


default search action
10th IoTBDS 2025: Porto, Portugal
- Ali Emrouznejad

, Patrick Hung, Andreas Jacobsson:
Proceedings of the 10th International Conference on Internet of Things, Big Data and Security, IoTBDS 2025, Porto, Portugal, April 6-8, 2025. SCITEPRESS 2025, ISBN 978-989-758-750-4
Invited Speakers
- Schahram Dustdar:

Active Inference for Distributed Intelligence in IoT and Edge Computing. IoTBDS 2025: 5 - Loic Bachelart:

Technological Adoption in the Era of Generative AI. IoTBDS 2025: 7 - Ana Aguiar:

It's All About the Data. IoTBDS 2025: 9
Papers
- Nilson Rodrigues Sousa, George Pinto

, Cássio V. S. Prazeres:
Internet of Things Devices Management for Smart Cities. 15-26 - Nilton Flávio S. Seixas, Adriano H. O. Maia, George Pinto

, Dhyego Tavares Cruz
, Bruno P. Santos, Ivan do Carmo Machado
, Eduardo Santana de Almeida, Frederico Araújo Durão, Maycon L. M. Peixoto, Gustavo B. Figueiredo, Cássio V. S. Prazeres:
Bridging the Cost Gap: A Comprehensive Analysis of CAPEX and OPEX for Smart Home Transition from a Provider's Perspective. 27-38 - Rafeef Baamer, Mihai Boicu:

Sockpuppet Detection in Wikipedia Using Machine Learning and Voting Classifiers. 39-47 - Yuzheng Yan, Ziyue Yu, Wuman Luo:

PatSimBoosting: Enhancing Patient Representations for Disease Prediction Through Similarity Analysis. 48-55 - Teresa Peixoto

, Bruno Oliveira, Óscar Oliveira
, Fillipe Ribeiro:
Real-Time Manufacturing Data Quality: Leveraging Data Profiling and Quality Metrics. 56-68 - Hassan Hammoud, Frédéric Weis, Melen Leclerc, Jean-Marie Bonnin:

Toward a More Realistic Energy Consumption Model for IoT Nodes in Extreme-Edge Computing Environments. 69-80 - Lucaleonardo Bove, Nicolò Gianmauro Totaro

, Massimiliano Gervasi:
Data Network Game: Enabling Collaboration via Data Mesh. 81-92 - Richard de Arruda Felix, Patricia Della Méa Plentz, Jean Carlo Rossa Hauck:

Approach to Deploying Batch File Data Products in a Big Data Environment. 93-104 - Gildas Kouko, Josée Desharnais, Nadia Tawbi:

Information Flow Control for the Internet of Things. 105-116 - Sara Boanca:

Pseudorandom Number Generators, Perfect Learning and Model Visualization with Neural Networks: Expanding on LFSRs and Geffe. 117-128 - Puchit Bunpleng, Puthtipong Thunyatada, Bhutharit Aksornsuwan

, Kanokvate Tungpimolrut, Ken T. Murata:
Smoke Segmentation Improvement Based on Fast Segment Anything Model with YOLOv11 for a Wildfire Monitoring System. 129-140 - Nadira Anjum Nipa, Nizar Bouguila, Zachary Patterson:

A Comparative Study of Log-Based Anomaly Detection Methods in Real-World System Logs. 141-152 - Eran Kaufman, Yigal Hoffner, Adan Fadila, Amin Masharqa, Nour Mawasi:

The Integration of Time Series Anomaly Detection into a Smart Home Environment. 153-163 - Srishti Sharma, Rahul Thakur:

EV-Connect: Energy Efficient & Incentive Cost Based Model for Range Anxious EVs with Multi-Hop Socially Assisted V2V Charging. 164-171 - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem:

Dynamic Obfuscation for Secure and Efficient Multi-Cloud Business Processes. 175-182 - Yuejing Zhai

, Yiping Li, Lihua He, Wuman Luo:
A Highly Nonlinear Survival Network for Hospital Readmission Prediction of Cardiac Patients. 183-190 - Kayode S. Adewole

, Andreas Jacobsson, Paul Davidsson:
RAM-IoT: Risk Assessment Model for IoT-Based Critical Assets. 191-198 - Sthembile Mthethwa, Moses Dlamini, Edgar Jembere:

DLT-Based Approach for Secure and Cyber Resilient Resource Constrained IoT Devices: A Survey on Recent Advances. 199-206 - Tasnimul Hasan, Abrar Hossain

, Mufakir Qamar Ansari, Talha Hussain Syed:
Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning. 207-214 - Madhu Yadav, Rajbir Kaur:

Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks. 215-222 - Kushagra Singh, Kafil Abbas Momin, M. Nishal, Chinmay Sultania, Madhav Rao:

Agri-Guard: IoT-Based Network for Agricultural Health Monitoring with Fault Detection. 223-230 - Tadashi Buitron, Enzo Peña, Pedro S. Castañeda

:
Inventory Management System Through the Integration of RPA and IoT to Enhance Processes in SMEs Within Peru's Automotive Sector. 231-236 - Seyed Mohsen Rostamkolaei Motlagh, Claus Pahl, Hamid R. Barzegar, Nabil El Ioini:

A Comparative Evaluation of Zero Knowledge Proof Techniques. 237-244 - Seyed Mohsen Rostamkolaei Motlagh, Claus Pahl, Hamid R. Barzegar, Nabil El Ioini:

A Technology Review of Zero Knowledge Proof Techniques. 245-253 - Lasse Harjumaa

, Ilkka Kivelä, Petri Jyrkkä, Ismo Hakala
:
Making Use of Design Patterns in IoT Middleware Implementation. 254-262 - Katharina Legler, Muhammad Sheheryar Jajja, Klaus Volbert:

Analysis and Design of Smart Components in Digital Energy Twins. 263-272 - Khadijah Febriana R., Rahul Thakur, Sudip Roy:

IoT-Driven Livestock Monitoring: Leveraging LoRaWAN for Behavior Analysis and Enhanced Farm Management. 273-280 - Hannes Salin:

A Comparative Analysis of Anonymous and Non-Anonymous Authorization Architectures for IoT Environments in Cooperative Intelligent Transport Systems. 281-288 - Ana C. P. Paixão, Breno R. da Silva, Rafael L. Silva, Filipe H. Cardoso

, Alexandre Braga:
Understanding How to Use Open-Source Libraries for Differentially Private Statistics on Energy Metering Time Series. 289-296 - Kento Hasegawa, Hibiki Nakanishi, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:

Automated Test Input Generation Based on Web User Interfaces via Large Language Models. 297-304 - Kento Hasegawa, Yuka Ikegami, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:

Automating the Assessment of Japanese Cyber-Security Technical Assessment Requirements Using Large Language Models. 305-312 - Zakariya Ghalmane, Brahim Daoud:

Graph-Based Learning for Multimodal Route Recommendation. 313-320 - Fouad Al Tfaily

, Zakariya Ghalmane, Mortada Termos, Mohamed-el-Amine Brahmia
, Ali Jaber, Mourad Zghal:
Generating Realistic Cyber Security Datasets for IoT Networks with Diverse Complex Network Properties. 321-328 - Mortada Termos, Zakariya Ghalmane, Mohamed-el-Amine Brahmia

, Ahmad Fadlallah
, Ali Jaber, Mourad Zghal:
Enhancing IoT Network Intrusion Detection with a New GraphSAGE Embedding Algorithm Using Centrality Measures. 329-336 - Nicolò Bertozzi, Anna Geraci

, Letizia Bergamasco, Enrico Ferrera, Edoardo Pristeri, Claudio Pastrone:
A Distributed Event-Orchestrated Digital Twin Architecture for Optimizing Energy-Intensive Industries. 337-344 - Ryusei Eda

, Nozomu Togawa:
Anomalous IoT Behavior Detection by LSTM-Based Power Waveform Prediction. 345-352 - Alexander W. Lee

, Melissa S. Lee
, Chelsea Yeh, Kyle Yeh:
Measuring Fall Risk Using the Internet-of-Things Chair. 353-360 - Mayuresh Hooli, Rabi N. Mahapatra:

