Abstract is missing.
- Preface1-3 [doi]
- Preface4-5 [doi]
- Keynote IDomingo Benitez. 6 [doi]
- Keynote IIJamal Bentahar. 7-8 [doi]
- Building An Anomaly Detection Engine (ADE) For IoT Smart ApplicationsNawaz Mohamudally, Mahejabeen Peermamode-Mohaboob. 10-17 [doi]
- Context Data Categories and Privacy Model for Mobile Data Collection AppsFelix Beierle, Vinh Thuy Tran, Mathias Allemand, Patrick Neff, Winfried Schlee, Thomas Probst, Rüdiger Pryss, Johannes Zimmermann. 18-25 [doi]
- Monitoring System Using Internet of Things For Potential LandslidesMeryem El Moulat, Olivier Debauche, Saïd Mahmoudi, Lahcen Aït Brahim, Pierre Manneback, Frédéric Lebeau. 26-34 [doi]
- Trust-based Context-aware Authentication System for Ubiquitous SystemsMalika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet. 35-42 [doi]
- On PMIPv6-based Cost-Effective Function-distributed Mobility Management Scheme for Industrial Future InternetJeong-A Kim, Jongpil Jeong. 43-50 [doi]
- Security of LoRaWAN v1.1 in Backward Compatibility ScenariosTahsin C. M. Dönmez, Ethiopia Nigussie. 51-58 [doi]
- Artificial Neural Network Model to relate Organization Characteristics and Construction Project Delivery MethodsUneb Gazder, Elhadi M. Shakshuki, Muhammad Adnan, Ansar-Ul-Haque Yasar. 59-66 [doi]
- A Smart Mobile Assessment Tool for Collecting Data in Large-Scale Educational StudiesKevin Andrews, Michael Zimoch, Manfred Reichert, Miles Tallon, Ulrich Frick, Rüdiger Pryss. 67-74 [doi]
- Model-Based Runtime Monitoring of Smart City SystemsKoray Inçki, Ismail Ari. 75-82 [doi]
- A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computingKhalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad. 83-90 [doi]
- Components for Smart Autonomous Ship Architecture Based on Intelligent Information TechnologyIllkyun Im, Dong Ryeol Shin, Jongpil Jeong. 91-98 [doi]
- A proposal of low-cost and low-power embedded wireless image sensor node for IoT applicationsMarcel Tresanchez, A. Pujol, Tomàs Pallejà, Dani Martínez, Eduard Clotet, Jordi Palacín. 99-106 [doi]
- The hybrid neural model to strengthen the e-nose restricted in real complex conditionsSlimane Ouhmad, Abderrahim Beni Hssane, Abdelmajid Hajami. 107-113 [doi]
- Towards a Real-time Occupancy Detection Approach for Smart BuildingsH. Elkhoukhi, Y. Nait Malek, A. Berouine, Mohamed Bakhouya, D. Elouadghiri, Mohammed Essaaidi. 114-120 [doi]
- Towards Distributed Containerized Serverless Architecture in Multi Cloud EnvironmentBoubaker Soltani, Afifa Ghenai, Nadia Zeghib. 121-128 [doi]
- Human Mobility Prediction Through TwitterCarmela Comito. 129-136 [doi]
- A Brief Review of Holonic Multi-Agent Models for Traffic and Transportation SystemsIgor Haman Tchappi, Stéphane Galland, Vivient Corneille Kamla, Jean-Claude Kamgang. 137-144 [doi]
- Towards Incentive Management Mechanisms in the Context of Crowdsensing Technologies based on TrackYourTinnitus InsightsKushal Agrawal, Muntazir Mehdi, Manfred Reichert, Franz J. Hauck, Winfried Schlee, Thomas Probst, Rüdiger Pryss. 145-152 [doi]
- Towards a Beacon-based Situational Prioritization Framework for Process-Aware Information SystemsMichael Stach, Tim Mohring, Rüdiger Pryss, Manfred Reichert. 153-160 [doi]
- On Hierarchical Crossing-layer Binding Update Scheme for Industrial Mobile NetworkingSoonsung Hwang, Jongpil Jeong. 161-168 [doi]
