Abstract is missing.
- Few Shot NER on Augmented Unstructured Text from Cardiology RecordsAntonino Ferraro, Antonio Galli, Valerio La Gatta, Mario Minocchi, Vincenzo Moscato, Marco Postiglione. 1-12 [doi]
- The Influence of Financial Literacy and Financial Technology on SMEs' SustainabilityWinarsih, Desy Noviyanti, Mutoharoh. 13-19 [doi]
- The Effect of Digital and Human Capital Transformation on SME Performance with Accounting Information Systems as an Intervening VariableWinarsih, Kholida, Chrisna Suhendi. 20-30 [doi]
- OpenVSLAM-Based Development Framework for Web-Based VR Tours Using 360VR Videos and Its ExtensionsYoshihiro Okada, Wei Shi 0008, Kosuke Kaneko. 31-42 [doi]
- Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New ParameterShunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 43-52 [doi]
- Source Code Vulnerability Detection Based on Graph Structure Representation and Attention MechanismsYiran Sun, Ziqi Wang, Kewei Liu, Baojiang Cui. 53-63 [doi]
- An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial TestingSiyuan Wang, Zhiwei Cui, Jie Xu 0038, Baojiang Cui. 64-74 [doi]
- Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal FeaturesQing Guo, Wenchuan Yang, Baojiang Cui. 75-86 [doi]
- Fuzzing IoT Devices via Android App Interfaces with Large Language ModelWenxing Ma, Baojiang Cui. 87-99 [doi]
- Towards the Automated Population of Thesauri Using BERT: A Use Case on the Cybersecurity DomainElena Cardillo, Alessio Portaro, Maria Taverniti, Claudia Lanza, Raffaele Guarasci. 100-109 [doi]
- Network Scanning Detection Based on Spatiotemporal BehaviorPengyuan Zhang, Baojiang Cui. 110-117 [doi]
- IoTaint: An Optimized Static Taint Analysis Method in Embedded FirmwareHuan Yu, Baojiang Cui. 118-129 [doi]
- An Innovative Approach to Real-Time Concept Drift Detection in Network SecurityFederica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras. 130-139 [doi]
- Formal Analysis of 5G EAP-TLS 1.3Naiguang Zhu, Jie Xu 0038, Baojiang Cui. 140-151 [doi]
- Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social EngineeringKota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki. 152-162 [doi]
- Design of Secure Fair Bidding Scheme Based on Threshold Elliptic Curve ElGamal CryptographyLiping Shi. 163-172 [doi]
- Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data CentersMichele Mastroianni, Massimo Ficco, Francesco Palmieri 0002, Vincenzo Emanuele Martone. 173-184 [doi]
- A Method for Estimating the Number of Diseases in J-MID Database: Application to CT ReportKoji Sakai, Yu Ohara, Yosuke Maehara, Takeshi Takahashi, Kei Yamada. 185-193 [doi]
- Text Mining with Finite State Automata via Compound Words OntologiesAlberto Postiglione. 194-205 [doi]
- Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding NetworkFeng Tian, Baojiang Cui, Chen Chen 0061. 206-218 [doi]
- Probing Cross-lingual Transfer of XLM Multi-language ModelRaffaele Guarasci, Stefano Silvestri, Massimo Esposito. 219-228 [doi]
- Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint AnalysisYifan Luo, Baojiang Cui. 229-240 [doi]
- A Method for Calculating Degree of Deviation of Posts on Social Media for Public Opinion in Flaming PredictionYusuke Yoshida, Kosuke Takano. 241-250 [doi]
- Systematic Review of Eye-Tracking StudiesAlba Haveriku, Hakik Paci, Nelda Kote, Elinda Kajo Meçe. 251-260 [doi]
- TPLUG: An Efficient Framework Through Token Pair Linking and Undirected Graph for Chinese Event ExtractionTing Hu, Fang Deng, Zhiqiang Chu. 261-272 [doi]
- Usability and Effectiveness of a Developed IoT-Based Smart Beverage DispenserDennis R. dela Cruz, Dyan G. Rodriguez, Hazel A. Caparas. 273-284 [doi]
- An Algorithm to Change the TBFC Model to Reduce the Energy Consumption of the IoTDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 285-296 [doi]
- An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz TestingHuipeng Liu, Baojiang Cui, Jie Xu, Lihua Niu. 297-306 [doi]
- XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement LearningRui Liu, Baojiang Cui, Chen Chen 0061, Jinxin Ma. 307-317 [doi]
- Implementation of a Fuzzy-Based Testbed for Selection of Radio Access Technologies in 5G Wireless Networks and Its Performance EvaluationPhudit Ampririt, Shunya Higashi, Paboth Kraikritayakul, Ermioni Qafzezi, Keita Matsuo, Leonard Barolli. 318-331 [doi]
- A Fuzzy-Based System for Assessment of Recognition Error in VANETs Considering Inattentive Driving as New ParameterErmioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli. 332-342 [doi]
- Performance Evaluation of BLX-α Crossover Method for Different Instances of WMNs Considering FC-RDVM Router Replacement Method and Subway Distribution of Mesh ClientsAdmir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 343-352 [doi]
