default search action
6th IoTSMS 2019: Granada, Spain
- Mohammad A. Alsmirat, Yaser Jararweh:
Sixth International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019, Granada, Spain, October 22-25, 2019. IEEE 2019, ISBN 978-1-7281-2949-5
IOTSMS 2019
- Evgenia Kapassa, Marios Touloupou, Argyro Mavrogiorgou, Athanasios Kiourtis, Dimitra Giannouli, Konstantina Katsigianni, Dimosthenis Kyriazis:
An Innovative eHealth System Powered By 5G Network Slicing. 7-12 - Nasr Rajb A Abosata, Andrew H. Kemp, Mohsen Razavi:
Secure Smart-Home Application Based on IoTCoAP protocol. 13-17 - Hung Cao, Monica Wachowicz:
Analytics Everywhere for Streaming IoT Data. 18-25 - Alec Parise, Miguel-Ángel Manso-Callejo, Hung Cao, Marco Mendonca, Harpreet Kohli, Monica Wachowicz:
Indoor Occupancy Prediction using an IoT Platform. 26-31 - Hung Cao, Marcel Brown, Lizhi Chen, Riley Smith, Monica Wachowicz:
Lessons Learned from Integrating Batch and Stream Processing using IoT Data. 32-34 - Andrea Maria Nogueira Cavalcanti Ribeiro, Pedro Rafael X. do Carmo, João Victor Lucena do Monte, Djamel Sadok, Patricia Takako Endo, Judith Kelner:
Comparative Analysis of Abstraction Layer Performance of IoT Devices Management Platforms. 35-42 - Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
A Location-Aware Authentication Model to Handle Uncertainty in IoT. 43-50 - Salsabeel Y. Shapsough, Imran A. Zualkernan:
Requirements for an IoT Middleware for Utility-Scale Distributed Solar Farms. 51-57 - Lucas R. B. Brasilino, Martin Swany:
Mitigating DDoS Flooding Attacks against IoT using Custom Hardware Modules. 58-64 - Pratik Pachange, Gaurav Bansod:
A Fast and Efficient Datapath Designs of Lightweight Cipher RoadRunneR on FPGA's for Resource Constrained Environments. 65-72 - Majeda Albataineh, Moath H. A. Jarrah:
DEVS-Based IoT Management System for Modeling and Exploring Smart Home Devices. 73-78 - Hernn H. Ivarez-Valera, Marc Dalmau, Philippe Roose, Christina Herzog:
The Architecture of Kaligreen V2: A Middleware Aware of Hardware Opportunities to Save Energy. 79-86 - Ahmad Ayad, Alireza Zamani, Anke Schmeink, Guido Dartmann:
Design and Implementation of a Hybrid Anomaly Detection System for IoT. 87-92 - Roger Young, Sheila Fallon, Paul Jacob, Denis O. Dwyer:
A Flow Based Architecture for Efficient Distribution of Vehicular Information in Smart Cities. 93-98 - Chenhong Zhou, Jiong Zhao, Hao Liu:
Adaptive Status Report with Congestion Control in NB-IoT. 99-103 - Mohammad Al-Zinati, Taha Almasri, Mohammad A. Alsmirat, Yaser Jararweh:
A Mobile-Edge Computing Bio-Surveillance Framework for Multiple Biological Attacks Detection. 104-109 - Milan Markovic, Daniel Garijo, Peter Edwards, Wamberto Vasconcelos:
Semantic Modelling of Plans and Execution Traces for Enhancing Transparency of IoT Systems. 110-115 - Milan Markovic, Peter Edwards, Naomi Jacobs:
Recording Provenance of Food Delivery Using IoT, Semantics and Business Blockchain Networks. 116-118 - Ousmane Sadio, Ibrahima Ngom, Claude Lishou:
Lightweight Security Scheme for MQTT/MQTT-SN Protocol. 119-123 - Bhavya Pareek, Priyanka Gupta, Gaurav Singal, Riti Kushwaha:
Person Identification using Autonomous Drone through Resource Constraint Devices. 124-129 - Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha:
UAVs Reliable Transmission for Multicast Protocols in FANETs. 130-135 - Van Thanh Le, Claus Pahl, Nabil El Ioini:
