default search action
2nd SGIoT 2018: Niagara Falls, ON, Canada
- Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mohamed Guerroumi:
Smart Grid and Internet of Things - Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 256, Springer 2019, ISBN 978-3-030-05927-9
Smart Grid and Internet of Things
- Md. Motaharul Islam, Zaheer Khan, Yazed Alsaawy:
An Implementation of Harmonizing Internet of Things (IoT) in Cloud. 3-12 - Shailendra Singh, Abdulsalam Yassine:
IoT Big Data Analytics with Fog Computing for Household Energy Management in Smart Grids. 13-22 - Adeniyi Onasanya, Maher Elshakankiri:
Secured Cancer Care and Cloud Services in IoT/WSN Based Medical Systems. 23-35 - Yue Qiu, Maode Ma:
Privacy Preserving for Location-Based IoT Services. 36-45 - Chad Davidson, Tahsin Rezwana, Mohammad Asadul Hoque:
Smart Home Security Application Enabled by IoT: - Using Arduino, Raspberry Pi, NodeJS, and MongoDB. 46-56 - Salsabeel Y. Shapsough, Mohannad Takrouri, Rached Dhaouadi, Imran A. Zualkernan:
An MQTT-Based Scalable Architecture for Remote Monitoring and Control of Large-Scale Solar Photovoltaic Systems. 57-67 - Syed Qaisar Jalil, Stephan K. Chalup, Mubashir Husain Rehmani:
A Smart Meter Firmware Update Strategy Through Network Coding for AMI Network. 68-77 - Md. Zakirul Alam Bhuiyan, Mdaliuz Zaman, Guojun Wang, Tian Wang, Md. Arafatur Rahman, Hai Tao:
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid. 78-84 - Samer Khasawneh, Michel Kadoch:
A Chain Based Signature Scheme for Uplink and Downlink Communications in AMI Networks. 85-99 - Diogo F. Lima Filho, José Roberto de A. Amazonas:
Robustness Situations in Cases of Node Failure and Packet Collision Enabled by TCNet: Trellis Coded Network - A New Algorithm and Routing Protocol. 100-110
Applications and Technologies
- Sakib Mahtab Khandaker, Afzal Hussain, Mohiuddin Ahmed:
Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. 113-120 - Tony Lindgren:
On Data Driven Organizations and the Necessity of Interpretable Models. 121-130 - Abrar Ullah, Hannan Xiao, Trevor Barker:
A Multi-factor Authentication Method for Security of Online Examinations. 131-138 - Munir Ahmad Saeed, Mohiuddin Ahmed:
Evaluation Metrics for Big Data Project Management. 139-142
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.