Abstract is missing.
- Observing the Users to Estimate the Perceived Quality: Challenges and TechnologiesLuigi Atzori. 5
- Keynote LectureSamuel Fosso Wamba. 7
- From Anthropomorphic to Zoomorphic Social Robots: Our ExperiencesPatrick Hung. 9
- In a World of Digital Transformation, Is AI Turning Us Into Superheroes?Matthieu Deboeuf Rouchon. 11
- A Systematic Mapping Study in Security Software Testing for Mobile DevicesFelipe Faustino, Jéssyka Vilela, Carla Silva 0001, Mariana Maia Peixoto. 17-28 [doi]
- IoTective: Automated Penetration Testing for Smart Home EnvironmentsKevin Nordnes, Jia-Chun Lin, Ming-Chang Lee, Victor Chang 0001. 29-39 [doi]
- Automation of Smart Homes with Multiple Rule SourcesYigal Hoffner, Eran Kaufman, Avidan Amir, Elad Yovel, Fogel Harel. 40-52 [doi]
- Advancements in Household Data Mining: Fine-Tuning of Usage Pattern Inference PipelineRamona Tolas, Raluca Portase, Rodica Potolea. 53-61 [doi]
- Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained DevicesEugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas. 62-74 [doi]
- Interoperable Access and Usage Control of Self-Sovereign Digital Twins Using ODRL and I4.0 LanguageJiahang Chen, Lennart Schinke, Xuebilian Gong, Martin Hoppen, Jürgen Roßmann. 75-85 [doi]
- UoCAD: An Unsupervised Online Contextual Anomaly Detection Approach for Multivariate Time Series from Smart HomesAafan Ahmad Toor, Jia-Chun Lin, Ming-Chang Lee, Ernst Gunnar Gran. 86-96 [doi]
- Ransomware Reconnaissance: Interrogating Certificates Towards Proactive Threat MitigationSteph Rudd. 97-106 [doi]
- Privacy Sensitive Building Monitoring Through Generative SensorsAngan Mitra, Denis Trystram, Christophe Cérin. 107-118 [doi]
- Optimising Data Processing in Industrial Settings: A Comparative Evaluation of Dimensionality Reduction ApproachesJosé Cação, Mário Antunes 0001, José Santos, Miguel Monteiro. 119-130 [doi]
- HOMEFUS: A Privacy and Security-Aware Model for IoT Data Fusion in Smart Connected HomesKayode S. Adewole, Andreas Jacobsson. 133-140 [doi]
- A Systematic Mapping Study on Techniques for Generating Test Cases from RequirementsAlessandro Rodrigues, Jéssyka Vilela, Carla Silva 0001. 141-148 [doi]
- Data Sets for Cyber Security Machine Learning Models: A Methodological ApproachInnocent Mbona, Jan H. P. Eloff. 149-156 [doi]
- Credential Lifecycle Analysis in Private LoRaWAN Networks for Industrial IoT (IIoT)Sergio H. Silva, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers. 157-165 [doi]
- Context Data Compact Prediction Tree (CD-CPT): Transforming User Experience Through Predictive AnalysisPooja Goyal, Md Khorrom Khan, Natnael Teshome, Brendan Geary, Renée C. Bryce. 166-173 [doi]
- How Is Starlink Manoeuvring? An Analysis of Patterns in the Manoeuvres of Starlink SatellitesDavid Peter Shorten, Wathsala Karunarathne, Matthew Roughan. 174-184 [doi]
- Hybrid Statistical Modeling for Anomaly Detection in Multi-Key Stores Based on Access PatternsTiberiu Boros, Marius Barbulescu. 185-190 [doi]
- IndraFlow: Seamless Data Transfer and Transformation Between Internet of Things, Robot Systems and Cloud-Native EnvironmentsAttila Csaba Marosi, Krisztián Póra. 191-198 [doi]
- Revolutionizing Vehicle Damage Inspection: A Deep Learning Approach for Automated Detection and ClassificationOnikepo D. Amodu, Adel Shaban, Gbenga Akinade. 199-208 [doi]
- Tile Quality Detection Device: Internet of Things (IoT) Demonstration PrototypeBernhard Heiden, Danijel Pacnik, Jessica Pregl, Maximilian Müller, Simone Leitner, Volodymyr Alieksieiev, Bianca Tonino-Heiden. 209-215 [doi]
- Towards a Write once Run Anywhere Approach in End-User IoT DevelopmentEkene Attoh, Beat Signer. 216-225 [doi]
- A Framework Addressing Challenges in Cybersecurity Testing of IoT Ecosystems and ComponentsSteve Taylor, Martin Gilje Jaatun, Alan Mc Gibney, Robert Seidl, Pavlo Hrynchenko, Dmytro Prosvirin, Rosella Mancilla. 226-234 [doi]
- Sample-Based Cardinality Estimation in Full Outer Join QueriesUriy A. Grigorev, Andrey D. Ploutenko, Aleksey V. Burdakov, Olga Pluzhnikova, Evgeny Detkov. 235-244 [doi]
- Navigating the CRA: A Brief Analysis of European Cyber Resilience Act and Resulting Actions for Product DevelopmentPeter Schoo. 245-251 [doi]
- Lite4More: A Hardware and Software Solution to Improve the Commissioning of Lighting InfrastructuresDiogo Correia, João Gomes, Carlos Resende, Filipe Sousa, Jorge Filipe, Carlos Silva, Antonio Sousa. 252-259 [doi]
- Secure Decentralized Carpooling Application Using Blockchain and Zero Knowledge ProofSaksham Goel, Sarvesh V. Sawant, Bhawana Rudra. 260-267 [doi]
- An Intrusion Detection Architecture Based on the Energy Consumption of Sensors Against Energy Depletion Attacks in LoRaWANAndré Proto, Charles Christian Miers, Tereza Cristina M. B. Carvalho. 268-275 [doi]
- Classification and Prediction of Hypoglycemia in Patients with Type 2 Diabetes Mellitus Using Data from the EHR and Patient ContextLuis Claudio Gubert, Felipe André Zeiser, Cristiano André da Costa, Rafael Kunst. 276-283 [doi]
- XA4AS: Adaptive Security for Multi-Stage AttacksElias Seid, Oliver Popov, Fredrik Blix. 284-293 [doi]
- Decentralized Ransomware Recovery Network: Enhancing Resilience and Security Through Secret Sharing SchemesSijjad Ali, Jia Wang, Victor Chung Ming Leung, Asad Ali. 294-301 [doi]
- Industrial Internet of Things for Assembly Line Worker's Work Fatigue RecognitionVenkata Krishna Rao Pabolu, Divya Shrivastava, Makarand S. Kulkarni. 302-309 [doi]
- Comparing On-Premise IoT Platforms: Empowering University of Things Ecosystems with Effective Device ManagementMevludin Blazevic, Dennis M. Riehle. 310-320 [doi]
- Emergency Corridor Building on Multi-Lane Motorways with Autonomous Model CarsJurij Kuzmic, Günter Rudolph, Fabian Ostermann. 321-328 [doi]
- Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum CryptographyPhilipp Grassl, Matthias Hudler, Manuel Koschuch. 329-338 [doi]
- Indescribably Blue: Bluetooth Low Energy Threat LandscapeChristopher Skallak, Silvie Schmidt. 339-350 [doi]
- Enhancing Hydroponic Farming Productivity Through IoT-Based Multi-Sensor Monitoring SystemKhadijah Febriana R., Rahul Thakur, Sudip Roy 0001. 351-357 [doi]
- Overcoming the Complexity of Quality Assurance for Big Data Systems: An Examination of Testing MethodsChristian Daase, Daniel Staegemann, Klaus Turowski. 358-369 [doi]