


default search action
12th IOT 2022: Delft, The Netherlands
- Evangelos Niforatos, Gerd Kortuem, Nirvana Meratnia, Joshua Siegel, Florian Michahelles:

Proceedings of the 12th International Conference on the Internet of Things, IoT 2022, Delft, The Netherlands, November 7-10, 2022. ACM 2022, ISBN 978-1-4503-9665-3
IoT in Practice
- Tiago Troccoli

, Juho Pirskanen
, Aleksandr Ometov
, Jari Nurmi
, Ville Kaseva
:
Fast Real-World Implementation of a Direction of Arrival Method for Constrained Embedded IoT Devices. 1-8 - Pol Maistriaux

, Thibault Pirson
, Maxime Schramme
, Jérôme Louveaux
, David Bol
:
Modeling the Carbon Footprint of Battery-Powered IoT Sensor Nodes for Environmental-Monitoring Applications. 9-16 - Marco Giani

, Nelly Frank
, Alexander Verl
:
Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial Experts. 17-24
IoT Modelling & Model Checking
- Jannis Strecker

, Kimberly García
, Kenan Bektas
, Simon Mayer
, Ganesh Ramanathan
:
SOCRAR: Semantic OCR through Augmented Reality. 25-32 - Georgios Bouloukakis

, Chrysostomos Zeginis
, Nikos Papadakis
, Panagiotis Zervakis
, Dimitris Plexousakis
, Kostas Magoutis
:
Enabling IoT-enhanced Transportation Systems using the NGSI Protocol. 33-40 - Irman Faqrizal

, Gwen Salaün
, Yliès Falcone
:
Probabilistic Analysis of Industrial IoT Applications. 41-48
IoT Security
- Ismet Burak Kadron

, Chaofan Shou
, Emily O'Mahony
, Yilmaz Vural
, Tevfik Bultan
:
Targeted Black-Box Side-Channel Mitigation for IoT✱. 49-56 - Ahmed Mohamed Hussain

, Nada Abughanam
, Junaid Qadir
, Amr Mohamed
:
Jamming Detection in IoT Wireless Networks: An Edge-AI Based Approach. 57-64 - Xiaokang Yin

, Ruijie Cai
, Yizheng Zhang
, Lukai Li
, Qichao Yang
, Shengli Liu
:
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis. 65-72 - Ahmed Mohamed Hussain

, Nada Abughanam
, Savio Sciancalepore
, Elias Yaacoub
, Amr Mohamed
:
Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation. 73-80
Human-Centric IoT
- Kaja Fjørtoft Ystgaard

, Katrien De Moor
:
Future scoping of truly Human-Centric IoT and Intelligent Networks: A Foresight Approach. 81-87 - Frank Beruscha

, Katharina Lorenz
, Anke Königschulte
, Serge Autexier
, Annika Sabrina Schulz
, Bodo Pahlke
, Valerie Bartsch
, Hendrik Leibrandt
:
Connecting Textiles: Exploring Textile Interior Surfaces for Power Supply, Communication and User Interaction in the IoT. 88-95 - Andrei Kazlouski

, Thomas Marchioro
, Evangelos P. Markatos
:
I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices. 96-103
IoT Services
- Henrik Dyrberg Egemose

, Brodie W. Hobson
, Mohamed Ouf
, Mikkel Baun Kjærgaard
:
Occupancy Estimation Using Sparse Sensor Coverage. 104-111 - Abdel Kader Chabi Sika Boni

, Youssef Hablatou
, Hassan Hassan
, Khalil Drira
:
Distributed deep reinforcement learning architecture for task offloading in autonomous IoT systems. 112-118 - Manon Arnaudo

, Luc Gerrits
, Ilya Grishkov
, Roland Kromes
, François Verdier
:
Blockchains Accesses for Low-Power Embedded Devices using LoRaWAN. 119-126
IoT & Middleware
- Abdessalam Elhabbash

