Abstract is missing.
- Edge Intelligence - The Co-evolution of Humans, IoT, and AISchahram Dustdar. 5
- New Horizons in IoT Workflows Provisioning in Edge and Cloud Datacentres for Fast Data Analytics: The Osmotic Computing ApproachRajiv Ranjan. 7-8
- Reference Architectures for Cloud-based Platforms: Convergence vs. DiversificationRóbert Lovas. 9
- Data-driven Model for Influenza Prediction Incorporating Environmental EffectsYosra Didi, Ahlem Walha, Ali Wali. 15-24 [doi]
- Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect FrameworkInes Kramer, Silvia Schmidt, Manuel Koschuch, Mathias Tausig. 25-35 [doi]
- Skeleton-based Action Recognition for Industrial Packing ProcessZhenhui Chen, HaiYang Hu, Zhongjin Li, Xingchen Qi, Haiping Zhang, Hua Hu, Victor Chang 0001. 36-45 [doi]
- A Life Cycle Method for Device Management in Dynamic IoT EnvironmentsDaniel Del Gaudio, Maximilian Reichel, Pascal Hirmer. 46-56 [doi]
- ZigBee IoT Intrusion Detection System: A Hybrid Approach with Rule-based and Machine Learning Anomaly DetectionFal Sadikin, Sandeep Kumar. 57-68 [doi]
- Decepti-SCADA: A Framework for Actively Defending Networked Critical InfrastructuresNicholas Cifranic, Jose Romero-Mariona, Brian Souza, Roger A. Hallman. 69-77 [doi]
- Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet DataMasataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake. 78-87 [doi]
- Online Predicting Conformance of Business Process with Recurrent Neural NetworksJiaojiao Wang, Dingguo Yu, Xiaoyu Ma, Chang Liu, Victor Chang 0001, Xuewen Shen. 88-100 [doi]
- IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NGEugene Frimpong, Antonis Michalas. 101-111 [doi]
- A Real-time Temperature Anomaly Detection Method for IoT DataWei Liu, Hongyi Jiang, Dandan Che, Lifei Chen, Qingshan Jiang. 112-118 [doi]
- Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained DevicesEugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas. 119-129 [doi]
- Best Fit Missing Value Imputation (BFMVI) Algorithm for Incomplete Data in the Internet of ThingsBenjamin Agbo, Yongrui Qin, Richard Hill. 130-137 [doi]
- A Systematic Mapping of Patterns and Architectures for IoT SecurityTanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry 0001. 138-149 [doi]
- Design and Development of IoT based Computer Network Room Environment Monitoring SystemFahd A. Banakhr. 153-160 [doi]
- Safety in Distributed Sensor Networks: A Literature ReviewTobias Altenburg, Sascha Bosse, Klaus Turowski. 161-168 [doi]
- Enabling Predictive and Preventive Maintenance using IoT and Big Data in the Telecom SectorTahir Mahmood, Kamran Munir. 169-176 [doi]
- The Socio-technical Impact of the Internet of Things: An Exploratory Mixed Methods ResearchAlbert Boonstra, Dustin A. Wiktor-Steffens. 177-188 [doi]
- A Cloud-based Analytics Architecture for the Application of Online Machine Learning Algorithms on Data Streams in Consumer-centric Internet of Things DomainsTheo Zschörnig, Jonah Windolph, Robert Wehlitz, Bogdan Franczyk. 189-196 [doi]
- Unity 3D Simulator of Autonomous Motorway Traffic Applied to Emergency Corridor BuildingJurij Kuzmic, Günter Rudolph. 197-204 [doi]
- A Reinforcement Learning QoS Negotiation Model for IoT MiddlewareItorobong S. Udoh, Gerald Kotonya. 205-212 [doi]
- The Suitability of Graph Databases for Big Data Analysis: A BenchmarkMartin Macak, Matus Stovcik, Barbora Buhnova. 213-220 [doi]
- Stocks Prices Prediction with Long Short-term MemoryZinnet Duygu Aksehir, Erdal Kiliç, Sedat Akleylek, Mesut Döngül, Burak Coskun. 221-226 [doi]
- IoT-based Systems Actuation Conflicts Management Towards DevOps: A Systematic Mapping StudyStéphane Lavirotte, Gérald Rocher, Jean-Yves Tigli, Thibaut Gonnin. 227-234 [doi]
- OKIoT Open Knowledge IoT Project: Smart Home Case Studies of Short-term Course and Software Residency Capstone ProjectVictor Takashi Hayashi, Vinícius Garcia, Renato Manzan de Andrade, Reginaldo Arakaki. 235-242 [doi]
- Condition Elements Extraction based on PCA Attribute Reduction and XgboostLuzhe Cao, Jinxuan Cao, Haoran Yin, Yongcheng Duan, Xueyan Wu. 243-248 [doi]
- Tackling the Six Fundamental Challenges of Big Data in Research Projects by Utilizing a Scalable and Modular ArchitectureAndreas Freymann, Florian Maier, Kristian Schaefer, Tom Böhnel. 249-256 [doi]
- Application Lifecycle Management for Industrial IoT Devices in Smart Grid Use CasesStephan Cejka, Florian Kintzler, Lisa Müllner, Felix Knorr, Marco Mittelsdorf, Jörn Schumann. 257-266 [doi]
- Classifying Big Data Taxonomies: A Systematic Literature ReviewDaniel Staegemann, Matthias Volk 0002, Alexandra Grube, Johannes Hintsch, Sascha Bosse, Robert Häusler, Abdulrahman Nahhas, Matthias Pohl, Klaus Turowski. 267-278 [doi]
- Predicting SQL Query Execution Time with a Cost Model for Spark PlatformAleksey V. Burdakov, Victoria Proletarskaya, Andrey D. Ploutenko, Oleg Ermakov, Uriy A. Grigorev. 279-287 [doi]
- A Large-scale Replication of Smart Grids Power Consumption Anomaly DetectionBruno Rossi 0001. 288-295 [doi]
- Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project DescriptionChuanyi Li, JiDong Ge, Victor Chang 0001, Bin Luo 0003. 296-303 [doi]
- Big Data Processing Tools Navigation DiagramMartin Macak, Hind Bangui, Barbora Buhnova, András J. Molnár, Csaba István Sidló. 304-312 [doi]
- A Review of Edge Computing Nodes based on the Internet of ThingsYunqi Dong, Jiujun Bai, XueBo Chen. 313-320 [doi]
- Overview of Enterprise IoT Security System based on Edge ComputingLiyun Lan, Jiujun Bai, XueBo Chen. 321-326 [doi]
- Low Cost Big Data Solutions: The Case of Apache Spark on Beowulf ClustersMarin Fotache, Marius-Iulian Cluci, Valerica Greavu-Serban. 327-334 [doi]
- Discussion on Heterogeneous Converged IoT Networking Scheme of CBN in Hotel FieldJiujun Bai, Yuqing Tong, XueBo Chen. 335-340 [doi]
- Intrinsic Indicators for Numerical Data QualityMilen S. Marev, Ernesto Compatangelo, Wamberto Weber Vasconcelos. 341-348 [doi]
- A Framework for Data Sharing between Healthcare Providers using BlockchainAhmed G. Alzahrani, Ahmed Alenezi, Hany F. Atlam, Gary Wills. 349-358 [doi]
- Analysis of Co-authorship Network and the Correlation between Academic Performance and Social Network MeasuresQianwen Xu, Victor Chang 0001. 359-366 [doi]
- Fulfilling the IoT Vision: Are We There Yet?Daniel Del Gaudio, Pascal Hirmer. 367-374 [doi]
- Geographical Queries Reformulation using Parallel FP-Growth for Spatial Taxonomies BuildingOmar El Midaoui, Btihal El Ghali, Abderrahim El Qadi. 375-381 [doi]
