Abstract is missing.
- Active Inference for Distributed Intelligence in IoT and Edge ComputingSchahram Dustdar. 5
- Technological Adoption in the Era of Generative AILoic Bachelart. 7
- It's All About the DataAna Aguiar. 9
- Internet of Things Devices Management for Smart CitiesNilson Rodrigues Sousa, George Pinto 0001, Cássio V. S. Prazeres. 15-26 [doi]
- Bridging the Cost Gap: A Comprehensive Analysis of CAPEX and OPEX for Smart Home Transition from a Provider's PerspectiveNilton Flávio S. Seixas, Adriano H. O. Maia, George Pinto 0001, Dhyego Tavares Cruz, Bruno P. Santos, Ivan do Carmo Machado, Eduardo Santana de Almeida, Frederico Araújo Durão, Maycon L. M. Peixoto, Gustavo B. Figueiredo, Cássio V. S. Prazeres. 27-38 [doi]
- Sockpuppet Detection in Wikipedia Using Machine Learning and Voting ClassifiersRafeef Baamer, Mihai Boicu. 39-47 [doi]
- PatSimBoosting: Enhancing Patient Representations for Disease Prediction Through Similarity AnalysisYuzheng Yan, Ziyue Yu, Wuman Luo. 48-55 [doi]
- Real-Time Manufacturing Data Quality: Leveraging Data Profiling and Quality MetricsTeresa Peixoto, Bruno Oliveira 0001, Óscar Oliveira, Fillipe Ribeiro. 56-68 [doi]
- Toward a More Realistic Energy Consumption Model for IoT Nodes in Extreme-Edge Computing EnvironmentsHassan Hammoud, Frédéric Weis, Melen Leclerc, Jean-Marie Bonnin. 69-80 [doi]
- Data Network Game: Enabling Collaboration via Data MeshLucaleonardo Bove, Nicolò Gianmauro Totaro, Massimiliano Gervasi. 81-92 [doi]
- Approach to Deploying Batch File Data Products in a Big Data EnvironmentRichard de Arruda Felix, Patricia Della Méa Plentz, Jean Carlo Rossa Hauck. 93-104 [doi]
- Information Flow Control for the Internet of ThingsGildas Kouko, Josée Desharnais, Nadia Tawbi. 105-116 [doi]
- Pseudorandom Number Generators, Perfect Learning and Model Visualization with Neural Networks: Expanding on LFSRs and GeffeSara Boanca. 117-128 [doi]
- Smoke Segmentation Improvement Based on Fast Segment Anything Model with YOLOv11 for a Wildfire Monitoring SystemPuchit Bunpleng, Puthtipong Thunyatada, Bhutharit Aksornsuwan, Kanokvate Tungpimolrut, Ken T. Murata. 129-140 [doi]
- A Comparative Study of Log-Based Anomaly Detection Methods in Real-World System LogsNadira Anjum Nipa, Nizar Bouguila, Zachary Patterson. 141-152 [doi]
- The Integration of Time Series Anomaly Detection into a Smart Home EnvironmentEran Kaufman, Yigal Hoffner, Adan Fadila, Amin Masharqa, Nour Mawasi. 153-163 [doi]
- EV-Connect: Energy Efficient & Incentive Cost Based Model for Range Anxious EVs with Multi-Hop Socially Assisted V2V ChargingSrishti Sharma, Rahul Thakur. 164-171 [doi]
- Dynamic Obfuscation for Secure and Efficient Multi-Cloud Business ProcessesAmina Ahmed-Nacer, Mohammed Riyadh Abdmeziem. 175-182 [doi]
- A Highly Nonlinear Survival Network for Hospital Readmission Prediction of Cardiac PatientsYuejing Zhai, Yiping Li, Lihua He, Wuman Luo. 183-190 [doi]
- RAM-IoT: Risk Assessment Model for IoT-Based Critical AssetsKayode S. Adewole, Andreas Jacobsson, Paul Davidsson. 191-198 [doi]
- DLT-Based Approach for Secure and Cyber Resilient Resource Constrained IoT Devices: A Survey on Recent AdvancesSthembile Mthethwa, Moses Dlamini, Edgar Jembere. 199-206 [doi]
- Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature LearningTasnimul Hasan, Abrar Hossain, Mufakir Qamar Ansari, Talha Hussain Syed. 207-214 [doi]
- Implementation of Rank Attack and Its Mitigation in RPL-Based IoT NetworksMadhu Yadav, Rajbir Kaur. 215-222 [doi]
- Agri-Guard: IoT-Based Network for Agricultural Health Monitoring with Fault DetectionKushagra Singh, Kafil Abbas Momin, M. Nishal, Chinmay Sultania, Madhav Rao. 223-230 [doi]
- Inventory Management System Through the Integration of RPA and IoT to Enhance Processes in SMEs Within Peru's Automotive SectorTadashi Buitron, Enzo Peña, Pedro S. Castañeda. 231-236 [doi]
- A Comparative Evaluation of Zero Knowledge Proof TechniquesSeyed Mohsen Rostamkolaei Motlagh, Claus Pahl, Hamid R. Barzegar, Nabil El Ioini. 237-244 [doi]
- A Technology Review of Zero Knowledge Proof TechniquesSeyed Mohsen Rostamkolaei Motlagh, Claus Pahl, Hamid R. Barzegar, Nabil El Ioini. 245-253 [doi]
- Making Use of Design Patterns in IoT Middleware ImplementationLasse Harjumaa, Ilkka Kivelä, Petri Jyrkkä, Ismo Hakala. 254-262 [doi]
- Analysis and Design of Smart Components in Digital Energy TwinsKatharina Legler, Muhammad Sheheryar Jajja, Klaus Volbert. 263-272 [doi]
- IoT-Driven Livestock Monitoring: Leveraging LoRaWAN for Behavior Analysis and Enhanced Farm ManagementKhadijah Febriana R., Rahul Thakur, Sudip Roy 0001. 273-280 [doi]
- A Comparative Analysis of Anonymous and Non-Anonymous Authorization Architectures for IoT Environments in Cooperative Intelligent Transport SystemsHannes Salin. 281-288 [doi]
- Understanding How to Use Open-Source Libraries for Differentially Private Statistics on Energy Metering Time SeriesAna C. P. Paixão, Breno R. da Silva, Rafael L. Silva, Filipe H. Cardoso, Alexandre Braga. 289-296 [doi]
- Automated Test Input Generation Based on Web User Interfaces via Large Language ModelsKento Hasegawa, Hibiki Nakanishi, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa. 297-304 [doi]
- Automating the Assessment of Japanese Cyber-Security Technical Assessment Requirements Using Large Language ModelsKento Hasegawa, Yuka Ikegami, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa. 305-312 [doi]
- Graph-Based Learning for Multimodal Route RecommendationZakariya Ghalmane, Brahim Daoud. 313-320 [doi]
- Generating Realistic Cyber Security Datasets for IoT Networks with Diverse Complex Network PropertiesFouad Al Tfaily, Zakariya Ghalmane, Mortada Termos, Mohamed-el-Amine Brahmia, Ali Jaber, Mourad Zghal. 321-328 [doi]
- Enhancing IoT Network Intrusion Detection with a New GraphSAGE Embedding Algorithm Using Centrality MeasuresMortada Termos, Zakariya Ghalmane, Mohamed-el-Amine Brahmia, Ahmad Fadlallah, Ali Jaber, Mourad Zghal. 329-336 [doi]
- A Distributed Event-Orchestrated Digital Twin Architecture for Optimizing Energy-Intensive IndustriesNicolò Bertozzi, Anna Geraci, Letizia Bergamasco, Enrico Ferrera, Edoardo Pristeri, Claudio Pastrone. 337-344 [doi]
- Anomalous IoT Behavior Detection by LSTM-Based Power Waveform PredictionRyusei Eda, Nozomu Togawa. 345-352 [doi]
- Measuring Fall Risk Using the Internet-of-Things ChairAlexander W. Lee, Melissa S. Lee, Chelsea Yeh, Kyle Yeh. 353-360 [doi]