, Yehia Elkhatib
, Georgios Bouloukakis
, Maria Salama
:
A Middleware for Automatic Composition and Mediation in IoT Systems. 127-134
Poster Papers
- Yunxuan Li

, Pascal Hirmer
, Christoph Stach
, Bernhard Mitschang
:
Ensuring Situation-Aware Privacy for Connected Vehicles. 135-138 - Ebenezer Akansah

, Elisha Elikem Kofi Senoo
, Israel Mendonça
, Masayoshi Aritsugi
:
Smart agricultural monitoring system: a practical design approach. 139-142 - Arslan Musaddiq

, Neda Maleki
, Francis Palma
, David Mozart
, Tobias Olsson
, Mustafa Omareen
, Fredrik Ahlgren
:
Internet of Things for Wetland Conservation using Helium Network: Experience and Analysis. 143-146 - Kento Katsumata

, Yuka Honda
, Tadashi Okoshi
, Jin Nakazawa
:
COVIDGuardian: A Machine Learning approach for detecting the Three Cs. 147-150 - Sigrid Marita Kvamme

, Espen Gudmundsen
, Tosin Daniel Oyetoyan
, Daniela Soares Cruzes
:
Data Protection Fortification: An Agile Approach for Threat Analysis of IoT Data. 151-154
STAR-IoT Workshop
- Scott Harper

, Maryam Mehrnezhad
, Matthew Leach
:
Security and Privacy Concerns of Pet Tech Users. 155-162 - Muhammad Aslam Jarwar

, Jeremy Watson
, Uchenna Daniel Ani
, Stuart W. Chalmers
:
Industrial Internet of Things Security Modelling using Ontological Methods. 163-170 - Irina Brass

, Andrew Mkwashi
:
Risk Assessment and Classification of Medical Device Software for the Internet of Medical Things: Challenges arising from connected, intelligent medical devices. 171-178 - Matthew Bradbury

, Daniel Prince
, Victoria Marcinkiewicz
, Tim Watson
:
Attributes and Dimensions of Trust in Secure Systems. 179-186
Next Generation Workshop
- Junior Dongo

:
An approach for Web of Things over Named Data Networking. 187-192 - Michael Nast

, Hannes Raddatz
, Benjamin Rother
, Frank Golatowski
, Dirk Timmermann
:
A Survey and Comparison of Publish/Subscribe Protocols for the Industrial Internet of Things (IIoT). 193-200 - Yuki Matsuda

:
IoPT: A Concept of Internet of Perception-aware Things. 201-204 - Miriam Schleipen

, Viktor Schubert
, Samir Dzidic
, Dimitri Penner
, Sven Spieckermann
:
A modeling approach for integration and contextualization of simulation-based digital services in IIoT. 205-210 - Henrique Sousa

, Pedro Figueiredo
, Daniel Francisco
, Miguel Monteiro
, Renato Dias
, Ana Almeida
, Pedro Rito
, Susana Sargento
:
Safe Roads: an Integration between Twitter and City Sensing. 211-218 - Hironori Shimosato

, Nozomi Hayashida
, Kenta Urano
, Takuro Yonezawa
, Nobuo Kawaguchi
:
XR Communication System for Remote Control Wheelchairs. 219-223 - Koki Tachibana

, Yuki Matsuda
, Kaito Isobe
, Daiki Mayumi
, Takamasa Kikuchi
, Hirohiko Suwa
, Keiichi Yasumoto
, Kazuya Murao
:
Tongaraas: Tongs for Recognizing Littering Garbage with Active Acoustic Sensing. 224-230 - Ganesh Ramanathan

, Srinivas Marella
:
Every Thing Under the Sun: How Web of Things and Semantic Data Brings Benefit to Small-Scale Photovoltaic Installations. 231-238 - Philippe Buschmann

, Mostafa H. M. Shorim
, Max Helm
, Arne Bröring
, Georg Carle
:
Task Allocation in Industrial Edge Networks with Particle Swarm Optimization and Deep Reinforcement Learning. 239-247

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














