default search action
12th IOT 2022: Delft, The Netherlands
- Evangelos Niforatos, Gerd Kortuem, Nirvana Meratnia, Joshua Siegel, Florian Michahelles:
Proceedings of the 12th International Conference on the Internet of Things, IoT 2022, Delft, The Netherlands, November 7-10, 2022. ACM 2022, ISBN 978-1-4503-9665-3
IoT in Practice
- Tiago Troccoli, Juho Pirskanen, Aleksandr Ometov, Jari Nurmi, Ville Kaseva:
Fast Real-World Implementation of a Direction of Arrival Method for Constrained Embedded IoT Devices. 1-8 - Pol Maistriaux, Thibault Pirson, Maxime Schramme, Jérôme Louveaux, David Bol:
Modeling the Carbon Footprint of Battery-Powered IoT Sensor Nodes for Environmental-Monitoring Applications. 9-16 - Marco Giani, Nelly Frank, Alexander Verl:
Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial Experts. 17-24
IoT Modelling & Model Checking
- Jannis Strecker, Kimberly García, Kenan Bektas, Simon Mayer, Ganesh Ramanathan:
SOCRAR: Semantic OCR through Augmented Reality. 25-32 - Georgios Bouloukakis, Chrysostomos Zeginis, Nikos Papadakis, Panagiotis Zervakis, Dimitris Plexousakis, Kostas Magoutis:
Enabling IoT-enhanced Transportation Systems using the NGSI Protocol. 33-40 - Irman Faqrizal, Gwen Salaün, Yliès Falcone:
Probabilistic Analysis of Industrial IoT Applications. 41-48
IoT Security
- Ismet Burak Kadron, Chaofan Shou, Emily O'Mahony, Yilmaz Vural, Tevfik Bultan:
Targeted Black-Box Side-Channel Mitigation for IoT✱. 49-56 - Ahmed Hussain, Nada Abughanam, Junaid Qadir, Amr Mohamed:
Jamming Detection in IoT Wireless Networks: An Edge-AI Based Approach. 57-64 - Xiaokang Yin, Ruijie Cai, Yizheng Zhang, Lukai Li, Qichao Yang, Shengli Liu:
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis. 65-72 - Ahmed Hussain, Nada Abughanam, Savio Sciancalepore, Elias Yaacoub, Amr Mohamed:
Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation. 73-80
Human-Centric IoT
- Kaja Fjørtoft Ystgaard, Katrien De Moor:
Future scoping of truly Human-Centric IoT and Intelligent Networks: A Foresight Approach. 81-87 - Frank Beruscha, Katharina Lorenz, Anke Königschulte, Serge Autexier, Annika Sabrina Schulz, Bodo Pahlke, Valerie Bartsch, Hendrik Leibrandt:
Connecting Textiles: Exploring Textile Interior Surfaces for Power Supply, Communication and User Interaction in the IoT. 88-95 - Andrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos:
I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices. 96-103
IoT Services
- Henrik Dyrberg Egemose, Brodie W. Hobson, Mohamed Ouf, Mikkel Baun Kjærgaard:
Occupancy Estimation Using Sparse Sensor Coverage. 104-111 - Abdel Kader Chabi Sika Boni, Youssef Hablatou, Hassan Hassan, Khalil Drira:
Distributed deep reinforcement learning architecture for task offloading in autonomous IoT systems. 112-118 - Manon Arnaudo, Luc Gerrits, Ilya Grishkov, Roland Kromes, François Verdier:
Blockchains Accesses for Low-Power Embedded Devices using LoRaWAN. 119-126
IoT & Middleware
- Abdessalam Elhabbash, Yehia Elkhatib, Georgios Bouloukakis, Maria Salama:
A Middleware for Automatic Composition and Mediation in IoT Systems. 127-134
Poster Papers
- Yunxuan Li, Pascal Hirmer, Christoph Stach, Bernhard Mitschang:
Ensuring Situation-Aware Privacy for Connected Vehicles. 135-138 - Ebenezer Akansah, Elisha Elikem Kofi Senoo, Israel Mendonça, Masayoshi Aritsugi:
Smart agricultural monitoring system: a practical design approach. 139-142 - Arslan Musaddiq, Neda Maleki, Francis Palma, David Mozart, Tobias Olsson, Mustafa Omareen, Fredrik Ahlgren:
Internet of Things for Wetland Conservation using Helium Network: Experience and Analysis. 143-146 - Kento Katsumata, Yuka Honda, Tadashi Okoshi, Jin Nakazawa:
COVIDGuardian: A Machine Learning approach for detecting the Three Cs. 147-150 - Sigrid Marita Kvamme, Espen Gudmundsen, Tosin Daniel Oyetoyan, Daniela Soares Cruzes:
Data Protection Fortification: An Agile Approach for Threat Analysis of IoT Data. 151-154
STAR-IoT Workshop
- Scott Harper, Maryam Mehrnezhad, Matthew Leach:
Security and Privacy Concerns of Pet Tech Users. 155-162 - Muhammad Aslam Jarwar, Jeremy Watson, Uchenna Daniel Ani, Stuart W. Chalmers:
Industrial Internet of Things Security Modelling using Ontological Methods. 163-170 - Irina Brass, Andrew Mkwashi:
Risk Assessment and Classification of Medical Device Software for the Internet of Medical Things: Challenges arising from connected, intelligent medical devices. 171-178 - Matthew Bradbury, Daniel Prince, Victoria Marcinkiewicz, Tim Watson:
Attributes and Dimensions of Trust in Secure Systems. 179-186
Next Generation Workshop
- Junior Dongo:
An approach for Web of Things over Named Data Networking. 187-192 - Michael Nast, Hannes Raddatz, Benjamin Rother, Frank Golatowski, Dirk Timmermann:
A Survey and Comparison of Publish/Subscribe Protocols for the Industrial Internet of Things (IIoT). 193-200 - Yuki Matsuda:
IoPT: A Concept of Internet of Perception-aware Things. 201-204 - Miriam Schleipen, Viktor Schubert, Samir Dzidic, Dimitri Penner, Sven Spieckermann:
A modeling approach for integration and contextualization of simulation-based digital services in IIoT. 205-210 - Henrique Sousa, Pedro Figueiredo, Daniel Francisco, Miguel Monteiro, Renato Dias, Ana Almeida, Pedro Rito, Susana Sargento:
Safe Roads: an Integration between Twitter and City Sensing. 211-218 - Hironori Shimosato, Nozomi Hayashida, Kenta Urano, Takuro Yonezawa, Nobuo Kawaguchi:
XR Communication System for Remote Control Wheelchairs. 219-223 - Koki Tachibana, Yuki Matsuda, Kaito Isobe, Daiki Mayumi, Takamasa Kikuchi, Hirohiko Suwa, Keiichi Yasumoto, Kazuya Murao:
Tongaraas: Tongs for Recognizing Littering Garbage with Active Acoustic Sensing. 224-230 - Ganesh Ramanathan, Srinivas Marella:
Every Thing Under the Sun: How Web of Things and Semantic Data Brings Benefit to Small-Scale Photovoltaic Installations. 231-238 - Philippe Buschmann, Mostafa H. M. Shorim, Max Helm, Arne Bröring, Georg Carle:
Task Allocation in Industrial Edge Networks with Particle Swarm Optimization and Deep Reinforcement Learning. 239-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.