- Predictive Modeling with Vehicle Sensor Data and IoT for Injury PreventionChristopher Yang, Ou Liang, Santiago Ontañón, Weimao Ke, Helen Loeb, Charlie Klauer. 293-298 [doi]
- Hybrid Machine-Crowd Approach for Fake News DetectionShaban Shabani, Maria Sokhn. 299-306 [doi]
- Understanding the Determinants of Enterprise Social Network UseAlexander Rossmann, Gerald Stei. 307-316 [doi]
- ysla: Reusable and Configurable SLAs for Large-Scale SLA ManagementRobert Engel, Shashank Rajamoni, Bryant Chen, Heiko Ludwig, Alexander Keller. 317-325 [doi]
- Osmotic Collaborative Computing for Machine Learning and Cybersecurity Applications in Industrial IoT Networks and Cyber Physical Systems with Gaussian Mixture ModelsEmmanuel Oyekanlu. 326-335 [doi]
- Fault-Tolerant Real-Time Collaborative Network Edge Analytics for Industrial IoT and Cyber Physical Systems with Communication Network DiversityEmmanuel Oyekanlu. 336-345 [doi]
- Open Educational Resources Platform Based on Collective IntelligenceMarcela Ribeiro de Oliveira, Israel Barreto Sant'Anna, Guilherme Scariot Ramos, Luis Carlos Erpen De Bona, Marcos Alexandre Castilho, Marcos Didonet Del Fabro, Eduardo Todt. 346-353 [doi]
- Early Detection of Cybersecurity Threats Using Collaborative CognitionSandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin. 354-363 [doi]
- Knowledge Modeling and Management for Mobility and Transport ApplicationsPierfrancesco Bellini, Stefano Bilotta, Daniele Cenni, Paolo Nesi, Michela Paolucci, Mirco Soderi. 364-371 [doi]
- Joint Cost Estimation Approach for Service Provider Legacy Network Migration to Unified Software Defined IPv6 NetworkBabu R. Dawadi, Danda B. Rawat, Shashidhar R. Joshi, Martina M. Keitsch. 372-379 [doi]
- Urban Pollution Monitoring Based on Mobile Crowd Sensing: An Osmotic Computing ApproachAntonella Longo, Andrea De Matteis, Marco Zappatore. 380-387 [doi]
- Auditing and Assessment of Data Traffic Flows in an IoT ArchitecturePaolo Nesi, Gianni Pantaleo, Michela Paolucci, Imad Zaza. 388-391 [doi]
- Designing a FIWARE Cloud Solution for Making Your Travel Smoother: The FLIWARE ExperienceLorenzo Carnevale, Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari. 392-398 [doi]
- Intelligent Crime Anomaly Detection in Smart Cities Using Deep LearningSharmila Chackravarthy, Steven Schmitt, Li Yang. 399-404 [doi]
- Assessment of an IoT Platform for Data Collection and Analysis for Medical SensorsJoão Rei, Claudia Brito, Antonio Sousa. 405-411 [doi]
- A Method for Large-Scale Resource Allocation in Smart CitiesHadi Hajari, Hassan A. Karimi. 412-415 [doi]
- Tapping Into the Use of Social Media Applications for Harnessing the Citizens' Collective Intelligence in the Strategic Digital CityCarla Cavichiolo Flores, Denis Alcides Rezende, Luisa Aguilar Lopes. 416-423 [doi]
- Visual Analytics Ontology-Guided I-DE System: A Case Study of Head and Neck Cancer in AustraliaAhsan Morshed, Abdur Rahim Mohammad Forkan, Tejal Shah, Prem Prakash Jayaraman, Rajiv Ranjan, Dimitrios Georgakopoulos. 424-429 [doi]
- Using Fuzzy Geoparticipation Methods to Optimize the Spatial Development Process in a Smart CityRobert Olszewski, Agnieszka Turek. 430-437 [doi]
- A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of VehiclesAyesha Anzer, Mourad Elhadef. 438-445 [doi]
- Towards the Basic Principles of Osmotic Computing: A Closed-Loop Gamified Cognitive Rehabilitation Flow ModelAlina Buzachis, Giuseppe Massimo Bernava, Mario Busa, Giovanni Pioggia, Massimo Villari. 446-452 [doi]
- Train and Equip Firefighters with Cognitive Virtual and Augmented RealityLi Yang, Yu Liang, Dalei Wu, Jim Gault. 453-459 [doi]
- Semantically Rich, Context Aware Access Control for OpenstackVishal Rathod, Sandeep Narayanan, Sudip Mittal, Anupam Joshi. 460-465 [doi]
- Cold-Start User-Based Weighted Collaborative Filtering for an Implicit Recommender System for Research FacilitiesYogesh S. Kale, Samantha E. Petrie, Marwan Bikdash, Michael D. Topal. 466-471 [doi]
- Multi-Stakeholder Consensus Decision-Making Framework Based on Trust: A Generic FrameworkLina Alfantoukh, Yefeng Ruan, Arjan Durresi. 472-479 [doi]
- Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging ServicesAdya Joshi, Madan Oberoi, Ranjan Bose. 480-486 [doi]