default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 166 matches
- 2024
- Anes Abdennebi, Reda Morsli, Nadjia Kara, Hakima Ould-Slimane:
Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A Comparative Study. CIoT 2024: 1-9 - Ferdaous Abderrazak, Peyman Pourmohammadi, Larbi Talbi, Eva Antonino-Daviu, Tayeb A. Denidni, Miguel Ferrando-Bataller:
Selective Excitation Technique for Wireless Power Transfer in Wearable Devices Using CMA. CIoT 2024: 1-6 - Nicholas Accurso, Samir Si-Mohammed, Diptangshu De, Filippo Malandra:
(DEMO) WTTool: A Visual Web-based Topology Generator and 5G Network Simulator with ns-3. CIoT 2024: 1-2 - Khorshed Alam, Md Fahad Monir, Zoheb Hassan, Md. Tarek Habib:
Optimizing IoT Network Intrusion Detection: A Deep Learning Approach. CIoT 2024: 1-5 - Salman Ali, Cedric Gondro, Qiben Yan, Wolfgang Banzhaf:
End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases. CIoT 2024: 1-8 - Wael Alsabbagh, Chaerin Kim, Nitin Sanjay Patil, Peter Langendörfer:
Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation. CIoT 2024: 1-7 - Jean-Bernard Altidor, Chamseddine Talhi:
Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning Algorithms. CIoT 2024: 1-7 - Lucas Otávio Nascimento De Araújo, Abdelkader Outtagarts:
Sustainability of AI - Energy consumption estimation of an mMTC admission control. CIoT 2024: 1-7 - Adriana Arteaga Arce, Alexandre Veremme, Carol Habib, Nathalie Mitton:
Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud Continuum. CIoT 2024: 1-2 - Fahima Hasan Athina, Jeniya Sultana, Debaleen Das Spandan, Razib Iqbal:
Metamorphic Testing for Investigation of Context Recognition from Smart Home Voice Commands. CIoT 2024: 1-4 - Mirna Awad, Adam Ait Hamid, Yeogeuch Ranganathan, Nizar Choubik, Rami Langar, Wael Jaafar:
xApps for DDoS Attacks Detection and Mitigation in 5G-V2X O-RAN Networks. CIoT 2024: 1-2 - Souad Beguenane, Wael Jaafar:
A Novel Communication-Efficient and Blockchain-Secured Distributed Federated Learning. CIoT 2024: 1-6 - Dalal Direm, Zakaria Maamar, Amel Benna:
DEMO of: A Policy-based System for Service Provisioning in Edge Computing. CIoT 2024: 1-2 - Pierre Domachowski, Haga Randrianaly, Marie-José Montpetit, Noël Crespi:
Computation Offloading on 5G Core Network for a Highly Delay Sensitive Real Time App. CIoT 2024: 1-4 - Neelanjana Subin Ferdous, Md. Zoheb Hassan, Imtiaz Ahmed, Lutfa Akter:
Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities and Research Road Map. CIoT 2024: 1-8 - Lilatul Ferdouse, Faria Khandaker:
Enhancing IoT Connectivity with Matching Theory-Based Spectrum Sharing for IRS-Aided Multi-Cell Systems. CIoT 2024: 1-7 - Nupur Gaikwad, Darshana Upadhyay, Jaume Manero, Srinivas Sampalli:
IoT-Enabled Pediatric Pain Care Leveraging Majority Vote-Based Transfer Learning Models. CIoT 2024: 1-8 - Mohamed Ahmed M. Hail, Arne Matthes, Stefan Fischer:
Comparative Performance Analysis of NDN Protocol in IoT Environments. CIoT 2024: 1-8 - Shuyan Han, Evelyn Hui Kai Soon, Shihang Ruan, Haoming He, Morteza Moghaddassian, Alberto Leon-Garcia:
(POSTER) Cloud Monitoring and Prediction of Indoor LoRa-based Air Quality Data. CIoT 2024: 1-2 - Mohamed Ibrahim, Zahra Taheri, Octavio Barrera, Artmiz Golkaramnay:
DEMO: Non-Reciprocal RIS Solution for Power Mismatch in WiFi-Connected IoT Devices. CIoT 2024: 1-2 - Ridwan Arefin Islam, Rezwan-Ul-Islam, Swakkhar Shatabda, Salekul Islam:
ElectroBlock: Reinforcement Learning and Blockchain-based Energy Trade to Optimize Tariffs. CIoT 2024: 1-5 - Abdul Fareed Jamali, Carol Fung:
Demo-ScanIoT, an Application to collect IoT dataset for HomeGuard. CIoT 2024: 1-2 - Tomoyuki Koyama, Takayuki Kushida, Soichiro Ikuno:
Query Prediction for Log Search for Distributed Tracing with External Monitoring Alerts. CIoT 2024: 1-7 - Anurag Kumar, Carol Fung:
An Analysis on CVE Vulnerabilities of the Internet of Things. CIoT 2024: 1-6 - Sarah Al Mamoun, Pía Baltazar, Charles Bicari, Marek Blottière, Jean-Michaël Celerier, Rochana Fardon, Olivier Gauthier, Eduardo A. L. Meneses, Maggie Needham, Guillaume Riou:
(DEMO) An IoT toolbox for media arts. CIoT 2024: 1-2 - Jean Baptiste Minani, Yahia El Fellah, Sanam Ahmed, Fatima Sabir, Naouel Moha, Yann-Gaël Guéhéneuc:
An Exploratory Study on Code Quality, Testing, Data Accuracy, and Practical Use Cases of IoT Wearables. CIoT 2024: 1-5 - Morteza Moghaddassian, J. J. Garcia-Luna-Aceves:
Secure Cloud-Based Provisioning and Managing the Complete Life Cycle of IoT Metals. CIoT 2024: 1-8 - Nahed Belhadj Mohamed, Md. Zoheb Hassan, Georges Kaddoum:
Deep Reinforcement Learning-Enabled Resilient Radio Resource Allocation for Internet-of-Things Networks with Receiver Non-Linearity. CIoT 2024: 1-5 - Victor Nikulshin, Chamseddine Talhi:
Effective IDS under constraints of modern enterprise networks: revisiting the OpTC dataset. CIoT 2024: 1-8 - Haoran Qi, Zihan Zhang, Farhana H. Zulkernine:
SKELETRACK: Efficient Tracking of Skeleton in Blurry Videos for Human Activity Recognition. CIoT 2024: 1-5
skipping 136 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-29 22:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint