IoTBDS C

59 papers

YearTitle / Authors
2017A Cognitive-IoE Approach to Ambient-intelligent Smart Home.
Gopal Jamnal, Xiaodong Liu
2017A Data-Driven Methodology for Heating Optimization in Smart Buildings.
Victoria Moreno, José Antonio Ferrer, José Alberto Díaz, Domingo Bravo, Victor Chang
2017A Dataset and a Comparison of Out-of-Order Event Compensation Algorithms.
Wolfgang Weiss, Víctor Juan Expósito Jiménez, Herwig Zeiner
2017A Frequency-domain-based Pattern Mining for Credit Card Fraud Detection.
Roberto Saia, Salvatore Carta
2017A Hands-on Approach on Botnets for Behavior Exploration.
João Pedro Dias, José Pedro Pinto, José Magalhães Cruz
2017A Holistic View of the IoT Process from Sensors to the Business Value.
Ateeq Khan, Matthias Pohl, Sascha Bosse, Stefan Willi Hart, Klaus Turowski
2017A LAHC-based Job Scheduling Strategy to Improve Big Data Processing in Geo-distributed Contexts.
Marco Cavallo, Giuseppe Di Modica, Carmelo Polito, Orazio Tomarchio
2017A Low-cost Vehicle Tracking Platform using Secure SMS.
Rune Hylsberg Jacobsen, Drini Aliu, Emad Ebeid
2017A Proposed Best-practice Framework for Information Security Governance.
Ghada Gashgari, Robert John Walters, Gary B. Wills
2017A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks.
Samaneh Rashidibajgan
2017An Image Data Learning Method by Discriminating Multiple ROIs Data Patterns for Extracting Weather Information.
Jiwan Lee, Sunghoon Jung, Kijin Kim, Minhwan Kim, Bonghee Hong
2017An Integrated Model to Investigate an Individual's Behavioural Towards using Cloud Computing.
Nouf Alkhater, Gary B. Wills, Robert John Walters
2017An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things.
Hany F. Atlam, Ahmed Alenezi, Robert John Walters, Gary B. Wills
2017Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Priya Vedhanayagam, Subha S., Balamurugan Balusamy, Pandi Vijayakumar, Victor Chang
2017Assimilated Learning - Bridging the Gap between Big Data and Smart Data.
Yi-Ke Guo
2017Big Data & Analytics to Support the Renewable Energy Integration of Smart Grids - Case Study: Power Solar Generation.
Guillermo Escobedo, Norma Jacome-Grajales, Gustavo Arroyo-Figueroa
2017Big Data - Evolution, Trends and Opportunities.
Roy R. Cecil
2017Big Data Analytics Framework for Natural Disaster Management in Malaysia.
Mohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli
2017Data Cleaning Technique for Security Big Data Ecosystem.
Diana Martínez-Mosquera, Sergio Luján-Mora
2017Data Warehouse MFRJ Query Execution Model for MapReduce.
Aleksey V. Burdakov, Uriy A. Grigorev, Victoria Proletarskaya, Artem Ustimov
2017Decentralized Content Trust for Docker Images.
Quanqing Xu, Chao Jin, Mohamed Faruq Bin Mohamed Rasid, Bharadwaj Veeravalli, Khin Mi Mi Aung
2017Device Fingerprinting: Analysis of Chosen Fingerprinting Methods.
Anna Kobusinska, Jerzy Brzezinski, Kamil Pawulczuk
2017Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - .
Paul Fremantle, Benjamin Aziz, Tom Kirkham
2017Evaluating the Efficiency of Blockchains in IoT with Simulations.
Jari Kreku, Visa Antero Vallivaara, Kimmo Halunen, Jani Suomalainen
2017Extracting Knowledge from Stream Behavioural Patterns.
Ricardo Jesus, Mário Antunes, Diogo Gomes, Rui L. Aguiar
2017Factors Influencing Adoption of IoT for Data-driven Decision Making in Asset Management Organizations.
Paul Brous, Marijn Janssen, Daan Schraven, Jasper Spiegeler, Baris Can Duzgun
2017From Group-by to Accumulation: Data Aggregation Revisited.
Alexandr Savinov
2017IBSC System for Victims Management in Emergency Scenarios.
Alexandra Rivero-García, Iván Santos-González, Candelaria Hernández-Goya, Pino Caballero-Gil
2017Internet of Things - The Power of the IoT Platform.
Thomas Ochs, Ute Riemann
2017Internet of Things Architecture for Handling Stream Air Pollution Data.
Joschka Kersting, Michaela Geierhos, Hanmin Jung, Taehong Kim
2017IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets.
Roger Hallman, Josiah Bryan, Geancarlo Palavicini, Joseph DiVita, Jose Romero-Mariona
2017IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things.
Nurul Huda Nik Zulkipli, Ahmed Alenezi, Gary B. Wills
2017IoT based Proximity Marketing .
Zanele Nicole Mndebele, Muthu Ramachandran
2017Lag Correlation Discovery and Classification for Time Series.
Georgios Dimitropoulos, Estela Papagianni, Vasileios Megalooikonomou
2017Live Migration for Service Function Chaining.
Dongcheng Zhao, Gang Sun, Dan Liao, Rahat Iqbal, Victor Chang
2017Memory Optimization of a Distributed Middleware for Smart Grid Applications.
Stephan Cejka, Albin Frischenschlager, Mario Faschang, Mark Stefan
2017Minimizing the Risks of Data Protection Infringement - Data Lifecycle Risk Assessment.
Silvia Balaban, Manuela Wagner
2017New Computing Model for Securing Mobile Agents in IP Networks.
Jean Tajer, Mo Adda, Benjamin Aziz
2017On the Prospect of using Cognitive Systems to Enforce Data Access Control.
Fernando Fradique Duarte, Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar
2017Optimization for Sustainable Manufacturing - Application of Optimization Techniques to Foster Resource Efficiency.
Enrico Ferrera, Riccardo Tisseur, Emanuel Lorenço, E. J. Silva, António José Baptista, Gonçalo Cardeal, Paulo Peças
2017Outsourcing Access Control for a Dynamic Access Configuration of IoT Services.
Philipp Montesano, Marc Hüffmeyer, Ulf Schreier
2017Perceptions of Digital Footprints and the Value of Privacy.
Luisa Vervier, Eva-Maria Zeissig, Chantal Lidynia, Martina Ziefle
2017Performance Testing of an Internet of Things Platform.
John Esquiagola, Laisa Caroline de Paula Costa, Pablo Calcina, Geovane Fedrecheski, Marcelo Zuffo
2017Privacy Agents for IoT Cloud Communication.
Syed Khuram Shahzad, Muhammad Waseem Iqbal, Nadeem Ahmad
2017Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017
Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary B. Wills, Robert John Walters, Victor Chang
2017Process Guidance for the Successful Deployment of a Big Data Project: Lessons Learned from Industrial Cases.
Christophe Ponsard, Annick Majchrowski, Stéphane Mouton, Mounir Touzani
2017RSSI-based Device Free Localization for Elderly Care Application.
Shaufikah Shukri, Latifah Munirah Kamarudin, David Lorater Ndzi, Ammar Zakaria, Saidatul Norlyna Azemi, Kamarulzaman Kamarudin, Syed Muhammad Mamduh Syed Zakaria
2017Resolving the Misconceptions on Big Data Analytics Implementation through Government Research Institute in Malaysia.
Mohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli
2017Secure Edge Computing with ARM TrustZone.
Robert Pettersen, Håvard D. Johansen, Dag Johansen
2017Secure Electronic Health Record System Based on Online/Offline KP-ABE in the Cloud.
Kun Liu
2017Secure IoT: An Improbable Reality.
Nayana Mannilthodi, Jinesh M. Kannimoola
2017Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security.
Muhammad Shaiful Azrin Md Alimon, L. M. Kamarudin, Azizi Harun, Ammar Zakaria, Shaufikah Shukri
2017Situational Awareness based Risk-adaptable Access Control in Enterprise Networks.
Brian Lee, Roman Vanickis, Franklin Rogelio, Paul Jacob
2017Task Offloading for Scientific Workflow Application in Mobile Cloud.
Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo
2017The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices.
Giovanni Perrone, Massimo Vecchio, Riccardo Pecori, Raffaele Giaffreda
2017The XACML Standard - Addressing Architectural and Security Aspects.
Óscar Mortágua Pereira, Vedran Semenski, Diogo Domingues Regateiro, Rui L. Aguiar
2017Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.
Geancarlo Palavicini Jr., Josiah Bryan, Eaven Sheets, Megan Kline, John San Miguel
2017Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups.
Yassine Essadraoui, Mohamed Dâfir Ech-Cherif El Kettani
2017Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions.
Noura Aleisa, Karen Renaud