Abstract is missing.
- Assimilated Learning - Bridging the Gap between Big Data and Smart DataYi-Ke Guo. 7
- Big Data - Evolution, Trends and OpportunitiesRoy R. Cecil. 13
- A Data-Driven Methodology for Heating Optimization in Smart BuildingsVictoria Moreno, José Antonio Ferrer, José Alberto Díaz, Domingo Bravo, Victor Chang 0001. 19-29 [doi]
- A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic NetworksSamaneh Rashidibajgan. 30-35 [doi]
- A Dataset and a Comparison of Out-of-Order Event Compensation AlgorithmsWolfgang Weiss, Víctor Juan Expósito Jiménez, Herwig Zeiner. 36-46 [doi]
- IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based BotnetsRoger Hallman, Josiah Bryan, Geancarlo Palavicini, Joseph DiVita, Jose Romero-Mariona. 47-58 [doi]
- Outsourcing Access Control for a Dynamic Access Configuration of IoT ServicesPhilipp Montesano, Marc Hüffmeyer, Ulf Schreier. 59-69 [doi]
- Factors Influencing Adoption of IoT for Data-driven Decision Making in Asset Management OrganizationsPaul Brous, Marijn Janssen, Daan Schraven, Jasper Spiegeler, Baris Can Duzgun. 70-79 [doi]
- Perceptions of Digital Footprints and the Value of PrivacyLuisa Vervier, Eva-Maria Zeissig, Chantal Lidynia, Martina Ziefle. 80-91 [doi]
- A LAHC-based Job Scheduling Strategy to Improve Big Data Processing in Geo-distributed ContextsMarco Cavallo, Giuseppe Di Modica, Carmelo Polito, Orazio Tomarchio. 92-101 [doi]
- Secure Edge Computing with ARM TrustZoneRobert Pettersen, Håvard D. Johansen, Dag Johansen. 102-109 [doi]
- Secure Electronic Health Record System Based on Online/Offline KP-ABE in the CloudKun Liu. 110-116 [doi]
- Internet of Things Architecture for Handling Stream Air Pollution DataJoschka Kersting, Michaela Geierhos, Hanmin Jung, Taehong Kim. 117-124 [doi]
- RSSI-based Device Free Localization for Elderly Care ApplicationShaufikah Shukri, Latifah Munirah Kamarudin, David Lorater Ndzi, Ammar Zakaria, Saidatul Norlyna Azemi, Kamarulzaman Kamarudin, Syed Muhammad Mamduh Syed Zakaria. 125-135 [doi]
- Task Offloading for Scientific Workflow Application in Mobile CloudFeifei Zhang, JiDong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo. 136-148 [doi]
- Live Migration for Service Function ChainingDongcheng Zhao, Gang Sun, Dan Liao, Rahat Iqbal, Victor Chang 0001. 149-156 [doi]
- A Low-cost Vehicle Tracking Platform using Secure SMSRune Hylsberg Jacobsen, Drini Aliu, Emad Ebeid. 157-166 [doi]
- Device Fingerprinting: Analysis of Chosen Fingerprinting MethodsAnna Kobusinska, Jerzy Brzezinski, Kamil Pawulczuk. 167-177 [doi]
- Lag Correlation Discovery and Classification for Time SeriesGeorgios Dimitropoulos, Estela Papagianni, Vasileios Megalooikonomou. 181-188 [doi]
- The XACML Standard - Addressing Architectural and Security AspectsÓscar Mortágua Pereira, Vedran Semenski, Diogo Domingues Regateiro, Rui L. Aguiar. 189-197 [doi]
- Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian PerceptionsNoura Aleisa, Karen Renaud. 198-205 [doi]
- Data Warehouse MFRJ Query Execution Model for MapReduceAleksey V. Burdakov, Uriy Grigorev, Victoria Proletarskaya, Artem Ustimov. 206-215 [doi]
- Evaluating the Efficiency of Blockchains in IoT with SimulationsJari Kreku, Visa Antero Vallivaara, Kimmo Halunen, Jani Suomalainen. 216-223 [doi]
- Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groupsYassine Essadraoui, Mohamed Dafir Ech-Cherif El Kettani. 224-231 [doi]
- New Computing Model for Securing Mobile Agents in IP NetworksJean Tajer, Mo Adda, Benjamin Aziz. 232-238 [doi]
- Privacy Agents for IoT Cloud CommunicationSyed Khuram Shahzad, Muhammad Waseem Iqbal, Nadeem Ahmad. 239-245 [doi]
- The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT DevicesGiovanni Perrone, Massimo Vecchio, Riccardo Pecori, Raffaele Giaffreda. 246-253 [doi]
- An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of ThingsHany F. Atlam, Ahmed Alenezi, Robert John Walters, Gary B. Wills. 254-260 [doi]
- Resolving the Misconceptions on Big Data Analytics Implementation through Government Research Institute in MalaysiaMohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli. 261-266 [doi]
