Abstract is missing.
- "Living in the Edge, Sailing Through the Cloud": Orchestrating Applications in the Edge to Cloud Computing ContinuumOrchestrating Applications in the Edge to Cloud Computing ContinuumTamás Kiss. 5-6
- On Location Privacy and Security of Positioning in Modern SystemsSrdjan Capkun. 7
- Slices: European Scientific Large-scale Infrastructure for Computing/Communication Experimental StudiesSerge Fdida. 9-10
- Integrating Machine Learning and Multi-Agent Systems for Fully Enabling Device-Edge-Cloud Continuum in Complex IoT WorldsGiancarlo Fortino. 11
- Quantum Clustering on Streaming Data: A Novel Method for Analyzing Big DataRebecca Hofer, Kevin Mallinger. 17-28 [doi]
- Lightweight and Self Adaptive Model for Domain Invariant Bearing Fault DiagnosisChandrakanth R. Kancharla, Jens Vankeirsbilck, Dries Vanoost, Jeroen Boydens, Hans Hallez. 29-38 [doi]
- An Energy Management Unit for Predictive Solar Energy Harvesting IoTJustus Rajappa Anuj, Adnan Sabovic, Burcu Celikkol, Michiel Aernouts, Philippe Reiter, Siegfried Mercelis, Peter Hellinckx, Jeroen Famaey. 39-50 [doi]
- Analysis of Security Events in Industrial Networks Using Self-Organizing Maps by the Example of Log4jRicardo Hormann, Daniel Bokelmann, Frank Ortmeier. 51-60 [doi]
- Castles Built on Sand: Observations from Classifying Academic Cybersecurity Datasets with Minimalist MethodsLaurens D'hooge, Miel Verkerken, Tim Wauters, Filip De Turck, Bruno Volckaert. 61-72 [doi]
- Simulation Based Performance Evaluation of FIWARE IoT Platform for Smart AgricultureKari Kolehmainen, Marco Pirazzi, Juha-Pekka Soininen, Juha Backman. 73-81 [doi]
- Function-as-a-Service for the Cloud-to-Thing Continuum: A Systematic Mapping StudyBárbara da Silva Oliveira, Nicolas Ferry 0001, Hui Song, Rustem Dautov, Ankica Barisic, Atslands Rego da Rocha. 82-93 [doi]
- Bank Checks Fraud Detection Based on the Analysis of Event Trends in Data-Flow SystemsUriy A. Grigorev, Yury Shashkin, Andrey D. Ploutenko, Aleksey V. Burdakov, Olga Pluzhnikova. 97-104 [doi]
- University of Things: Opportunities and Challenges for a Smart Campus Environment based on IoT Sensors and Business ProcessesMevludin Blazevic, Dennis M. Riehle. 105-114 [doi]
- Software Updates Monitoring & Anomaly DetectionImanol Etxezarreta Martinez, David García Villaescusa, Imanol Mugarza, Irune Yarza, Irune Agirre. 115-122 [doi]
- The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1Tzu-Hsuan Huang, Chun-Tsai Chien, Chien-Lung Wang, I-En Liao. 123-130 [doi]
- Analysis of Sensor Attacks Against Autonomous VehiclesSøren Bønning Jakobsen, Kenneth Sylvest Knudsen, Birger Andersen. 131-139 [doi]
- On-Premise Internet of Things (IoT) Data Storage: Comparison of Database Management SystemsAnna Wolters, Mevludin Blazevic, Dennis M. Riehle. 140-149 [doi]
- CopAS: A Big Data Forensic Analytics SystemMartin Macák, Tomás Rebok, Matus Stovcik, Mouzhi Ge, Bruno Rossi 0001, Barbora Buhnova. 150-161 [doi]
- Attack Simulation on Data Distribution Service-based Infrastructure SystemBasem Almadani, Hawazen Alzahrani, Farouq Muhammad Aliyu. 162-169 [doi]
- AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected InfrastructuresHannes Salin. 170-177 [doi]
- A Scalable Decentralized and Lightweight Access Control Framework Using IOTA Tangle for the Internet of ThingsTariq A. A. Alsboui, Muhammad Hussain 0002, Hussain Al-Aqrabi, Richard Hill, Mohammad Hijjawi. 178-185 [doi]
- Green Intelligent Homes: A Perspective on the Future of Smart Homes and Their ImplicationsJoseph Bugeja, Andreas Jacobsson. 186-193 [doi]
- Deep Dive into Hunting for LotLs Using Machine Learning and Feature EngineeringTiberiu Boros, Andrei Cotaie. 194-199 [doi]
- Creating a Personalized Recommendation Framework in Smart Shopping by Using IoT DevicesAbdaoui Noura, Ismahène Hadj Khalifa, Sami Faïz. 200-207 [doi]
- RePAD2: Real-Time Lightweight Adaptive Anomaly Detection for Open-Ended Time SeriesMing-Chang Lee, Jia-Chun Lin. 208-217 [doi]
- The Anatomy of an Infrastructure for Digital Underground MiningSreekant Sreedharan, Muthu Ramachandran, Soma Ghosh, Suraj Prakash. 218-225 [doi]
- Reducing IoT Big Data for Efficient Storage and ProcessingEleftheria Katsarou, Stathes Hadjiefthymiades. 226-230 [doi]
- Generative Deep Learning for Solutions to Data Deconflation Problems in Information and Operational Technology NetworksRoger A. Hallman, John M. San Miguel, Arron Lu, Alejandro Monje, Mohammad R. Alam, George Cybenko. 231-235 [doi]
- Detection of DDoS Attacks on Urban IoT Devices Using Neural NetworksSimon Onyebuchi Obetta, Arghir-Nicolae Moldovan. 236-242 [doi]
- Process Automation and Monitoring Systems Based on IIoT Using Private LoRaWAN Networks: A Case Study of ArcelorMittal Vega FacilitiesDanilo Farias de Carvalho, Charles Christian Miers. 243-254 [doi]