All Stories

  1. ABusing Social Media and Sentiment Analysis for Stock Market Prediction
  2. DISTIL: Digital Identities for the Evaluation of Job Skills
  3. Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response
  4. Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities
  5. Building a modern data platform based on the data lakehouse architecture and cloud-native ecosystem
  6. Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection
  7. Enhancing Trust in Machine Learning via Adversarial Data Attack Detection using GANs
  8. IEC61131-3 Input Output Hashing Validation
  9. Enhancing Automotive Intrusion Detection Systems with CHERI-Based Memory Protection
  10. Moving Healthcare AI Support Systems for Visually Detectable Diseases to Constrained Devices
  11. DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof
  12. Towards Building a Smart Water Management System (SWAMS) in Nigeria
  13. Broker-Less OPC UA PubSub Communication Model Performance Analysis
  14. Examining the Strength of Three Word Passwords
  15. Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics
  16. Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration
  17. Transforming EU Governance: The Digital Integration Through EBSI and GLASS
  18. Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
  19. Edge NLP for Efficient Machine Translation in Low Connectivity Areas
  20. Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap
  21. Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques
  22. Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas
  23. Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System
  24. LESSONS LEARNT FROM AN ONLINE PILOT STUDY ABOUT STRATEGIC ALIGNMENT AT A HIGHER EDUCATION INSTITUTION
  25. Attacking Windows Hello for Business: Is It What We Were Promised?
  26. Explainable AI-Based DDOS Attack Identification Method for IoT Networks
  27. Using Social Media & Sentiment Analysis to Make Investment Decisions
  28. Investigating machine learning attacks on financial time series models
  29. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture
  30. GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS
  31. Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)
  32. A security and authentication layer for SCADA/DCS applications
  33. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
  34. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
  35. Towards An SDN Assisted IDS
  36. Programming Languages Usage
  37. Positioning as Service for 5G IoT Networks
  38. A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda
  39. Data Augmentation to Improve the Performance of a Convolutional Neural Network on Image Classification
  40. