default search action
InterIoT/SaSeIoT 2016: Paris, France
- Nathalie Mitton, Hakima Chaouchi, Thomas Noël, Thomas Watteyne, Alban Gabillon, Patrick Capolsini:
Interoperability, Safety and Security in IoT - Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 190, 2017, ISBN 978-3-319-52726-0
InterIoT
- Jens Dede, Anna Förster:
Comparative Analysis of Opportunistic Communication Technologies. 3-10 - Rémy Léone, Federico Sismondi, Thomas Watteyne, César Viho:
Technical Overview of F-Interop. 11-17 - Georgios Z. Papadopoulos, Andreas Georgallides, Theo Tryfonas, George Oikonomou:
BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs. 18-25 - Márcio Ferreira Moreno, Renato Cerqueira, Sérgio Colcher:
Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT. 26-32 - François Aïssaoui, Guillaume Garzone, Nicolas Seydoux:
Providing Interoperability for Autonomic Control of Connected Devices. 33-40 - Nikos Koutsouris, Apostolos Voulkidis, Kostas Tsagkaris:
A Framework to Support Interoperability in IoT and Facilitate the Development and Deployment of Highly Distributed Cloud Applications. 41-48 - Sébastien Ziegler, Serge Fdida, César Viho, Thomas Watteyne:
F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things. 49-55 - Georgios Z. Papadopoulos, Alexandros Mavromatis, Xenofon Fafoutis, Robert J. Piechocki, Theo Tryfonas, George Oikonomou:
Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links. 56-63
SaSeIoT
- Ayman El Hajjar, George Roussos, Maura B. Paterson:
On the Performance of Key Pre-distribution for RPL-Based IoT Networks. 67-78 - Ausama Majeed, Adil Al-Yasiri:
Formulating A Global Identifier Based on Actor Relationship for the Internet of Things. 79-91 - Qiang Li, Zeming Yang, Baoxu Liu, Zhengwei Jiang, Jian Yan:
Framework of Cyber Attack Attribution Based on Threat Intelligence. 92-103 - Jian Wang, Abraham O. Fapojuwo, Chen Zhang, Huiting Tan:
UML Modeling of Cross-Layer Attack in Wireless Sensor Networks. 104-115 - Ali Hayek, Samer Telawi, Christian Bieler, Josef Börcsök:
Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications. 116-126 - Brian Cusack, Zhuang Tian, Ar Kar Kyaw:
Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT. 127-138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.