- Big Data & Analytics to Support the Renewable Energy Integration of Smart Grids - Case Study: Power Solar GenerationGuillermo Escobedo, Norma Jacome-Grajales, Gustavo Arroyo-Figueroa. 267-275 [doi]
- IBSC System for Victims Management in Emergency ScenariosAlexandra Rivero-García, Iván Santos-González, Candelaria Hernández-Goya, Pino Caballero-Gil. 276-283 [doi]
- Internet of Things - The Power of the IoT PlatformThomas Ochs, Ute Riemann. 284-294 [doi]
- A Proposed Best-practice Framework for Information Security GovernanceGhada Gashgari, Robert John Walters, Gary Wills. 295-301 [doi]
- A Cognitive-IoE Approach to Ambient-intelligent Smart HomeGopal Jamnal, Xiaodong Liu. 302-308 [doi]
- Performance Testing of an Internet of Things PlatformJohn Esquiagola, Laisa Caroline de Paula Costa, Pablo Calcina, Geovane Fedrecheski, Marcelo Zuffo. 309-314 [doi]
- IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of ThingsNurul Huda Nik Zulkipli, Ahmed Alenezi, Gary B. Wills. 315-324 [doi]
- IoT based Proximity Marketing Zanele Nicole Mndebele, Muthu Ramachandran. 325-330 [doi]
- Memory Optimization of a Distributed Middleware for Smart Grid ApplicationsStephan Cejka, Albin Frischenschlager, Mario Faschang, Mark Stefan. 331-337 [doi]
- Secure IoT: An Improbable RealityNayana Mannilthodi, Jinesh M. Kannimoola. 338-343 [doi]
- Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - Paul Fremantle, Benjamin Aziz, Tom Kirkham. 344-349 [doi]
- Process Guidance for the Successful Deployment of a Big Data Project: Lessons Learned from Industrial CasesChristophe Ponsard, Annick Majchrowski, Stéphane Mouton, Mounir Touzani. 350-355 [doi]
- Minimizing the Risks of Data Protection Infringement - Data Lifecycle Risk AssessmentSilvia Balaban, Manuela Wagner. 356-362 [doi]
- Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node SecurityMuhammad Shaiful Azrin Md Alimon, L. M. Kamarudin, Azizi Harun, Ammar Zakaria, Shaufikah Shukri. 363-369 [doi]
- From Group-by to Accumulation: Data Aggregation RevisitedAlexandr Savinov. 370-379 [doi]
- Data Cleaning Technique for Security Big Data EcosystemDiana Martínez-Mosquera, Sergio Luján-Mora. 380-385 [doi]
- A Frequency-domain-based Pattern Mining for Credit Card Fraud DetectionRoberto Saia, Salvatore Carta. 386-391 [doi]
- A Holistic View of the IoT Process from Sensors to the Business ValueAteeq Khan, Matthias Pohl, Sascha Bosse, Stefan Willi Hart, Klaus Turowski. 392-399 [doi]
- Situational Awareness based Risk-adaptable Access Control in Enterprise NetworksBrian Lee, Roman Vanickis, Franklin Rogelio, Paul Jacob. 400-405 [doi]
- Big Data Analytics Framework for Natural Disaster Management in MalaysiaMohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli. 406-411 [doi]
- On the Prospect of using Cognitive Systems to Enforce Data Access ControlFernando Fradique Duarte, Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar. 412-418 [doi]
- Extracting Knowledge from Stream Behavioural PatternsRicardo Jesus, Mário Antunes 0001, Diogo Gomes, Rui L. Aguiar. 419-423 [doi]
- Optimization for Sustainable Manufacturing - Application of Optimization Techniques to Foster Resource EfficiencyEnrico Ferrera, Riccardo Tisseur, Emanuel Lorenço, E. J. Silva, Antonio J. Baptista, Gonçalo Cardeal, Paulo Peças. 424-430 [doi]
- Decentralized Content Trust for Docker ImagesQuanqing Xu, Chao Jin, Mohamed Faruq Bin Mohamed Rasid, Bharadwaj Veeravalli, Khin Mi Mi Aung. 431-437 [doi]
- An Image Data Learning Method by Discriminating Multiple ROIs Data Patterns for Extracting Weather InformationJiwan Lee, Sunghoon Jung, Kijin Kim, Minhwan Kim, Bonghee Hong. 438-443 [doi]
- Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service Priya Vedhanayagam, Subha S., Balamurugan Balusamy, Pandi Vijayakumar, Victor Chang 0001. 449-460 [doi]
- A Hands-on Approach on Botnets for Behavior ExplorationJoão Pedro Dias, José Pedro Pinto, José Magalhães Cruz. 463-469 [doi]
- Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware VettingGeancarlo Palavicini Jr., Josiah Bryan, Eaven Sheets, Megan Kline, John San Miguel. 470-477 [doi]
- An Integrated Model to Investigate an Individual's Behavioural Towards using Cloud ComputingNouf Alkhater, Gary Wills, Robert John Walters. 478-481 [doi]