Abstract is missing.
- Multi-objective Evolutionary Federated LearningYaochu Jin. 5
- Secure Object Detection on the EdgeLing Liu. 7
- Interpretability and Explainability Facets of Data Analytics: Symbols and Information GranulesWitold Pedrycz. 9-10
- Industry 4.0 and Society 5.0: Challenges from a Data Analysis PerspectiveAjith Abraham. 11
- A Real-time and Energy-aware Framework for Data Stream Processing in the Internet of ThingsEgberto A. R. de Oliveira, Flávia Coimbra Delicato, Atslands Rego da Rocha, Marta Mattoso. 17-28 [doi]
- Detection of Malicious Binaries by Applying Machine Learning Models on Static and Dynamic ArtefactsAnantha Rao Chukka, V. Susheela Devi. 29-37 [doi]
- Malware Detection for IoT Devices using Automatically Generated White List and Isolation ForestMasataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake. 38-47 [doi]
- Research on Optimization of 4G-LTE Wireless Network Cells Anomaly Diagnosis Algorithm based on Multidimensional Time Series DataBing Qian, Chong Ma, Tong Zhang. 48-57 [doi]
- SIMBIoTA: Similarity-based Malware Detection on IoT DevicesCsongor Tamás, Dorottya Papp, Levente Buttyán. 58-69 [doi]
- The VoIP PBX Honeypot Advance Persistent Threat AnalysisNathaniel Mcinnes, Gary B. Wills. 70-80 [doi]
- Secure Key Management in Embedded Systems: A First ProposalGorazd Jank, Silvia Schmidt, Manuel Koschuch. 81-91 [doi]
- C*DynaConf: An Apache Cassandra Auto-tuning Tool for Internet of Things DataLucas Benevides Dias, Dennis Sávio Silva, Rafael T. de Sousa Jr., Maristela Holanda. 92-102 [doi]
- Deep Learning for COVID-19 Prediction based on Blood TestZiyue Yu, Lihua He, Wuman Luo, Rita Tse, Giovanni Pau 0001. 103-111 [doi]
- Customer Relationship Management Improvement using IoT DataChristian Ploder, Reinhard Bernsteiner, Thomas Dilger, Sarah Huber. 115-122 [doi]
- Cloud-based Private Querying of Databases by Means of Homomorphic EncryptionYassine Abbar, Pascal Aubry, Thierno Barry, Sergiu Carpov, Sayanta Mallick, Mariem Krichen, Damien Ligier, Sergey Shpak, Renaud Sirdey. 123-131 [doi]
- Detection of Malicious Binaries by Deep Learning MethodsAnantha Rao Chukka, V. Susheela Devi. 132-139 [doi]
- Detection of Malicious Binaries by Deep Learning MethodsAnantha Rao Chukka, V. Susheela Devi. 132-139 [doi]
- A Principled Approach to Enriching Security-related Data for Running Processes through Statistics and Natural Language ProcessingTiberiu Boros, Andrei Cotaie, Kumar Vikramjeet, Vivek Malik, Lauren Park, Nick Pachis. 140-147 [doi]
- Comparison between Filtered Canny Edge Detector and Convolutional Neural Network for Real Time Lane Detection in a Unity 3D SimulatorJurij Kuzmic, Günter Rudolph. 148-155 [doi]
- Use of Machine Learning for Expanding Realistic and Usable Routes for Data Analysis on Sustainable MobilityFabian Schirmer, Andreas Freymann, Anamaria Cristescu, Niklas Geisinger. 156-163 [doi]
- A Comparison among Wi-Fi Direct, Classic Bluetooth, and Bluetooth Low Energy Discovery Procedures for Enabling Massive Machine Type CommunicationsAbel Rodriguez Medel, Jose Marcos Camara Brito. 164-169 [doi]
- An Ontological Approach to the Formation of an Excursion Route by Heritage Objects in GISAndrii Honchar, Maryna Popova, Rina Novogrudska. 170-176 [doi]
- Internet of Things based Product-Service System in the Maritime Industrial SectorIslam Abusohyon, Flavio Tonelli. 177-184 [doi]
- Identifying Food Fraud using BlockchainHoi Wen Leung, Adriane Chapman, Nawfal F. Fadhel. 185-192 [doi]
