


default search action
9th IoTSMS 2022: Milan, Italy
- Jaime Lloret, Larbi Boubchir, Yaser Jararweh, Elhadj Benkhelifa, Imad Saleh:

9th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2022, Milan, Italy, November 29 - Dec. 1, 2022. IEEE 2022, ISBN 979-8-3503-2045-9 - Tahira Yasmin, Ghaleb A. El Refae

, Shorouq Eletter:
"Expo City Dubai": A Convergence of Smart Touristic and Residential Experience. 1-5 - Linsheng Hu, Yihao Li, Hao Zhang

, Lu Yuan, Fuhui Zhou, Qihui Wu:
Robust Semantic Communication Driven by Knowledge Graph. 1-5 - Salam Traboulsi, Dieter Uckelmann:

5G as Enabler Technology for Smart City Use Cases. 1-7 - Shadi AlZu'bi, Samia A. Abushanap, Islam AlTalahin, Ayman M. Abdalla

, Abdelfatah Aref Tamimi:
Secure Transmission of Noisy Images over Fiber Optic Communication. 1-5 - Nada Masood Mirza, Adnan Ali:

IoT Predictive Model for Caffeine Addiction. 1-4 - Rawad Bader, Adnan Ali, Nada Masood Mirza:

AI and Robotics Leading Industry 4.0. 1-4 - Ichiro Satoh:

Configurable Protocol for IoT Systems. 1-6 - Zehra Camlica, Jim Quesenberry, Daniel Carballo, Mark Crowley:

Aggressive Driver Behavior Detection using Parallel Convolutional Neural Networks on Simulated and Real Driving Data. 1-8 - Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen:

Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach. 1-8 - Shahanawaz Kamal

, Ubaid Ullah
, Slawomir Koziel:
A Printed Crossed-Dipole mmWave Antenna with Efficient Omnidirectional Circular Polarization for Wireless Surveillance in IOT Applications. 1-4 - Priscilla Benedetti, Giuseppe Coviello, Kunal Rao, Srimat Chakradhar:

DataX Allocator: Dynamic resource management for stream analytics at the Edge. 1-8 - Van Thanh Le

, Nabil El Ioini, Claus Pahl
, Mehdi Elahi:
Capacity-Based Trust System in Untrusted MEC Environments. 1-8 - Dounya Kassimi, Okba Kazar

, Ezedin Barka, Abdelhak Merizig, Zina Houhamdi, Belkacem Athamena
, Zaoui Meftah:
A Smart Approach using Multi-agent System for Big Data Security. 1-7 - Mohammad Alhassan, Suleiman Ashur

, Haythem Bany Salameh, Layla Amaireh, Ahmed Maher:
Integration of IoT Technology in Treatment of Pedestrian-Crossing at Intersections. 1-5 - Hassan Jalil Hadi, Umer Hayat

, Numan Musthaq, Faisal Bashir Hussain, Yue Cao
:
Developing Realistic Distributed Denial of Service (DDoS) Dataset for Machine Learning-based Intrusion Detection System. 1-6 - Ahmad Ibrahim Aljumah, Mohammed T. Nuseir, Ghaleb A. El Refae

:
Internet of Things (IoT): A Way to Expedite Production and Service Performance Empirical, Evidence from Textile Industry of United Arab Emirates (UAE). 1-8 - Firas AlBalas, Ehssan Alrabee, Wail Mardini, Amr Sawafta:

Energy-Aware Routing Approach in Internet of Things Using Genetic Algorithms. 1-6 - Mohammad Al-Hattab

, Maen Takruri:
Adaptive Method to Estimate Link Budget Parameters in Wireless Networks. 1-4 - David Enthoven, Zaid Al-Ars:

Fidel: Reconstructing Private Training Samples from Weight Updates in Federated Learning. 1-8 - Mohammed T. Nuseir, Ahmad Ibrahim Aljumah, Ghaleb A. El Refae

:
Impact of Big Data Analytics and Managerial Support on CRM: Exploring Mediating Role of Marketing Analytics. 1-8 - Zaka Ullah, Muath Al-Hasan, Ismail Ben Mabrouk:

EMI Shielding for 5G IOT devices with MXene Metamaterial Absorber. 1-4 - Enrico Bassetti

, Davide Quaranta, Emanuele Panizzi:
Quick decentralized estimation of earthquake epicenter with low-cost IoT network. 1-8 - Christoph Haar, Erik Buchmann:

IoT Security With INFINITE: The 3-Dimensional Internet Of Things Maturity Model. 1-8 - Mohammad Al Ja'afreh

, Ali Karime
, Sahel Alouneh, Abdulmotaleb El-Saddik:
A Detailed Analysis of Qualitative and Quantitative Factors in Realization of 6G Communication. 1-10 - Shadi AlZu'bi, Samia A. Abushanap, Muder Almiani

, Ala Mughaid
:
Transfer Learning Enabled CAD System for Monkey Pox Classification. 1-5 - Muhammad Afzaal

:
An Overview of Defense Techniques Against DoS Attacks. 1-8 - Kenza Riahi, Mohamed-el-Amine Brahmia

, Abdelhafid Abouaissa, Lhassane Idoumghar:
FPBFT: A Fast PBFT Protocol for Private Blockchains. 1-8 - Mario van Rooij, Sabina van Rooij, Henri Bouma

, Andy D. Pimentel
:
Secure Sparse Gradient Aggregation in Distributed Architectures. 1-8 - Chen Wan, Amjad Mehmood

, Carsten Maple, Gregory Epiphaniou, Jaime Lloret:
A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol. 1-8 - Issam Al-Azzoni, Nenad Petrovic

:
On Persisting EMF Data Using Blockchains. 1-5 - Sibendu Paul

, Kunal Rao, Giuseppe Coviello, Murugan Sankaradas, Oliver Po, Y. Charlie Hu, Srimat Chakradhar:
APT: Adaptive Perceptual quality based camera Tuning using reinforcement learning. 1-9 - Khalid A. Darabkh, Hanan F. Al-Khazaleh, Raed T. Al-Zubi, Sharhabeel H. Alnabelsi, Haythem Bany Salameh:

An Improved and Stable Routing Protocol for Cognitive Radio Based IoT Networks. 1-5 - Daniel Montero Hernández, Jorge Peña Queralta

, Tomi Westerlund:
Distributed Ledger Technologies for Managing Heterogenous Computing Systems at the Edge. 1-8 - Muntaha Alawneh, Imad M. Abbadi:

Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles. 1-6 - Hassan Mistareehi, Haythem Bany Salameh, D. Manivannan

:
An On-Board Hardware Implementation of AODV Routing Protocol in VANET: Design and Experimental Evaluation. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














