


default search action
10th IoTBDS 2025: Porto, Portugal
- Ali Emrouznejad
, Patrick Hung, Andreas Jacobsson:
Proceedings of the 10th International Conference on Internet of Things, Big Data and Security, IoTBDS 2025, Porto, Portugal, April 6-8, 2025. SCITEPRESS 2025, ISBN 978-989-758-750-4
Invited Speakers
- Schahram Dustdar:
Active Inference for Distributed Intelligence in IoT and Edge Computing. IoTBDS 2025: 5 - Loic Bachelart:
Technological Adoption in the Era of Generative AI. IoTBDS 2025: 7 - Ana Aguiar:
It's All About the Data. IoTBDS 2025: 9
Papers
- Nilson Rodrigues Sousa, George Pinto
, Cássio V. S. Prazeres:
Internet of Things Devices Management for Smart Cities. 15-26 - Nilton Flávio S. Seixas, Adriano H. O. Maia, George Pinto
, Dhyego Tavares Cruz
, Bruno P. Santos, Ivan do Carmo Machado, Eduardo Santana de Almeida, Frederico Araújo Durão, Maycon L. M. Peixoto, Gustavo B. Figueiredo, Cássio V. S. Prazeres:
Bridging the Cost Gap: A Comprehensive Analysis of CAPEX and OPEX for Smart Home Transition from a Provider's Perspective. 27-38 - Rafeef Baamer, Mihai Boicu:
Sockpuppet Detection in Wikipedia Using Machine Learning and Voting Classifiers. 39-47 - Yuzheng Yan, Ziyue Yu, Wuman Luo:
PatSimBoosting: Enhancing Patient Representations for Disease Prediction Through Similarity Analysis. 48-55 - Teresa Peixoto, Bruno Oliveira, Óscar Oliveira, Fillipe Ribeiro:
Real-Time Manufacturing Data Quality: Leveraging Data Profiling and Quality Metrics. 56-68 - Hassan Hammoud, Frédéric Weis, Melen Leclerc, Jean-Marie Bonnin:
Toward a More Realistic Energy Consumption Model for IoT Nodes in Extreme-Edge Computing Environments. 69-80 - Lucaleonardo Bove, Nicolò Gianmauro Totaro, Massimiliano Gervasi:
Data Network Game: Enabling Collaboration via Data Mesh. 81-92 - Richard de Arruda Felix, Patricia Della Méa Plentz, Jean Carlo Rossa Hauck:
Approach to Deploying Batch File Data Products in a Big Data Environment. 93-104 - Gildas Kouko, Josée Desharnais, Nadia Tawbi:
Information Flow Control for the Internet of Things. 105-116 - Sara Boanca:
Pseudorandom Number Generators, Perfect Learning and Model Visualization with Neural Networks: Expanding on LFSRs and Geffe. 117-128 - Puchit Bunpleng, Puthtipong Thunyatada, Bhutharit Aksornsuwan, Kanokvate Tungpimolrut, Ken T. Murata:
Smoke Segmentation Improvement Based on Fast Segment Anything Model with YOLOv11 for a Wildfire Monitoring System. 129-140 - Nadira Anjum Nipa, Nizar Bouguila, Zachary Patterson:
A Comparative Study of Log-Based Anomaly Detection Methods in Real-World System Logs. 141-152 - Eran Kaufman, Yigal Hoffner, Adan Fadila, Amin Masharqa, Nour Mawasi:
The Integration of Time Series Anomaly Detection into a Smart Home Environment. 153-163 - Srishti Sharma, Rahul Thakur:
EV-Connect: Energy Efficient & Incentive Cost Based Model for Range Anxious EVs with Multi-Hop Socially Assisted V2V Charging. 164-171 - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem:
Dynamic Obfuscation for Secure and Efficient Multi-Cloud Business Processes. 175-182 - Yuejing Zhai, Yiping Li, Lihua He, Wuman Luo:
A Highly Nonlinear Survival Network for Hospital Readmission Prediction of Cardiac Patients. 183-190 - Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson:
