


default search action
7th IFIPIoT 2024: Nice, France
- Gaëtan Rey
, Jean-Yves Tigli
, Erwin Franquet
:
Internet of Things - 7th IFIP WG 5.5 International Cross-Domain Conference, IFIPIoT 2024, Nice, France, November 6-8, 2024, Proceedings. IFIP Advances in Information and Communication Technology 737, Springer 2025, ISBN 978-3-031-81899-8
Hardware/Software Solutions for IoT and CPS
- Cristina Bernad
, Vojdan Kjorveziroski
, Pedro Juan Roig
, Salvador Alcaraz
, Katja Gilly
, Sonja Filiposka
:
Relocation of Container-Based Services in a MEC-NFV Orchestrated Environment. 3-20 - Martin Nahalka
, Marco M. Cook
, Dimitrios Pezaros
:
The Good, the Bad and the Ugly: Investigating the Effectiveness of Graph Deep Neural Networks for Anomaly Detection in Industrial Control Systems. 21-36 - Raaga Sai Somesula
, Sibi Rajagopal Sivakumar
, Srinivas Katkoori
:
Programmable and Scalable Bit-Sliced VLSI Architecture for Decision Tree-Based Machine Learning Edge Inference. 37-54
Electronics and Signal Processing for IoT
- Christian Franck, Johann Großschädl:
Efficient Implementation of Authenticated Encryption on 16-bit MSP430 Microcontrollers. 57-73
Networking and Communications Technology for IoT
- Samir Medjhah, Thierry Monteil, Marie-Agnès Peraldi-Frati, Luigi Liquori:
Multi-layered Model for Performance Evaluation of oneM2M-Based IoT Solution. 77-95 - Vinh Hoa La
, Edgardo Montes de Oca
, Ana R. Cavalli
:
An Information-Theoretic Approach for Anomaly Detection in RPL-Based Internet of Things. 96-111 - Emil Sekerinski
, Tianyu Zhou
:
Formal Development of a Delay-Tolerant Multicast Protocol for Wireless Sensors. 112-128
Artificial Intelligence and Machine Learning Technologies for IoT
- Nastaran Mahmoudyar, Ali A. Ghorbani, Arash Habibi Lashkari:
Graph-Based Classification of IoT Malware Families Enhanced by Fuzzy Hashing. 131-148 - Mario Barbareschi
, Salvatore Barone
, Valentina Casola
, Salvatore Della Torca
:
Error Resiliency and Adversarial Robustness in Convolutional Neural Networks: An Empirical Analysis. 149-160
Cyber Security/Privacy/Trust for IoT and CPS
- Raouf Jmal
, Mariam Masmoudi
, Ikram Amous
, Florence Sèdes
:
A Blockchain and IPFS-Enhanced Model for Attack Detection and Resource Efficiency. 163-174 - Franco Mezzarapa
, Jenna Goodrich
, Andey Robins
, Mike Borowczak
:
Hardware Trojan Key-Corruption Detection with Automated Neural Architecture Search. 175-185
IoT or CPS Applications and Use Cases
- Laurent Capocchi, Jean François Santucci
, Jean-Yves Tigli
, Thibault Gomnin, Stephane Lavirotte
, Gérald Rocher
:
Actuation Conflict Management in Internet of Things Systems DevOps: A Discrete Event Modeling and Simulation Approach. 189-206 - Bonpagna Kann, Sandra Castellanos-Paez, Romain Rombourg, Philippe Lalanda:
Leveraging Task-Specific VAEs for Efficient Exemplar Generation in HAR. 207-225 - Sally Bagheri, Andreas Jacobsson
:
The Role of Ethics in Smart Homes - A Workshop-Based Approach. 226-242 - Phu H. Nguyen
, Ashish Rauniyar, Toni Valtteri Niemi:
Digital Twin-Based Security Orchestration, Automation and Response for IoT and CPS. 243-260 - Benoit Couraud
, Mehdi Nafkha, Franck Dechavanne, Azeddine El Youssfi, Paulo Moura
:
GreenMov: A Fiware Based Interoperable Solution to Reduce the Environmental Impact of Mobility. 261-278 - Ahmad Sedaghat
, Mohammad Nazififard
, Mohamad Iyad Al-Khiami
:
Dynamic IoT Determination of Overall Heat Transfer Coefficient in a Portable Cabin in Kuwait. 279-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.