L2C: Learn to Clean Time Series Data. 361-369 - Mathias Fredrik Hedberg, Jia-Chun Lin, Ming-Chang Lee:

PacketZapper: A Scalable and Automated Platform for IoT Traffic Collection and Analysis. 370-377 - Gabriel Vieira, Ana Rita Ortigoso

, Daniel Fuentes, Luís Frazão, Nuno Costa, António Pereira
:
Enhancing Scalability in Wi-Fi IoT Networks with Logical Data Plane Segregation Using SDN Principles. 378-385 - Mario Casillo, Francesco Colace, Angelo Lorusso, Domenico Santaniello, Carmine Valentino:

A Multilevel Graph-Based Recommender System for Personalized Learning Paths in Archaeological Parks: Leveraging IoT and Situation Awareness. 386-393 - Fares Ashraf ElSalamony, Nahla H. Barakat

, Ahmad Mostafa:
Unravelling the Sequential Patterns of Cyber Attacks: A Temporal Analysis of Attack Dependencies. 394-401 - Jalaa Hoblos:

Anomaly Detection on Univariate Time Series Data Using Exponentially Weighted Moving Average (AnEWMA). 402-409 - Yutaro Iizawa, Norihiro Okui, Yusuke Akimoto, Shotaro Fukushima, Ayumu Kubota, Takuya Yoshida:

A Study of Anomalous Communication Detection for IoT Devices Using Flow Logs in a Cloud Environment. 410-415 - Steve Taylor, Norbert Götze, Joerg Abendroth, Jens Kuhr, Rosella Mancilla, Bernd-Ludwig Wenning

, Pasindu Kuruppuarachchi, Aida Omerovic, Ravishankar Borgaonkar, Andrea Neverdal Skytterholm, Antonios Mpantis
, George N. Triantafyllou, Oscar Garcia Perales, Oleh Zaritskyi
:
Cybersecurity Indicators Within a Cybersecurity Testing and Monitoring Framework. 416-427 - Athiruj Poositaporn, Hanmin Jung:

Clustering-Based Pattern Prediction Framework for Air Pollution Prediction. 428-435 - Hanmin Jung, Athiruj Poositaporn:

Towards Client Engagement Using RAG System with Pattern Prediction Framework. 436-441 - Rawaa Al-Wani, Mays F. Al-Naday:

Intelligent Anomaly Detection for Context-Oriented Data Brokerage Systems. 442-449 - Yu-Jie Ou, Yan-Ming Chen, Chun-Chao Yeh:

A Novel Wi-Fi Mesh Network Framework for Efficient Mobile Data Transmission. 450-455 - Carlos Antonio Vilchez Pascual

, Brian David Pajares Correa, Félix Melchor Santos López
:
Design of an IoT-Driven Software Architecture for an Automated Robotic Fueling System in Open-Pit Mining. 456-463
Special Session on Artificial Intelligence for Emerging IoT Systems: Open Challenges and Novel Perspectives
- Habib Imani

, Renato Zona, Armando Arcieri, Luigi Piero Di Bonito, Simone Palladino, Vincenzo Minutolo:
eXplainable Artificial Intelligence Framework for Structure's Limit Load Extimation. 469-480 - Ciro Nespolino

, Roberta De Fazio, Laura Verde, Stefano Marrone:
Towards a Digital Twin of the Cardiovascular System. 481-490 - Prabhakaran Rajendran, Nirmal Kumar Balaraman

, Hareesh Viswanathan:
Enhancing Accuracy and Efficiency in Physical Count Processes: Leveraging AI, IoT, and Automation for Real-Time Inventory Management in Supply Chain. 493-500 - Lelio Campanile, Renato Zona, Antonio Perfetti, Franco Rosatelli:

An AI-Driven Methodology for Patent Evaluation in the IoT Sector: Assessing Relevance and Future Impact. 501-508 - Fabio Napoli, Lelio Campanile, Giovanni De Gregorio, Stefano Marrone:

Quantum Convolutional Neural Networks for Image Classification: Perspectives and Challenges. 509-516

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














