Abstract is missing.
- NeuroMesh: IoT Security Enabled by a Blockchain Powered Botnet VaccineGregory Falco, Caleb Li, Pavel Fedorov, Carlos Caldera, Rahul Arora, Kelly Jackson. 1-6 [doi]
- Leveraging User Mobility and Mobile App Services Behavior for Optimal Edge Resource UtilizationJohn Violos, Evangelos Psomakelis, Konstantinos Tserpes, Fotis Aisopos, Theodora A. Varvarigou. 7-12 [doi]
- Under Sampling Bagging Shapelet Transformation for Hydraulic SystemYohan Joo, Jongpil Jeong, Sangmin Bae. 13-18 [doi]
- The 51 V's Of Big Data: Survey, Technologies, Characteristics, Opportunities, Issues and ChallengesNawsher Khan, Arshi Naim, Mohammad Rashid Hussain, Noorulhasan Naveed Quadri, Naim Ahmad, Shamimul Qamar. 19-24 [doi]
- Dynamic Constraints for Mixed-Criticality SystemsDávid Juhász, Axel Jantsch. 25-30 [doi]
- Security and Safety Co-Engineering of the FlexRay Bus in Vehicular NetworksDominik Püllen, Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Stefan Katzenbeisser 0001. 31-37 [doi]
- Representation learning for social networks using Homophily based Latent Space ModelPranav Nerurkar, Madhav Chandane, Sunil Bhirud. 38-43 [doi]
- A Design Flow Framework for Fully-Connected Neural Networks Rapid PrototypingNikolaos Zompakis, Dimitrios Anagnostos, Konstantina Koliogeorgi, Georgios Zervakis, Kostas Siozios. 44-49 [doi]
- Bitcoin Payment-Channels for Resource Limited IoT DevicesChristopher Hannon, Dong Jin. 50-57 [doi]
- Enhanced Data Transmission Platform in Smart FarmsAlireza Izaddoost, Efemena Ogodo, Sandesh Prasai. 58-61 [doi]
- IoT-based Urban Noise Identification Using Machine Learning: Performance of SVM, KNN, Bagging, and Random ForestYasser Alsouda, Sabri Pllana, Arianit Kurti. 62-67 [doi]
- Analysis of Performance and Energy Consumption of Wearable Devices and Mobile Gateways in IoT ApplicationsMohammad R. Nakhkash, Tuan Nguyen Gia, Iman Azimi, Arman Anzanpour, Amir M. Rahmani, Pasi Liljeberg. 68-73 [doi]
- Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in CloudsFaraz Fatemi Moghaddam, Philipp Wieder, Süleyman Berk Çemberci, Ramin Yahyapour. 74-79 [doi]
- Experimental Evaluation of Scenario Aware Synchronous Data Flow based Power ManagementOliver Klemp, Maher Fakih, Kim Grüttner, Ralf Stemmer, Wolfgang Nebel. 80-85 [doi]
- A Design-flow for implementing, validating and evaluating Machine-learning Classifiers on FPGAsJan Cordes, Maher Fakih. 86-91 [doi]
- Hardware Acceleration of Image Registration Algorithm on FPGA-based Systems on ChipIoannis Stratakos, Dimitrios Gourounas, Vasileios Tsoutsouras, Theodore L. Economopoulos, George K. Matsopoulos, Dimitrios Soudris. 92-97 [doi]
- A Quality Attribute-based Evaluation of Time-series Databases for Edge-centric ArchitecturesJanaki Joshi, Lakshmi Sirisha Chodisetty, Varsha Raveendran. 98-103 [doi]
- SAFEPOWER: Application of Power Management Techniques in SoCs for Safety-Relevant SystemsKim Grüttner, Maher Fakih, Mikel Azkarate-askatsua, Peio Onaindia, Roman Obermaisser. 104-109 [doi]
- Workload-aware Management Targeting Multi-Gateway Internet-of-ThingsIoannis Galanis, Theodoros Marinakis, Iraklis Anagnostopoulos. 110-115 [doi]
- An Implemented Open Source Blockchain Market for Smart Grids and Microgrids Using Autonomous AgentsStefan Forsström, Ulf Jennehag. 116-121 [doi]
- Differentiating Attacks and Faults in Energy Aware Smart Home System using Supervised Machine LearningGeorgios Tertytchny, Nicolas Nicolaou, Maria K. Michael. 122-127 [doi]
- Metis: Optimal Task Allocation Framework for the Edge/Hub/Cloud ParadigmAndreas Kouloumpris, Theocharis Theocharides, Maria K. Michael. 128-133 [doi]
- Towards Collaborative Machine Learning Driven Healthcare Internet of ThingsBahar Farahani, Mojtaba Barzegari, Fereidoon Shams Aliee. 134-140 [doi]
- Towards Distributed Runtime Monitoring with C++ ContractsRolf Schmedes, Philipp Ittershagen, Kim Grüttner. 141-145 [doi]
- Assessment of Model-based Methodologies to Architect Cyber-Physical SystemsAndreas Aigner, Abdelmajid Khelil. 146-151 [doi]
- Blockchain-based Smart-IoT Trust Zone Measurement ArchitectureJawad Ali, Toqeer Ali Syed, Yazed Alsaawy, Ahmad Shahrafidz Khalid, Shahrulniza Musa. 152-157 [doi]
- Decentralized Directed acyclic graph based DLT NetworkA. Saad, Soo-young Park. 158-163 [doi]
- Securing Over-The-Air IoT Firmware Updates using BlockchainXinchi He, Sarra M. Alqahtani, Rose F. Gamble, Mauricio Papa. 164-171 [doi]
- Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices DetectionLydia Negka, Georgios Gketsios, Nikolaos A. Anagnostopoulos, Georgios Spathoulas, Athanasios Kakarountas, Stefan Katzenbeisser. 172-178 [doi]
- The Evolving Enterprise Architecture: A Digital Transformation PerspectiveFereidoon Shams Aliee, Hanieh Kashfi, Bahar Farahani. 179-183 [doi]
- Defining granularity levels for supply chain traceability based on IoT and blockchainThomas K. Dasaklis, Fran Casino, Constantinos Patsakis. 184-190 [doi]
- Secure Blockchain-Enabled DyMonDS DesignMichelle Lauer, Rupamathi Jaddivada, Marija Ilic. 191-198 [doi]
- Cycle-Accurate NoC-based Convolutional Neural Network SimulatorKun-Chih Jimmy Chen, Ting-Yi George Wang, Yueh-Chi Andrew Yang. 199-204 [doi]
- On automating delayered IC analysis for hardware IP protectionEsha Sarkar, Michail Maniatakos. 205-210 [doi]
- Protect Your Chip Design Intellectual Property: An OverviewJohann Knechtel, Satwik Patnaik, Ozgur Sinanoglu. 211-216 [doi]
- Security Assessment of Microfluidic ImmunoassaysMohammed Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty, Ramesh Karri. 217-222 [doi]
- Cross-layer Enterprise Architecture Evaluation: An Approach to Improve the Evaluation of TO-BE Enterprise ArchitectureHossein Ahmadi, Bahar Farahani, Fereidoon Shams Aliee, Masoud Azizi Motlagh. 223-228 [doi]
- Probabilistic-WCET Reliability: On the experimental validation of EVT hypothesesFederico Reghenzani, Giuseppe Massari, William Fornaciari, Andrea Galimberti. 229-234 [doi]