- Preparatory Reflections on Safe Context-adaptive Software (Position Paper)Dominik Grzelak, Uwe Aßmann. 382-391 [doi]
- Self-adaptive Sensing IoT Platform for Conserving Historic Buildings and Collections in MuseumsRita Tse, Marcus Im, Su-Kit Tang, Luís Filipe Menezes, Alfredo Manuel Pereira Geraldes Dias, Giovanni Pau 0001. 392-398 [doi]
- Self-recovery Service Securing Edge Server in IoT Network against Ransomware AttackIn-San Lei, Su-Kit Tang, Ion-Kun Chao, Rita Tse. 399-404 [doi]
- cloud.iO, An Open-source W3C WoT Compliant FrameworkLucas Bonvin, Dominique Gabioud, Michael Clausen. 405-411 [doi]
- Investigating Trusted Records for Employment and EducationRayan M. Ghamri, Nawfal F. Fadhel, Gary B. Wills. 412-419 [doi]
- Scalable Logistic Cell RFID Witness ModelBernhard Heiden, Volodymyr Alieksieiev, Bianca Tonino-Heiden. 420-427 [doi]
- Approaching the (Big) Data Science Engineering ProcessMatthias Volk 0002, Daniel Staegemann, Sascha Bosse, Robert Häusler, Klaus Turowski. 428-435 [doi]
- IIot Platform for Agile Manufacturing in Plastic and Rubber DomainIlaria Bosi, Jure Rosso, Enrico Ferrera, Claudio Pastrone. 436-444 [doi]
- What3Words Geo Encryption: An Alternative Approach to Location based EncryptionJulian Dreyer, Ralf Tönjes. 445-452 [doi]
- Determining Potential Failures and Challenges in Data Driven Endeavors: A Real World Case Study AnalysisDaniel Staegemann, Matthias Volk 0002, Tuan Vu, Sascha Bosse, Robert Häusler, Abdulrahman Nahhas, Matthias Pohl, Klaus Turowski. 453-460 [doi]
- Big Data Analytics as Game Changer in Dealing Impact of Climate Change in Malaysia: Present and Future ResearchMohammad Fikry Abdullah, Mohd Zaki Mat Amin, Zurina Zainol, Marini Mohamad Ideris. 461-469 [doi]
- BRAIN-IoT: Paving the Way for Next-Generation Internet of ThingsEnrico Ferrera, Xu Tao, Davide Conzon, Victor Sonora Pombo, Miquel Cantero, Tim Ward, Ilaria Bosi, Mirko Sandretto. 470-477 [doi]
- Environmental Aware Vulnerability ScoringAndreas Eitel. 478-485 [doi]
- A Reinforcement Learning and IoT based System to Assist Patients with DisabilitiesMuddasar Naeem, Antonio Coronato, Giovanni Paragliola, Giuseppe De Pietro. 491-498 [doi]
- Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification TechniquesGiacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 499-506 [doi]
- Privacy Regulations Challenges on Data-centric and IoT Systems: A Case Study for Smart VehiclesLelio Campanile, Mauro Iacono, Fiammetta Marulli, Michele Mastroianni. 507-518 [doi]
- Early Warning System for Landslide Risk and SHM by Means of Reinforced Optic Fiber in Lifetime Strain AnalysisRenato Zona, Martina De Cristofaro, Luca Esposito, Paolo Ferla, Simone Palladino, Elena Totaro, Lucio Olivares, Vincenzo Minutolo. 521-525 [doi]
- A WSN Energy-aware Approach for Air Pollution Monitoring in Waste Treatment Facility Site: A Case Study for Landfill Monitoring OdourLelio Campanile, Mauro Iacono, Roberta Lotito, Michele Mastroianni. 526-532 [doi]
- Machine Learning Approaches for Diabetes Classification: Perspectives to Artificial Intelligence Methods UpdatingGiuseppe Mainenti, Lelio Campanile, Fiammetta Marulli, Carlo Ricciardi, Antonio S. Valente. 533-540 [doi]