- A Measurement System for Improving Riding Comfortability of Omnidirectional Wheelchair RobotKeita Matsuo, Leonard Barolli. 353-361 [doi]
- A Comparative Study of Four YOLO-Based Models for Distracted Driving DetectionNaoki Tanaka, Hibiki Tanaka, Makoto Ikeda, Leonard Barolli. 362-370 [doi]
- An Intelligent System Based on CCM, SA and FDTD for Sensor Node Placement Optimization in Wireless Visual Sensor NetworksYuki Nagai, Tetsuya Oda, Chihiro Yukawa, Kyohei Wakabayashi, Leonard Barolli. 371-383 [doi]
- Performance Evaluation of a Cuckoo Search Based System for Node Placement Problem in Wireless Mesh Networks: Evaluation Results for Computation Time and Different Numbers of NestsShinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 384-393 [doi]
- Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-MiddleMenglin Ma, Baojiang Cui. 394-403 [doi]
- 4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle ModelZiyang Chen, Baojiang Cui, Zishuai Cheng. 404-414 [doi]
- Energy Sharing System Among Vehicles on a Vehicular NetworkWalter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella. 415-422 [doi]
- Proposal of Indoor AR Navigation System Using SLAM for Location SearchYusuke Gotoh, Ryusei Tsunetomo, Kiki Adhinugraha. 423-434 [doi]
- A Fuzzy-Based System for Real-Time Volume Control of Electric Bass GuitarsGenki Moriya, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli. 435-442 [doi]
- Implementation of a Low-Cost and Intelligent Driver Monitoring System for Engine Locking in the Presence of Alcohol Detection or Drowsiness in DriversEvjola Spaho, Orjola Jaupi, Anxhela Cala. 443-451 [doi]
- An Accident Detection System for Private Lavatories Using Fuzzy Control and Thermal CameraTomoaki Matsui, Tetsuya Oda, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Leonard Barolli. 452-459 [doi]
- A Fuzzy-Based System for Decision of Compressed Image Degree Using Cluster Load LevelKenya Okage, Tetsuya Oda, Yuki Nagai, Chihiro Yukawa, Kyohei Wakabayashi, Leonard Barolli. 460-469 [doi]
- A Fuzzy Control Based Method for Imaging Position Decision and Its Performance EvaluationChihiro Yukawa, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Leonard Barolli. 470-479 [doi]
- Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined NetworksSami Alsaadi, Tertsegha J. Anande, Mark S. Leeson. 480-491 [doi]
- Analysis and Development of a New Method for Defining Path Reliability in WebGIS Based on Fuzzy Logic and Dispersion IndicesWalter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella. 492-501 [doi]
- Object Detection and Speech Recognition Based Motion Analysis System for Pointing and CallingKyohei Wakabayashi, Chihiro Yukawa, Yuki Nagai, Tetsuya Oda, Leonard Barolli. 502-511 [doi]
- Trust Zone Model with the Mandatory Access Control ModelShigenari Nakamura, Makoto Takizawa 0001. 512-521 [doi]
- A DPI-Based Network Traffic Feature Vector Optimization ModelYuqing Zhao, Baojiang Cui, Jun Yang, Meiyi Jiang. 522-531 [doi]
- A Hill Climbing System for Optimizing Component Selection of Multirotor UAVsNobuki Saito, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Leonard Barolli. 532-544 [doi]
- Optimization of Deer Repellent Devices Placement Based on Hill Climbing and Acoustic Ray TracingSora Asada, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli. 545-554 [doi]
- Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees AlgorithmPeixin Cong, Baojiang Cui. 555-566 [doi]
- Star Point Target Extraction with High Noise Background Based on MorphologyZhen-Zhen Li. 567-574 [doi]
- Toward Detection of Fake News Using Sentiment Analysis for Albanian News ArticlesBesjana Muraku, Lu Xiao, Elinda Kajo Meçe. 575-585 [doi]
- Proposal of My Hazard Map System for Disaster Prevention EducationToshiya Morita, Tomoyuki Ishida. 586-596 [doi]
- Automated Storytelling Technologies for Cultural HeritageLuigi Colucci Cante, Beniamino Di Martino, Mariangela Graziano, Dario Branco, Gennaro Junior Pezzullo. 597-606 [doi]
- Support for Automated Story Telling Using Natural Language Processing Techniques Aimed at Recognizing Narrative ElementsBeniamino Di Martino, Gennaro Junior Pezzullo, Emanuela Grassia. 607-616 [doi]
- Travel Air IQ: A Tool for Air Quality-Aware TouristsDivya Pragna Mulla, Antonella Calò, Antonella Longo. 617-628 [doi]
- Advanced IT Technologies Applied to Archaeological Park of Norba (Latium, Italy)Dario Branco, Antonio Coppa, Salvatore D'Angelo, Stefania Quilici Gigli, Giuseppina Renda, Salvatore Venticinque. 629-638 [doi]
- XR Theater: An ExperienceMario Alessandro Bochicchio, Eleonora Miccoli. 639-648 [doi]