default search action
5th IoTBDS 2020: Prague, Czech Republic
- Gary B. Wills, Péter Kacsuk, Victor Chang:
Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9, 2020. SCITEPRESS 2020, ISBN 978-989-758-426-8
Invited Speakers
- Schahram Dustdar:
Edge Intelligence - The Co-evolution of Humans, IoT, and AI. IoTBDS 2020: 5 - Rajiv Ranjan:
New Horizons in IoT Workflows Provisioning in Edge and Cloud Datacentres for Fast Data Analytics: The Osmotic Computing Approach. IoTBDS 2020: 7-8 - Róbert Lovas:
Reference Architectures for Cloud-based Platforms: Convergence vs. Diversification. IoTBDS 2020: 9
Papers
- Yosra Didi, Ahlem Walha, Ali Wali:
Data-driven Model for Influenza Prediction Incorporating Environmental Effects. 15-24 - Ines Kramer, Silvia Schmidt, Manuel Koschuch, Mathias Tausig:
Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework. 25-35 - Zhenhui Chen, Haiyang Hu, Zhongjin Li, Xingchen Qi, Haiping Zhang, Hua Hu, Victor Chang:
Skeleton-based Action Recognition for Industrial Packing Process. 36-45 - Daniel Del Gaudio, Maximilian Reichel, Pascal Hirmer:
A Life Cycle Method for Device Management in Dynamic IoT Environments. 46-56 - Fal Sadikin, Sandeep Kumar:
ZigBee IoT Intrusion Detection System: A Hybrid Approach with Rule-based and Machine Learning Anomaly Detection. 57-68 - Nicholas Cifranic, Jose Romero-Mariona, Brian Souza, Roger A. Hallman:
Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures. 69-77 - Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake:
Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data. 78-87 - Jiaojiao Wang, Dingguo Yu, Xiaoyu Ma, Chang Liu, Victor Chang, Xuewen Shen:
Online Predicting Conformance of Business Process with Recurrent Neural Networks. 88-100 - Eugene Frimpong, Antonis Michalas:
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG. 101-111 - Wei Liu, Hongyi Jiang, Dandan Che, Lifei Chen, Qingshan Jiang:
A Real-time Temperature Anomaly Detection Method for IoT Data. 112-118 - Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas:
Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices. 119-129 - Benjamin Agbo, Yongrui Qin, Richard Hill:
Best Fit Missing Value Imputation (BFMVI) Algorithm for Incomplete Data in the Internet of Things. 130-137 - Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry:
A Systematic Mapping of Patterns and Architectures for IoT Security. 138-149 - Fahd Ahmed Banakhr:
Design and Development of IoT based Computer Network Room Environment Monitoring System. 153-160 - Tobias Altenburg, Sascha Bosse, Klaus Turowski:
Safety in Distributed Sensor Networks: A Literature Review. 161-168 - Tahir Mahmood, Kamran Munir:
Enabling Predictive and Preventive Maintenance using IoT and Big Data in the Telecom Sector. 169-176 - Albert Boonstra, Dustin A. Wiktor-Steffens:
The Socio-technical Impact of the Internet of Things: An Exploratory Mixed Methods Research. 177-188 - Theo Zschörnig, Jonah Windolph, Robert Wehlitz, Bogdan Franczyk:
A Cloud-based Analytics Architecture for the Application of Online Machine Learning Algorithms on Data Streams in Consumer-centric Internet of Things Domains. 189-196 - Jurij Kuzmic, Günter Rudolph:
Unity 3D Simulator of Autonomous Motorway Traffic Applied to Emergency Corridor Building. 197-204 - Itorobong S. Udoh, Gerald Kotonya:
A Reinforcement Learning QoS Negotiation Model for IoT Middleware. 205-212 - Martin Macák, Matus Stovcik, Barbora Buhnova:
The Suitability of Graph Databases for Big Data Analysis: A Benchmark. 213-220 - Zýnnet Duygu Akþehýr, Erdal Kiliç, Sedat Akleylek, Mesut Döngül, Burak Coskun:
Stocks Prices Prediction with Long Short-term Memory. 221-226 - Stéphane Lavirotte, Gérald Rocher, Jean-Yves Tigli, Thibaut Gonnin:
IoT-based Systems Actuation Conflicts Management Towards DevOps: A Systematic Mapping Study. 227-234 - Victor Takashi Hayashi, Vinícius Garcia, Renato Manzan de Andrade, Reginaldo Arakaki:
OKIoT Open Knowledge IoT Project: Smart Home Case Studies of Short-term Course and Software Residency Capstone Project. 235-242 - Luzhe Cao, Jinxuan Cao, Haoran Yin, Yongcheng Duan, Xueyan Wu:
Condition Elements Extraction based on PCA Attribute Reduction and Xgboost. 243-248 - Andreas Freymann, Florian Maier, Kristian Schaefer, Tom Böhnel:
Tackling the Six Fundamental Challenges of Big Data in Research Projects by Utilizing a Scalable and Modular Architecture. 249-256 - Stephan Cejka, Florian Kintzler, Lisa Müllner, Felix Knorr, Marco Mittelsdorf, Jörn Schumann:
Application Lifecycle Management for Industrial IoT Devices in Smart Grid Use Cases. 257-266 - Daniel Staegemann, Matthias Volk, Alexandra Grube, Johannes Hintsch, Sascha Bosse, Robert Häusler, Abdulrahman Nahhas, Matthias Pohl, Klaus Turowski:
Classifying Big Data Taxonomies: A Systematic Literature Review. 267-278 - Aleksey V. Burdakov, Victoria Proletarskaya, Andrey D. Ploutenko, Oleg Ermakov, Uriy A. Grigorev:
