default search action
10th IoTSMS 2023: San Antonio, TX, USA
- Muhannad Quwaider, Yaser Jararweh:
10th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2023, San Antonio, TX, USA, October 23-25, 2023. IEEE 2023, ISBN 979-8-3503-9389-7 - Sriram Vamsi Ilapakurthy:
Bolstering the Mobile Cloud: Addressing Emerging Threats and Strengthening Multi-Layered Defenses for Robust Mobile Security. 1-7 - Ibrahim Abe Baggili:
Keynote Speech 1: Who You Gonna Call? Unmasking AI Investigations through AI Forensics. 1 - Jaime Lloret:
Keynote Speech 2: Artificial Intelligence applied to real-time IoT data delivery. 2-3 - Abdallah Khreishah:
Keynote Speech 3: Beyond securing networks and storage: emerging attacks and defences to machine intelligence. 4-5 - Vinay Tripathi:
Keynote Speech 4: AI/ML Applications in Computer Networks. 6 - Rafiqullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret:
Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures. 8-14 - Nasser Alsabilah, Danda B. Rawat:
An Adaptive Flow-based NIDS for Smart Home Networks Against Malware Behavior Using XGBoost combined with Rough Set Theory. 15-22 - Nazia Sharmin, Christopher Kiekintveld:
Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes. 23-30 - Vahid Ghaffari:
Reducing the travel time of passengers between bus stations in the city by using the smart subsystem of road side unit (RSU) in the high traffic intersections of Zanjan city. 31-38 - Arman Foroughi, José Miguel Jiménez, Jaime Lloret:
A New Image Processing System to Diagnose the Orange Fruit Disease. 39-46 - Yu-Hsien Wei, You-Xian Huang, You-Ching Chen, Der-Lor Way:
An IoT-based Smart Bathroom for Healthy Life. 47-52 - Benjamin O. Kelly, Shengkai Chen, Eric Pengyu Zhou, Maher Elshakankiri:
AI-Enabled Plastic Pollution Monitoring System for Toronto Waterways. 53-58 - Zahra Yousef, Hamza Gharsellaoui, Walid Barhoumi:
Four-layer Architecture for IoT Security in Fog Network. 59-65 - Xianping Wang, Hao Qiu, Jiayue Shen, Weiru Chen:
A Survey on the Cybersecurity of IoT From The Perspective of SoC. 66-71 - Abdullah Kamal, Zaid Jamal, Gabriel Rosales, Brian Robinson, Zachary Sotny, Heena Rathore:
Image to Text Recognition for Detecting Human and Machine Altered News in Social Media. 72-74 - Shivam Mishra, Aditya Ray, Manpreet Singh, S. Venkatesan, Anshu S. Anand:
Automated Hardware Auditing Testbed for UART and SPI based IoT Devices. 75-82 - Warren R. Williams, Raahul C. Pathak:
Edge Analytics Solution for Online Monitoring of Building Operations Data. 83-89 - Min-Chun Tsai, Sheng-De Wang:
Self-Supervised Image Anomaly Detection and Localization with Synthetic Anomalies. 90-95 - Ashutosh Kumar, Brijesh Peshvani, S. Venkatesan, Manish Kumar, Suneel Yadav, Sandeep Kumar Shukla:
Automated Security Audit Testbed For IP-Based IoT Devices Without Physical Access. 96-103 - Hisham A. Kholidy:
A Smart Network Slicing Provisioning Framework for 5G-based IoT Networks. 104-110 - Saydul Akbar Murad, Nick Rahimi:
Secure and Scalable Permissioned Blockchain using LDE-P2P Networks. 111-116 - Himan Namdari, Cihan Tunc, Ram Dantu:
Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol. 117-124 - Seth Barrett, Bradley Boswell, Gokila Dorai:
Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors. 125-132 - Diana Gutierrez, William Ocampo, Adriaan Jansen, Alexander Perez-Pons:
Memory Extraction of an Emulated STM-32 Blue Pill for Anomaly Detection. 133-140 - Maurice Ngouen, Mohammad Ashiqur Rahman, Nagarajan Prabakar, A. Selcuk Uluagac, Laurent Njilla:
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption. 141-148 - Meriem Chiraz Zouzou, Mohamed Shahawy, Elhadj Benkhelifa, Hisham A. Kholidy:
SIoTSim: Simulator for Social Internet of Things. 149-155 - Radjaa Bensaid, Nabila Labraoui, Haythem Bany Salameh:
Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks. 156-160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.