


default search action
2nd IoTBDS 2017: Porto, Portugal
- Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary B. Wills, Robert John Walters, Victor Chang:

Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017. SciTePress 2017, ISBN 978-989-758-245-5
Invited Speakers
Keynote Speakers
- Yi-Ke Guo:

Assimilated Learning - Bridging the Gap between Big Data and Smart Data. IoTBDS 2017: 7
Invited Lecture
- Roy R. Cecil:

Big Data - Evolution, Trends and Opportunities. IoTBDS 2017: 13
Papers
Full Papers
- Victoria Moreno

, José Antonio Ferrer, José Alberto Díaz
, Domingo Bravo, Victor Chang:
A Data-Driven Methodology for Heating Optimization in Smart Buildings. 19-29 - Samaneh Rashidibajgan:

A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks. 30-35 - Wolfgang Weiss

, Víctor Juan Expósito Jiménez
, Herwig Zeiner
:
A Dataset and a Comparison of Out-of-Order Event Compensation Algorithms. 36-46 - Roger Hallman

, Josiah Bryan, Geancarlo Palavicini, Joseph DiVita, Jose Romero-Mariona:
IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets. 47-58 - Philipp Montesano, Marc Hüffmeyer, Ulf Schreier:

Outsourcing Access Control for a Dynamic Access Configuration of IoT Services. 59-69 - Paul Brous, Marijn Janssen, Daan Schraven

, Jasper Spiegeler, Baris Can Duzgun:
Factors Influencing Adoption of IoT for Data-driven Decision Making in Asset Management Organizations. 70-79 - Luisa Vervier, Eva-Maria Zeissig

, Chantal Lidynia
, Martina Ziefle:
Perceptions of Digital Footprints and the Value of Privacy. 80-91 - Marco Cavallo, Giuseppe Di Modica

, Carmelo Polito, Orazio Tomarchio:
A LAHC-based Job Scheduling Strategy to Improve Big Data Processing in Geo-distributed Contexts. 92-101 - Robert Pettersen, Håvard D. Johansen, Dag Johansen:

Secure Edge Computing with ARM TrustZone. 102-109 - Kun Liu:

Secure Electronic Health Record System Based on Online/Offline KP-ABE in the Cloud. 110-116 - Joschka Kersting, Michaela Geierhos

, Hanmin Jung, Taehong Kim
:
Internet of Things Architecture for Handling Stream Air Pollution Data. 117-124 - Shaufikah Shukri, Latifah Munirah Kamarudin

, David Lorater Ndzi
, Ammar Zakaria, Saidatul Norlyna Azemi
, Kamarulzaman Kamarudin, Syed Muhammad Mamduh Syed Zakaria:
RSSI-based Device Free Localization for Elderly Care Application. 125-135 - Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo:

Task Offloading for Scientific Workflow Application in Mobile Cloud. 136-148 - Dongcheng Zhao, Gang Sun

, Dan Liao, Rahat Iqbal
, Victor Chang:
Live Migration for Service Function Chaining. 149-156 - Rune Hylsberg Jacobsen, Drini Aliu, Emad Ebeid

:
A Low-cost Vehicle Tracking Platform using Secure SMS. 157-166 - Anna Kobusinska

, Jerzy Brzezinski
, Kamil Pawulczuk:
Device Fingerprinting: Analysis of Chosen Fingerprinting Methods. 167-177
Short Papers
- Georgios Dimitropoulos, Estela Papagianni, Vasileios Megalooikonomou:

Lag Correlation Discovery and Classification for Time Series. 181-188 - Óscar Mortágua Pereira, Vedran Semenski, Diogo Domingues Regateiro, Rui L. Aguiar:

The XACML Standard - Addressing Architectural and Security Aspects. 189-197 - Noura Aleisa

, Karen Renaud
:
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions. 198-205 - Aleksey V. Burdakov, Uriy A. Grigorev

, Victoria Proletarskaya, Artem Ustimov:
Data Warehouse MFRJ Query Execution Model for MapReduce. 206-215 - Jari Kreku, Visa Antero Vallivaara, Kimmo Halunen, Jani Suomalainen

:
Evaluating the Efficiency of Blockchains in IoT with Simulations. 216-223 - Yassine Essadraoui, Mohamed Dafir Ech-Cherif El Kettani:

Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups. 224-231 - Jean Tajer, Mo Adda

, Benjamin Aziz:
New Computing Model for Securing Mobile Agents in IP Networks. 232-238 - Syed Khuram Shahzad

, Muhammad Waseem Iqbal, Nadeem Ahmad
:
Privacy Agents for IoT Cloud Communication. 239-245 - Giovanni Perrone, Massimo Vecchio, Riccardo Pecori

, Raffaele Giaffreda:
The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices. 246-253 - Hany F. Atlam

, Ahmed Alenezi, Robert John Walters, Gary B. Wills
:
An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things. 254-260 - Mohammad Fikry Abdullah

