All Stories

  1. ABusing Social Media and Sentiment Analysis for Stock Market Prediction
  2. DISTIL: Digital Identities for the Evaluation of Job Skills
  3. Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response
  4. Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities
  5. Building a modern data platform based on the data lakehouse architecture and cloud-native ecosystem
  6. Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection
  7. Enhancing Trust in Machine Learning via Adversarial Data Attack Detection using GANs
  8. Enhancing Automotive Intrusion Detection Systems with CHERI-Based Memory Protection
  9. Moving Healthcare AI Support Systems for Visually Detectable Diseases to Constrained Devices
  10. DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof
  11. Towards Building a Smart Water Management System (SWAMS) in Nigeria
  12. Broker-Less OPC UA PubSub Communication Model Performance Analysis
  13. Examining the Strength of Three Word Passwords
  14. Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics
  15. Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration
  16. Transforming EU Governance: The Digital Integration Through EBSI and GLASS
  17. Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
  18. Edge NLP for Efficient Machine Translation in Low Connectivity Areas
  19. Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap
  20. Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques
  21. Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas
  22. Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System
  23. LESSONS LEARNT FROM AN ONLINE PILOT STUDY ABOUT STRATEGIC ALIGNMENT AT A HIGHER EDUCATION INSTITUTION
  24. Attacking Windows Hello for Business: Is It What We Were Promised?
  25. Explainable AI-Based DDOS Attack Identification Method for IoT Networks
  26. Using Social Media & Sentiment Analysis to Make Investment Decisions
  27. Investigating machine learning attacks on financial time series models
  28. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture
  29. GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS
  30. Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)
  31. A security and authentication layer for SCADA/DCS applications
  32. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
  33. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
  34. Towards An SDN Assisted IDS
  35. Programming Languages Usage
  36. Positioning as Service for 5G IoT Networks
  37. A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda
  38. Data Augmentation to Improve the Performance of a Convolutional Neural Network on Image Classification
  39. Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture)
  40. Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM)
  41. Multi-label Classifier to Deal with Misclassification in Non-functional Requirements
  42. Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT
  43. Class Feature Pyramids for Video Explanation
  44. Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions
  45. Granularity Cost Analysis for Function Block as a Service
  46. Authentication Layer for IEC 61113-3 Applications
  47. Personalized Micro-Service Recommendation System for Online News
  48. A Mentoring Platform for Older Adults Supporting the “Live and Learn” Concept
  49. Traffic Sign Recognition based on Synthesised Training Data
  50. Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case
  51. Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid
  52. Building an Adaptive E-Learning System
  53. A service oriented QoS architecture targeting the smart grid world & machine learning aspects
  54. Tolerating partial failures on IEC 61499 applications
  55. Multiply and conquer: A replication framework for building fault tolerant industrial applications
  56. Exploiting voting strategies in partially replicated IEC 61499 applications
  57. The arrowhead approach for SOA application development and documentation
  58. Arrowhead compliant virtual market of energy
  59. Resource Management and Service Deployment in Grids
  60. Enhancing service portability in upcoming 3G UMTS networks & security aspects
  61. A Web-Services Based Architecture for Dynamic-Service Deployment
  62. Proposing a service-enabled semantic grid model
  63. Towards a resource management and service deployment framework
  64. Distributed, service-enabled router architecture
  65. Dynamic Service Deployment using an Ontologybased Description of Devices and Services