Abstract is missing.
- Fast Real-World Implementation of a Direction of Arrival Method for Constrained Embedded IoT DevicesTiago Troccoli, Juho Pirskanen, Aleksandr Ometov, Jari Nurmi, Ville Kaseva. 1-8 [doi]
- Modeling the Carbon Footprint of Battery-Powered IoT Sensor Nodes for Environmental-Monitoring ApplicationsPol Maistriaux, Thibault Pirson, Maxime Schramme, Jérôme Louveaux, David Bol. 9-16 [doi]
- Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial ExpertsMarco Giani, Nelly Frank, Alexander Verl. 17-24 [doi]
- SOCRAR: Semantic OCR through Augmented RealityJannis Strecker, Kimberly García, Kenan Bektas, Simon Mayer, Ganesh Ramanathan. 25-32 [doi]
- Enabling IoT-enhanced Transportation Systems using the NGSI ProtocolGeorgios Bouloukakis, Chrysostomos Zeginis, Nikos Papadakis, Panagiotis Zervakis, Dimitris Plexousakis, Kostas Magoutis. 33-40 [doi]
- Probabilistic Analysis of Industrial IoT ApplicationsIrman Faqrizal, Gwen Salaün, Yliès Falcone. 41-48 [doi]
- Targeted Black-Box Side-Channel Mitigation for IoT✱Ismet Burak Kadron, Chaofan Shou, Emily O'Mahony, Yilmaz Vural, Tevfik Bultan. 49-56 [doi]
- Jamming Detection in IoT Wireless Networks: An Edge-AI Based ApproachAhmed Hussain, Nada Abughanam, Junaid Qadir 0001, Amr Mohamed 0001. 57-64 [doi]
- Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking AnalysisXiaokang Yin 0001, Ruijie Cai, Yizheng Zhang, Lukai Li, Qichao Yang, Shengli Liu. 65-72 [doi]
- Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and EvaluationAhmed Hussain, Nada Abughanam, Savio Sciancalepore, Elias Yaacoub, Amr Mohamed 0001. 73-80 [doi]
- Future scoping of truly Human-Centric IoT and Intelligent Networks: A Foresight ApproachKaja FjØrtoft Ystgaard, Katrien De Moor. 81-87 [doi]
- Connecting Textiles: Exploring Textile Interior Surfaces for Power Supply, Communication and User Interaction in the IoTFrank Beruscha, Katharina Lorenz, Anke Königschulte, Serge Autexier, Annika Sabrina Schulz, Bodo Pahlke, Valerie Bartsch, Hendrik Leibrandt. 88-95 [doi]
- I just wanted to track my steps! Blocking unwanted traffic of Fitbit devicesAndrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos. 96-103 [doi]
- Occupancy Estimation Using Sparse Sensor CoverageHenrik Dyrberg Egemose, Brodie W. Hobson, Mohamed Ouf, Mikkel Baun Kjærgaard. 104-111 [doi]
- Distributed deep reinforcement learning architecture for task offloading in autonomous IoT systemsAbdel Kader Chabi Sika Boni, Youssef Hablatou, Hassan Hassan 0002, Khalil Drira. 112-118 [doi]
- Blockchains Accesses for Low-Power Embedded Devices using LoRaWANManon Arnaudo, Luc Gerrits, Ilya Grishkov, Roland Kromes, François Verdier. 119-126 [doi]
- A Middleware for Automatic Composition and Mediation in IoT SystemsAbdessalam Elhabbash, Yehia Elkhatib, Georgios Bouloukakis, Maria Salama. 127-134 [doi]
- Ensuring Situation-Aware Privacy for Connected VehiclesYunxuan Li, Pascal Hirmer, Christoph Stach, Bernhard Mitschang. 135-138 [doi]
- Smart agricultural monitoring system: a practical design approachEbenezer Akansah, Elisha Elikem Kofi Senoo, Israel Mendonça, Masayoshi Aritsugi. 139-142 [doi]
- Internet of Things for Wetland Conservation using Helium Network: Experience and AnalysisArslan Musaddiq, Neda Maleki, Francis Palma, David Mozart, Tobias Olsson, Mustafa Omareen, Fredrik Ahlgren. 143-146 [doi]
- COVIDGuardian: A Machine Learning approach for detecting the Three CsKento Katsumata, Yuka Honda, Tadashi Okoshi, Jin Nakazawa. 147-150 [doi]
- Data Protection Fortification: An Agile Approach for Threat Analysis of IoT DataSigrid Marita Kvamme, Espen Gudmundsen, Tosin Daniel Oyetoyan, Daniela Soares Cruzes. 151-154 [doi]
- Security and Privacy Concerns of Pet Tech UsersScott Harper, Maryam Mehrnezhad, Matthew Leach. 155-162 [doi]
- Industrial Internet of Things Security Modelling using Ontological MethodsMuhammad Aslam Jarwar, Jeremy Watson, Uchenna Daniel Ani, Stuart Chalmers. 163-170 [doi]
- Risk Assessment and Classification of Medical Device Software for the Internet of Medical Things: Challenges arising from connected, intelligent medical devicesIrina Brass, Andrew Mkwashi. 171-178 [doi]
- Attributes and Dimensions of Trust in Secure SystemsMatthew Bradbury, Daniel Prince, Victoria Marcinkiewicz, Tim Watson. 179-186 [doi]
- An approach for Web of Things over Named Data NetworkingJunior Dongo. 187-192 [doi]
- A Survey and Comparison of Publish/Subscribe Protocols for the Industrial Internet of Things (IIoT)Michael Nast, Hannes Raddatz, Benjamin Rother, Frank Golatowski, Dirk Timmermann. 193-200 [doi]
- IoPT: A Concept of Internet of Perception-aware ThingsYuki Matsuda 0001. 201-204 [doi]
- A modeling approach for integration and contextualization of simulation-based digital services in IIoTMiriam Schleipen, Viktor Schubert, Samir Dzidic, Dimitri Penner, Sven Spieckermann. 205-210 [doi]
- Safe Roads: an Integration between Twitter and City SensingHenrique Sousa, Pedro Figueiredo, Daniel Francisco, Miguel Monteiro, Renato Dias, Ana Almeida, Pedro Rito, Susana Sargento. 211-218 [doi]
- XR Communication System for Remote Control WheelchairsHironori Shimosato, Nozomi Hayashida, Kenta Urano, Takuro Yonezawa, Nobuo Kawaguchi. 219-223 [doi]
- Tongaraas: Tongs for Recognizing Littering Garbage with Active Acoustic Sensingkoki tachibana, Yuki Matsuda 0001, Kaito Isobe, Daiki Mayumi, Takamasa Kikuchi, Hirohiko Suwa, Keiichi Yasumoto, Kazuya Murao. 224-230 [doi]
- Every Thing Under the Sun: How Web of Things and Semantic Data Brings Benefit to Small-Scale Photovoltaic InstallationsGanesh Ramanathan, Srinivas Marella. 231-238 [doi]
- Task Allocation in Industrial Edge Networks with Particle Swarm Optimization and Deep Reinforcement LearningPhilippe Buschmann, Mostafa H. M. Shorim, Max Helm, Arne Bröring, Georg Carle. 239-247 [doi]