Abstract is missing.
- Bolstering the Mobile Cloud: Addressing Emerging Threats and Strengthening Multi-Layered Defenses for Robust Mobile SecuritySriram Vamsi Ilapakurthy. 1-7 [doi]
- Keynote Speech 1: Who You Gonna Call? Unmasking AI Investigations through AI ForensicsIbrahim Abe Baggili. 1 [doi]
- Keynote Speech 2: Artificial Intelligence applied to real-time IoT data deliveryJaime Lloret 0001. 2-3 [doi]
- Keynote Speech 3: Beyond securing networks and storage: emerging attacks and defences to machine intelligenceAbdallah Khreishah. 4-5 [doi]
- Keynote Speech 4: AI/ML Applications in Computer NetworksVinay Tripathi. 6 [doi]
- Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signaturesRafiqullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret 0001. 8-14 [doi]
- An Adaptive Flow-based NIDS for Smart Home Networks Against Malware Behavior Using XGBoost combined with Rough Set TheoryNasser Alsabilah, Danda B. Rawat. 15-22 [doi]
- Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based AttributesNazia Sharmin, Christopher Kiekintveld. 23-30 [doi]
- Reducing the travel time of passengers between bus stations in the city by using the smart subsystem of road side unit (RSU) in the high traffic intersections of Zanjan cityVahid Ghaffari. 31-38 [doi]
- A New Image Processing System to Diagnose the Orange Fruit DiseaseArman Foroughi, José Miguel Jiménez, Jaime Lloret 0001. 39-46 [doi]
- An IoT-based Smart Bathroom for Healthy LifeYu-Hsien Wei, You-Xian Huang, You-Ching Chen, Der-Lor Way. 47-52 [doi]
- AI-Enabled Plastic Pollution Monitoring System for Toronto WaterwaysBenjamin O. Kelly, Shengkai Chen, Eric Pengyu Zhou, Maher Elshakankiri. 53-58 [doi]
- Four-layer Architecture for IoT Security in Fog NetworkZahra Yousef, Hamza Gharsellaoui, Walid Barhoumi. 59-65 [doi]
- A Survey on the Cybersecurity of IoT From The Perspective of SoCXianping Wang, Hao Qiu, Jiayue Shen, Weiru Chen. 66-71 [doi]
- Image to Text Recognition for Detecting Human and Machine Altered News in Social MediaAbdullah Kamal, Zaid Jamal, Gabriel Rosales, Brian Robinson, Zachary Sotny, Heena Rathore. 72-74 [doi]
- Automated Hardware Auditing Testbed for UART and SPI based IoT DevicesShivam Mishra, Aditya Ray, Manpreet Singh, S. Venkatesan 0002, Anshu S. Anand. 75-82 [doi]
- Edge Analytics Solution for Online Monitoring of Building Operations DataWarren R. Williams, Raahul C. Pathak. 83-89 [doi]
- Self-Supervised Image Anomaly Detection and Localization with Synthetic AnomaliesMin-Chun Tsai, Sheng-De Wang. 90-95 [doi]
- Automated Security Audit Testbed For IP-Based IoT Devices Without Physical AccessAshutosh Kumar, Brijesh Peshvani, S. Venkatesan, Manish Kumar, Suneel Yadav, Sandeep Kumar Shukla. 96-103 [doi]
- A Smart Network Slicing Provisioning Framework for 5G-based IoT NetworksHisham A. Kholidy. 104-110 [doi]
- Secure and Scalable Permissioned Blockchain using LDE-P2P NetworksSaydul Akbar Murad, Nick Rahimi. 111-116 [doi]
- Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance ProtocolHiman Namdari, Cihan Tunc, Ram Dantu. 117-124 [doi]
- Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack VectorsSeth Barrett, Bradley Boswell, Gokila Dorai. 125-132 [doi]
- Memory Extraction of an Emulated STM-32 Blue Pill for Anomaly DetectionDiana Gutierrez, William Ocampo, Adriaan Jansen, Alexander Perez-Pons. 133-140 [doi]
- Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device EncryptionMaurice Ngouen, Mohammad Ashiqur Rahman, Nagarajan Prabakar, A. Selcuk Uluagac, Laurent Njilla. 141-148 [doi]
- SIoTSim: Simulator for Social Internet of ThingsMeriem Chiraz Zouzou, Mohamed Shahawy, Elhadj Benkhelifa, Hisham A. Kholidy. 149-155 [doi]
- Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT NetworksRadjaa Bensaid, Nabila Labraoui, Haythem Bany Salameh. 156-160 [doi]