Abstract is missing.
- A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat IntelligenceParis Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos. 3-8 [doi]
- Investigating Attack Propagation in a SoS via a Service DecompositionElena Lisova, Jamal El Hachem, Aida Causevic. 9-14 [doi]
- Blockchain Security by Design Framework for Trust and Adoption in IoT EnvironmentGohar Sargsyan, Nicolas Castellon, Raymond Binnendijk, Peter Cozijnsen. 15-20 [doi]
- On Blockchain Architectures for Trust-Based Collaborative Intrusion DetectionNicholas Kolokotronis, Sotirios Brotsis, Georgios Germanos, Costas Vassilakis, Stavros Shiaeles. 21-28 [doi]
- A Watermark Inspection Game for IoT SettingsGabriele Gianini, Corrado Mio, Leopold Ghemmogne Fossi, Elöd Egyed-Zsigmond. 29-34 [doi]
- A Forensics-by-Design Management Framework for Medical Devices Based on BlockchainVaggelis Malamas, Thomas K. Dasaklis, Panayiotis Kotzanikolaou, Mike Burmester, Sokratis K. Katsikas. 35-40 [doi]
- Attacking IEC-60870-5-104 SCADA SystemsPanagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, Emmanouil Panaousis. 41-46 [doi]
- MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT BrokersAndrea Palmieri, Paolo Prem, Silvio Ranise, Umberto Morelli, Tahir Ahmad. 47-53 [doi]
- Impact of Misbehaving Devices in Mobile Crowd Sourcing SystemsMenatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok. 54-59 [doi]
- DDoS Attack Mitigation through Root-DNS Server: A Case StudyBetty Saridou, Stavros Shiaeles, Basil K. Papadopoulos. 60-65 [doi]
- Data Verification and Privacy in IoT ArchitectureRichard K. Lomotey, Jacob Rickabaugh, Natalia Slivkanich, Rita Orji. 66-71 [doi]
- Cyber Resilience in IoT Network: Methodology and Example of Assessment through Epidemic Spreading ApproachEmanuele Bellini 0001, Franco Bagnoli, Alexander A. Ganin, Igor Linkov. 72-77 [doi]
- IoT Vulnerability Data Crawling and AnalysisStavros Shiaeles, Nicholas Kolokotronis, Emanuele Bellini 0001. 78-83 [doi]
- New Two-Level µTESLA Protocol for IoT EnvironmentsAli Al Dhaheri, Chan Yeob Yeun, Ernesto Damiani. 84-91 [doi]
- Deep Learning Based Approach for Classifying Power Signals and Detecting Anomalous Behavior of Wireless DevicesAbdurhman Albasir, Ricardo Manzano, Kshirasagar Naik. 92-98 [doi]
- An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion DetectionTommaso Zoppi, Andrea Ceccarellli, Andrea Bondavalli. 99-104 [doi]
- Scalable Graph Learning for FinanceToyotaro Suzumura. 109 [doi]
- Mapping ERD to Knowledge GraphAbdelrahman Osman Elfaki, Amer Aljaedi, Yucong Duan. 110-114 [doi]
- A Knowledge Graph Based Framework for Web API RecommendationBenjamin A. Kwapong, Kenneth K. Fletcher. 115-120 [doi]
- Service Recommendation Based on User Dynamic Preference Extraction and PredictionYanmei Zhang, Ya Qian, Mengjiao Gan, Xiaoyi Tang, Zheng Lin. 121-126 [doi]
- Knowledge-as-a-Service: A Community Knowledge Base for Research Infrastructures in Environmental and Earth SciencesZhiming Zhao, Xiaofeng Liao, Paul Martin 0002, Jordan Maduro, Peter Thijsse, Dick Schaap, Markus Stocker, Doron Goldfarb, Barbara Magagna. 127-132 [doi]
- Dimensional Situation Analytics: An Introduction and Its Application ProspectsHua Ming, Katsunori Oyama. 133-134 [doi]
- Knowledge Graph Provision for Heterogeneous Service NetworkLei Yu, Yucong Duan, Yonghao Zhang. 135-140 [doi]
- Visualization System for Analyzing Customer Comments in Marketing Research Support SystemKeita Arai, Yoshitaka Sakurai, Eriko Sakurai, Setsuo Tsuruta, Rainer Knauf. 141-146 [doi]
- Learning Process Models in IoT EdgeLong Cheng 0003, Cong Liu, Qingzhi Liu, Yucong Duan, John Murphy 0001. 147-150 [doi]
- Network Cloudification Enabling Network - Cloud/Fog Service Unification: State of the Art and ChallengesQiang Duan, Shangguang Wang. 153-159 [doi]
- Integrating Service Function Chain Management into Software Defined Network ControllerB. S. Lakshmi, J. Lakshmi. 160-165 [doi]
- Space-Based Cloud-Fog Computing Architecture and Its ApplicationsSuzhi Cao, Yi Zhao, Junyong Wei, Shuling Yang, Hao Han, Xue Sun, Lei Yan. 166-171 [doi]
- Space-Based Computing Platform Based on SoC FPGAShuling Yang, Suzhi Cao, Junyong Wei, Yi Zhao, Hao Han, Lei Yan. 172-177 [doi]
- Investigation of Moving Target Defense Technique to Prevent Poisoning Attacks in SDNSaumil Macwan, Chung-Horng Lung. 178-183 [doi]
- DDoS Attacks Detection and Mitigation in SDN Using Machine LearningObaid Rahman, Mohammad Ali Gauhar Quraishi, Chung-Horng Lung. 184-189 [doi]
- More General Evaluation of a Client-Centered Counseling AgentTsubasa Horii, Yoshitaka Sakurai, Eriko Sakurai, Setsuo Tsuruta, Rainer Knauf, Ernesto Damiani, Andrea Kutics. 190-196 [doi]
- SWoSC 2019 Invited TalkGopal Pingali. 199 [doi]
- Simulation-as-a-Service with Serverless ComputingKyriakos Kritikos, Pawel Skrzypek. 200-205 [doi]
- An Evaluation of Open Source Serverless Computing Frameworks Support at the EdgeAndrei Palade, Aqeel Kazmi, Siobhán Clarke. 206-211 [doi]
- Data Encryption and Fragmentation in Autonomous Vehicles Using Raspberry Pi 3Sahand Murad, Stavros Shaiaeles, Asiya Khan, Giovani Masala. 212-216 [doi]
- Services Computing and RegtechMichael Goul. 219-223 [doi]
- Financial Services Industry Challenges and Innovation OpportunitiesKumar Bhaskaran, Rong N. Chang, Prasenjit Dey, Jorge L. Sanz. 224-229 [doi]
- A Marketplace Approach to Trade-Related Risk DataChristophe Spoerry. 230-233 [doi]
- Opportunities Created by Digitalization of Life and HealthRamesh Jain. 237 [doi]
- Artificial intelligence in Home Care Settings in South Karelia Social and Healthcare District in FinlandPentti Itkonen. 238-239 [doi]
- Digital Health Challenges in the Silver EraLorenzo Chiari. 240-241 [doi]
- A Holistic View of a Patient Medical RecordPattanasak Mongkolwat. 242-243 [doi]
- Application of Deep Learning to Screening Test of DementiaKaoru Sakatani. 244 [doi]
- From Connected Health to Smart Healthcare: A Path to Equitable Care DeliveryLiqun Xu. 245-246 [doi]
- Integration Platform of Health Services in an Aging SocietyZhiyong Feng. 247 [doi]
- Resilient Mechanisms for Reliable Digital Health ServicesHiroki Takakura. 248-249 [doi]
