Abstract is missing.
- An Innovative eHealth System Powered By 5G Network SlicingEvgenia Kapassa, Marios Touloupou, Argyro Mavrogiorgou, Athanasios Kiourtis, Dimitra Giannouli, Konstantina Katsigianni, Dimosthenis Kyriazis. 7-12 [doi]
- Secure Smart-Home Application Based on IoTCoAP protocolNasr Rajb A Abosata, Andrew H. Kemp 0001, Mohsen Razavi. 13-17 [doi]
- Analytics Everywhere for Streaming IoT DataHung Cao, Monica Wachowicz. 18-25 [doi]
- Indoor Occupancy Prediction using an IoT PlatformAlec Parise, Miguel-Ángel Manso-Callejo, Hung Cao, Marco Mendonca, Harpreet Kohli, Monica Wachowicz. 26-31 [doi]
- Lessons Learned from Integrating Batch and Stream Processing using IoT DataHung Cao, Marcel Brown, Lizhi Chen, Riley Smith, Monica Wachowicz. 32-34 [doi]
- Comparative Analysis of Abstraction Layer Performance of IoT Devices Management PlatformsAndrea Maria Nogueira Cavalcanti Ribeiro, Pedro Rafael X. do Carmo, João Victor Lucena do Monte, Djamel Sadok, Patricia Takako Endo, Judith Kelner. 35-42 [doi]
- A Location-Aware Authentication Model to Handle Uncertainty in IoTMohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa. 43-50 [doi]
- Requirements for an IoT Middleware for Utility-Scale Distributed Solar FarmsSalsabeel Y. Shapsough, Imran A. Zualkernan. 51-57 [doi]
- Mitigating DDoS Flooding Attacks against IoT using Custom Hardware ModulesLucas R. B. Brasilino, Martin Swany. 58-64 [doi]
- A Fast and Efficient Datapath Designs of Lightweight Cipher RoadRunneR on FPGA's for Resource Constrained EnvironmentsPratik Pachange, Gaurav Bansod. 65-72 [doi]
- DEVS-Based IoT Management System for Modeling and Exploring Smart Home DevicesMajeda Albataineh, Moath Jarrah. 73-78 [doi]
- The Architecture of Kaligreen V2: A Middleware Aware of Hardware Opportunities to Save EnergyHernn H. Ivarez-Valera, Marc Dalmau, Philippe Roose, Christina Herzog. 79-86 [doi]
- Design and Implementation of a Hybrid Anomaly Detection System for IoTAhmad Ayad, Alireza Zamani, Anke Schmeink, Guido Dartmann. 87-92 [doi]
- A Flow Based Architecture for Efficient Distribution of Vehicular Information in Smart CitiesRoger Young, Sheila Fallon, Paul Jacob, Denis O. Dwyer. 93-98 [doi]
- Adaptive Status Report with Congestion Control in NB-IoTChenhong Zhou, Jiong Zhao, Hao Liu. 99-103 [doi]
- A Mobile-Edge Computing Bio-Surveillance Framework for Multiple Biological Attacks DetectionMohammad Al-Zinati, Taha Almasri, Mohammad A. Alsmirat, Yaser Jararweh. 104-109 [doi]
- Semantic Modelling of Plans and Execution Traces for Enhancing Transparency of IoT SystemsMilan Markovic, Daniel Garijo, Peter Edwards, Wamberto Vasconcelos. 110-115 [doi]
- Recording Provenance of Food Delivery Using IoT, Semantics and Business Blockchain NetworksMilan Markovic, Peter Edwards, Naomi Jacobs. 116-118 [doi]
- Lightweight Security Scheme for MQTT/MQTT-SN ProtocolOusmane Sadio, Ibrahima Ngom, Claude Lishou. 119-123 [doi]
- Person Identification using Autonomous Drone through Resource Constraint DevicesBhavya Pareek, Priyanka Gupta, Gaurav Singal, Riti Kushwaha. 124-129 [doi]
- UAVs Reliable Transmission for Multicast Protocols in FANETsGaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha. 130-135 [doi]
- Blockchain Based Service Continuity in Mobile Edge ComputingVan Thanh Le, Claus Pahl, Nabil El Ioini. 136-141 [doi]
- RECON: A Real-time Entity Based Access Control for IoTAndrew Blower, Gerald Kotonya. 142-146 [doi]