, Mardhiah Ibrahim, Harlisa Zulkifli:
Resolving the Misconceptions on Big Data Analytics Implementation through Government Research Institute in Malaysia. 261-266 - Guillermo Escobedo, Norma Jacome-Grajales, Gustavo Arroyo-Figueroa

:
Big Data & Analytics to Support the Renewable Energy Integration of Smart Grids - Case Study: Power Solar Generation. 267-275 - Alexandra Rivero-García, Iván Santos-González, Candelaria Hernández-Goya, Pino Caballero-Gil:

IBSC System for Victims Management in Emergency Scenarios. 276-283 - Thomas Ochs, Ute Riemann:

Internet of Things - The Power of the IoT Platform. 284-294 - Ghada Gashgari, Robert John Walters, Gary B. Wills:

A Proposed Best-practice Framework for Information Security Governance. 295-301 - Gopal Jamnal, Xiaodong Liu:

A Cognitive-IoE Approach to Ambient-intelligent Smart Home. 302-308 - John Esquiagola

, Laisa Caroline de Paula Costa, Pablo Calcina, Geovane Fedrecheski, Marcelo Zuffo:
Performance Testing of an Internet of Things Platform. 309-314 - Nurul Huda Nik Zulkipli, Ahmed Alenezi, Gary B. Wills

:
IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things. 315-324 - Zanele Nicole Mndebele, Muthu Ramachandran:

IoT based Proximity Marketing . 325-330 - Stephan Cejka, Albin Frischenschlager, Mario Faschang, Mark Stefan:

Memory Optimization of a Distributed Middleware for Smart Grid Applications. 331-337 - Nayana Mannilthodi, Jinesh M. Kannimoola

:
Secure IoT: An Improbable Reality. 338-343 - Paul Fremantle, Benjamin Aziz, Tom Kirkham:

Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - . 344-349 - Christophe Ponsard, Annick Majchrowski, Stéphane Mouton, Mounir Touzani:

Process Guidance for the Successful Deployment of a Big Data Project: Lessons Learned from Industrial Cases. 350-355 - Silvia Balaban, Manuela Wagner:

Minimizing the Risks of Data Protection Infringement - Data Lifecycle Risk Assessment. 356-362 - Muhammad Shaiful Azrin Md Alimon, L. M. Kamarudin

, Azizi Harun, Ammar Zakaria, Shaufikah Shukri:
Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security. 363-369 - Alexandr Savinov:

From Group-by to Accumulation: Data Aggregation Revisited. 370-379 - Diana Martínez-Mosquera, Sergio Luján-Mora

:
Data Cleaning Technique for Security Big Data Ecosystem. 380-385 - Roberto Saia, Salvatore Carta:

A Frequency-domain-based Pattern Mining for Credit Card Fraud Detection. 386-391 - Ateeq Khan, Matthias Pohl, Sascha Bosse, Stefan Willi Hart, Klaus Turowski:

A Holistic View of the IoT Process from Sensors to the Business Value. 392-399 - Brian Lee, Roman Vanickis, Franklin Rogelio

, Paul Jacob:
Situational Awareness based Risk-adaptable Access Control in Enterprise Networks. 400-405 - Mohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli:

Big Data Analytics Framework for Natural Disaster Management in Malaysia. 406-411 - Fernando Fradique Duarte, Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar:

On the Prospect of using Cognitive Systems to Enforce Data Access Control. 412-418 - Ricardo Jesus

, Mário Antunes, Diogo Gomes
, Rui L. Aguiar
:
Extracting Knowledge from Stream Behavioural Patterns. 419-423 - Enrico Ferrera, Riccardo Tisseur, Emanuel Lorenço, E. J. Silva, Antonio J. Baptista

, Gonçalo Cardeal, Paulo Peças
:
Optimization for Sustainable Manufacturing - Application of Optimization Techniques to Foster Resource Efficiency. 424-430 - Quanqing Xu, Chao Jin

, Mohamed Faruq Bin Mohamed Rasid, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Decentralized Content Trust for Docker Images. 431-437 - Jiwan Lee, Sunghoon Jung, Kijin Kim, Minhwan Kim, Bonghee Hong:

An Image Data Learning Method by Discriminating Multiple ROIs Data Patterns for Extracting Weather Information. 438-443
Special Session on Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
Full Paper
- Priya Vedhanayagam, Subha S., Balamurugan Balusamy

, Pandi Vijayakumar
, Victor Chang:
Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service . 449-460
Short Papers
- João Pedro Dias

, José Pedro Pinto, José Magalhães Cruz:
A Hands-on Approach on Botnets for Behavior Exploration. 463-469 - Geancarlo Palavicini Jr., Josiah Bryan, Eaven Sheets, Megan Kline, John San Miguel:

Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting. 470-477 - Nouf Alkhater, Gary B. Wills, Robert John Walters:

An Integrated Model to Investigate an Individual's Behavioural Towards using Cloud Computing. 478-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