- On Microcell-Macrocell Handoff Queueing scheme in Heterogeneous Industrial NetworksChangyong Um, Jongpil Jeong. 169-176 [doi]
- Energy efficient clustering and routing in a wireless sensor networksAsha G. R., Gowrishankar. 178-185 [doi]
- Clustering analysis of online discussion participantsPeter Krammer, Marcel Kvassay, Ján Mojzis, Ivana Budinska, Ladislav Hluchý, Marek Jurkovic. 186-195 [doi]
- Simulation Platform of Optical Transmission System in Matlab SimulinkPavol Salík, Rastislav Róka, Tomás Gorazd. 196-203 [doi]
- Security of Join Procedure and its Delegation in LoRaWAN v1.1Tahsin C. M. Dönmez, Ethiopia Nigussie. 204-211 [doi]
- A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial NoiseLing Chen, MingChu Li, Ling Qin, Yingmo Jie. 212-218 [doi]
- Third-generation sequencing data analytics on mobile devices: cache oblivious and out-of-core approaches as a proof-of-conceptFranco Milicchio, Marco Oliva, Christina Boucher, Mattia C. F. Prosperi. 219-226 [doi]
- Towards a New approach for automating the simulation of QoS mechanisms in a smart digital environmentAyoub Bahnasse, Abdelmajid Badri, Mohamed Talea, Fatima Ezzahraa Louhab, Azeddine Khiat. 227-234 [doi]
- A PMIPv6-based User Mobility Pattern Scheme for SDN-defined Smart Factory NetworkingDae Jun Ahn, Jongpil Jeong. 235-242 [doi]
- C-ITSChadha Zrari, Flavien Balbo, Khaled Ghédira. 243-250 [doi]
- Optimally Protecting Elections with Uncertainty about Voter PreferencesMingChu Li, Yuanpeng Cao. 251-258 [doi]
- Evaluation of a Compound Node Selection Function for a Greedy Routing in Urban Vehicular Ad Hoc NetworksTrung Chi Ngo, Quy Lam Hoang, Hoon Oh. 259-266 [doi]
- A Per-Face Popularity Scheme to Increase Cache Robustness in Information-Centric NetworksJohn P. Baugh, Jinhua Guo. 267-274 [doi]
- Network State Conservation in Dynamic Spectrum Access: the IEEE 802.11 DCF CaseJun Peng. 275-282 [doi]
- Optimal Resource Allocation in Cyber-Security: A Game Theoretic ApproachAbderrahmane Sokri. 283-288 [doi]
- Fog Computing: Data Streaming Services for Mobile End-UsersTarek R. Sheltami, Essa Q. Shahra, Elhadi M. Shakshuki. 289-296 [doi]
- A Recursive K-means towards trade-off between PLM Competences, Positions, and OffersMourad Messaadia, Samir Ouchani, Anne Louis. 297-302 [doi]
- SMS: Smart Management Scheme via Software Defined NetworksAhmad Nahar Quttoum, Hassan AlSaraireh, Olbi Khadjiev, Marwa Alqudaimat. 303-308 [doi]
- Detection of DNS DDoS Attacks with Random Forest Algorithm on SparkLiguo Chen, Yuedong Zhang, Qi Zhao, Guanggang Geng, Zhiwei Yan. 310-315 [doi]
- Unpredictable cryptographic primitives for the Robust Wireless Network SecurityYounes Asimi, Ahmed Asimi, Azidine Guezzaz, Zakariae Tbatou, Yassine Sadqi. 316-321 [doi]
- Blind Maternal-Fetal ECG Separation Based on the Time-Scale Image TSI and SVD - ICA MethodsSaid Ziani, Atman Jbari, Larbi Bellarbi, Yousef Farhaoui. 322-327 [doi]
- IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security BehaviorsEl Balmany Chawki, Asimi Ahmed, Tbatou Zakariae. 328-333 [doi]
- Analysis of the allocation of classes, threads and CPU used in embedded systems for Java applicationsHicham Medromi, Laila Moussaid, Laila FAL. 334-339 [doi]
