default search action
7th IoTBDS 2022
- Denis Bastieri, Gary B. Wills, Péter Kacsuk, Victor Chang:
Proceedings of the 7th International Conference on Internet of Things, Big Data and Security, IoTBDS 2022, Online Streaming, April 22-24, 2022. SCITEPRESS 2022, ISBN 978-989-758-564-7
Invited Speakers
- Jie Lu:
Machine Learning for Decision Support in Complex Environments. IoTBDS 2022: 5 - Zoran Obradovic:
Event Detection and Classification in Big IoT Networks from Scarce and Imprecise Labels. IoTBDS 2022: 7 - Rajkumar Buyya:
Neoteric Frontiers in Cloud and Edge Computing. IoTBDS 2022: 9-10 - Antonio Iera:
Ecosystems of Social Digital Twins for Future IoT Network. IoTBDS 2022: 11
Papers
- Duc Cuong Nguyen, Kien Dang Nguyen, Simy Chacko:
A Real-time Explainable Anomaly Detection System for Connected Vehicles. 17-25 - Evandro L. C. Macedo, Flávia Coimbra Delicato, Luís F. M. de Moraes, Giancarlo Fortino:
A Two-level Integrated Approach for Assigning Trust Metrics to Internet of Things Devices. 26-36 - Zhi Lu, Vrizlynn L. L. Thing:
PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection. 37-46 - Tobias Altenburg, Matthias Volk, Daniel Staegemann, Klaus Turowski:
Reliability Estimation of a Smart Metering Architecture using a Monte Carlo Simulation. 47-54 - Dorottya Papp, Gergely Ács, Roland Nagy, Levente Buttyán:
SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices. 55-66 - Salim Chehida, Saddek Bensalem, Davide Conzon, Enrico Ferrera, Xu Tao:
BRAIN-IoT Architecture and Platform for Building IoT Systems. 67-77 - Hind Bangui, Barbora Buhnova, Bruno Rossi:
Shifting towards Antifragile Critical Infrastructure Systems. 78-87 - Steph Rudd, Hamish Cunningham:
Threat Modelling with the GDPR towards a Security and Privacy Metrics Framework for IoT Smart-farm Application. 91-102 - Paul D. Rosero-Montalvo, Vanessa E. Alvear-Puertas:
Efficient Lightweight Cryptography Algorithm in IoT Devices with Real-time Criteria. 103-109 - Jurij Kuzmic, Patrick Brinkmann, Günter Rudolph:
Real-Time Object Detection with Intel NCS2 on Hardware with Limited Resources for Low-power IoT Devices. 110-118 - Hannes Salin, Dennis Fokin:
An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice Architectures. 119-126 - Sai Man Cheok, Lap-Man Hoi, Su-Kit Tang, Rita Tse:
Constructing High Quality Bilingual Corpus using Parallel Data from the Web. 127-132 - Tiberiu Boros, Andrei Cotaie, Antrei Stan, Kumar Vikramjeet, Vivek Malik, Joseph Davidson:
Machine Learning and Feature Engineering for Detecting Living off the Land Attacks. 133-140 - Daniel Del Gaudio, Amil Imeri, Pascal Hirmer:
A Failure Prediction Platform for Internet of Things Applications. 141-148 - Rauli Kaksonen, Kimmo Halunen, Juha Röning:
Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines. 149-156 - Abeer Akkad, Gary B. Wills, Abdolbaghi Rezazadeh:
An Information Security Model for an IoT-enabled Smart Grid. 157-165 - Tope Omitola, Ben Waterson, Niko Tsakalakis, Richard Gomer, Sophie Stalla-Bourdillon, Tom J. Cherrett, Gary B. Wills:
Provisioning Security in a Next Generation Mobility as a Service System. 166-173 - Tariq A. A. Alsboui, Hussain Al-Aqrabi, Richard Hill, Shamaila Iram:
An Approach to Privacy-Preserving Distributed Intelligence for the Internet of Things. 174-182 - Chelsea Yeh, Alexander W. Lee, Hudson Kaleb Kalaw Dy, Karin C. Li:
Internet-of-Things Management of Medical Chairs and Wheelchairs. 183-188 - Jan Gerhards, Tim Schneider, Pascal Hirmer:
Towards a Digital Twin Framework for Connected Vehicles. 189-196 - Mansour Alzahrani, Alex S. Weddell, Gary B. Wills:
Using Environmental Data for IoT Device Energy Harvesting Prediction. 197-204 - Zoltán Farkas, Róbert Lovas:
Reference Architecture for IoT Platforms towards Cloud Continuum based on Apache Kafka and Orchestration Methods. 205-214 - Stephanie von Maltzan:
The Concept of Identifiability in ML Models. 215-222 - Fernando L. Oliveira, Rafael R. Parizi, Júlio C. B. de Mattos:
Improving Developer Productivity on Internet of Things using JavaScript. 223-230 - Sohrab Chalishhafshejani, Bao Khanh Pham, Martin Gilje Jaatun:
Automating Security in a Continuous Integration Pipeline. 231-238 - Daniel Staegemann, Matthias Volk, Priyanka Byahatti, Nikhilkumar Italiya, Suhas Shantharam, Apoorva Byaladakere Chandrashekar, Klaus Turowski:
Implementing Test Driven Development in the Big Data Domain: A Movie Recommendation System as an Exemplary Case. 239-248 - Andreas Aigner, Abdelmajid Khelil:
A Semantic Security Model for Cyber-Physical Systems to Identify and Evaluate Potential Threats and Vulnerabilities. 249-257 - Pol Hölzmer, Manuel Koschuch, Matthias Hudler:
Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length. 258-266 - Bernhard Heiden, Christian A. Koren, Volodymyr Alieksieiev, Bianca Tonino-Heiden:
Energy Consumption of a Hexspider Robot-o as Function of Footwear and Underground: Experimental Investigations. 267-273 - Thierry Antoine-Santoni, Bastien Poggi, David Araújo, Chabi Babatounde:
Factors Influencing LoRa Communication in IoT Deployment: Overview and Experience Analysis. 274-280 - Han Xu, Zheming Zuo, Jie Li, Victor Chang:
Seen to Unseen: When Fuzzy Inference System Predicts IoT Device Positioning Labels That Had Not Appeared in Training Phase. 281-288 - Himesh Welgama, Kevin Lee, Jonathan Kua:
A Framework for Seamless Offloading in IoT Applications using Edge and Cloud Computing. 289-296 - Vai-Kei Ian, Rita Tse, Su-Kit Tang, Giovanni Pau:
Performance Analysis of Machine Learning Algorithms in Storm Surge Prediction. 297-303 - Phuc Tran, Duc Cuong Nguyen:
Advanced Lightweight Cryptography for Automotive Security: Surveys, Challenges and Solutions. 304-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.