- L2C: Learn to Clean Time Series DataMayuresh Hooli, Rabi N. Mahapatra. 361-369 [doi]
- PacketZapper: A Scalable and Automated Platform for IoT Traffic Collection and AnalysisMathias Fredrik Hedberg, Jia-Chun Lin, Ming-Chang Lee. 370-377 [doi]
- Enhancing Scalability in Wi-Fi IoT Networks with Logical Data Plane Segregation Using SDN PrinciplesGabriel Vieira, Ana Rita Ortigoso, Daniel Fuentes, Luís Frazão, Nuno Costa 0001, António Pereira 0001. 378-385 [doi]
- A Multilevel Graph-Based Recommender System for Personalized Learning Paths in Archaeological Parks: Leveraging IoT and Situation AwarenessMario Casillo, Francesco Colace, Angelo Lorusso, Domenico Santaniello, Carmine Valentino. 386-393 [doi]
- Unravelling the Sequential Patterns of Cyber Attacks: A Temporal Analysis of Attack DependenciesFares Ashraf ElSalamony, Nahla H. Barakat, Ahmad Mostafa. 394-401 [doi]
- Anomaly Detection on Univariate Time Series Data Using Exponentially Weighted Moving Average (AnEWMA)Jalaa Hoblos. 402-409 [doi]
- A Study of Anomalous Communication Detection for IoT Devices Using Flow Logs in a Cloud EnvironmentYutaro Iizawa, Norihiro Okui, Yusuke Akimoto, Shotaro Fukushima, Ayumu Kubota, Takuya Yoshida. 410-415 [doi]
- Cybersecurity Indicators Within a Cybersecurity Testing and Monitoring FrameworkSteve Taylor 0002, Norbert Götze, Joerg Abendroth, Jens Kuhr, Rosella Mancilla, Bernd-Ludwig Wenning, Pasindu Kuruppuarachchi, Aida Omerovic, Ravishankar Borgaonkar, Andrea Neverdal Skytterholm, Antonios Mpantis, George N. Triantafyllou, Oscar Garcia Perales, Oleh Zaritskyi. 416-427 [doi]
- Clustering-Based Pattern Prediction Framework for Air Pollution PredictionAthiruj Poositaporn, Hanmin Jung. 428-435 [doi]
- Towards Client Engagement Using RAG System with Pattern Prediction FrameworkHanmin Jung, Athiruj Poositaporn. 436-441 [doi]
- Intelligent Anomaly Detection for Context-Oriented Data Brokerage SystemsRawaa Al-Wani, Mays F. Al-Naday. 442-449 [doi]
- A Novel Wi-Fi Mesh Network Framework for Efficient Mobile Data TransmissionYu-Jie Ou, Yan-Ming Chen, Chun-Chao Yeh. 450-455 [doi]
- Design of an IoT-Driven Software Architecture for an Automated Robotic Fueling System in Open-Pit MiningCarlos Antonio Vilchez Pascual, Brian David Pajares Correa, Felix Melchor Santos López. 456-463 [doi]
- eXplainable Artificial Intelligence Framework for Structure's Limit Load ExtimationHabib Imani, Renato Zona, Armando Arcieri, Luigi Piero Di Bonito, Simone Palladino, Vincenzo Minutolo. 469-480 [doi]
- Towards a Digital Twin of the Cardiovascular SystemCiro Nespolino, Roberta De Fazio, Laura Verde, Stefano Marrone 0001. 481-490 [doi]
- Enhancing Accuracy and Efficiency in Physical Count Processes: Leveraging AI, IoT, and Automation for Real-Time Inventory Management in Supply ChainPrabhakaran Rajendran, Nirmal Kumar Balaraman, Hareesh Viswanathan. 493-500 [doi]
- An AI-Driven Methodology for Patent Evaluation in the IoT Sector: Assessing Relevance and Future ImpactLelio Campanile, Renato Zona, Antonio Perfetti, Franco Rosatelli. 501-508 [doi]
- Quantum Convolutional Neural Networks for Image Classification: Perspectives and ChallengesFabio Napoli, Lelio Campanile, Giovanni De Gregorio, Stefano Marrone 0001. 509-516 [doi]