


default search action
11th IoTSMS 2024: Malmö, Sweden
- Muhannad Quwaider, Fahed Alkhabbas, Yaser Jararweh:
11th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2024, Malmö, Sweden, September 2-5, 2024. IEEE 2024, ISBN 979-8-3503-6650-1 - Romina Spalazzese, Jaime Lloret Mauri:
Message from the General Chairs. ii - Daniel J. Beutel:
Keynote Speech 4 Federated Learning for IoT. 1 - Johan Eker:
Keynote Speech 3 Cloudy with a Chance of Offloading: The Lighter Side of Edge Computing. 1 - Fabio Paternò:
Keynote Speech 1 Human Control in Daily Environment Automations. 1 - Daniela Nicklas:
Keynote Speech 2 Smart Cities - A Play Ground for Fog, Mobile Edge, and IOT-based Computing? 1 - Hibiki Nakanishi, Kota Hisafuru, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Initial Seeds Generation Using LLM for IoT Device Fuzzing. 5-10 - José Álvaro Fernández-Carrasco, Iñigo Amonarriz Pagola, Raul Orduna Urrutia, Rodrigo Román:
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity. 11-18 - Shih-Man Chang, Hao-Pu Lin, Chin-Chuan Han, Yu-Chi Wu:
An IoT-based Parameter Extraction Platform for Powder Metallurgy Sintering Furnace. 19-24 - Matej Petrík, Michal Ries, Martin Sabo:
Digital Twin for Ion Mobility Spectrometry Devices. 25-32 - Erik Gottschalk
:
Power Cost for Secure and Reliable IoT. 33-37 - Ubaid Ullah, Slawomir Koziel, Anna Pietrenko-Dabrowska, Shahanawaz Kamal
:
Characteristics Mode Analysis of a Unit-Cell and A 3×3 Finite Metasurface Design for IoT Applications in the mm-wave Band. 38-43 - Tien-Chiao Chang, Yu-Chi Wu, Chin-Chuan Han, Chao-Shu Chang:
Real-time Arm Motion Tracking and Hand Gesture Recognition Based on a Single Inertial Measurement Unit. 44-49 - L. Kavisankar, Ajay Vemuri, S. Venkatesan, Rahamatullah Khondoker:
A Novel Strategy for the Identification of the Operating System of Bluetooth-Enabled Devices for Security Audit. 50-57 - Burak Tufekci, Atakan Arslan, Cihan Tunc, Kirill Morozov:
Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones. 58-65 - Juan P. Velásquez, Mexhid Ferati:
Promoting Sustainable Water Behaviours Through Exploration with IoT Prototypes. 66-73 - Vasileios Karagiannis, Béla Nagy, Agnes Jodkowski, Margit Kranner, Drazen Ignjatovic:
A Review of Emerging Trends in Energy Data Management Systems. 74-81 - Rehema Mwawado, Marco Zennaro, Jimmy Nsenga, Damien Hanyurwimfura:
Optimizing Soil-Based Crop Recommendations with Federated Learning on Raspberry Pi Edge Computing Nodes. 82-89 - Robson Santos Da Silva, Roberto Mariano De Araújo Filho, Marcos Heleno Guerson De Oliveira Júnior, Maria Lídia Rebello Pinho Dias Scoton, Paulo Henrique Lima Brito, Eduardo Mario Dias, Marcos Oliveira:
IoT: applications, potentialities and challenges in the context of Quality Infrastructure 4.0. 90-97 - Ali Deveci
, Selim Yilmaz, Sevil Sen:
CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution. 98-105 - Henry Chen, Lambros Lambrinos, Ryan Grammenos, Konstantinos Karagiannis, Elie Kfoury:
A data-driven scheduling module for electric vehicle charging. 106-111 - Hanan Alfares, Omar Banimelhem:
Comparative Analysis of Machine Learning Techniques for Handling Imbalance in IoT-23 Dataset for Intrusion Detection Systems. 112-119 - Koki Mori, Ryotaro Ohara, Takayuki Genda, Shun Sato, Shintaro Izumi, Hiroshi Kawaguchi:
