


default search action
8th CIoT 2025: London, United Kingdom
- 8th Conference on Cloud and Internet of Things, CIoT 2025, London, United Kingdom, October 29-31, 2025. IEEE 2025, ISBN 979-8-3315-6002-7

- Hai Dinh-Tuan:

CRACI: A Cloud-Native Reference Architecture for the Industrial Compute Continuum. 1-8 - Andrei Cervoneac, Rhonny Javier Diaz Marques, Meri Kortsa Or Korca, Felix Rokossa, Dipo Dunsin, Sonjoy Ranjon Das, Bilal Hassan:

RaspDash: A Cloud-Internet of Things (IoT) for Smart Parking Solution with Predictive Analytics. 1-4 - Seemal Asif

, Jon Hall
, Daniela Sawyer
:
Enabling Real-Time Robot-Tracker Communication via MQTT on the Factory Cloud for Metrology Automation. 1-7 - Ahmed Waheed, Yousef Sultan, Somayeh Mohammady:

Ultra-Wideband OFDM with Index Modulation for Next Generation Wireless Systems. 1-4 - Bajram Visha, Sonjoy Ranjon Das, Amanullah Yasin, Bilal Hassan, Sandra Fernando:

An AIoT-Based Real-Time Bee Monitoring and Wasp Mitigation in Apiaries Yolo, Hailo, Honeybee, Sort, Wasp. 1-9 - Tian Yang, Muhammad Faheem Awan, Anja Jakovljevic, Dejan Drajic, Mario Minardi, Christos Politis, Mohammad Afhamisis, Maria Rita Palattella:

Edge Computing to Enable Front-End Data Processing Capabilities in Smart Agriculture and Forestry. 1-8 - Ogunleye Olalekan Samuel

:
Hybrid Meta-Deep Learning Approach for Malicious Data Classification in Iot Packet Data Networks. 1-8 - Ahmed Chaouch Ilies Akram, Mohammed Khaled Ali Oudenani, Youssra Cheriguene, Mohamed Chahine Ghanem

:
Safelearning: Mobility-Aware Client Selection in Federated Edge Learning Over UAV Networks. 1-7 - Jeremy Basha, Raouia Masmoudi Ghodhbane, E. Veronica Belmega:

MABs for Adaptive Resource Optimization in LoRa IoT Networks. 1-8 - Morteza Moghaddassian, J. J. Garcia-Luna-Aceves:

TULIP: Sharing A Few Secrets to Secure Data Transfers in IoT Infrastructures. 1-8 - Hai Dinh-Tuan:

Unikernels vs. Containers: A Runtime-Level Performance Comparison for Resource-Constrained Edge Workloads. 1-8 - Federico Camisa, Elvis Adrian Nedelcu, Simona Maria Moga, Elena Agheorghiesei, Dipo Dunsin, Sonjoy Ranjon Das, Bilal Hassan:

Greensense: Cloud-IoT for Smart Plant Monitoring. 1-8 - Aohan Li, Miyu Tsuzuki:

(DEMO) Deep Reinforcement Learning Based Resource Allocation in Distributed Iot Systems. 1-2 - Beenyameen Rahman, Sonjoy Ranjon Das, Bilal Hassan, Jay Dobariya:

IoT-Powered Surveillance: Intelligent Video Processing with Edge and Cloud Synergy. 1-4 - Yacine Ahmed Yahia, Osman Salem, Ahmed Mehaoua:

Autonomous and Context-Adaptive Defense Mechanisms for Identity Access Management in Internet of Medical Things. 1-7 - Rob Carson, Mohamed Chahine Ghanem

, Feriel Bouakkaz:
Self-Healing Network of Interconnected Edge Devices Empowered by Infrastructure-As-Code and LoRa Communication. 1-5 - Sam Lelouey, Yacine Ahmed Yahia, Osman Salem, Ahmed Mehaoua:

Anomaly Detection in Internet of Things IAM Logs via Perplexity Scoring. 1-5 - Tomihiro Utsumi, Masatoshi Arikawa, Motoshi Tanaka, Yu Kume:

Web-Based Ambient Sensing Framework for Non-Intrusive Elderly Monitoring. 1-8 - Epaminondas A. Sousa Junior, Victor M. Garcia Martinez, Ricardo C. de Mello, Moisés R. N. Ribeiro, Adnei W. Donatti, Tereza Cristina M. B. Carvalho, João Henrique G. M. Corrêa, Rodrigo Moreira, Júnia Maísa Oliveira, José Marcos S. Nogueira, Flávio Oliveira Silva

:
Edge Clouds on Open Infrastructure: Assessing Footprint and Performance for IaaS Over CaaS. 1-8 - Dipo Dunsin, Mohamed Chahine Ghanem, Eduardo Almeida Palmieri, Hamza Kheddar, Yassine Habchi:

MalVol-25: A Diverse, Labelled and Detailed Volatile Memory Dataset for Malware Detection and Response Testing and Validation. 1-5 - Heoncheol Lee:

Towards Robust Multi-Object Pose Estimation Under Sparse and Noisy Data in Robotic Systems. 1-2 - J. J. Garcia-Luna-Aceves, Marc Mosko:

Multicasting with No Multicast Routing Protocols in Wireless Networks and IoT Deployments. 1-4 - Adewale Ogabi

, M. Shahwaiz Afaqui
:
Industrial Automation System Design Using Open-Source IIoT SCADA with AI-Enhanced Predictive Analytics. 1-5 - Evgeniya Svintsova, Sahar Al-Sudani, Mohamed Chahine Ghanem:

Assessment of Integrating Llm in Websites Localisation Service. 1-4 - Praveen Chinnusamy

:
Enhancing Smart Home Accessibility Through Natural Language Interaction. 1-4 - Takashi Fuchino, Ken Tanaka, Kenji Mikawa, Takashi Harada:

(POSTER) Rule List Optimization Method via Dependency Removal. 1-2 - Priscila F. S. Guedes, Pedro H. S. Coutinho, Mohamed Chahine Ghanem, Márcio J. Lacerda:

Cloud Control for Cyber-Physical Systems in the Presence of DoS Attacks. 1-6 - Zahra Soltani:

Performance and Front-End Module Comparison of IoT Red Cap and NR 5G Devices. 1-4 - Rania Blibek, Yasmine Zahem, Jiahui Xiang, Osman Salem, Ahmed Mehaoua:

Authentication Protocol Risk Scoring: A Classification Approach. 1-4 - Shenko Chura Aredo, Hailu Jelde Wedajo, Hailu Belay Kassa, Kevin T. Kornegay, Kedir Elka Amigna, Deyas Deme Merga:

A Technical Roadmap for Scalable 5G Deployment in Rapidly Urbanizing Cities: Modeling, Simulation, and Corridor-Based Infrastructure Planning. 1-6 - Amine Talbi, Sutharshan Amirthalingam, Jiahui Xiang, Osman Salem, Ahmed Mehaoua:

A Survey of Attacks on Internet of Medical Thing and How to Classify Them. 1-6 - Panagiotis Giannakopoulos, Bart van Knippenberg, Kishor Chandra Joshi, Nicola Calabretta, George Exarchakos:

Runtime RTT Variability Predictors for Performance-Aware Scheduling in Edge Computing. 1-8 - Renuka Cheeturi, Syam Kumar Pasupuleti, Rashmi Ranjan Rout:

Efficient and Quantum-Resistant Public Auditing Scheme for Cloud-Assisted IoT. 1-4 - M. Hamza Ali, Basit Shabbir, Usama Ishfaq, Arshad Hassan, Amine Bermak:

An Iot-Enabled Autonomous Shopping Cart Using LiDAR and BLE for Smart Retail Environments. 1-5 - Obada Alnaddaf, Mohammed B. Alshawki

:
Securing Cloud and IoT Identity: An Analysis of Keystone Authentication Mechanisms in Openstack. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














