


default search action
InterIoT/SaSeIoT 2016: Paris, France
- Nathalie Mitton, Hakima Chaouchi, Thomas Noël, Thomas Watteyne, Alban Gabillon, Patrick Capolsini:

Interoperability, Safety and Security in IoT - Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 190, 2017, ISBN 978-3-319-52726-0
InterIoT
- Jens Dede, Anna Förster

:
Comparative Analysis of Opportunistic Communication Technologies. 3-10 - Rémy Léone, Federico Sismondi, Thomas Watteyne, César Viho:

Technical Overview of F-Interop. 11-17 - Georgios Z. Papadopoulos

, Andreas Georgallides, Theo Tryfonas
, George Oikonomou
:
BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs. 18-25 - Márcio Ferreira Moreno, Renato Cerqueira, Sérgio Colcher:

Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT. 26-32 - François Aïssaoui, Guillaume Garzone, Nicolas Seydoux:

Providing Interoperability for Autonomic Control of Connected Devices. 33-40 - Nikos Koutsouris, Apostolos Voulkidis, Kostas Tsagkaris

:
A Framework to Support Interoperability in IoT and Facilitate the Development and Deployment of Highly Distributed Cloud Applications. 41-48 - Sébastien Ziegler, Serge Fdida, César Viho, Thomas Watteyne:

F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things. 49-55 - Georgios Z. Papadopoulos

, Alexandros Mavromatis, Xenofon Fafoutis
, Robert J. Piechocki
, Theo Tryfonas
, George Oikonomou
:
Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links. 56-63
SaSeIoT
- Ayman El Hajjar

, George Roussos
, Maura B. Paterson
:
On the Performance of Key Pre-distribution for RPL-Based IoT Networks. 67-78 - Ausama Majeed, Adil Al-Yasiri:

Formulating A Global Identifier Based on Actor Relationship for the Internet of Things. 79-91 - Qiang Li, Zeming Yang, Baoxu Liu, Zhengwei Jiang, Jian Yan:

Framework of Cyber Attack Attribution Based on Threat Intelligence. 92-103 - Jian Wang, Abraham O. Fapojuwo, Chen Zhang, Huiting Tan:

UML Modeling of Cross-Layer Attack in Wireless Sensor Networks. 104-115 - Ali Hayek, Samer Telawi, Christian Bieler, Josef Börcsök:

Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications. 116-126 - Brian Cusack, Zhuang Tian, Ar Kar Kyaw:

Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT. 127-138

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