- Ms Pacman and the Robotic Ghost: A Modern Cyber-Physical Remake of the Famous Pacman GameKonstantinos Panayiotou, Emmanouil Tsardoulias, Christopher Zolotas, Iason Paraskevopoulos, Alexandra Chatzicharistou, Alexandros Sahinis, Stathis Dimitriadis, Dimitra Ntzioni, Christopher Mpekos, Giannis Manousaridis, Aris Georgoulas, Andreas L. Symeonidis. 147-154 [doi]
- Smart Traffic Light Controller SystemL. F. P. Oliveira, L. T. Manera, P. D. G. Luz. 155-160 [doi]
- Unsupervised Anomaly Alerting for IoT-Gateway Monitoring using Adaptive Thresholds and Half-Space TreesRené Wetzig, Anton Gulenko, Florian Schmidt. 161-168 [doi]
- Adaptive, Correlation-Based Training Data Selection for IoT Device ManagementAnders Eivind Braten, Frank Alexander Kraemer, David Palma. 169-176 [doi]
- Low Cost LoRa based Network for Forest Fire DetectionRoberto Vega-Rodríguez, Sandra Sendra, Jaime Lloret, Pablo Romero-Díaz, José Luis García-Navas. 177-184 [doi]
- Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT)Mohammed Alshahrani, Issa Traoré, Isaac Woungang. 185-194 [doi]
- RConnected Middleware: Location based services for IoT environmentsMiguel Almeida Carvalho, João Nuno Silva. 195-202 [doi]
- A Novel Mobile Node's Identifier for Beyond 5G SDN-based NetworksFouad A. Yaseen, Hamed S. Al-Raweshidy. 203-208 [doi]
- Kata Containers: An Emerging Architecture for Enabling MEC Services in Fast and Secure WayAlessandro Randazzo, Ilenia Tinnirello. 209-214 [doi]
- An Anonymity Technique for Base Stations Against Traffic Volume Analysis in Wireless Sensor Networks and Internet of ThingsUthman Baroudi, Farouq Aliyu, Essa Shahra, Ahmed Al Naser. 215-220 [doi]
- Agent-based IoT Coordination for Smart Cities Considering Security and PrivacyIván García-Magariño, Geraldine Gray, Muttukrishnan Rajarajan, Waqar Asif. 221-226 [doi]
- Networks-on-Chip based Deep Neural Networks Accelerators for IoT Edge DevicesGiuseppe Ascia, Vincenzo Catania, Salvatore Monteleone, Maurizio Palesi, Davide Patti, John Jose. 227-234 [doi]
- A Crawling Approach to Facilitate Open IoT Data Archiving and ReuseTamas Pflanzner, Zoltan Feher, Attila Kertész. 235-242 [doi]
- Improving Link Quality Estimation Accuracy in 6TiSCH NetworksDario Fanucchi, Francesca Righetti, Carlo Vallati, Barbara Staehle, Giuseppe Anastasi. 243-250 [doi]
- RFID in the Wild - Analyzing Stocktake Data to Determine Detection Probabilities of ProductsMatthias Wölbitsch, Thomas Hasler, Michael Goller, Christian Gütl, Simon Walk, Denis Helic. 251-258 [doi]
- User Privacy Risk Analysis For The Internet of ThingsAkash Aggarwal, Waqar Asif, Habibul Azam, Milan Markovic, Muttukrishnan Rajarajan, Peter Edwards. 259-264 [doi]
- LoRaWAN IoT Solutions for SmartCitiesAgustín Candia, Federico Lo Grasso, Laura Fava, Soledad Natacha Represa, Javier Díaz, Diego Vilches. 265-269 [doi]
- Adaptive Radio Resource Management Scheme in 5G networks support for IoT ApplicationsKhitem Ben Ali, Faouzi Zarai. 270-276 [doi]
- A WSN-based Monitoring System to Control SewerageJavier Rocher, José Luis García-Navas, Oscar Romero 0002, Jaime Lloret. 277-282 [doi]
- Retrofitting Security and Privacy Measures to Smart Home DevicesChenghao Ye, Praburam Prabhakar Indra, David Aspinall 0001. 283-290 [doi]
- taAutonomous Avatar-based Architecture for Value-added Services ProvisionKarima Khadir, Nawal Guermouche, Thierry Monteil 0001. 291-298 [doi]