- One query to retrieve XML and Relational DataHassana Nassiri, Mustapha Machkour, Mohamed Hachimi. 340-345 [doi]
- Proposal of a Big data System Based on the Recommendation and Profiling Techniques for an Intelligent Management of Moroccan TourismOumayma Boulaalam, Badraddine Aghoutane, Driss El Ouadghiri, Aniss Moumen, Mahamed Laghdaf Cheikh Malinine. 346-351 [doi]
- Energy Efficiency: Improving the renewable energy penetration in a smart and green communityHaddaoui Abdelwahab, Laila Moussaid, Fouad Moutaouakkil, Hicham Medromi. 352-357 [doi]
- PentaNoc: A New Scalable and self-similar NoC ArchitectureAhlem Boudellioua, Nasser Alzeidi. 358-364 [doi]
- A Novel Approach for Optimizing Governance, Risk management and Compliance for Enterprise Information security using DEMATEL and FoMDharmalingam Ramalingam, Shivasankarappa Arun, Neelamegam Anbazhagan. 365-370 [doi]
- An Enhanced AODV Protocol for Avoiding Black Holes in MANETQussai M. Yaseen, Monther Aldwairi. 371-376 [doi]
- A Qualitative Evaluation of IPv6 for the Industrial Internet of ThingsBenjamin Feldner, Paula Herber. 377-384 [doi]
- Fine-grained Access Control Framework for Igor, a Unified Access Solution to The Internet of ThingsPauline Sia Wen Shieng, Jack Jansen, Steven Pemberton. 385-392 [doi]
- How blockchain improves the supply chain: case study alimentary supply chainRoberto Casado-Vara, Javier Prieto, Fernando de la Prieta, Juan M. Corchado. 393-398 [doi]
- Multi Criteria Decision Making (MCDM) based Spectrum Moderator for Fog-Assisted Internet of ThingsSubha P. Eswaran, Sridhar Sripurushottama, Manoj Jain. 399-406 [doi]
- Mobile Systems applied to Traffic Management and Safety: a state of the artVittorio Astarita, Demetrio Carmine Festa, Vincenzo Pasquale Giofrè. 407-414 [doi]
- Low-cost smartphone-based speed surveying methods in proximity to traffic calming devicesNicola Berloco, Pasquale Colonna, Paolo Intini, Giuseppe Masi, Vittorio Ranieri. 415-420 [doi]
- Automatic data collection for detecting travel behavior: the IPET platformFrancesco Piras, Eleonora Sottile, Daniele Calli, Italo Meloni. 421-426 [doi]
- The use of Smartphones to assess the Feasibility of a Cooperative Intelligent Transportation Safety System based on Surrogate Measures of SafetyVittorio Astarita, Demetrio Carmine Festa, Vincenzo Pasquale Giofrè, Giuseppe Guido, Alessandro Vitale. 427-432 [doi]
- Mobile for emergencies M4EM: a cooperative software tool for emergency management operationsVittorio Astarita, Demetrio Carmine Festa, Vincenzo Pasquale Giofrè, Giuseppe Guido, Giulio Stefano. 433-438 [doi]
- Comfort Index CI(bus): A methodology to measure the comfort on boardVincenzo Barone, Demetrio Carmine Festa, Domenico Walter Edvige Mongelli, Antonio Tassitani. 439-444 [doi]
- Referenceable mobile crowdsensing architecture: A healthcare use caseMuntazir Mehdi, Guido Mühlmeier, Kushal Agrawal, Rüdiger Pryss, Manfred Reichert, Franz J. Hauck. 445-451 [doi]
- AMSEP: Automated Multi-level Security Management for Multimedia Event ProcessingHichem Ben Abdallah, Takoua Abdellatif, Faouzi Chekir. 452-457 [doi]
- Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home EnvironmentsOlivier Brun, Yonghua Yin, Erol Gelenbe. 458-463 [doi]
- Design and Implementation of Monitoring System Architecture for Smart Bicycle PlatformYeongKyun Lee, Jongpil Jeong. 464-469 [doi]