Abstract is missing.
- Adopting Machine Learning to Support the Detection of Malicious Domain NamesFernanda Magalhães, João Paulo Magalhães. 1-6 [doi]
- Network Formation in 6TiSCH Industrial Internet of Things under Misbehaved NodesYassine Boufenneche, Rafik Zitouni, Laurent George 0001, Nawel Gharbi. 1-6 [doi]
- The Role of Artificial Intelligence and Cyber Security for Social Networks and Internet of TransportationBhavani M. Thuraisingham. 1 [doi]
- *Theodoros Nestoridis, Chrysa Oikonomou, Anastasios Temperekidis, Fotios Gioulekas, Panagiotis Katsaros. 1-8 [doi]
- Methodological approach for creating an IoT manufacturing applicationAchraf Rahmouni, Catarina Ferreira Da Silva, Parisa Ghodous. 1-6 [doi]
- Machine Learning Based Predictive Models in Mobile Platforms Using CPU-GPUJavad Sohankar, Madhurima Pore, Ayan Banerjee, Koosha Sadeghi, Sandeep K. S. Gupta. 1-6 [doi]
- Transferability of Privacy-related Behaviours to Shared Smart Home Assistant DevicesVanessa Z. Lin, Simon Parkin. 1-8 [doi]
- Selection of Service Nodes in Edge Computing EnvironmentsEfthymios Oikonomou, Angelos N. Rouskas. 1-6 [doi]
- Security and Privacy of Medical Internet of Things Devices for Smart HomesPaige Harvey, Otily Toutsop, Kevin Kornegay, Excel Alale, Don Reaves. 1-6 [doi]
- Resilient IoT-based Monitoring System for Crude Oil PipelinesSafuriyawu Ahmed, Frédéric Le Mouël, Nicolas Stouls. 1-7 [doi]
- An exploration of the cybercrime ecosystem around ShodanMaria Bada, Ildiko Pete. 1-8 [doi]
- Reliable abnormal event detection from IoT surveillance systemsErsin Elbasi. 1-5 [doi]
- Investigating the potential of MFCC features in classifying respiratory diseasesA. S. K. Sreeram, Udhaya Ravishankar, Narayana Rao Sripada, Baswaraj Mamidgi. 1-7 [doi]
- A first Step towards a Protection Profile for the Security Evaluation of Consensus MechanismsChristine Hennebert. 1-6 [doi]
- A Comparative Study of Clustering Techniques Applied on Covid-19 Scientific LiteratureValerio Bellandi, Paolo Ceravolo, Samira Maghool, Stefano Siccardi. 1-8 [doi]
- Enhancing the robustness of watermarked medical images using heuristic search algorithmErsin Elbasi. 1-5 [doi]
- VM Introspection-based Allowlisting for IaaSFarah Fargo, Olivier Franza, Cihan Tunc, Salim Hariri. 1-4 [doi]
- Data Quality Model-based Testing of Information Systems: the Use-case of E-scootersAnastasija Nikiforova, Janis Bicevskis, Zane Bicevska, Ivo Oditis. 1-8 [doi]
- AppArmor For Health Data Access Control: Assessing Risks and BenefitsThibaud Ecarot, Samuel Dussault, Ameni Souid, Luc Lavoie, Jean-François Ethier. 1-7 [doi]
- Indoor Temperature Characterization and its Implication on Power Consumption in a Campus BuildingAli Safari Khatouni, Michael Bauer, Hanan Lutfiyya. 1-8 [doi]
- Challenges of IOT Service PlatformsKhalil Drira. 1 [doi]
- Crystal-Free Architectures for Smart Dust and the Industrial IoTThomas Watteyne. 1 [doi]
- Sequential Routing Decision with Low-Complexity for Throughput Improvement in Full-duplex Cognitive Radio NetworksSharhabeel H. Alnabelsi, Haythem Bany Salameh. 1-5 [doi]
- Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog EnvironmentReinout Eyckerman, Siegfried Mercelis, Johann Márquez-Barja, Peter Hellinckx. 1-8 [doi]
- Some Revised Perspectives on Internet of ThingsSamee U. Khan. 1 [doi]
- A Data Generator for Cloud-Edge Vehicle Communication in Multi Domain Cellular NetworksMarco Pomalo, Van Thanh Le, Nabil El Ioini, Claus Pahl, Hamid R. Barzegar. 1-8 [doi]