- Attribute-based Network and System Access Control Architecture for Industrial MachinesAlexander Kern, Reiner Anderl. 299-306 [doi]
- A Decentralized Optimization Algorithm for Residential Demand Side Management in Smart GridsSarah M. Azzam, Muhamed Salah, Tallal Elshabrawy, Mohamed Ashour. 307-313 [doi]
- An IoT Based Inventory System for High Value Laboratory EquipmentWasim Raad, María Victoria Bueno Delgado, Mohamed A. Deriche, Wael Suliman. 314-319 [doi]
- Remote Attestation as a Service for IoTMauro Conti, Edlira Dushku, Luigi V. Mancini, Md Masoom Rabbani, Silvio Ranise. 320-325 [doi]
- WSN-based Interactive Dynamic Maps for Guidance in Al-Masjid Al-HaramWafaa Kanakri, Lo'ai Ali Tawalbeh. 326-330 [doi]
- Formal Methods for Android Banking Malware Analysis and DetectionGiacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 331-336 [doi]
- Performance Evaluation of Deterministic Communication in the Railway DomainDaniel Onwuchekwa, Roman Obermaisser. 337-343 [doi]
- Virtual Switch for Integrated Real-Time Systems based on SDNHongjie Fang, Roman Obermaisser. 344-351 [doi]
- Cybersecurity and Driverless Cars: In Search for a Normative Way of SafetyEvariste Some, Gregory Gondwe, Evan W. Rowe. 352-357 [doi]
- DAGMaR: A DAG-based Robust Road Membership Estimation Framework for Scenario MiningLars Klitzke, Johannes Meyer, Tilman Leune, Carsten Koch, Frank Köster. 358-365 [doi]
- Secure V2V Communication with Identity-based Cryptography from License Plate RecognitionTudor Andreica, Bogdan Groza. 366-373 [doi]
- Prototyping Approach of Networking Road Users for Cooperative Collision Avoidance using SmartphonesWaldemar Titov, Felix Boehm, Thomas Schlegel. 374-379 [doi]
- Automated ARIMA Model Construction for Dynamic Vehicle GPS Location PredictionMohammad Alzyout, Mohammad A. Alsmirat, Mohammed I. Al-Saleh. 380-386 [doi]
- Efficient Monitoring of Library Call InvocationMarinos Tsantekidis, Vassilis Prevelakis. 387-392 [doi]
- Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic HypervisorManabu Hirano, Ryotaro Kobayashi. 393-398 [doi]
- Differences in Android Behavior Between Real Device and Emulator: A Malware Detection PerspectiveAlejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm. 399-404 [doi]
- Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data CommunicationDuisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad, Muder Almiani, Raouf M. Ganda, Ahmed Oun. 405-411 [doi]
- An Architecture for Blockchain based Peer to Peer Energy TradingJuhar Ahmed Abdella, Khaled Shuaib. 412-419 [doi]
- Knowledge Graph-Enhanced Blockchains by Integrating a Graph-Data Service-LayerBelal Abu-Naim, Wolfgang Klas. 420-427 [doi]
- Performance Improvement of Ordering and Endorsement Phase in Hyperledger FabricMinsu Kwon, HeonChang Yu. 428-432 [doi]
- Ledgerdata Refiner: A Powerful Ledger Data Query Platform for Hyperledger FabricEnce Zhou, Haoli Sun, Bingfeng Pi, Jun Sun, Kazuhiro Yamashita, Yoshihide Nomura. 433-440 [doi]
- A Study of Inequality in the Ethereum Smart Contract EcosystemBishwas C. Gupta, Sandeep K. Shukla. 441-449 [doi]
- Preserving Patient's Privacy using Proxy Re-encryption in Permissioned BlockchainDevendra K. Meena, Ras Dwivedi, Sandeep Shukla. 450-457 [doi]
- SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz TestingJian-Wei Liao, Tsung-Ta Tsai, Chia-Kang He, Chin-Wei Tien. 458-465 [doi]
- Apex: a High-Performance Hierarchical Distributed LedgerMarc X. Makkes, Robert Diebels. 466-473 [doi]
- Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted ComputingYichang Wu, Yuansong Qiao, Yuhang Ye, Brian Lee. 474-481 [doi]
- Decentralized Cloud Scheduling via Smart Contracts. Operational constraints and costsAdrian F. Spataru, Laura Ricci, Dana Petcu, Barbara Guidi. 482-489 [doi]
- Blockchain in Health Data Systems: A SurveyTaylor Hardin, David Kotz. 490-497 [doi]
- Predictive Proof of Metrics - a New Blockchain Consensus ProtocolVenkata Siva Vijayendra Bhamidipati, Michael Chan, Arpit Jain, Ashok Srinivasa Murthy, Derek Chamorro, Aniruddh Kamalapuram Muralidhar. 498-505 [doi]
- Improving Data Security in Message Communication between ACT and Aircraft using Private BlockchainYusuf Zakir, Khondker S. Hasan, Naomi S. Wiggins, Amlan Chatterjee. 506-513 [doi]
- ConnectionChain: the Secure Interworking of BlockchainsShingo Fujimoto, Yoshiki Higashikado, Takuma Takeuchi. 514-518 [doi]
- Full-text Search for Verifiable Credential Metadata on Distributed LedgersZoltán András Lux, Felix Beierle, Sebastian Zickau, Sebastian Göndör. 519-528 [doi]
- Acceptable Privacy for XAND BlockchainDebasish Ray Chawdhuri, Jeffrey Kramer, Spencer Judge. 529-536 [doi]
- Blockchain Technology in Supply Chain Management: Preliminary StudySoha Yousuf, Davor Svetinovic. 537-538 [doi]
- Transactive Energy on Hyperledger FabricNikita Karandikar, Antorweep Chakravorty, Chunming Rong. 539-546 [doi]
- Trading User Data: A Blockchain Based ApproachThorsten Weber, Wolfgang Prinz. 547-554 [doi]
- Network Traffic Characterization Using L-moment Ratio DiagramsMihaela I. Chidean, Javier Carmona-Murillo, Rune Hylsberg Jacobsen, Qi Zhang 0013. 555-560 [doi]
- Experimental Study on Machine Learning with Approximation to Data StreamsZhang Fu, Jiani Jiang. 561-566 [doi]
- Applying Ant Colony optimization for Service Function Chaining in a 5G NetworkSegundo Moreno, Antonio Miguel Mora, Pablo Padilla, Javier Carmona-Murillo, Pedro A. Castillo. 567-574 [doi]
- Detection and mitigation of DoS attacks in SDN. An experimental approachJesús Galeano-Brajones, David Cortés-Polo, Juan F. Valenzuela-Valdés, Antonio M. Mora, Javier Carmona-Murillo. 575-580 [doi]
- Optimization of Massive Connections in 5G Networks for IoTPablo H. Zapata-Cano, Alejandro Ramirez-Arroyo, Francisco Luna-Valero, Antonio Valenzuela-Valdés, Pedro A. Castillo Valdivieso, Juan Francisco Valenzuela-Valdés. 581-585 [doi]
- Simulation of the Performance of the Acoustic Positioning System of the Underwater KM3NeT Neutrino TelescopeCarlo Guidi. 586-590 [doi]
- A Compact Array Transducer for Full Calibration of Underwater Acoustic Detection Neutrino TelescopesMiguel Ardid, Dídac D. Tortosa, Juan Antonio Martínez-Mora. 591-595 [doi]
- Assessing the Yield of a Multi-varieties Crop of Camelina sativa (L.) Crantz through NDVI Remote SensingDavid Mostaza-Colado, Pedro V. Mauri Ablanque, Aníbal Capuano. 596-602 [doi]
- Remote Sensing Data: Useful Way for the Precision AgricultureYousfi Salima, José Fernando Marin Peira, Gregorio rincón de la horra, Pedro V. Mauri Ablanque. 603-609 [doi]
- Automated Irrigation Management Platform using a Wireless Sensor NetworkAmine Dahane, Kechar Bouabdellah, Y. Meddah, O. Benabdellah. 610-615 [doi]
- Low-cost Soil Moisture Sensors Based on Inductive Coils Tested on Different Sorts of SoilsMar Parra, Lorena Parra, Jaime Lloret, Pedro V. Mauri, Josep V. Llinares. 616-622 [doi]