- A Scenario-Based Requirement Model for Crossover Healthcare ServiceMeng Xi, Ying Li 0001, Yongna Wei, Naibo Wang, Yuyu Yin, Zhiling Luo, ShuiGuang Deng, Yihua Mao, Jianwei Yin. 252-259 [doi]
- Design and Implementation of Credit Evaluation System for Healthy Aged ServiceChao Li, Yiqin Zhao, Sen Li, PengHao Wang, Ziping Zhao. 260-263 [doi]
- Decision Support for EMS Policy Making Using Data Analytics and Real-Time AlertsMelanie Reuter-Oppermann, Dave Richards. 266-271 [doi]
- Evidence Based Public Health Policy Making: Tool SupportIoannis Basdekis, Konstantin Pozdniakov, Marios Prasinos, Konstantina Koloutsou. 272-277 [doi]
- The Need of Social Campaigning in Public Health Policy Decision MakingPanagiotis Katrakazas, Ourania Manta, Dimitrios D. Koutsouris, Nikos Dimakopoulos, Giorgos Giotis, Efstratios Tzoannos. 278-282 [doi]
- A Big Data Architecture for the Extraction and Analysis of EHR DataStefano Silvestri, Angelo Esposito, Francesco Gargiulo 0001, Mario Sicuranza, Mario Ciampi, Giuseppe De Pietro. 283-288 [doi]
- Risk of Pneumonia and Associated Outcomes in Intensive Care Unit: An Integrated Approach of Visual and Cluster AnalysisGiuliana Favara, Paolo Marco Riela, Andrea Maugeri, Martina Barchitta, Giovanni Gallo, Antonella Agodi. 289-294 [doi]
- On the Homogenization of Heterogeneous Inertial-Based Databases for Human Activity RecognitionAnna Ferrari, Marco Mobilio, Daniela Micucci, Paolo Napoletano. 295-300 [doi]
- Innovations and Convergence in Mobile Medical Applications and Cloud-Based Hospital Information Systems for the Real-Time Monitoring of Patients and Early Warning of DiseasesMustafa Asim Kazancigil. 301-306 [doi]
- Improving Hearing Healthcare with Big Data Analytics of Real-Time Hearing Aid DataJeppe Høy Christensen, Niels Henrik Pontoppidan, Marco Anisetti, Valerio Bellandi, Marco Cremonini. 307-313 [doi]
- Self-Management of Containers Deployment in Decentralized EnvironmentsFabiana Rossi. 315-318 [doi]
- Data Distribution and Exploitation in a Global Microservice Artefact ObservatoryPanagiotis Gkikopoulos. 319-322 [doi]
- A Dynamic Scheduling Framework for Multi-Tenancy CloudsRu Jia. 323-326 [doi]
- A Semantics-Enabled Approach for Data Lake Exploration ServicesMassimiliano Garda. 327-330 [doi]
- Service Function Chain Composition and Mapping in NFV-Enabled NetworksMeng Wang, Bo Cheng 0001, Biyi Li, Junliang Chen. 331-334 [doi]
- MLModelScope: Evaluate and Introspect Cognitive PipelinesCheng Li, Abdul Dakkak, Jinjun Xiong, Wen-mei Hwu. 335-338 [doi]
- Applicability of Neural Network Based Models for Software Effort EstimationSuyash Shukla, Sandeep Kumar. 339-342 [doi]
- Improving the Attribute-Based Active Learning by Clustering the New ItemsJunxin Zhou, Raja Chiky. 343-344 [doi]
- IDEAaS: Interactive Data Exploration As-a ServiceAda Bagozi. 345-348 [doi]
- A Data Logistics System for Internet of ThingsSyed Juned Ali, Pisipati Radha Krishna, Kamal Karlapalem. 349-350 [doi]
- E-SBOT: A Soft Service Robot for User-Centric Smart Service DeliveryXiaofei Xu, Zhongjie Wang, Zhiying Tu, Dian-Hui Chu, Yuming Ye. 354-355 [doi]
- Policy-Based De-Identification Test FrameworkArmin Gerl, Stefan Becher. 356-357 [doi]
- A Question-Driven Source Code Recommendation Service Based on Stack OverflowHang Yin, Zhiyu Sun, Yanchun Sun, Wenpin Jiao. 358-359 [doi]
- An Automatic Semantic Code Repair Service Based on Deep Learning for Programs with Single ErrorZhiyu Sun, Chao Xin, Yanchun Sun. 360-361 [doi]
- A Systematic Cloud Workload Clustering Technique in Large Scale Data CentersSalam Ismaeel, Ali Miri. 362-363 [doi]
- Measurement and Observation of Cross-Provider Cross-Region Latency for Cloud-Based IoT SystemsThy Vu, Chayanne Jaye Mediran, Yang Peng. 364-365 [doi]
- ERAMIS: A Reference Architecture-Based Methodology for IoT SystemsPaul Kearney, Rasool Asal. 366-367 [doi]
- Landcover Based 3-Dimensional Inverse Distance Weighting for Visualization of Radiation DoseRyo Kikawa, Katsunori Oyama, Hua Ming. 370-371 [doi]
- A Reinforcement Learning Approach to Web API Recommendation for Mashup DevelopmentRichard Anarfi, Kenneth K. Fletcher. 372-373 [doi]
- A User Profile Based Pension Service Recommendation AlgorithmChunshan Li, Dian-Hui Chu, Xiaofei Xu, Yunfei Bu. 374-375 [doi]
- Output and Input Data Perturbations for Differentially Private DatabasesFatema Rashid, Ali Miri. 376-377 [doi]
- A Smart and Safe Construction Application Design for Fog ComputingPetar Kochovski, Marko Bajec, Rizos Sakellariou, Vlado Stankovski. 378-379 [doi]
- Towards a Methodology for Evaluating Big Data PlatformsEvangelia Kavakli, Rizos Sakellariou, Vlado Stankovski. 380-381 [doi]
- RESTfulness of APIs in the WildArne Koschel, Maximilian Blankschyn, Kevin Schulze, Dominik Schöner, Irina Astrova, Igor Astrov. 382-383 [doi]
- Where Are We Looking? Understanding Android Static Analysis TechniquesSuzanna Schmeelk. 384-385 [doi]
- Analyzing Effect of Ensemble Models on Multi-Layer Perceptron Network for Software Effort EstimationSuyash Shukla, Sandeep Kumar, Pravas Ranjan Bal. 386-387 [doi]
- Query Data Inconsistency for Business ProcessesYongping Tang, Jian Yang 0001, Jianwen Su. 388-389 [doi]
- Dynamic Service Composition Orchestrated by Cognitive Agents in Mobile and Pervasive ComputingOscar J. Romero. 390-391 [doi]
- Dyn-YCSB: Benchmarking Adaptive FrameworksSubhajit Sidhanta, Supratik Mukhopadhyay, Wojciech Golab. 392-393 [doi]
- Towards Specification of a Software Architecture for Cross-Sectoral Big Data ApplicationsIoannis Arapakis, Yolanda Becerra, Omer Boehm, George Bravos, Vasilis Chatzigiannakis, Cesare Cugnasco, Giorgos Demetriou, Iliada Eleftheriou, Julien Etienne Mascolo, Lidija Fodor, Sotiris Ioannidis, Dusan Jakovetic, Leonidas Kallipolitis, Evangelia Kavakli, Despina Kopanaki, Nicolas Kourtellis, Mario Maawad Marcos, Ramon Martín de Pozuelo, Nemanja Milosevic, Giuditta Morandi, Enric Pages i Montanera, Gerald H. Ristow, Rizos Sakellariou, Raül Sirvent, Srdjan Skrbic, Ilias Spais, Giorgos Vasiliadis, Michael Vinov. 394-395 [doi]
- Delivering Data Mining Services in Cloud ComputingManuel Parra-Royon, José Manuel Benítez. 396-397 [doi]
- Evaluation of Big Data Governance - Combining a Multi-Criteria Approach and Systems TheoryJacky Akoka, Isabelle Comyn-Wattiau. 398-399 [doi]