Abstract is missing.
- Network Risk Assessment Method Based on Residual Risk AnalysisHao Jing, Peizhi Yan, Gang Wang, Jiewei Liu, Yige Fang. 1-18 [doi]
- EIMDC: A New Model for Designing Digital Twin ApplicationsXiang Wang, Haimin Hong, Jing Zeng, Yongming Sun, Guochuan Liu. 19-32 [doi]
- Penetration Testing: Smart Home IoT DevicesAshok Adarsh Angadi, Cihan Varol, Narasimha Shashidhar. 33-46 [doi]
- A Comparative Analysis of User's Concerns and Government Policies on Autonomous VehiclesVictorine Clotilde Wakam Younang, Jessica Yang, Leonardo Garcia Jacuinde, Amartya Sen. 47-61 [doi]
- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning SystemXiaohu Fan, Xuejiao Pang, Hao Feng. 62-76 [doi]
- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric ServicesDamilola Alao, Emily Hamrick, Saman Bhat, Amartya Sen, Kenneth K. Fletcher. 77-91 [doi]
- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT NodesFrederik Lauer, Maximilian Schöffel, Carl Christian Rheinländer, Norbert Wehn. 92-107 [doi]
- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT DevicesSatyam Mishra, Vu Minh Phuc, Nguyen Van Tanh. 108-122 [doi]
- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT SolutionsGilroy Philbert Pereira, Mohamed Zied Chaari. 123-132 [doi]