default search action
2nd IoTBDS 2017: Porto, Portugal
- Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary B. Wills, Robert John Walters, Victor Chang:
Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017. SciTePress 2017, ISBN 978-989-758-245-5
Invited Speakers
Keynote Speakers
- Yi-Ke Guo:
Assimilated Learning - Bridging the Gap between Big Data and Smart Data. IoTBDS 2017: 7
Invited Lecture
- Roy R. Cecil:
Big Data - Evolution, Trends and Opportunities. IoTBDS 2017: 13
Papers
Full Papers
- Victoria Moreno, José Antonio Ferrer, José Alberto Díaz, Domingo Bravo, Victor Chang:
A Data-Driven Methodology for Heating Optimization in Smart Buildings. 19-29 - Samaneh Rashidibajgan:
A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks. 30-35 - Wolfgang Weiss, Víctor Juan Expósito Jiménez, Herwig Zeiner:
A Dataset and a Comparison of Out-of-Order Event Compensation Algorithms. 36-46 - Roger Hallman, Josiah Bryan, Geancarlo Palavicini, Joseph DiVita, Jose Romero-Mariona:
IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets. 47-58 - Philipp Montesano, Marc Hüffmeyer, Ulf Schreier:
Outsourcing Access Control for a Dynamic Access Configuration of IoT Services. 59-69 - Paul Brous, Marijn Janssen, Daan Schraven, Jasper Spiegeler, Baris Can Duzgun:
Factors Influencing Adoption of IoT for Data-driven Decision Making in Asset Management Organizations. 70-79 - Luisa Vervier, Eva-Maria Zeissig, Chantal Lidynia, Martina Ziefle:
Perceptions of Digital Footprints and the Value of Privacy. 80-91 - Marco Cavallo, Giuseppe Di Modica, Carmelo Polito, Orazio Tomarchio:
A LAHC-based Job Scheduling Strategy to Improve Big Data Processing in Geo-distributed Contexts. 92-101 - Robert Pettersen, Håvard D. Johansen, Dag Johansen:
Secure Edge Computing with ARM TrustZone. 102-109 - Kun Liu:
Secure Electronic Health Record System Based on Online/Offline KP-ABE in the Cloud. 110-116 - Joschka Kersting, Michaela Geierhos, Hanmin Jung, Taehong Kim:
Internet of Things Architecture for Handling Stream Air Pollution Data. 117-124 - Shaufikah Shukri, Latifah Munirah Kamarudin, David Lorater Ndzi, Ammar Zakaria, Saidatul Norlyna Azemi, Kamarulzaman Kamarudin, Syed Muhammad Mamduh Syed Zakaria:
RSSI-based Device Free Localization for Elderly Care Application. 125-135 - Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo:
Task Offloading for Scientific Workflow Application in Mobile Cloud. 136-148 - Dongcheng Zhao, Gang Sun, Dan Liao, Rahat Iqbal, Victor Chang:
Live Migration for Service Function Chaining. 149-156 - Rune Hylsberg Jacobsen, Drini Aliu, Emad Ebeid:
A Low-cost Vehicle Tracking Platform using Secure SMS. 157-166 - Anna Kobusinska, Jerzy Brzezinski, Kamil Pawulczuk:
Device Fingerprinting: Analysis of Chosen Fingerprinting Methods. 167-177
Short Papers
- Georgios Dimitropoulos, Estela Papagianni, Vasileios Megalooikonomou:
Lag Correlation Discovery and Classification for Time Series. 181-188 - Óscar Mortágua Pereira, Vedran Semenski, Diogo Domingues Regateiro, Rui L. Aguiar:
The XACML Standard - Addressing Architectural and Security Aspects. 189-197 - Noura Aleisa, Karen Renaud:
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions. 198-205 - Aleksey V. Burdakov, Uriy A. Grigorev, Victoria Proletarskaya, Artem Ustimov:
Data Warehouse MFRJ Query Execution Model for MapReduce. 206-215 - Jari Kreku, Visa Antero Vallivaara, Kimmo Halunen, Jani Suomalainen:
Evaluating the Efficiency of Blockchains in IoT with Simulations. 216-223 - Yassine Essadraoui, Mohamed Dafir Ech-Cherif El Kettani:
Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups. 224-231 - Jean Tajer, Mo Adda, Benjamin Aziz:
New Computing Model for Securing Mobile Agents in IP Networks. 232-238 - Syed Khuram Shahzad, Muhammad Waseem Iqbal, Nadeem Ahmad:
Privacy Agents for IoT Cloud Communication. 239-245 - Giovanni Perrone, Massimo Vecchio, Riccardo Pecori, Raffaele Giaffreda:
The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices. 246-253 - Hany F. Atlam, Ahmed Alenezi, Robert John Walters, Gary B. Wills:
An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things. 254-260 - Mohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli:
Resolving the Misconceptions on Big Data Analytics Implementation through Government Research Institute in Malaysia. 261-266 - Guillermo Escobedo, Norma Jacome-Grajales, Gustavo Arroyo-Figueroa:
Big Data & Analytics to Support the Renewable Energy Integration of Smart Grids - Case Study: Power Solar Generation. 267-275 - Alexandra Rivero-García, Iván Santos-González, Candelaria Hernández-Goya, Pino Caballero-Gil:
IBSC System for Victims Management in Emergency Scenarios. 276-283 - Thomas Ochs, Ute Riemann:
Internet of Things - The Power of the IoT Platform. 284-294 - Ghada Gashgari, Robert John Walters, Gary B. Wills:
A Proposed Best-practice Framework for Information Security Governance. 295-301 - Gopal Jamnal, Xiaodong Liu:
A Cognitive-IoE Approach to Ambient-intelligent Smart Home. 302-308 - John Esquiagola, Laisa Caroline de Paula Costa, Pablo Calcina, Geovane Fedrecheski, Marcelo Zuffo:
Performance Testing of an Internet of Things Platform. 309-314 - Nurul Huda Nik Zulkipli, Ahmed Alenezi, Gary B. Wills:
IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things. 315-324 - Zanele Nicole Mndebele, Muthu Ramachandran:
IoT based Proximity Marketing . 325-330 - Stephan Cejka, Albin Frischenschlager, Mario Faschang, Mark Stefan:
Memory Optimization of a Distributed Middleware for Smart Grid Applications. 331-337 - Nayana Mannilthodi, Jinesh M. Kannimoola:
Secure IoT: An Improbable Reality. 338-343 - Paul Fremantle, Benjamin Aziz, Tom Kirkham:
Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - . 344-349 - Christophe Ponsard, Annick Majchrowski, Stéphane Mouton, Mounir Touzani:
Process Guidance for the Successful Deployment of a Big Data Project: Lessons Learned from Industrial Cases. 350-355 - Silvia Balaban, Manuela Wagner:
Minimizing the Risks of Data Protection Infringement - Data Lifecycle Risk Assessment. 356-362 - Muhammad Shaiful Azrin Md Alimon, L. M. Kamarudin, Azizi Harun, Ammar Zakaria, Shaufikah Shukri:
Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security. 363-369 - Alexandr Savinov:
From Group-by to Accumulation: Data Aggregation Revisited. 370-379 - Diana Martínez-Mosquera, Sergio Luján-Mora:
Data Cleaning Technique for Security Big Data Ecosystem. 380-385 - Roberto Saia, Salvatore Carta:
A Frequency-domain-based Pattern Mining for Credit Card Fraud Detection. 386-391 - Ateeq Khan, Matthias Pohl, Sascha Bosse, Stefan Willi Hart, Klaus Turowski:
A Holistic View of the IoT Process from Sensors to the Business Value. 392-399 - Brian Lee, Roman Vanickis, Franklin Rogelio, Paul Jacob:
Situational Awareness based Risk-adaptable Access Control in Enterprise Networks. 400-405 - Mohammad Fikry Abdullah, Mardhiah Ibrahim, Harlisa Zulkifli:
Big Data Analytics Framework for Natural Disaster Management in Malaysia. 406-411 - Fernando Fradique Duarte, Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar:
On the Prospect of using Cognitive Systems to Enforce Data Access Control. 412-418 - Ricardo Jesus, Mário Antunes, Diogo Gomes, Rui L. Aguiar:
Extracting Knowledge from Stream Behavioural Patterns. 419-423 - Enrico Ferrera, Riccardo Tisseur, Emanuel Lorenço, E. J. Silva, Antonio J. Baptista, Gonçalo Cardeal, Paulo Peças:
Optimization for Sustainable Manufacturing - Application of Optimization Techniques to Foster Resource Efficiency. 424-430 - Quanqing Xu, Chao Jin, Mohamed Faruq Bin Mohamed Rasid, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Decentralized Content Trust for Docker Images. 431-437 - Jiwan Lee, Sunghoon Jung, Kijin Kim, Minhwan Kim, Bonghee Hong:
An Image Data Learning Method by Discriminating Multiple ROIs Data Patterns for Extracting Weather Information. 438-443
Special Session on Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
Full Paper
- Priya Vedhanayagam, Subha S., Balamurugan Balusamy, Pandi Vijayakumar, Victor Chang:
Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service . 449-460
Short Papers
- João Pedro Dias, José Pedro Pinto, José Magalhães Cruz:
A Hands-on Approach on Botnets for Behavior Exploration. 463-469 - Geancarlo Palavicini Jr., Josiah Bryan, Eaven Sheets, Megan Kline, John San Miguel:
Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting. 470-477 - Nouf Alkhater, Gary B. Wills, Robert John Walters:
An Integrated Model to Investigate an Individual's Behavioural Towards using Cloud Computing. 478-481
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.