RAM-IoT: Risk Assessment Model for IoT-Based Critical Assets. 191-198 - Sthembile Mthethwa, Moses Dlamini, Edgar Jembere:
DLT-Based Approach for Secure and Cyber Resilient Resource Constrained IoT Devices: A Survey on Recent Advances. 199-206 - Tasnimul Hasan, Abrar Hossain, Mufakir Qamar Ansari, Talha Hussain Syed:
Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning. 207-214 - Madhu Yadav, Rajbir Kaur:
Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks. 215-222 - Kushagra Singh, Kafil Abbas Momin, M. Nishal, Chinmay Sultania, Madhav Rao:
Agri-Guard: IoT-Based Network for Agricultural Health Monitoring with Fault Detection. 223-230 - Tadashi Buitron, Enzo Peña, Pedro S. Castañeda
:
Inventory Management System Through the Integration of RPA and IoT to Enhance Processes in SMEs Within Peru's Automotive Sector. 231-236 - Seyed Mohsen Rostamkolaei Motlagh, Claus Pahl, Hamid R. Barzegar, Nabil El Ioini:
A Comparative Evaluation of Zero Knowledge Proof Techniques. 237-244 - Seyed Mohsen Rostamkolaei Motlagh, Claus Pahl, Hamid R. Barzegar, Nabil El Ioini:
A Technology Review of Zero Knowledge Proof Techniques. 245-253 - Lasse Harjumaa
, Ilkka Kivelä, Petri Jyrkkä, Ismo Hakala
:
Making Use of Design Patterns in IoT Middleware Implementation. 254-262 - Katharina Legler, Muhammad Sheheryar Jajja, Klaus Volbert:
Analysis and Design of Smart Components in Digital Energy Twins. 263-272 - Khadijah Febriana R., Rahul Thakur, Sudip Roy:
IoT-Driven Livestock Monitoring: Leveraging LoRaWAN for Behavior Analysis and Enhanced Farm Management. 273-280 - Hannes Salin:
A Comparative Analysis of Anonymous and Non-Anonymous Authorization Architectures for IoT Environments in Cooperative Intelligent Transport Systems. 281-288 - Ana C. P. Paixão, Breno R. da Silva, Rafael L. Silva, Filipe H. Cardoso
, Alexandre Braga:
Understanding How to Use Open-Source Libraries for Differentially Private Statistics on Energy Metering Time Series. 289-296 - Kento Hasegawa, Hibiki Nakanishi, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Automated Test Input Generation Based on Web User Interfaces via Large Language Models. 297-304 - Kento Hasegawa, Yuka Ikegami, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Automating the Assessment of Japanese Cyber-Security Technical Assessment Requirements Using Large Language Models. 305-312 - Zakariya Ghalmane, Brahim Daoud:
Graph-Based Learning for Multimodal Route Recommendation. 313-320 - Fouad Al Tfaily
, Zakariya Ghalmane, Mortada Termos, Mohamed-el-Amine Brahmia
, Ali Jaber, Mourad Zghal:
Generating Realistic Cyber Security Datasets for IoT Networks with Diverse Complex Network Properties. 321-328 - Mortada Termos, Zakariya Ghalmane, Mohamed-el-Amine Brahmia
, Ahmad Fadlallah, Ali Jaber, Mourad Zghal:
Enhancing IoT Network Intrusion Detection with a New GraphSAGE Embedding Algorithm Using Centrality Measures. 329-336 - Nicolò Bertozzi, Anna Geraci, Letizia Bergamasco, Enrico Ferrera, Edoardo Pristeri, Claudio Pastrone:
A Distributed Event-Orchestrated Digital Twin Architecture for Optimizing Energy-Intensive Industries. 337-344 - Ryusei Eda, Nozomu Togawa:
Anomalous IoT Behavior Detection by LSTM-Based Power Waveform Prediction. 345-352 - Alexander W. Lee, Melissa S. Lee, Chelsea Yeh, Kyle Yeh:
Measuring Fall Risk Using the Internet-of-Things Chair. 353-360 - Mayuresh Hooli, Rabi N. Mahapatra:
L2C: Learn to Clean Time Series Data. 361-369 - Mathias Fredrik Hedberg, Jia-Chun Lin, Ming-Chang Lee:
PacketZapper: A Scalable and Automated Platform for IoT Traffic Collection and Analysis. 370-377 - Gabriel Vieira, Ana Rita Ortigoso
, Daniel Fuentes, Luís Frazão, Nuno Costa, António Pereira:
Enhancing Scalability in Wi-Fi IoT Networks with Logical Data Plane Segregation Using SDN Principles. 378-385 - Mario Casillo, Francesco Colace, Angelo Lorusso, Domenico Santaniello, Carmine Valentino:
A Multilevel Graph-Based Recommender System for Personalized Learning Paths in Archaeological Parks: Leveraging IoT and Situation Awareness. 386-393 - Fares Ashraf ElSalamony, Nahla H. Barakat, Ahmad Mostafa:
Unravelling the Sequential Patterns of Cyber Attacks: A Temporal Analysis of Attack Dependencies. 394-401 - Jalaa Hoblos:
Anomaly Detection on Univariate Time Series Data Using Exponentially Weighted Moving Average (AnEWMA). 402-409 - Yutaro Iizawa, Norihiro Okui, Yusuke Akimoto, Shotaro Fukushima, Ayumu Kubota, Takuya Yoshida:
A Study of Anomalous Communication Detection for IoT Devices Using Flow Logs in a Cloud Environment. 410-415 - Steve Taylor, Norbert Götze, Joerg Abendroth, Jens Kuhr, Rosella Mancilla, Bernd-Ludwig Wenning, Pasindu Kuruppuarachchi, Aida Omerovic, Ravishankar Borgaonkar, Andrea Neverdal Skytterholm, Antonios Mpantis
, George N. Triantafyllou, Oscar Garcia Perales, Oleh Zaritskyi
:
Cybersecurity Indicators Within a Cybersecurity Testing and Monitoring Framework. 416-427 - Athiruj Poositaporn, Hanmin Jung:
Clustering-Based Pattern Prediction Framework for Air Pollution Prediction. 428-435 - Hanmin Jung, Athiruj Poositaporn:
Towards Client Engagement Using RAG System with Pattern Prediction Framework. 436-441 - Rawaa Al-Wani, Mays F. Al-Naday:
Intelligent Anomaly Detection for Context-Oriented Data Brokerage Systems. 442-449 - Yu-Jie Ou, Yan-Ming Chen, Chun-Chao Yeh:
A Novel Wi-Fi Mesh Network Framework for Efficient Mobile Data Transmission. 450-455 - Carlos Antonio Vilchez Pascual, Brian David Pajares Correa, Felix Melchor Santos López:
Design of an IoT-Driven Software Architecture for an Automated Robotic Fueling System in Open-Pit Mining. 456-463
Special Session on Artificial Intelligence for Emerging IoT Systems: Open Challenges and Novel Perspectives
- Habib Imani
, Renato Zona, Armando Arcieri, Luigi Piero Di Bonito, Simone Palladino, Vincenzo Minutolo:
eXplainable Artificial Intelligence Framework for Structure's Limit Load Extimation. 469-480 - Ciro Nespolino, Roberta De Fazio, Laura Verde, Stefano Marrone:
Towards a Digital Twin of the Cardiovascular System. 481-490 - Prabhakaran Rajendran, Nirmal Kumar Balaraman
, Hareesh Viswanathan:
Enhancing Accuracy and Efficiency in Physical Count Processes: Leveraging AI, IoT, and Automation for Real-Time Inventory Management in Supply Chain. 493-500 - Lelio Campanile, Renato Zona, Antonio Perfetti, Franco Rosatelli:
An AI-Driven Methodology for Patent Evaluation in the IoT Sector: Assessing Relevance and Future Impact. 501-508 - Fabio Napoli, Lelio Campanile, Giovanni De Gregorio, Stefano Marrone:
Quantum Convolutional Neural Networks for Image Classification: Perspectives and Challenges. 509-516

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
