


default search action
5th CIoT 2022: Marrakech, Morocco
- 5th Conference on Cloud and Internet of Things, CIoT 2022, Marrakech, Morocco, March 28-30, 2022. IEEE 2022, ISBN 978-1-6654-7964-6
- Mostafa Alawieh, Walid Fahs, Jamal Haydar, Fadlallah Chbib, Ahmad Fadlallah:
A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing Protocol. 1-8 - Hind Khoulimi, Mohamed Lahby, Othman Benammar:
Towards an intelligent system to manage IDS for IoT. 9-16 - Zouheir Trabelsi:
Investigating the Robustness of IoT Security Cameras against Cyber Attacks. 17-23 - Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer:
Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment. 24-31 - Hubert Djuitcheu
, Maik Debes, Matthias Aumüller, Jochen Seitz:
Recent review of Distributed Denial of Service Attacks in the Internet of Things. 32-39 - Meryeme Ayache, Amjad Gawanmeh, Jamal N. Al-Karaki:
DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem. 40-47 - Yasmeen Dabbagh, Reem Khoja, Leena AlZahrani, Ghada AlShowaier, Nidal Nasser
:
A Blockchain-Based Fake Product Identification System. 48-52 - Soumaya Bachtobji, Djamel Eddine Kouicem, Mouna Ben Mabrouk:
Towards Blockchain Based Architecture for Building Information Modelling (BIM). 53-59 - Fabian Sparbrodt, Marisol García-Valls:
Digesting smart contracts in Ethereum blockchain networks. 60-66 - Sofien Resifi, Hassan Hassan, Khalil Drira:
Adapting Deep Learning models to IoT environments. 67-74 - Ambar Prajapati, Bonny Banerjee
:
Simulating Distributed Wireless Sensor Networks for Edge-AI. 75-82 - Sevda Özge Bursa, Özlem Durmaz Incel, Gülfem Isiklar Alptekin:
Transforming Deep Learning Models for Resource-Efficient Activity Recognition on Mobile Devices. 83-89 - Lorenzo Bacchiani
, Giuseppe De Palma
, Luca Sciullo, Mario Bravetti, Marco De Felice, Maurizio Gabbrielli, Gianluigi Zavattaro, Roberto Della Penna, Corrado Iorizzo, Andrea Livaldi
, Luca Magnotta, Mirko Orsini:
SEAWALL: Seamless Low Latency Cloud Platforms for the Industry 4.0. 90-91 - Matheus B. de A. Rodrigues, Ana Carolina Rocha Mendes, Marcos Paulo C. de Mendonça, Gabriel R. Carrara, Luiz Claudio Schara Magalhães, Célio Vinicius N. de Albuquerque, Dianne S. V. Medeiros, Diogo M. F. Mattos:
An Efficient Strategy with High Availability for Dynamic Provisioning of Access Points in Large-Scale Wireless Networks. 92-99 - Hai Dinh-Tuan, Felix Beierle:
MS2M: A message-based approach for live stateful microservices migration. 100-107 - Menatalla Abdel-Gawad, Manar Usama, Haidy Hesham, Omar Ibrahim, Mohammad M. Abdellatif:
Remote Healthcare Monitoring using Wearable IoT Devices and Cloud Services. 108-113 - Florian Meyer, Phil Malessa, Jan Niklas Diercks, Volker Turau:
Are Group Acknowledgements Worth Anything in IEEE 802.15.4 DSME: A Comparative Analysis. 114-121 - Othmane Dergaoui, Youssef Baddi
, Abderrahim Hasbi:
Energy-saved and load-balanced wireless sensor network clustering in a multi-layered wireless networks structures. 122-128 - Tanzeela Altaf, Robin Braun
:
A Roadmap to Smart Homes Security Aided SDN and ML. 129-136 - Pankaj Khatiwada, Bian Yang:
An access control and authentication scheme for secure data sharing in the decentralized cloud storage system. 137-144 - Muath A. Obaidat, Jian Lim Choong, Kutub Thakur:
A Secure Authentication and Access Control Scheme for CoAP-based IoT. 145-149 - Amine Bouaouda, Karim Afdel, Rachida Abounacer:
Forecasting the Energy Consumption of Cloud Data Centers Based on Container Placement with Ant Colony Optimization and Bin Packing. 150-157 - Thomas Prantl, Timo Zeck, Lukas Iffländer
, Lukas Beierlieb, Alexandra Dmitrienko, Christian Krupitzer, Samuel Kounev:
Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes. 158-165 - Sadeem Hamad Alrasheed, Majid Aied Alhariri, Sulaiman Abdulaziz Adubaykhi, Salim El Khediri:
Cloud Computing Security and Challenges: Issues, Threats, and Solutions. 166-172 - P. C. Amogh, Dinil Mon Divakaran, Mohan Gurusamy:
Inferring Autoscale Information from NFV MANO for Launching Attacks - An Experimental Study with Cloudified 5G. 173-179 - Farah Chahlaoui, Hamza Dahmouni, Hassan El Alami:
Multipath-routing based load-balancing in SDN networks. 180-185 - Ramy Mohamed, Sofiane Zemouri:
Towards a Cloud-Native 5G Service Chaining for IoT and Video Analytics in Smart Campus. 186-188 - Ricardo M. Firmino, Diogo M. F. Mattos, Dianne S. V. Medeiros, Pedro B. Velloso
:
MT-AODV: Resilient Communication in Military Mobile Ad-Hoc Networks through On-demand Multiple Routing Tables. 189-196 - Preechai Mekbungwan
, Giovanni Pau
, Kanchana Kanchanasut
:
In-network Computation for IoT Data Processing with ActiveNDN in Wireless Sensor Networks. 197-204 - Ahmed Adel, Amr El Mougy:
Cloud Computing Predictive Resource Management Framework Using Hidden Markov Model. 205-212 - Hailong Feng, Zhengqi Cui, Tingting Yang:
Cache Optimization Strategy for Mobile Edge Computing in Maritime IoT. 213-219 - Noor Ahmed:
MPaS: A Micro-services based Publish/Subscribe Middleware System Model for IoT. 220-225 - Anniek Eerdekens
, Arne Callaert, Margot Deruyck, Luc Martens, Wout Joseph:
Dog's Behaviour Classification Based on Wearable Sensor Accelerometer Data. 226-231 - Sérgio D. Correia, Rafael Perez, João Pedro Matos-Carvalho
, Valderi R. Q. Leithardt
:
µJSON, a Lightweight Compression Scheme for Embedded GNSS Data Transmission on IoT Nodes. 232-238 - Irfanullah, Razaullah, Saleem Aslam, Fazal Muqeem:
Internet of Things Platform for Real Time Automated Safety System Based on Multi Sensor Network and Bluetooth Module. 239-246 - Farhan Sufyan
, Mohd Sameen Chishti, Amit Banerjee:
Energy and Delay Aware Computation Offloading Scheme in MCC Environment. 247-254

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.