


default search action
5th IoTBDS 2020: Prague, Czech Republic
- Gary B. Wills, Péter Kacsuk, Victor Chang:

Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9, 2020. SCITEPRESS 2020, ISBN 978-989-758-426-8
Invited Speakers
- Schahram Dustdar:

Edge Intelligence - The Co-evolution of Humans, IoT, and AI. IoTBDS 2020: 5 - Rajiv Ranjan:

New Horizons in IoT Workflows Provisioning in Edge and Cloud Datacentres for Fast Data Analytics: The Osmotic Computing Approach. IoTBDS 2020: 7-8 - Róbert Lovas:

Reference Architectures for Cloud-based Platforms: Convergence vs. Diversification. IoTBDS 2020: 9
Papers
- Yosra Didi, Ahlem Walha, Ali Wali:

Data-driven Model for Influenza Prediction Incorporating Environmental Effects. 15-24 - Ines Kramer, Silvia Schmidt, Manuel Koschuch

, Mathias Tausig:
Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework. 25-35 - Zhenhui Chen, Haiyang Hu, Zhongjin Li, Xingchen Qi, Haiping Zhang, Hua Hu, Victor Chang:

Skeleton-based Action Recognition for Industrial Packing Process. 36-45 - Daniel Del Gaudio, Maximilian Reichel, Pascal Hirmer:

A Life Cycle Method for Device Management in Dynamic IoT Environments. 46-56 - Fal Sadikin, Sandeep Kumar:

ZigBee IoT Intrusion Detection System: A Hybrid Approach with Rule-based and Machine Learning Anomaly Detection. 57-68 - Nicholas Cifranic, Jose Romero-Mariona, Brian Souza, Roger A. Hallman

:
Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures. 69-77 - Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake:

Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data. 78-87 - Jiaojiao Wang, Dingguo Yu, Xiaoyu Ma, Chang Liu, Victor Chang, Xuewen Shen:

Online Predicting Conformance of Business Process with Recurrent Neural Networks. 88-100 - Eugene Frimpong

, Antonis Michalas
:
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG. 101-111 - Wei Liu, Hongyi Jiang, Dandan Che, Lifei Chen, Qingshan Jiang:

A Real-time Temperature Anomaly Detection Method for IoT Data. 112-118 - Eugene Frimpong

, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
:
Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices. 119-129 - Benjamin Agbo, Yongrui Qin, Richard Hill

:
Best Fit Missing Value Imputation (BFMVI) Algorithm for Incomplete Data in the Internet of Things. 130-137 - Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry:

A Systematic Mapping of Patterns and Architectures for IoT Security. 138-149 - Fahd Ahmed Banakhr:

Design and Development of IoT based Computer Network Room Environment Monitoring System. 153-160 - Tobias Altenburg

, Sascha Bosse, Klaus Turowski:
Safety in Distributed Sensor Networks: A Literature Review. 161-168 - Tahir Mahmood, Kamran Munir:

Enabling Predictive and Preventive Maintenance using IoT and Big Data in the Telecom Sector. 169-176 - Albert Boonstra

, Dustin A. Wiktor-Steffens:
The Socio-technical Impact of the Internet of Things: An Exploratory Mixed Methods Research. 177-188 - Theo Zschörnig, Jonah Windolph

, Robert Wehlitz
, Bogdan Franczyk:
A Cloud-based Analytics Architecture for the Application of Online Machine Learning Algorithms on Data Streams in Consumer-centric Internet of Things Domains. 189-196 - Jurij Kuzmic, Günter Rudolph:

Unity 3D Simulator of Autonomous Motorway Traffic Applied to Emergency Corridor Building. 197-204 - Itorobong S. Udoh, Gerald Kotonya:

A Reinforcement Learning QoS Negotiation Model for IoT Middleware. 205-212 - Martin Macák, Matus Stovcik, Barbora Buhnova:

The Suitability of Graph Databases for Big Data Analysis: A Benchmark. 213-220 - Zýnnet Duygu Akþehýr, Erdal Kiliç

, Sedat Akleylek, Mesut Döngül, Burak Coskun:
Stocks Prices Prediction with Long Short-term Memory. 221-226 - Stéphane Lavirotte, Gérald Rocher, Jean-Yves Tigli

, Thibaut Gonnin:
IoT-based Systems Actuation Conflicts Management Towards DevOps: A Systematic Mapping Study. 227-234 - Victor Takashi Hayashi, Vinícius Garcia, Renato Manzan de Andrade, Reginaldo Arakaki:

OKIoT Open Knowledge IoT Project: Smart Home Case Studies of Short-term Course and Software Residency Capstone Project. 235-242 - Luzhe Cao, Jinxuan Cao, Haoran Yin, Yongcheng Duan, Xueyan Wu:

Condition Elements Extraction based on PCA Attribute Reduction and Xgboost. 243-248 - Andreas Freymann, Florian Maier, Kristian Schaefer, Tom Böhnel:

Tackling the Six Fundamental Challenges of Big Data in Research Projects by Utilizing a Scalable and Modular Architecture. 249-256 - Stephan Cejka, Florian Kintzler, Lisa Müllner, Felix Knorr, Marco Mittelsdorf, Jörn Schumann:

Application Lifecycle Management for Industrial IoT Devices in Smart Grid Use Cases. 257-266 - Daniel Staegemann, Matthias Volk, Alexandra Grube, Johannes Hintsch, Sascha Bosse, Robert Häusler, Abdulrahman Nahhas, Matthias Pohl, Klaus Turowski:

Classifying Big Data Taxonomies: A Systematic Literature Review. 267-278 - Aleksey V. Burdakov

, Victoria Proletarskaya, Andrey D. Ploutenko, Oleg Ermakov, Uriy A. Grigorev:
Predicting SQL Query Execution Time with a Cost Model for Spark Platform. 279-287 - Bruno Rossi

:
A Large-scale Replication of Smart Grids Power Consumption Anomaly Detection. 288-295 - Chuanyi Li, Jidong Ge, Victor Chang, Bin Luo:

Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description. 296-303 - Martin Macák, Hind Bangui, Barbora Buhnova, András J. Molnár, Csaba István Sidló:

Big Data Processing Tools Navigation Diagram. 304-312 - Yunqi Dong, Jiujun Bai, Xuebo Chen:

A Review of Edge Computing Nodes based on the Internet of Things. 313-320 - Liyun Lan, Jiujun Bai, Xuebo Chen:

Overview of Enterprise IoT Security System based on Edge Computing. 321-326 - Marin Fotache, Marius-Iulian Cluci, Valerica Greavu-Serban:

Low Cost Big Data Solutions: The Case of Apache Spark on Beowulf Clusters. 327-334 - Jiujun Bai, Yuqing Tong, Xuebo Chen:

Discussion on Heterogeneous Converged IoT Networking Scheme of CBN in Hotel Field. 335-340 - Milen S. Marev, Ernesto Compatangelo, Wamberto Weber Vasconcelos:

Intrinsic Indicators for Numerical Data Quality. 341-348 - Ahmed G. Alzahrani, Ahmed Alenezi, Hany F. Atlam

, Gary B. Wills
:
A Framework for Data Sharing between Healthcare Providers using Blockchain. 349-358 - Qianwen Xu, Victor Chang

:
Analysis of Co-authorship Network and the Correlation between Academic Performance and Social Network Measures. 359-366 - Daniel Del Gaudio, Pascal Hirmer:

Fulfilling the IoT Vision: Are We There Yet? 367-374 - Omar El Midaoui, Btihal El Ghali, Abderrahim El Qadi:

Geographical Queries Reformulation using Parallel FP-Growth for Spatial Taxonomies Building. 375-381 - Dominik Grzelak