- Challenges in Data Acquisition and Management in Big Data EnvironmentsDaniel Staegemann, Matthias Volk 0002, Akanksha Saxena, Matthias Pohl, Abdulrahman Nahhas, Robert Häusler, Mohammad Abdallah, Sascha Bosse, Naoum Jamous, Klaus Turowski. 193-204 [doi]
- A Low-Complexity Algorithm for NB-IoT NetworksSalem Alemaishat. 205-214 [doi]
- Analysis of the Message Queueing Telemetry Transport Protocol for Data Labelling: An Orthopedic Manufacturing Process Case StudyMangolika Bhattacharya, Reenu Mohandas, Mihai Penica, Mark Southern, Karl Van Camp, Martin J. Hayes. 215-222 [doi]
- IoT based Circadian Rhythm Monitoring using Fuzzy LogicK. Sornalakshmi, Revathi Venkataraman, N. Parthiban, V. Kavitha 0003. 223-228 [doi]
- Role of Artificial Intelligence of Things (AIoT) in Covid-19 Pandemic: A Brief SurveyVenkatesh K. Pappakrishnan, R. Mythili, V. Kavitha 0003, N. Parthiban. 229-236 [doi]
- Information Flow Secure CAmkESAmit Goyal, Akshat Garg, Digvijaysingh Gour, R. K. Shyamasundar, G. Sivakumar. 237-244 [doi]
- Selforganisational High Efficient Stable Chaos PatternsBernhard Heiden, Volodymyr Alieksieiev, Bianca Tonino-Heiden. 245-252 [doi]
- Approximate Query Processing for Lambda ArchitectureAleksey V. Burdakov, Uriy A. Grigorev, Andrey D. Ploutenko, Oleg Ermakov. 253-261 [doi]
- Analysis Layer Implementation Method for a Streaming Data Processing SystemAleksey V. Burdakov, Uriy A. Grigorev, Andrey D. Ploutenko, Oleg Ermakov. 262-269 [doi]
- Analysis Layer Implementation Method for a Streaming Data Processing SystemAleksey V. Burdakov, Uriy A. Grigorev, Andrey D. Ploutenko, Oleg Ermakov. 262-269 [doi]
- Smart Cities V2I Cloud based Infrastructure using Road Side UnitsTamer Omar, Kevin Guerra, Christopher Mardoyan, Shannen Sharma, Xavier Rangel. 270-277 [doi]
- A Deployable Data as a Service Architecture for EnterprisesAdrián Tóth, Mouzhi Ge. 278-285 [doi]
- Malicious Activity Detection using Smart Contracts in IoTMwangi Eric, Hany F. Atlam, Nawfal F. Fadhel. 286-295 [doi]
- A Preliminary Overview of the Situation in Big Data TestingDaniel Staegemann, Matthias Volk 0002, Matthias Pohl, Robert Häusler, Abdulrahman Nahhas, Mohammad Abdallah, Klaus Turowski. 296-302 [doi]
- An Arduino-based Device to Detect Dangerous Audio NoisesLorenzo De Lauretis, Tiziano Lombardi, Stefania Costantini, Ludovica Clementini. 303-308 [doi]
- Detection of Anomalous User Activity for Home IoT DevicesVishwajeet Bhosale, Lorenzo De Carli, Indrakshi Ray. 309-314 [doi]
- Development of Low-cost IoT System for Monitoring and Enhancing Renewable Energy Feed-in Tariff at Household in Hong KongC. C. Lee, George Chan. 315-322 [doi]
- P2S2O: Pseudonymous Polling System for Small OrganizationsLiuyang Dong, Jiliang Li, Yanxing Li, Jing Ren, Shizhong Xu, Gang Sun, Victor Chang 0001. 323-328
- Homicide Network Detection based on Social Network AnalysisVictor Chang 0001, Yeqing Mou, Qianwen Ariel Xu, Harleen Kaur, Ben S. Liu. 329-337 [doi]
- Machine Learning-aided Automatic Calibration of Smart Thermal Cameras for Health Monitoring ApplicationsLelio Campanile, Fiammetta Marulli, Michele Mastroianni, Gianfranco Palmiero, Carlo Sanghez. 343-353 [doi]
- Applying Machine Learning to Weather and Pollution Data Analysis for a Better Management of Local Areas: The Case of Napoli, ItalyLelio Campanile, Pasquale Cantiello, Mauro Iacono, Roberta Lotito, Fiammetta Marulli, Michele Mastroianni. 354-363 [doi]
- Apply Machine Learning and Fuzzy Logics to Design an Automated System for Urban FarmingTran Duc Hai Du, Van Dinh Chuong. 367-374
- The Data Deconflation Problem: Moving from Classical to Emerging SolutionsRoger A. Hallman, George Cybenko. 375-380 [doi]