- Securing Industrial Control Systems Using Physical Device FingerprintingTsion Yimer, Md Tanvir Arafin, Kevin Kornegay. 1-6 [doi]
- A Survey on Blockchain for Healthcare Informatics and ApplicationsKimberly Wilber, Sarah Vayansky, Nicholas Costello, David Berdik, Yaser Jararweh. 1-9 [doi]
- Decentralized Linked Open Data in Constrained Wireless Sensor NetworksBart Moons, Flor Sanders, Thijs Paelman, Jeroen Hoebeke. 1-6 [doi]
- A Overview on WSN Deployment and a Novel Conceptual BIM-based Approach in Smart BuildingsKhaoula Zaimen, Mohamed-el-Amine Brahmia, Jean-François Dollinger, Laurent Moalic, Abdelhafid Abouaissa, Lhassane Idoumghar. 1-6 [doi]
- Performance Analysis of RPL Protocols in LLN Network Using Friedman's TestNovi Azman, Abdusy Syarif, Mohamed-el-Amine Brahmia, Jean-François Dollinger, Samir Ouchani, Lhassane Idoumghar. 1-6 [doi]
- Applications of Blockchain in Healthcare, Industry 4, and Cyber-Physical SystemsSai Mounika Tadaka, Lo'ai Tawalbeh. 1-8 [doi]
- Data-driven Decision Support Tools for Reducing GHG Emissions from Livestock Production Systems: Overview and ChallengesDrisya Alex Thumba, Sanja Lazarova-Molnar, Parisa Niloofar. 1-8 [doi]
- Detection of Carbapenems Resistant K-mer Sequences in Bacteria of Critical Priority by the World Health Organization (Pseudomonas aeruginosa and Acinetobacter baumannii)E. A. Barlandas-Quintana, J. E. Martinez-Ledesma. 1-8 [doi]
- A Novel Gateway Selection Protocol for Three-layers Integrated Wireless NetworksRaghad Al-Syouf, Mohammad Shurman, Abdallah Alma'aitah, Sharhabeel H. Alnabelsi. 1-5 [doi]
- Quantifying Security and Performance of Physical Unclonable FunctionsFahem Zerrouki, Samir Ouchani, Hafida Bouarfa. 1-4 [doi]
- An Actuation Conflicts Management Flow for Smart IoT-based SystemsGérald Rocher, Thibaut Gonnin, Frank Dechavanne, Stéphane Lavirotte, Jean-Yves Tigli, Laurent Capocchi, Jean François Santucci. 1-8 [doi]
- A Context-Aware Break Glass Access Control System for IoT EnvironmentsDries Van Bael, Shirin Kalantari, Andreas Put, Bart De Decker. 1-8 [doi]
- Service Migration in Multi-domain Cellular Networks based on Machine Learning ApproachesMarco Pomalo, Van Thanh Le, Nabil El Ioini, Claus Pahl, Hamid R. Barzegar. 1-8 [doi]
- AIoT for Smart territoriesJuan Manuel Corchado. 1 [doi]
- BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of ThingsErin Beckwith, Geethapriya Thamilarasu. 1-8 [doi]
- IoT based Wireless Energy Efficient Smart Metering System Using ZigBee in Smart CitiesSanthosh Shetty Chowdary, Mohamed A. Abd El ghany, Klaus Hofmann. 1-4 [doi]
- Sensor Data Visualization on Google Maps using AWS, and IoT Discovery BoardVishakha Subhash Supekar, Ali Ahmadina. 1-6 [doi]
- Encryption scheme based on the automorphism group of the Ree function fieldGennady Khalimov, Yevgeniy Kotukh, Svitlana Khalimova. 1-8 [doi]
- Using Siamese Networks to Detect Shading on the Edge of Solar FarmsSalsabeel Y. Shapsough, Imran A. Zualkernan, Rached Dhaouadi, Ali Reza Sajun. 1-8 [doi]
- A Novel Approach Based on Blockchain to Enhance Security with Dynamic Policy UpdatingOussama Mounnan, Abdelkrim El Mouatasim, Otman Manad, Aissam Outchakoucht, Hamza Es-Samaali, Larbi Boubchir. 1-6 [doi]
- WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT EnvironmentAlaa Mheisn, Mohammad Shurman, Abdallah Al-Ma'aytah. 1-4 [doi]