![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2018
- Eyhab Al-Masri:
QoS-Aware IIoT Microservices Architecture. ICII 2018: 171-172 - Eyhab Al-Masri, Ibrahim Diabate, Richa Jain, Ming Hoi Lam, Swetha Reddy Nathala:
A Serverless IoT Architecture for Smart Waste Management Systems. ICII 2018: 179-180 - Ryan Brummet, Dolvara Gunatilaka, Dhruv Vyas, Octav Chipara
, Chenyang Lu:
A Flexible Retransmission Policy for Industrial Wireless Sensor Actuator Networks. ICII 2018: 79-88 - Liqi Chen, Zheng Huang, Zhenbang Liu, Dawei Liu, Xin Huang:
4G Network for Air-Ground Data Transmission: A Drone Based Experiment. ICII 2018: 167-168 - Hyokeun Choi:
Brightics-IoT: Key Attractive Features of Enterprise Targeted IoT Platform. ICII 2018: 175-176 - Hyokeun Choi, JaeSeung Song, Kyuyull Yi:
Brightics-IoT: Towards Effective Industrial IoT Platforms for Connected Smart Factories. ICII 2018: 146-152 - Soumya Kanti Datta, Jérôme Härri, Christian Bonnet:
IoT Based Positioning Service Platform. ICII 2018: 165-166 - Glenn A. Fink, Yana Shulga:
Helping IT and OT Defenders Collaborate. ICII 2018: 188-194 - Fengxiang Gao, Haoqi Gao, Jun Wu:
A Reconfigurable SoC for SoftCast Wireless Video Transmission. ICII 2018: 169-170 - Hoda Ghadeer:
Cybersecurity Issues in Internet of Things and Countermeasures. ICII 2018: 195-201 - Junchen Guo, Ting Wang, Meng Jin, Songzhen Yang, Chengkun Jiang, Long Liu, Yuan He:
TagLeak: Non-Intrusive and Battery-Free Liquid Leakage Detection with Backscattered Signals. ICII 2018: 40-48 - Song Han
, Tao Gong, Mark Nixon, Eric Rotvold, Kam-yiu Lam, Krithi Ramamritham:
RT-DAP: A Real-Time Data Analytics Platform for Large-Scale Industrial Process Monitoring and Control. ICII 2018: 59-68 - Yutao Huang, Yuhe Lu, Feng Wang, Xiaoyi Fan, Jiangchuan Liu, Victor C. M. Leung:
An Edge Computing Framework for Real-Time Monitoring in Smart Grid. ICII 2018: 99-108 - Chadlia Jerad, Edward A. Lee:
Deterministic Timing for the Industrial Internet of Things. ICII 2018: 13-22 - Aron Laszka
, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening. ICII 2018: 153-158 - ChanHyung Lee, NakMyoung Sung, Lewis Nkenyereye, JaeSeung Song:
Blockchain Enabled Internet-of-Things Service Platform for Industrial Domain. ICII 2018: 177-178 - Zhouzhou Li, Hua Fang, Honggang Wang
, Shaoen Wu, Mahmoud Daneshmand:
A New Efficient Scheme for Securely Growing WBAN Nodes. ICII 2018: 159-164 - Yehan Ma, Chenyang Lu:
Efficient Holistic Control over Industrial Wireless Sensor-Actuator Networks. ICII 2018: 89-98 - Venkata Prashant Modekurthy
, Dali Ismail, Mahbubur Rahman
, Abusayeed Saifullah:
A Utilization-Based Approach for Schedulability Analysis in Wireless Control Systems. ICII 2018: 49-58 - Nour Moustafa
, Benjamin P. Turnbull
, Kim-Kwang Raymond Choo
:
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks. ICII 2018: 139-145 - Pat Pannuto
, Wenpeng Wang, Prabal Dutta, Bradford Campbell
:
A Modular and Adaptive Architecture for Building Applications with Connected Devices. ICII 2018: 1-12 - Animesh Pattanayak, Matt Kirkland
:
Current Cyber Security Challenges in ICS. ICII 2018: 202-207 - Fabian Rincon, Yasuyuki Tanaka, Thomas Watteyne:
On the Impact of WiFi on 2.4 GHz Industrial IoT Networks. ICII 2018: 33-39 - Philipp Sommer, Yannick Maret, Dacfey Dzung:
Low-Power Wide-Area Networks for Industrial Sensing Applications. ICII 2018: 23-32 - Chengpei Tang, Shanqing Wang, Chancheng Zhou, Xiaolong Zheng, Hua Li, Xiangjian Shi:
An Energy-Image Based Multi-Unit Power Load Forecasting System. ICII 2018: 69-78 - Hong-Linh Truong:
Integrated Analytics for IIoT Predictive Maintenance Using IoT Big Data Cloud Systems. ICII 2018: 109-118 - Natalija Vlajic, Daiwei Zhou, Jonathan Tung:
IoT Cameras and DVRs as DDoS Reflectors: Pros and Cons from Hacker's Perspective. ICII 2018: 181-187 - Yuwei Xie, Hongwei Zhang, Pengfei Ren:
Unified Scheduling for Predictable Communication Reliability in Industrial Cellular Networks. ICII 2018: 129-138 - Juhong Xu, Hanqing Guo, Shaoen Wu:
Indoor Multi-Sensory Self-Supervised Autonomous Mobile Robotic Navigation. ICII 2018: 119-128 - Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand:
A Focused Crawler Model Based on Mutation Improving Particle Swarm Optimization Algorithm. ICII 2018: 173-174
skipping 1 more match
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-22 11:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint