


default search action
7th IoTSMS 2020: Virtual Event, France
- Larbi Boubchir, Elhadj Benkhelifa, Yaser Jararweh, Imad Saleh:

7th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2020, Virtual Event, France, December 14-16, 2020. IEEE 2020, ISBN 978-0-7381-2460-5 - Fernanda Magalhães, João Paulo Magalhães

:
Adopting Machine Learning to Support the Detection of Malicious Domain Names. 1-6 - Tsion Yimer, Md Tanvir Arafin

, Kevin T. Kornegay
:
Securing Industrial Control Systems Using Physical Device Fingerprinting. 1-6 - Raghad Al-Syouf, Mohammad Shurman, Abdallah Y. Alma'aitah, Sharhabeel H. Alnabelsi:

A Novel Gateway Selection Protocol for Three-layers Integrated Wireless Networks. 1-5 - Ersin Elbasi

:
Reliable abnormal event detection from IoT surveillance systems. 1-5 - Marco Pomalo, Van Thanh Le

, Nabil El Ioini, Claus Pahl
, Hamid R. Barzegar:
A Data Generator for Cloud-Edge Vehicle Communication in Multi Domain Cellular Networks. 1-8 - Oussama Mounnan

, Abdelkrim El Mouatasim, Otman Manad, Aissam Outchakoucht, Hamza Es-Samaali, Larbi Boubchir
:
A Novel Approach Based on Blockchain to Enhance Security with Dynamic Policy Updating. 1-6 - Theodoros Nestoridis, Chrysa Oikonomou, Anastasios Temperekidis, Fotios Gioulekas, Panagiotis Katsaros:

Scalable IoT architecture for balancing performance and security in mobile crowdsensing systems*. 1-8 - A. S. K. Sreeram, Udhaya Ravishankar, Narayana Rao Sripada, Baswaraj Mamidgi:

Investigating the potential of MFCC features in classifying respiratory diseases. 1-7 - Alaa Mheisn

, Mohammad Shurman, Abdallah Y. Alma'aitah:
WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment. 1-4 - Achraf Rahmouni, Catarina Ferreira da Silva

, Parisa Ghodous:
Methodological approach for creating an IoT manufacturing application. 1-6 - Salsabeel Y. Shapsough, Imran A. Zualkernan

, Rached Dhaouadi
, Ali Reza Sajun
:
Using Siamese Networks to Detect Shading on the Edge of Solar Farms. 1-8 - Farah Fargo, Olivier Franza, Cihan Tunc

, Salim Hariri:
VM Introspection-based Allowlisting for IaaS. 1-4 - Gennady Khalimov, Yevgeniy Kotukh, Svitlana Khalimova

:
Encryption scheme based on the automorphism group of the Ree function field. 1-8 - Javad Sohankar, Madhurima Pore, Ayan Banerjee

, Koosha Sadeghi, Sandeep K. S. Gupta:
Machine Learning Based Predictive Models in Mobile Platforms Using CPU-GPU. 1-6 - Thomas Watteyne:

Crystal-Free Architectures for Smart Dust and the Industrial IoT. 1 - Gérald Rocher, Thibaut Gonnin, Frank Dechavanne, Stéphane Lavirotte, Jean-Yves Tigli

, Laurent Capocchi, Jean François Santucci:
An Actuation Conflicts Management Flow for Smart IoT-based Systems. 1-8 - Safuriyawu Ahmed, Frédéric Le Mouël, Nicolas Stouls:

Resilient IoT-based Monitoring System for Crude Oil Pipelines. 1-7 - Vanessa Z. Lin, Simon Parkin:

Transferability of Privacy-related Behaviours to Shared Smart Home Assistant Devices. 1-8 - Yassine Boufenneche, Rafik Zitouni

, Laurent George, Nawel Gharbi:
Network Formation in 6TiSCH Industrial Internet of Things under Misbehaved Nodes. 1-6 - Efthymios Oikonomou, Angelos N. Rouskas:

Selection of Service Nodes in Edge Computing Environments. 1-6 - Vishakha Subhash Supekar, Ali Ahmadinia

:
Sensor Data Visualization on Google Maps using AWS, and IoT Discovery Board. 1-6 - Novi Azman, Abdusy Syarif, Mohamed-el-Amine Brahmia

, Jean-François Dollinger
, Samir Ouchani
, Lhassane Idoumghar:
Performance Analysis of RPL Protocols in LLN Network Using Friedman's Test. 1-6 - Erin Beckwith, Geethapriya Thamilarasu:

BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things. 1-8 - Bhavani Thuraisingham:

The Role of Artificial Intelligence and Cyber Security for Social Networks and Internet of Transportation. 1 - Thibaud Ecarot, Samuel Dussault

, Ameni Souid, Luc Lavoie, Jean-François Ethier:
AppArmor For Health Data Access Control: Assessing Risks and Benefits. 1-7 - Samee U. Khan:

Some Revised Perspectives on Internet of Things. 1 - Khalil Drira:

Challenges of IOT Service Platforms. 1 - Dries Van Bael, Shirin Kalantari, Andreas Put, Bart De Decker:

A Context-Aware Break Glass Access Control System for IoT Environments. 1-8 - Juan Manuel Corchado:

AIoT for Smart territories. 1 - Fahem Zerrouki, Samir Ouchani

, Hafida Bouarfa:
Quantifying Security and Performance of Physical Unclonable Functions. 1-4 - Valerio Bellandi

, Paolo Ceravolo, Samira Maghool, Stefano Siccardi:
A Comparative Study of Clustering Techniques Applied on Covid-19 Scientific Literature. 1-8 - Erick Alan Barlandas-Quintana, J. E. Martinez-Ledesma:

Detection of Carbapenems Resistant K-mer Sequences in Bacteria of Critical Priority by the World Health Organization (Pseudomonas aeruginosa and Acinetobacter baumannii). 1-8 - Sai Mounika Tadaka, Lo'ai Tawalbeh:

Applications of Blockchain in Healthcare, Industry 4, and Cyber-Physical Systems. 1-8 - Christine Hennebert:

A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms. 1-6 - Drisya Alex Thumba

, Sanja Lazarova-Molnar
, Parisa Niloofar
:
Data-driven Decision Support Tools for Reducing GHG Emissions from Livestock Production Systems: Overview and Challenges. 1-8 - Sharhabeel H. Alnabelsi, Haythem Bany Salameh:

Sequential Routing Decision with Low-Complexity for Throughput Improvement in Full-duplex Cognitive Radio Networks. 1-5 - Reinout Eyckerman, Siegfried Mercelis

, Johann Márquez-Barja
, Peter Hellinckx
:
Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog Environment. 1-8 - Bart Moons, Flor Sanders, Thijs Paelman, Jeroen Hoebeke:

Decentralized Linked Open Data in Constrained Wireless Sensor Networks. 1-6 - Ersin Elbasi

:
Enhancing the robustness of watermarked medical images using heuristic search algorithm. 1-5 - Marco Pomalo, Van Thanh Le

, Nabil El Ioini, Claus Pahl
, Hamid R. Barzegar:
Service Migration in Multi-domain Cellular Networks based on Machine Learning Approaches. 1-8 - Maria Bada, Ildiko Pete:

An exploration of the cybercrime ecosystem around Shodan. 1-8 - Khaoula Zaimen, Mohamed-el-Amine Brahmia

, Jean-François Dollinger
, Laurent Moalic, Abdelhafid Abouaissa, Lhassane Idoumghar:
A Overview on WSN Deployment and a Novel Conceptual BIM-based Approach in Smart Buildings. 1-6 - Anastasija Nikiforova

, Janis Bicevskis, Zane Bicevska, Ivo Oditis:
Data Quality Model-based Testing of Information Systems: the Use-case of E-scooters. 1-8 - Ali Safari Khatouni, Michael A. Bauer, Hanan Lutfiyya:

Indoor Temperature Characterization and its Implication on Power Consumption in a Campus Building. 1-8 - Santhosh Shetty Chowdary, Mohamed A. Abd El Ghany

, Klaus Hofmann:
IoT based Wireless Energy Efficient Smart Metering System Using ZigBee in Smart Cities. 1-4 - Paige Harvey, Otily Toutsop, Kevin T. Kornegay

, Excel Alale, Don Reaves:
Security and Privacy of Medical Internet of Things Devices for Smart Homes. 1-6 - Kimberly Wilber, Sarah Vayansky, Nicholas Costello, David Berdik, Yaser Jararweh:

A Survey on Blockchain for Healthcare Informatics and Applications. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