, Uwe Aßmann
:
Preparatory Reflections on Safe Context-adaptive Software (Position Paper). 382-391 - Rita Tse, Marcus Im, Su-Kit Tang

, Luís Filipe Menezes, Alfredo Manuel Pereira Geraldes Dias, Giovanni Pau:
Self-adaptive Sensing IoT Platform for Conserving Historic Buildings and Collections in Museums. 392-398 - In-San Lei, Su-Kit Tang

, Ion-Kun Chao, Rita Tse:
Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. 399-404 - Lucas Bonvin, Dominique Gabioud, Michael Clausen:

cloud.iO, An Open-source W3C WoT Compliant Framework. 405-411 - Rayan M. Ghamri, Nawfal F. Fadhel

, Gary B. Wills
:
Investigating Trusted Records for Employment and Education. 412-419 - Bernhard Heiden

, Volodymyr Alieksieiev, Bianca Tonino-Heiden
:
Scalable Logistic Cell RFID Witness Model. 420-427 - Matthias Volk, Daniel Staegemann

, Sascha Bosse, Robert Häusler, Klaus Turowski:
Approaching the (Big) Data Science Engineering Process. 428-435 - Ilaria Bosi, Jure Rosso, Enrico Ferrera, Claudio Pastrone

:
IIot Platform for Agile Manufacturing in Plastic and Rubber Domain. 436-444 - Julian Dreyer

, Ralf Tönjes:
What3Words Geo Encryption: An Alternative Approach to Location based Encryption. 445-452 - Daniel Staegemann, Matthias Volk, Tuan Vu, Sascha Bosse, Robert Häusler, Abdulrahman Nahhas, Matthias Pohl, Klaus Turowski:

Determining Potential Failures and Challenges in Data Driven Endeavors: A Real World Case Study Analysis. 453-460 - Mohammad Fikry Abdullah, Mohd Zaki Mat Amin, Zurina Zainol, Marini Mohamad Ideris

:
Big Data Analytics as Game Changer in Dealing Impact of Climate Change in Malaysia: Present and Future Research. 461-469 - Enrico Ferrera, Xu Tao

, Davide Conzon
, Victor Sonora Pombo, Miquel Cantero, Tim Ward, Ilaria Bosi, Mirko Sandretto:
BRAIN-IoT: Paving the Way for Next-Generation Internet of Things. 470-477 - Andreas Eitel:

Environmental Aware Vulnerability Scoring. 478-485
Special Session on Artificial Intelligence for Emerging IoT Systems: Open Challenges and Novel Perspectives
- Muddasar Naeem, Antonio Coronato

, Giovanni Paragliola, Giuseppe De Pietro:
A Reinforcement Learning and IoT based System to Assist Patients with Disabilities. 491-498 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques. 499-506 - Lelio Campanile, Mauro Iacono, Fiammetta Marulli, Michele Mastroianni

:
Privacy Regulations Challenges on Data-centric and IoT Systems: A Case Study for Smart Vehicles. 507-518 - Renato Zona, Martina De Cristofaro, Luca Esposito, Paolo Ferla, Simone Palladino, Elena Totaro, Lucio Olivares, Vincenzo Minutolo:

Early Warning System for Landslide Risk and SHM by Means of Reinforced Optic Fiber in Lifetime Strain Analysis. 521-525 - Lelio Campanile, Mauro Iacono, Roberta Lotito, Michele Mastroianni

:
A WSN Energy-aware Approach for Air Pollution Monitoring in Waste Treatment Facility Site: A Case Study for Landfill Monitoring Odour. 526-532 - Giuseppe Mainenti, Lelio Campanile, Fiammetta Marulli, Carlo Ricciardi, Antonio S. Valente:

Machine Learning Approaches for Diabetes Classification: Perspectives to Artificial Intelligence Methods Updating. 533-540

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