Blockchain Based Service Continuity in Mobile Edge Computing. 136-141 - Andrew Blower, Gerald Kotonya:
RECON: A Real-time Entity Based Access Control for IoT. 142-146 - Konstantinos Panayiotou, Emmanouil G. Tsardoulias, Christopher Zolotas, Iason Paraskevopoulos, Alexandra Chatzicharistou, Alexandros Sahinis, Stathis Dimitriadis, Dimitra Ntzioni, Christopher Mpekos, Giannis Manousaridis, Aris Georgoulas, Andreas L. Symeonidis:
Ms Pacman and the Robotic Ghost: A Modern Cyber-Physical Remake of the Famous Pacman Game. 147-154 - Luiz Fernando Pinto de Oliveira, Leandro Tiago Manera, Paulo Denis Garcez Da Luz:
Smart Traffic Light Controller System. 155-160 - René Wetzig, Anton Gulenko, Florian Schmidt:
Unsupervised Anomaly Alerting for IoT-Gateway Monitoring using Adaptive Thresholds and Half-Space Trees. 161-168 - Anders Eivind Braten, Frank Alexander Kraemer, David Palma:
Adaptive, Correlation-Based Training Data Selection for IoT Device Management. 169-176 - Roberto Vega-Rodríguez, Sandra Sendra, Jaime Lloret, Pablo Romero-Díaz, José Luis García-Navas:
Low Cost LoRa based Network for Forest Fire Detection. 177-184 - Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). 185-194 - Miguel Almeida Carvalho, João Nuno Silva:
RConnected Middleware: Location based services for IoT environments. 195-202 - Fouad A. Yaseen, Hamed S. Al-Raweshidy:
A Novel Mobile Node's Identifier for Beyond 5G SDN-based Networks. 203-208 - Alessandro Randazzo, Ilenia Tinnirello:
Kata Containers: An Emerging Architecture for Enabling MEC Services in Fast and Secure Way. 209-214 - Uthman Baroudi, Farouq Aliyu, Essa Shahra, Ahmed Al Naser:
An Anonymity Technique for Base Stations Against Traffic Volume Analysis in Wireless Sensor Networks and Internet of Things. 215-220 - Iván García-Magariño, Geraldine Gray, Muttukrishnan Rajarajan, Waqar Asif:
Agent-based IoT Coordination for Smart Cities Considering Security and Privacy. 221-226 - Giuseppe Ascia, Vincenzo Catania, Salvatore Monteleone, Maurizio Palesi, Davide Patti, John Jose:
Networks-on-Chip based Deep Neural Networks Accelerators for IoT Edge Devices. 227-234 - Tamas Pflanzner, Zoltan Feher, Attila Kertész:
A Crawling Approach to Facilitate Open IoT Data Archiving and Reuse. 235-242 - Dario Fanucchi, Francesca Righetti, Carlo Vallati, Barbara Staehle, Giuseppe Anastasi:
Improving Link Quality Estimation Accuracy in 6TiSCH Networks. 243-250 - Matthias Wölbitsch, Thomas Hasler, Michael Goller, Christian Gütl, Simon Walk, Denis Helic:
RFID in the Wild - Analyzing Stocktake Data to Determine Detection Probabilities of Products. 251-258 - Akash Aggarwal, Waqar Asif, Habibul Azam, Milan Markovic, Muttukrishnan Rajarajan, Peter Edwards:
User Privacy Risk Analysis For The Internet of Things. 259-264 - Agustín Candia, Federico Lo Grasso, Laura Fava, Soledad Natacha Represa, Javier Díaz, Diego Vilches:
LoRaWAN IoT Solutions for SmartCities. 265-269 - Khitem Ben Ali, Faouzi Zarai:
Adaptive Radio Resource Management Scheme in 5G networks support for IoT Applications. 270-276 - Javier Rocher, José Luis García-Navas, Oscar Romero, Jaime Lloret:
A WSN-based Monitoring System to Control Sewerage. 277-282 - Chenghao Ye, Praburam Prabhakar Indra, David Aspinall:
Retrofitting Security and Privacy Measures to Smart Home Devices. 283-290 - Karima Khadir, Nawal Guermouche, Thierry Monteil:
taAutonomous Avatar-based Architecture for Value-added Services Provision. 291-298 - Alexander Kern, Reiner Anderl:
Attribute-based Network and System Access Control Architecture for Industrial Machines. 299-306 - Sarah M. Azzam, Muhamed Salah, Tallal Elshabrawy, Mohamed Ashour:
A Decentralized Optimization Algorithm for Residential Demand Side Management in Smart Grids. 307-313 - Wasim Raad, María Victoria Bueno Delgado, Mohamed A. Deriche, Wael Suliman:
An IoT Based Inventory System for High Value Laboratory Equipment. 314-319 - Mauro Conti, Edlira Dushku, Luigi V. Mancini, Md Masoom Rabbani, Silvio Ranise:
Remote Attestation as a Service for IoT. 320-325
MCSMS 2019
- Wafaa Kanakri, Lo'ai Ali Tawalbeh:
WSN-based Interactive Dynamic Maps for Guidance in Al-Masjid Al-Haram. 326-330 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Formal Methods for Android Banking Malware Analysis and Detection. 331-336
ITCVT 2019
- Daniel Onwuchekwa, Roman Obermaisser:
Performance Evaluation of Deterministic Communication in the Railway Domain. 337-343 - Hongjie Fang, Roman Obermaisser:
Virtual Switch for Integrated Real-Time Systems based on SDN. 344-351 - Evariste Some, Gregory Gondwe, Evan W. Rowe:
Cybersecurity and Driverless Cars: In Search for a Normative Way of Safety. 352-357 - Lars Klitzke, Johannes Meyer, Tilman Leune, Carsten Koch, Frank Köster:
DAGMaR: A DAG-based Robust Road Membership Estimation Framework for Scenario Mining. 358-365 - Tudor Andreica, Bogdan Groza:
Secure V2V Communication with Identity-based Cryptography from License Plate Recognition. 366-373 - Waldemar Titov, Felix Boehm, Thomas Schlegel:
Prototyping Approach of Networking Road Users for Cooperative Collision Avoidance using Smartphones. 374-379 - Mohammad Alzyout, Mohammad A. Alsmirat, Mohammed I. Al-Saleh:
Automated ARIMA Model Construction for Dynamic Vehicle GPS Location Prediction. 380-386
FCST 2019
- Marinos Tsantekidis, Vassilis Prevelakis:
Efficient Monitoring of Library Call Invocation. 387-392 - Manabu Hirano, Ryotaro Kobayashi:
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor. 393-398 - Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
Differences in Android Behavior Between Real Device and Emulator: A Malware Detection Perspective. 399-404 - Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad, Muder Almiani, Raouf M. Ganda, Ahmed Oun:
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. 405-411
BCCA 2019
- Juhar Ahmed Abdella, Khaled Shuaib:
An Architecture for Blockchain based Peer to Peer Energy Trading. 412-419 - Belal Abu-Naim, Wolfgang Klas:
Knowledge Graph-Enhanced Blockchains by Integrating a Graph-Data Service-Layer. 420-427 - Minsu Kwon, Heonchang Yu:
Performance Improvement of Ordering and Endorsement Phase in Hyperledger Fabric. 428-432 - Ence Zhou, Haoli Sun, Bingfeng Pi, Jun Sun, Kazuhiro Yamashita, Yoshihide Nomura:
Ledgerdata Refiner: A Powerful Ledger Data Query Platform for Hyperledger Fabric. 433-440 - Bishwas C. Gupta, Sandeep K. Shukla:
A Study of Inequality in the Ethereum Smart Contract Ecosystem. 441-449 - Devendra K. Meena, Ras Dwivedi, Sandeep K. Shukla:
Preserving Patient's Privacy using Proxy Re-encryption in Permissioned Blockchain. 450-457 - Jian-Wei Liao, Tsung-Ta Tsai, Chia-Kang He, Chin-Wei Tien:
SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing. 458-465 - Marc X. Makkes, Robert Diebels:
Apex: a High-Performance Hierarchical Distributed Ledger. 466-473 - Yichang Wu, Yuansong Qiao, Yuhang Ye, Brian Lee:
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing. 474-481 - Adrian F. Spataru, Laura Ricci, Dana Petcu, Barbara Guidi:
Decentralized Cloud Scheduling via Smart Contracts. Operational constraints and costs. 482-489 - Taylor Hardin, David Kotz:
Blockchain in Health Data Systems: A Survey. 490-497 - Venkata Siva Vijayendra Bhamidipati, Michael Chan, Arpit Jain, Ashok Srinivasa Murthy, Derek Chamorro, Aniruddh Kamalapuram Muralidhar:
Predictive Proof of Metrics - a New Blockchain Consensus Protocol. 498-505 - Yusuf Zakir, Khondker S. Hasan, Naomi S. Wiggins, Amlan Chatterjee:
Improving Data Security in Message Communication between ACT and Aircraft using Private Blockchain. 506-513 - Shingo Fujimoto, Yoshiki Higashikado, Takuma Takeuchi:
ConnectionChain: the Secure Interworking of Blockchains. 514-518 - Zoltán András Lux, Felix Beierle, Sebastian Zickau, Sebastian Göndör:
Full-text Search for Verifiable Credential Metadata on Distributed Ledgers. 519-528 - Debasish Ray Chawdhuri, Jeffrey Kramer, Spencer Judge:
Acceptable Privacy for XAND Blockchain. 529-536 - Soha Yousuf, Davor Svetinovic:
Blockchain Technology in Supply Chain Management: Preliminary Study. 537-538 - Nikita Karandikar, Antorweep Chakravorty, Chunming Rong:
Transactive Energy on Hyperledger Fabric. 539-546 - Thorsten Weber, Wolfgang Prinz:
Trading User Data: A Blockchain Based Approach. 547-554
ES5TI 2019
- Mihaela I. Chidean, Javier Carmona-Murillo, Rune Hylsberg Jacobsen, Qi Zhang:
Network Traffic Characterization Using L-moment Ratio Diagrams. 555-560 - Zhang Fu, Jiani Jiang:
Experimental Study on Machine Learning with Approximation to Data Streams. 561-566 - Segundo Moreno, Antonio Miguel Mora, Pablo Padilla, Javier Carmona-Murillo, Pedro A. Castillo:
Applying Ant Colony optimization for Service Function Chaining in a 5G Network. 567-574 - Jesús Galeano-Brajones, David Cortés-Polo, Juan F. Valenzuela-Valdés, Antonio Miguel Mora, Javier Carmona-Murillo:
Detection and mitigation of DoS attacks in SDN. An experimental approach. 575-580 - Pablo H. Zapata-Cano, Alejandro Ramirez-Arroyo, Francisco Luna-Valero, Antonio Valenzuela-Valdés, Pedro Ángel Castillo Valdivieso, Juan Francisco Valenzuela-Valdés:
Optimization of Massive Connections in 5G Networks for IoT. 581-585
MarSS 2019
- Carlo Guidi:
Simulation of the Performance of the Acoustic Positioning System of the Underwater KM3NeT Neutrino Telescope. 586-590 - Miguel Ardid, Dídac D. Tortosa, Juan Antonio Martínez-Mora:
A Compact Array Transducer for Full Calibration of Underwater Acoustic Detection Neutrino Telescopes. 591-595
TeCrop 2019
- David Mostaza-Colado, Pedro V. Mauri Ablanque, Aníbal Capuano:
Assessing the Yield of a Multi-varieties Crop of Camelina sativa (L.) Crantz through NDVI Remote Sensing. 596-602 - Yousfi Salima, José Fernando Marin Peira, Gregorio rincón de la horra, Pedro V. Mauri Ablanque:
Remote Sensing Data: Useful Way for the Precision Agriculture. 603-609 - Amine Dahane, Kechar Bouabdellah, Y. Meddah, O. Benabdellah:
Automated Irrigation Management Platform using a Wireless Sensor Network. 610-615 - Mar Parra, Lorena Parra, Jaime Lloret, Pedro V. Mauri, Josep V. Llinares:
Low-cost Soil Moisture Sensors Based on Inductive Coils Tested on Different Sorts of Soils. 616-622
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.