


default search action
11th IoTSMS 2024: Malmö, Sweden
- Muhannad Quwaider, Fahed Alkhabbas, Yaser Jararweh:

11th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2024, Malmö, Sweden, September 2-5, 2024. IEEE 2024, ISBN 979-8-3503-6650-1 - Romina Spalazzese, Jaime Lloret Mauri:

Message from the General Chairs. ii - Daniel J. Beutel:

Keynote Speech 4 Federated Learning for IoT. 1 - Johan Eker:

Keynote Speech 3 Cloudy with a Chance of Offloading: The Lighter Side of Edge Computing. 1 - Fabio Paternò

:
Keynote Speech 1 Human Control in Daily Environment Automations. 1 - Daniela Nicklas:

Keynote Speech 2 Smart Cities - A Play Ground for Fog, Mobile Edge, and IOT-based Computing? 1 - Hibiki Nakanishi, Kota Hisafuru, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:

Initial Seeds Generation Using LLM for IoT Device Fuzzing. 5-10 - José Álvaro Fernández-Carrasco, Iñigo Amonarriz Pagola, Raul Orduna Urrutia, Rodrigo Román:

CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity. 11-18 - Shih-Man Chang, Hao-Pu Lin, Chin-Chuan Han, Yu-Chi Wu:

An IoT-based Parameter Extraction Platform for Powder Metallurgy Sintering Furnace. 19-24 - Matej Petrík

, Michal Ries, Martin Sabo:
Digital Twin for Ion Mobility Spectrometry Devices. 25-32 - Erik Gottschalk

:
Power Cost for Secure and Reliable IoT. 33-37 - Ubaid Ullah, Slawomir Koziel, Anna Pietrenko-Dabrowska, Shahanawaz Kamal

:
Characteristics Mode Analysis of a Unit-Cell and A 3×3 Finite Metasurface Design for IoT Applications in the mm-wave Band. 38-43 - Tien-Chiao Chang, Yu-Chi Wu, Chin-Chuan Han, Chao-Shu Chang:

Real-time Arm Motion Tracking and Hand Gesture Recognition Based on a Single Inertial Measurement Unit. 44-49 - L. Kavisankar, Ajay Vemuri, S. Venkatesan, Rahamatullah Khondoker:

A Novel Strategy for the Identification of the Operating System of Bluetooth-Enabled Devices for Security Audit. 50-57 - Burak Tufekci, Atakan Arslan, Cihan Tunc, Kirill Morozov:

Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones. 58-65 - Juan P. Velásquez, Mexhid Ferati:

Promoting Sustainable Water Behaviours Through Exploration with IoT Prototypes. 66-73 - Vasileios Karagiannis

, Béla Nagy, Agnes Jodkowski
, Margit Kranner
, Drazen Ignjatovic
:
A Review of Emerging Trends in Energy Data Management Systems. 74-81 - Rehema Mwawado, Marco Zennaro, Jimmy Nsenga, Damien Hanyurwimfura:

Optimizing Soil-Based Crop Recommendations with Federated Learning on Raspberry Pi Edge Computing Nodes. 82-89 - Robson Santos Da Silva, Roberto Mariano De Araújo Filho, Marcos Heleno Guerson De Oliveira Júnior, Maria Lídia Rebello Pinho Dias Scoton, Paulo Henrique Lima Brito, Eduardo Mario Dias, Marcos Oliveira:

IoT: applications, potentialities and challenges in the context of Quality Infrastructure 4.0. 90-97 - Ali Deveci

, Selim Yilmaz
, Sevil Sen:
CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution. 98-105 - Henry Chen, Lambros Lambrinos

, Ryan Grammenos, Konstantinos Karagiannis, Elie Kfoury:
A data-driven scheduling module for electric vehicle charging. 106-111 - Hanan Alfares, Omar Banimelhem:

Comparative Analysis of Machine Learning Techniques for Handling Imbalance in IoT-23 Dataset for Intrusion Detection Systems. 112-119 - Koki Mori, Ryotaro Ohara, Takayuki Genda, Shun Sato, Shintaro Izumi, Hiroshi Kawaguchi:

Estimating Human Activities in Bathroom Through Sound Event Detection in Embedded Systems. 120-123 - Mattias Nordahl, Alfred Åkesson, Björn A. Johnsson

, Görel Hedin
, Boris Magnusson:
Software Component Update for IoT Systems. 124-131 - Jon Hall, Ben Morrow, Alex Godbehere:

Enhancing IIoT infrastructures with Kubernetes: Advanced Edge Cluster Management. 132-139 - Jiang Zhi-Hao:

The Impact of Innovation Ecosystem on the Innovation Performance of Chinese IoT Startups. 140-146 - Yuka Ikegami, Ryotaro Negishi, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:

Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations. 147-152 - Stanley Chukwuebuka Nwabuona, Kartikeya Sharma

, Martin Nordal Petersen
, Sarah Renee Ruepp
:
Ergonomic Back Pain Monitoring in Older Workers Using Smart Insoles. 153-160 - Alessandro Cerioli, Riccardo Miccini

, Clément Laroche, Tobias Piechowiak, Luca Pezzarossa, Jens Sparsø
, Martin Schoeberl
:
NeuralCasting: A Front-End Compilation Infrastructure for Neural Networks. 161-168 - Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat

:
Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks. 169-176 - Josepaul Paulachan

, Daniel Onwuchekwa, Roman Obermaisser:
Task Scheduling in Multi-Cloud Environments: A Graph Partitioning Approach Enhanced by Nested Genetic Algorithms. 177-184 - Mohammad Naweed Mohammadi, Toshiro Takahara, Hamidullah Sokout

:
Optimizing Water Consumption and Improving Productivity in Afghanistan's Greenhouses Through IoT and Machine Learning. 185-191 - Adrian Murphy, Daniel Larsson, Fanny Söderlund, Ola Angelsmark, Johan Eker:

Automated Log Message Embeddings. 192-197 - Hamam Mokayed

, Ghada Alsayed, Felicia Lodin, Olle Hagner, Björn Backe:
Enhancing Object Detection in Snowy Conditions: Evaluating YOLO v9 Models with Augmentation Techniques. 198-203 - Md Mahbubur Rahman, Reza Malekian, Vilhelm Akerstroem:

Fault Detection On Heat Pump Operational Data Using Machine Learning Algorithms. 204-211 - Ioannis Sorokos, Patrick Wolf, Jan Reich, Daniel Schneider:

Evaluating Self-Adaptive Architectures for Automated Driving Systems. 212-217 - George Kornaros, Dimitrios Bakoyiannis, Othon Tomoutzoglou, Marcello Coppola

:
From Cloud to IoT Device Authenticity under Kubernetes Management. 218-223 - Drazen Ignjatovic

, Vasileios Karagiannis
, Aradina Chettakattu, Denis Havlik
, Georg Neubauer
:
Crisis Management in the Era of the IoT, Edge Computing, and LLMs. 224-231 - Anton Slavin, Ulrich Norbisrath, Danielle Morgan, Eero Vainikko:

Investigating Raspberry Pi Access Point Client Limit for Use in IoT Education. 232-239 - Burak Tufekci, Vinh Quach, Cihan Tunc, Ram Dantu:

DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks. 240-247 - Miguel Zaragoza-Esquerdo, Alberto Ivars-Palomares, Lorena Parra, Sandra Sendra, Jaime Lloret, Manuel Pulido-Velazquez:

Underwater IoT System for Water Quality Monitoring at the Marine Outfall. 248-253 - Elsa López Pérez, Thomas Watteyne, Malisa Vucinic:

Pre-Shared Key Authentication in Ephemeral Diffie-Hellman Over COSE. 254-257 - Ali Ahmad

, Francisco Javier Díaz, Miguel Zaragoza-Esquerdo, Sandra Sendra, Lorena Parra, Sandra Viciano-Tudela, Jaime Lloret, Veronika Chaloupková, Raquel Bados
, Luis Saúl Esteban-Pascual, Irene Mediavilla:
LoRaWAN-based Network for Harvest Time Estimation in Cistus ladanifer. 258-263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