Estimating Human Activities in Bathroom Through Sound Event Detection in Embedded Systems. 120-123 - Mattias Nordahl, Alfred Åkesson, Björn A. Johnsson, Görel Hedin
, Boris Magnusson:
Software Component Update for IoT Systems. 124-131 - Jon Hall, Ben Morrow, Alex Godbehere:
Enhancing IIoT infrastructures with Kubernetes: Advanced Edge Cluster Management. 132-139 - Jiang Zhi-Hao:
The Impact of Innovation Ecosystem on the Innovation Performance of Chinese IoT Startups. 140-146 - Yuka Ikegami, Ryotaro Negishi, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations. 147-152 - Stanley Chukwuebuka Nwabuona, Kartikeya Sharma, Martin Nordal Petersen
, Sarah Renee Ruepp
:
Ergonomic Back Pain Monitoring in Older Workers Using Smart Insoles. 153-160 - Alessandro Cerioli, Riccardo Miccini
, Clément Laroche, Tobias Piechowiak, Luca Pezzarossa, Jens Sparsø
, Martin Schoeberl
:
NeuralCasting: A Front-End Compilation Infrastructure for Neural Networks. 161-168 - Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat:
Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks. 169-176 - Josepaul Paulachan, Daniel Onwuchekwa, Roman Obermaisser:
Task Scheduling in Multi-Cloud Environments: A Graph Partitioning Approach Enhanced by Nested Genetic Algorithms. 177-184 - Mohammad Naweed Mohammadi, Toshiro Takahara, Hamidullah Sokout:
Optimizing Water Consumption and Improving Productivity in Afghanistan's Greenhouses Through IoT and Machine Learning. 185-191 - Adrian Murphy, Daniel Larsson, Fanny Söderlund, Ola Angelsmark, Johan Eker:
Automated Log Message Embeddings. 192-197 - Hamam Mokayed, Ghada Alsayed, Felicia Lodin, Olle Hagner, Björn Backe:
Enhancing Object Detection in Snowy Conditions: Evaluating YOLO v9 Models with Augmentation Techniques. 198-203 - Md Mahbubur Rahman, Reza Malekian, Vilhelm Akerstroem:
Fault Detection On Heat Pump Operational Data Using Machine Learning Algorithms. 204-211 - Ioannis Sorokos, Patrick Wolf, Jan Reich, Daniel Schneider:
Evaluating Self-Adaptive Architectures for Automated Driving Systems. 212-217 - George Kornaros, Dimitrios Bakoyiannis, Othon Tomoutzoglou, Marcello Coppola:
From Cloud to IoT Device Authenticity under Kubernetes Management. 218-223 - Drazen Ignjatovic, Vasileios Karagiannis
, Aradina Chettakattu, Denis Havlik
, Georg Neubauer:
Crisis Management in the Era of the IoT, Edge Computing, and LLMs. 224-231 - Anton Slavin, Ulrich Norbisrath, Danielle Morgan, Eero Vainikko:
Investigating Raspberry Pi Access Point Client Limit for Use in IoT Education. 232-239 - Burak Tufekci, Vinh Quach, Cihan Tunc, Ram Dantu:
DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks. 240-247 - Miguel Zaragoza-Esquerdo, Alberto Ivars-Palomares, Lorena Parra, Sandra Sendra, Jaime Lloret, Manuel Pulido-Velazquez:
Underwater IoT System for Water Quality Monitoring at the Marine Outfall. 248-253 - Elsa López Pérez, Thomas Watteyne, Malisa Vucinic:
Pre-Shared Key Authentication in Ephemeral Diffie-Hellman Over COSE. 254-257 - Ali Ahmad, Francisco Javier Díaz, Miguel Zaragoza-Esquerdo, Sandra Sendra, Lorena Parra, Sandra Viciano-Tudela, Jaime Lloret, Veronika Chaloupková, Raquel Bados, Luis Saúl Esteban-Pascual, Irene Mediavilla:
LoRaWAN-based Network for Harvest Time Estimation in Cistus ladanifer. 258-263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.