Abstract is missing.
- Machine Learning for Decision Support in Complex EnvironmentsJie Lu 0001. 5
- Event Detection and Classification in Big IoT Networks from Scarce and Imprecise LabelsZoran Obradovic. 7
- Neoteric Frontiers in Cloud and Edge ComputingRajkumar Buyya. 9-10
- Ecosystems of Social Digital Twins for Future IoT NetworkAntonio Iera. 11
- A Real-time Explainable Anomaly Detection System for Connected VehiclesDuc-Cuong Nguyen, Kien Dang Nguyen, Simy Chacko. 17-25 [doi]
- A Two-level Integrated Approach for Assigning Trust Metrics to Internet of Things DevicesEvandro L. C. Macedo, Flávia Coimbra Delicato, Luís F. M. de Moraes, Giancarlo Fortino. 26-36 [doi]
- PhilaeX: Explaining the Failure and Success of AI Models in Malware DetectionZhi Lu, Vrizlynn L. L. Thing. 37-46 [doi]
- Reliability Estimation of a Smart Metering Architecture using a Monte Carlo SimulationTobias Altenburg, Matthias Volk 0002, Daniel Staegemann, Klaus Turowski. 47-54 [doi]
- SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT DevicesDorottya Papp, Gergely Ács, Roland Nagy, Levente Buttyán. 55-66 [doi]
- BRAIN-IoT Architecture and Platform for Building IoT SystemsSalim Chehida, Saddek Bensalem, Davide Conzon, Enrico Ferrera, Xu Tao. 67-77 [doi]
- Shifting towards Antifragile Critical Infrastructure SystemsHind Bangui, Barbora Buhnova, Bruno Rossi 0001. 78-87 [doi]
- Threat Modelling with the GDPR towards a Security and Privacy Metrics Framework for IoT Smart-farm ApplicationSteph Rudd, Hamish Cunningham. 91-102 [doi]
- Efficient Lightweight Cryptography Algorithm in IoT Devices with Real-time CriteriaPaul D. Rosero-Montalvo, Vanessa E. Alvear-Puertas. 103-109 [doi]
- Real-Time Object Detection with Intel NCS2 on Hardware with Limited Resources for Low-power IoT DevicesJurij Kuzmic, Patrick Brinkmann, Günter Rudolph. 110-118 [doi]
- An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice ArchitecturesHannes Salin, Dennis Fokin. 119-126 [doi]
- Constructing High Quality Bilingual Corpus using Parallel Data from the WebSai Man Cheok, Lap-Man Hoi, Su-Kit Tang, Rita Tse. 127-132 [doi]
- Machine Learning and Feature Engineering for Detecting Living off the Land AttacksTiberiu Boros, Andrei Cotaie, Antrei Stan, Kumar Vikramjeet, Vivek Malik, Joseph Davidson. 133-140 [doi]
- A Failure Prediction Platform for Internet of Things ApplicationsDaniel Del Gaudio, Amil Imeri, Pascal Hirmer. 141-148 [doi]
- Common Cybersecurity Requirements in IoT Standards, Best Practices, and GuidelinesRauli Kaksonen, Kimmo Halunen, Juha Röning. 149-156 [doi]
- An Information Security Model for an IoT-enabled Smart GridAbeer Akkad, Gary B. Wills, Abdolbaghi Rezazadeh. 157-165 [doi]
- Provisioning Security in a Next Generation Mobility as a Service SystemTope Omitola, Ben Waterson, Niko Tsakalakis, Richard Gomer, Sophie Stalla-Bourdillon, Tom J. Cherrett, Gary B. Wills. 166-173 [doi]
- An Approach to Privacy-Preserving Distributed Intelligence for the Internet of ThingsTariq A. A. Alsboui, Hussain Al-Aqrabi, Richard Hill, Shamaila Iram. 174-182 [doi]
- Internet-of-Things Management of Medical Chairs and WheelchairsChelsea Yeh, Alexander W. Lee, Hudson Kaleb Kalaw Dy, Karin C. Li. 183-188 [doi]
- Towards a Digital Twin Framework for Connected VehiclesJan Gerhards, Tim Schneider, Pascal Hirmer. 189-196 [doi]
- Using Environmental Data for IoT Device Energy Harvesting PredictionMansour Alzahrani, Alex S. Weddell, Gary B. Wills. 197-204 [doi]
- Reference Architecture for IoT Platforms towards Cloud Continuum based on Apache Kafka and Orchestration MethodsZoltán Farkas, Róbert Lovas. 205-214 [doi]
- The Concept of Identifiability in ML ModelsStephanie von Maltzan. 215-222 [doi]
- Improving Developer Productivity on Internet of Things using JavaScriptFernando L. Oliveira, Rafael R. Parizi, Júlio C. B. de Mattos. 223-230 [doi]
- Automating Security in a Continuous Integration PipelineSohrab Chalishhafshejani, Bao Khanh Pham, Martin Gilje Jaatun. 231-238 [doi]
- Implementing Test Driven Development in the Big Data Domain: A Movie Recommendation System as an Exemplary CaseDaniel Staegemann, Matthias Volk 0002, Priyanka Byahatti, Nikhilkumar Italiya, Suhas Shantharam, Apoorva Byaladakere Chandrashekar, Klaus Turowski. 239-248 [doi]
- A Semantic Security Model for Cyber-Physical Systems to Identify and Evaluate Potential Threats and VulnerabilitiesAndreas Aigner, Abdelmajid Khelil. 249-257 [doi]
- Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary LengthPol Hölzmer, Manuel Koschuch, Matthias Hudler. 258-266 [doi]
- Energy Consumption of a Hexspider Robot-o as Function of Footwear and Underground: Experimental InvestigationsBernhard Heiden, Christian A. Koren, Volodymyr Alieksieiev, Bianca Tonino-Heiden. 267-273 [doi]
- Factors Influencing LoRa Communication in IoT Deployment: Overview and Experience AnalysisThierry Antoine-Santoni, Bastien Poggi, David Araújo, Chabi Babatounde. 274-280 [doi]
- Seen to Unseen: When Fuzzy Inference System Predicts IoT Device Positioning Labels That Had Not Appeared in Training PhaseHan Xu, Zheming Zuo, Jie Li 0021, Victor Chang 0001. 281-288 [doi]
- A Framework for Seamless Offloading in IoT Applications using Edge and Cloud ComputingHimesh Welgama, Kevin Lee, Jonathan Kua. 289-296 [doi]
- Performance Analysis of Machine Learning Algorithms in Storm Surge PredictionVai-Kei Ian, Rita Tse, Su-Kit Tang, Giovanni Pau 0001. 297-303 [doi]
- Advanced Lightweight Cryptography for Automotive Security: Surveys, Challenges and SolutionsPhuc Tran, Duc-Cuong Nguyen. 304-311 [doi]