default search action
12th EIDWT 2024: Naples, Italy
- Leonard Barolli:
Advances in Internet, Data & Web Technologies - The 12th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2024, Naples, Italy, 21-23 February 2024. Lecture Notes on Data Engineering and Communications Technologies 193, Springer 2024, ISBN 978-3-031-53554-3 - Antonino Ferraro, Antonio Galli, Valerio La Gatta, Mario Minocchi, Vincenzo Moscato, Marco Postiglione:
Few Shot NER on Augmented Unstructured Text from Cardiology Records. 1-12 - Winarsih, Desy Noviyanti, Mutoharoh:
The Influence of Financial Literacy and Financial Technology on SMEs' Sustainability. 13-19 - Winarsih, Kholida, Chrisna Suhendi:
The Effect of Digital and Human Capital Transformation on SME Performance with Accounting Information Systems as an Intervening Variable. 20-30 - Yoshihiro Okada, Wei Shi, Kosuke Kaneko:
OpenVSLAM-Based Development Framework for Web-Based VR Tours Using 360VR Videos and Its Extensions. 31-42 - Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New Parameter. 43-52 - Yiran Sun, Ziqi Wang, Kewei Liu, Baojiang Cui:
Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms. 53-63 - Siyuan Wang, Zhiwei Cui, Jie Xu, Baojiang Cui:
An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing. 64-74 - Qing Guo, Wenchuan Yang, Baojiang Cui:
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features. 75-86 - Wenxing Ma, Baojiang Cui:
Fuzzing IoT Devices via Android App Interfaces with Large Language Model. 87-99 - Elena Cardillo, Alessio Portaro, Maria Taverniti, Claudia Lanza, Raffaele Guarasci:
Towards the Automated Population of Thesauri Using BERT: A Use Case on the Cybersecurity Domain. 100-109 - Pengyuan Zhang, Baojiang Cui:
Network Scanning Detection Based on Spatiotemporal Behavior. 110-117 - Huan Yu, Baojiang Cui:
IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware. 118-129 - Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
An Innovative Approach to Real-Time Concept Drift Detection in Network Security. 130-139 - Naiguang Zhu, Jie Xu, Baojiang Cui:
Formal Analysis of 5G EAP-TLS 1.3. 140-151 - Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki:
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering. 152-162 - LiPing Shi:
Design of Secure Fair Bidding Scheme Based on Threshold Elliptic Curve ElGamal Cryptography. 163-172 - Michele Mastroianni, Massimo Ficco, Francesco Palmieri, Vincenzo Emanuele Martone:
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers. 173-184 - Koji Sakai, Yu Ohara, Yosuke Maehara, Takeshi Takahashi, Kei Yamada:
A Method for Estimating the Number of Diseases in J-MID Database: Application to CT Report. 185-193 - Alberto Postiglione:
Text Mining with Finite State Automata via Compound Words Ontologies. 194-205 - Feng Tian, Baojiang Cui, Chen Chen:
Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network. 206-218 - Raffaele Guarasci, Stefano Silvestri, Massimo Esposito:
Probing Cross-lingual Transfer of XLM Multi-language Model. 219-228 - Yifan Luo, Baojiang Cui:
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis. 229-240 - Yusuke Yoshida, Kosuke Takano:
A Method for Calculating Degree of Deviation of Posts on Social Media for Public Opinion in Flaming Prediction. 241-250 - Alba Haveriku, Hakik Paci, Nelda Kote, Elinda Kajo Meçe:
Systematic Review of Eye-Tracking Studies. 251-260 - Ting Hu, Fang Deng, Zhiqiang Chu:
TPLUG: An Efficient Framework Through Token Pair Linking and Undirected Graph for Chinese Event Extraction. 261-272 - Dennis R. dela Cruz, Dyan G. Rodriguez, Hazel A. Caparas:
Usability and Effectiveness of a Developed IoT-Based Smart Beverage Dispenser. 273-284 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An Algorithm to Change the TBFC Model to Reduce the Energy Consumption of the IoT. 285-296 - Huipeng Liu, Baojiang Cui, Jie Xu, Lihua Niu:
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing. 297-306 - Rui Liu, Baojiang Cui, Chen Chen, Jinxin Ma:
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning. 307-317 - Phudit Ampririt, Shunya Higashi, Paboth Kraikritayakul, Ermioni Qafzezi, Keita Matsuo, Leonard Barolli:
Implementation of a Fuzzy-Based Testbed for Selection of Radio Access Technologies in 5G Wireless Networks and Its Performance Evaluation. 318-331 - Ermioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Assessment of Recognition Error in VANETs Considering Inattentive Driving as New Parameter. 332-342 - Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of BLX-α Crossover Method for Different Instances of WMNs Considering FC-RDVM Router Replacement Method and Subway Distribution of Mesh Clients. 343-352 - Keita Matsuo, Leonard Barolli:
A Measurement System for Improving Riding Comfortability of Omnidirectional Wheelchair Robot. 353-361 - Naoki Tanaka, Hibiki Tanaka, Makoto Ikeda, Leonard Barolli:
A Comparative Study of Four YOLO-Based Models for Distracted Driving Detection. 362-370 - Yuki Nagai, Tetsuya Oda, Chihiro Yukawa, Kyohei Wakabayashi, Leonard Barolli:
An Intelligent System Based on CCM, SA and FDTD for Sensor Node Placement Optimization in Wireless Visual Sensor Networks. 371-383 - Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of a Cuckoo Search Based System for Node Placement Problem in Wireless Mesh Networks: Evaluation Results for Computation Time and Different Numbers of Nests. 384-393 - Menglin Ma, Baojiang Cui:
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. 394-403 - Ziyang Chen, Baojiang Cui, Zishuai Cheng:
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. 404-414 - Walter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella:
Energy Sharing System Among Vehicles on a Vehicular Network. 415-422 - Yusuke Gotoh, Ryusei Tsunetomo, Kiki Adhinugraha:
Proposal of Indoor AR Navigation System Using SLAM for Location Search. 423-434 - Genki Moriya, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli:
A Fuzzy-Based System for Real-Time Volume Control of Electric Bass Guitars. 435-442 - Evjola Spaho, Orjola Jaupi, Anxhela Cala:
Implementation of a Low-Cost and Intelligent Driver Monitoring System for Engine Locking in the Presence of Alcohol Detection or Drowsiness in Drivers. 443-451 - Tomoaki Matsui, Tetsuya Oda, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Leonard Barolli:
An Accident Detection System for Private Lavatories Using Fuzzy Control and Thermal Camera. 452-459 - Kenya Okage, Tetsuya Oda, Yuki Nagai, Chihiro Yukawa, Kyohei Wakabayashi, Leonard Barolli:
A Fuzzy-Based System for Decision of Compressed Image Degree Using Cluster Load Level. 460-469 - Chihiro Yukawa, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Leonard Barolli:
A Fuzzy Control Based Method for Imaging Position Decision and Its Performance Evaluation. 470-479 - Sami Alsaadi, Tertsegha J. Anande, Mark S. Leeson:
Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined Networks. 480-491 - Walter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella:
Analysis and Development of a New Method for Defining Path Reliability in WebGIS Based on Fuzzy Logic and Dispersion Indices. 492-501 - Kyohei Wakabayashi, Chihiro Yukawa, Yuki Nagai, Tetsuya Oda, Leonard Barolli:
Object Detection and Speech Recognition Based Motion Analysis System for Pointing and Calling. 502-511 - Shigenari Nakamura, Makoto Takizawa:
Trust Zone Model with the Mandatory Access Control Model. 512-521 - Yuqing Zhao, Baojiang Cui, Jun Yang, Meiyi Jiang:
A DPI-Based Network Traffic Feature Vector Optimization Model. 522-531 - Nobuki Saito, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Leonard Barolli:
A Hill Climbing System for Optimizing Component Selection of Multirotor UAVs. 532-544 - Sora Asada, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli:
Optimization of Deer Repellent Devices Placement Based on Hill Climbing and Acoustic Ray Tracing. 545-554 - Peixin Cong, Baojiang Cui:
Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm. 555-566 - Zhen-zhen Li:
Star Point Target Extraction with High Noise Background Based on Morphology. 567-574 - Besjana Muraku, Lu Xiao, Elinda Kajo Meçe:
Toward Detection of Fake News Using Sentiment Analysis for Albanian News Articles. 575-585 - Toshiya Morita, Tomoyuki Ishida:
Proposal of My Hazard Map System for Disaster Prevention Education. 586-596 - Luigi Colucci Cante, Beniamino Di Martino, Mariangela Graziano, Dario Branco, Gennaro Junior Pezzullo:
Automated Storytelling Technologies for Cultural Heritage. 597-606 - Beniamino Di Martino, Gennaro Junior Pezzullo, Emanuela Grassia:
Support for Automated Story Telling Using Natural Language Processing Techniques Aimed at Recognizing Narrative Elements. 607-616 - Divya Pragna Mulla, Antonella Calò, Antonella Longo:
Travel Air IQ: A Tool for Air Quality-Aware Tourists. 617-628 - Dario Branco, Antonio Coppa, Salvatore D'Angelo, Stefania Quilici Gigli, Giuseppina Renda, Salvatore Venticinque:
Advanced IT Technologies Applied to Archaeological Park of Norba (Latium, Italy). 629-638 - Mario Alessandro Bochicchio, Eleonora Miccoli:
XR Theater: An Experience. 639-648
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.