Predicting SQL Query Execution Time with a Cost Model for Spark Platform. 279-287 - Bruno Rossi:
A Large-scale Replication of Smart Grids Power Consumption Anomaly Detection. 288-295 - Chuanyi Li, Jidong Ge, Victor Chang, Bin Luo:
Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description. 296-303 - Martin Macák, Hind Bangui, Barbora Buhnova, András J. Molnár, Csaba István Sidló:
Big Data Processing Tools Navigation Diagram. 304-312 - Yunqi Dong, Jiujun Bai, Xuebo Chen:
A Review of Edge Computing Nodes based on the Internet of Things. 313-320 - Liyun Lan, Jiujun Bai, Xuebo Chen:
Overview of Enterprise IoT Security System based on Edge Computing. 321-326 - Marin Fotache, Marius-Iulian Cluci, Valerica Greavu-Serban:
Low Cost Big Data Solutions: The Case of Apache Spark on Beowulf Clusters. 327-334 - Jiujun Bai, Yuqing Tong, Xuebo Chen:
Discussion on Heterogeneous Converged IoT Networking Scheme of CBN in Hotel Field. 335-340 - Milen S. Marev, Ernesto Compatangelo, Wamberto Weber Vasconcelos:
Intrinsic Indicators for Numerical Data Quality. 341-348 - Ahmed G. Alzahrani, Ahmed Alenezi, Hany F. Atlam, Gary B. Wills:
A Framework for Data Sharing between Healthcare Providers using Blockchain. 349-358 - Qianwen Xu, Victor Chang:
Analysis of Co-authorship Network and the Correlation between Academic Performance and Social Network Measures. 359-366 - Daniel Del Gaudio, Pascal Hirmer:
Fulfilling the IoT Vision: Are We There Yet? 367-374 - Omar El Midaoui, Btihal El Ghali, Abderrahim El Qadi:
Geographical Queries Reformulation using Parallel FP-Growth for Spatial Taxonomies Building. 375-381 - Dominik Grzelak, Uwe Aßmann:
Preparatory Reflections on Safe Context-adaptive Software (Position Paper). 382-391 - Rita Tse, Marcus Im, Su-Kit Tang, Luís Filipe Menezes, Alfredo Manuel Pereira Geraldes Dias, Giovanni Pau:
Self-adaptive Sensing IoT Platform for Conserving Historic Buildings and Collections in Museums. 392-398 - In-San Lei, Su-Kit Tang, Ion-Kun Chao, Rita Tse:
Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. 399-404 - Lucas Bonvin, Dominique Gabioud, Michael Clausen:
cloud.iO, An Open-source W3C WoT Compliant Framework. 405-411 - Rayan M. Ghamri, Nawfal F. Fadhel, Gary B. Wills:
Investigating Trusted Records for Employment and Education. 412-419 - Bernhard Heiden, Volodymyr Alieksieiev, Bianca Tonino-Heiden:
Scalable Logistic Cell RFID Witness Model. 420-427 - Matthias Volk, Daniel Staegemann, Sascha Bosse, Robert Häusler, Klaus Turowski:
Approaching the (Big) Data Science Engineering Process. 428-435 - Ilaria Bosi, Jure Rosso, Enrico Ferrera, Claudio Pastrone:
IIot Platform for Agile Manufacturing in Plastic and Rubber Domain. 436-444 - Julian Dreyer, Ralf Tönjes:
What3Words Geo Encryption: An Alternative Approach to Location based Encryption. 445-452 - Daniel Staegemann, Matthias Volk, Tuan Vu, Sascha Bosse, Robert Häusler, Abdulrahman Nahhas, Matthias Pohl, Klaus Turowski:
Determining Potential Failures and Challenges in Data Driven Endeavors: A Real World Case Study Analysis. 453-460 - Mohammad Fikry Abdullah, Mohd Zaki Mat Amin, Zurina Zainol, Marini Mohamad Ideris:
Big Data Analytics as Game Changer in Dealing Impact of Climate Change in Malaysia: Present and Future Research. 461-469 - Enrico Ferrera, Xu Tao, Davide Conzon, Victor Sonora Pombo, Miquel Cantero, Tim Ward, Ilaria Bosi, Mirko Sandretto:
BRAIN-IoT: Paving the Way for Next-Generation Internet of Things. 470-477 - Andreas Eitel:
Environmental Aware Vulnerability Scoring. 478-485
Special Session on Artificial Intelligence for Emerging IoT Systems: Open Challenges and Novel Perspectives
- Muddasar Naeem, Antonio Coronato, Giovanni Paragliola, Giuseppe De Pietro:
A Reinforcement Learning and IoT based System to Assist Patients with Disabilities. 491-498 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques. 499-506 - Lelio Campanile, Mauro Iacono, Fiammetta Marulli, Michele Mastroianni:
Privacy Regulations Challenges on Data-centric and IoT Systems: A Case Study for Smart Vehicles. 507-518 - Renato Zona, Martina De Cristofaro, Luca Esposito, Paolo Ferla, Simone Palladino, Elena Totaro, Lucio Olivares, Vincenzo Minutolo:
Early Warning System for Landslide Risk and SHM by Means of Reinforced Optic Fiber in Lifetime Strain Analysis. 521-525 - Lelio Campanile, Mauro Iacono, Roberta Lotito, Michele Mastroianni:
A WSN Energy-aware Approach for Air Pollution Monitoring in Waste Treatment Facility Site: A Case Study for Landfill Monitoring Odour. 526-532 - Giuseppe Mainenti, Lelio Campanile, Fiammetta Marulli, Carlo Ricciardi, Antonio S. Valente:
Machine Learning Approaches for Diabetes Classification: Perspectives to Artificial Intelligence Methods Updating. 533-540
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.