


default search action
12th EIDWT 2024: Naples, Italy
- Leonard Barolli:

Advances in Internet, Data & Web Technologies - The 12th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2024, Naples, Italy, 21-23 February 2024. Lecture Notes on Data Engineering and Communications Technologies 193, Springer 2024, ISBN 978-3-031-53554-3 - Antonino Ferraro

, Antonio Galli, Valerio La Gatta
, Mario Minocchi, Vincenzo Moscato, Marco Postiglione:
Few Shot NER on Augmented Unstructured Text from Cardiology Records. 1-12 - Winarsih, Desy Noviyanti, Mutoharoh:

The Influence of Financial Literacy and Financial Technology on SMEs' Sustainability. 13-19 - Winarsih, Kholida, Chrisna Suhendi:

The Effect of Digital and Human Capital Transformation on SME Performance with Accounting Information Systems as an Intervening Variable. 20-30 - Yoshihiro Okada, Wei Shi, Kosuke Kaneko:

OpenVSLAM-Based Development Framework for Web-Based VR Tours Using 360VR Videos and Its Extensions. 31-42 - Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New Parameter. 43-52 - Yiran Sun, Ziqi Wang, Kewei Liu, Baojiang Cui:

Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms. 53-63 - Siyuan Wang, Zhiwei Cui, Jie Xu, Baojiang Cui:

An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing. 64-74 - Qing Guo, Wenchuan Yang, Baojiang Cui:

Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features. 75-86 - Wenxing Ma, Baojiang Cui:

Fuzzing IoT Devices via Android App Interfaces with Large Language Model. 87-99 - Elena Cardillo, Alessio Portaro

, Maria Taverniti, Claudia Lanza, Raffaele Guarasci
:
Towards the Automated Population of Thesauri Using BERT: A Use Case on the Cybersecurity Domain. 100-109 - Pengyuan Zhang, Baojiang Cui:

Network Scanning Detection Based on Spatiotemporal Behavior. 110-117 - Huan Yu, Baojiang Cui:

IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware. 118-129 - Federica Uccello

, Marek Pawlicki, Salvatore D'Antonio
, Rafal Kozik, Michal Choras:
An Innovative Approach to Real-Time Concept Drift Detection in Network Security. 130-139 - Naiguang Zhu, Jie Xu, Baojiang Cui:

Formal Analysis of 5G EAP-TLS 1.3. 140-151 - Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki

:
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering. 152-162 - LiPing Shi:

Design of Secure Fair Bidding Scheme Based on Threshold Elliptic Curve ElGamal Cryptography. 163-172 - Michele Mastroianni

, Massimo Ficco
, Francesco Palmieri
, Vincenzo Emanuele Martone:
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers. 173-184 - Koji Sakai, Yu Ohara, Yosuke Maehara, Takeshi Takahashi, Kei Yamada:

A Method for Estimating the Number of Diseases in J-MID Database: Application to CT Report. 185-193 - Alberto Postiglione

:
Text Mining with Finite State Automata via Compound Words Ontologies. 194-205 - Feng Tian, Baojiang Cui, Chen Chen:

Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network. 206-218 - Raffaele Guarasci

, Stefano Silvestri
, Massimo Esposito:
Probing Cross-lingual Transfer of XLM Multi-language Model. 219-228 - Yifan Luo, Baojiang Cui:

Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis. 229-240 - Yusuke Yoshida, Kosuke Takano:

A Method for Calculating Degree of Deviation of Posts on Social Media for Public Opinion in Flaming Prediction. 241-250 - Alba Haveriku

, Hakik Paci, Nelda Kote
, Elinda Kajo Meçe
:
Systematic Review of Eye-Tracking Studies. 251-260 - Ting Hu, Fang Deng, Zhiqiang Chu:

TPLUG: An Efficient Framework Through Token Pair Linking and Undirected Graph for Chinese Event Extraction. 261-272 - Dennis R. dela Cruz, Dyan G. Rodriguez, Hazel A. Caparas:

Usability and Effectiveness of a Developed IoT-Based Smart Beverage Dispenser. 273-284 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:

An Algorithm to Change the TBFC Model to Reduce the Energy Consumption of the IoT. 285-296 - Huipeng Liu, Baojiang Cui, Jie Xu, Lihua Niu:

An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing. 297-306 - Rui Liu, Baojiang Cui, Chen Chen, Jinxin Ma:

XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning. 307-317 - Phudit Ampririt, Shunya Higashi, Paboth Kraikritayakul, Ermioni Qafzezi, Keita Matsuo, Leonard Barolli:

Implementation of a Fuzzy-Based Testbed for Selection of Radio Access Technologies in 5G Wireless Networks and Its Performance Evaluation. 318-331 - Ermioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli:

A Fuzzy-Based System for Assessment of Recognition Error in VANETs Considering Inattentive Driving as New Parameter. 332-342 - Admir Barolli

, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of BLX-α Crossover Method for Different Instances of WMNs Considering FC-RDVM Router Replacement Method and Subway Distribution of Mesh Clients. 343-352 - Keita Matsuo, Leonard Barolli:

A Measurement System for Improving Riding Comfortability of Omnidirectional Wheelchair Robot. 353-361 - Naoki Tanaka, Hibiki Tanaka, Makoto Ikeda

, Leonard Barolli
:
A Comparative Study of Four YOLO-Based Models for Distracted Driving Detection. 362-370 - Yuki Nagai, Tetsuya Oda, Chihiro Yukawa, Kyohei Wakabayashi, Leonard Barolli:

An Intelligent System Based on CCM, SA and FDTD for Sensor Node Placement Optimization in Wireless Visual Sensor Networks. 371-383 - Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:

Performance Evaluation of a Cuckoo Search Based System for Node Placement Problem in Wireless Mesh Networks: Evaluation Results for Computation Time and Different Numbers of Nests. 384-393 - Menglin Ma, Baojiang Cui:

Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. 394-403 - Ziyang Chen, Baojiang Cui, Zishuai Cheng:

4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. 404-414 - Walter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella:

Energy Sharing System Among Vehicles on a Vehicular Network. 415-422 - Yusuke Gotoh, Ryusei Tsunetomo, Kiki Adhinugraha

:
Proposal of Indoor AR Navigation System Using SLAM for Location Search. 423-434 - Genki Moriya, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli:

A Fuzzy-Based System for Real-Time Volume Control of Electric Bass Guitars. 435-442 - Evjola Spaho, Orjola Jaupi, Anxhela Cala:

Implementation of a Low-Cost and Intelligent Driver Monitoring System for Engine Locking in the Presence of Alcohol Detection or Drowsiness in Drivers. 443-451 - Tomoaki Matsui, Tetsuya Oda, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Leonard Barolli:

An Accident Detection System for Private Lavatories Using Fuzzy Control and Thermal Camera. 452-459 - Kenya Okage, Tetsuya Oda, Yuki Nagai, Chihiro Yukawa, Kyohei Wakabayashi, Leonard Barolli:

A Fuzzy-Based System for Decision of Compressed Image Degree Using Cluster Load Level. 460-469 - Chihiro Yukawa, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Leonard Barolli:

A Fuzzy Control Based Method for Imaging Position Decision and Its Performance Evaluation. 470-479 - Sami Alsaadi, Tertsegha J. Anande, Mark S. Leeson:

Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined Networks. 480-491 - Walter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella:

Analysis and Development of a New Method for Defining Path Reliability in WebGIS Based on Fuzzy Logic and Dispersion Indices. 492-501 - Kyohei Wakabayashi, Chihiro Yukawa, Yuki Nagai, Tetsuya Oda, Leonard Barolli:

Object Detection and Speech Recognition Based Motion Analysis System for Pointing and Calling. 502-511 - Shigenari Nakamura

, Makoto Takizawa:
Trust Zone Model with the Mandatory Access Control Model. 512-521 - Yuqing Zhao, Baojiang Cui, Jun Yang, Meiyi Jiang:

A DPI-Based Network Traffic Feature Vector Optimization Model. 522-531 - Nobuki Saito, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Leonard Barolli:

A Hill Climbing System for Optimizing Component Selection of Multirotor UAVs. 532-544 - Sora Asada, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli:

Optimization of Deer Repellent Devices Placement Based on Hill Climbing and Acoustic Ray Tracing. 545-554 - Peixin Cong, Baojiang Cui:

Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm. 555-566 - Zhen-zhen Li:

Star Point Target Extraction with High Noise Background Based on Morphology. 567-574 - Besjana Muraku, Lu Xiao, Elinda Kajo Meçe

:
Toward Detection of Fake News Using Sentiment Analysis for Albanian News Articles. 575-585 - Toshiya Morita, Tomoyuki Ishida:

Proposal of My Hazard Map System for Disaster Prevention Education. 586-596 - Luigi Colucci Cante

, Beniamino Di Martino, Mariangela Graziano
, Dario Branco
, Gennaro Junior Pezzullo:
Automated Storytelling Technologies for Cultural Heritage. 597-606 - Beniamino Di Martino, Gennaro Junior Pezzullo, Emanuela Grassia:

Support for Automated Story Telling Using Natural Language Processing Techniques Aimed at Recognizing Narrative Elements. 607-616 - Divya Pragna Mulla, Antonella Calò, Antonella Longo:

Travel Air IQ: A Tool for Air Quality-Aware Tourists. 617-628 - Dario Branco

, Antonio Coppa, Salvatore D'Angelo, Stefania Quilici Gigli, Giuseppina Renda, Salvatore Venticinque:
Advanced IT Technologies Applied to Archaeological Park of Norba (Latium, Italy). 629-638 - Mario Alessandro Bochicchio, Eleonora Miccoli:

XR Theater: An Experience. 639-648

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














