


default search action
9th IoTSMS 2022: Milan, Italy
- Jaime Lloret, Larbi Boubchir, Yaser Jararweh, Elhadj Benkhelifa, Imad Saleh:
9th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2022, Milan, Italy, November 29 - Dec. 1, 2022. IEEE 2022, ISBN 979-8-3503-2045-9 - Tahira Yasmin, Ghaleb A. El Refae, Shorouq Eletter:
"Expo City Dubai": A Convergence of Smart Touristic and Residential Experience. 1-5 - Linsheng Hu, Yihao Li, Hao Zhang
, Lu Yuan, Fuhui Zhou, Qihui Wu:
Robust Semantic Communication Driven by Knowledge Graph. 1-5 - Salam Traboulsi, Dieter Uckelmann:
5G as Enabler Technology for Smart City Use Cases. 1-7 - Shadi AlZu'bi, Samia A. Abushanap, Islam AlTalahin, Ayman M. Abdalla
, Abdelfatah Aref Tamimi:
Secure Transmission of Noisy Images over Fiber Optic Communication. 1-5 - Nada Masood Mirza, Adnan Ali:
IoT Predictive Model for Caffeine Addiction. 1-4 - Rawad Bader, Adnan Ali, Nada Masood Mirza:
AI and Robotics Leading Industry 4.0. 1-4 - Ichiro Satoh:
Configurable Protocol for IoT Systems. 1-6 - Zehra Camlica, Jim Quesenberry, Daniel Carballo, Mark Crowley:
Aggressive Driver Behavior Detection using Parallel Convolutional Neural Networks on Simulated and Real Driving Data. 1-8 - Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen:
Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach. 1-8 - Shahanawaz Kamal
, Ubaid Ullah
, Slawomir Koziel:
A Printed Crossed-Dipole mmWave Antenna with Efficient Omnidirectional Circular Polarization for Wireless Surveillance in IOT Applications. 1-4 - Priscilla Benedetti, Giuseppe Coviello, Kunal Rao, Srimat Chakradhar:
DataX Allocator: Dynamic resource management for stream analytics at the Edge. 1-8 - Van Thanh Le
, Nabil El Ioini, Claus Pahl
, Mehdi Elahi:
Capacity-Based Trust System in Untrusted MEC Environments. 1-8 - Dounya Kassimi, Okba Kazar
, Ezedin Barka, Abdelhak Merizig, Zina Houhamdi, Belkacem Athamena
, Zaoui Meftah:
A Smart Approach using Multi-agent System for Big Data Security. 1-7 - Mohammad Alhassan, Suleiman Ashur
, Haythem Bany Salameh, Layla Amaireh, Ahmed Maher:
Integration of IoT Technology in Treatment of Pedestrian-Crossing at Intersections. 1-5 - Hassan Jalil Hadi, Umer Hayat
, Numan Musthaq, Faisal Bashir Hussain, Yue Cao
:
Developing Realistic Distributed Denial of Service (DDoS) Dataset for Machine Learning-based Intrusion Detection System. 1-6 - Ahmad Ibrahim Aljumah, Mohammed T. Nuseir, Ghaleb A. El Refae:
Internet of Things (IoT): A Way to Expedite Production and Service Performance Empirical, Evidence from Textile Industry of United Arab Emirates (UAE). 1-8 - Firas AlBalas, Ehssan Alrabee, Wail Mardini, Amr Sawafta:
Energy-Aware Routing Approach in Internet of Things Using Genetic Algorithms. 1-6 - Mohammad Al-Hattab
, Maen Takruri:
Adaptive Method to Estimate Link Budget Parameters in Wireless Networks. 1-4 - David Enthoven, Zaid Al-Ars:
Fidel: Reconstructing Private Training Samples from Weight Updates in Federated Learning. 1-8 - Mohammed T. Nuseir, Ahmad Ibrahim Aljumah, Ghaleb A. El Refae:
Impact of Big Data Analytics and Managerial Support on CRM: Exploring Mediating Role of Marketing Analytics. 1-8 - Zaka Ullah, Muath Al-Hasan, Ismail Ben Mabrouk:
EMI Shielding for 5G IOT devices with MXene Metamaterial Absorber. 1-4 - Enrico Bassetti
, Davide Quaranta, Emanuele Panizzi:
Quick decentralized estimation of earthquake epicenter with low-cost IoT network. 1-8 - Christoph Haar, Erik Buchmann:
IoT Security With INFINITE: The 3-Dimensional Internet Of Things Maturity Model. 1-8 - Mohammad Al Ja'afreh
, Ali Karime
, Sahel Alouneh, Abdulmotaleb El-Saddik:
A Detailed Analysis of Qualitative and Quantitative Factors in Realization of 6G Communication. 1-10 - Shadi AlZu'bi, Samia A. Abushanap, Muder Almiani
, Ala Mughaid
:
Transfer Learning Enabled CAD System for Monkey Pox Classification. 1-5 - Muhammad Afzaal
:
An Overview of Defense Techniques Against DoS Attacks. 1-8 - Kenza Riahi, Mohamed-el-Amine Brahmia
, Abdelhafid Abouaissa, Lhassane Idoumghar:
FPBFT: A Fast PBFT Protocol for Private Blockchains. 1-8 - Mario van Rooij, Sabina van Rooij, Henri Bouma
, Andy D. Pimentel
:
Secure Sparse Gradient Aggregation in Distributed Architectures. 1-8 - Chen Wan, Amjad Mehmood
, Carsten Maple, Gregory Epiphaniou, Jaime Lloret:
A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol. 1-8 - Issam Al-Azzoni, Nenad Petrovic
:
On Persisting EMF Data Using Blockchains. 1-5 - Sibendu Paul, Kunal Rao, Giuseppe Coviello, Murugan Sankaradas, Oliver Po, Y. Charlie Hu, Srimat Chakradhar:
APT: Adaptive Perceptual quality based camera Tuning using reinforcement learning. 1-9 - Khalid A. Darabkh, Hanan F. Al-Khazaleh, Raed T. Al-Zubi, Sharhabeel H. Alnabelsi, Haythem Bany Salameh:
An Improved and Stable Routing Protocol for Cognitive Radio Based IoT Networks. 1-5 - Daniel Montero Hernández, Jorge Peña Queralta
, Tomi Westerlund:
Distributed Ledger Technologies for Managing Heterogenous Computing Systems at the Edge. 1-8 - Muntaha Alawneh, Imad M. Abbadi:
Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles. 1-6 - Hassan Mistareehi, Haythem Bany Salameh, D. Manivannan
:
An On-Board Hardware Implementation of AODV Routing Protocol in VANET: Design and Experimental Evaluation. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.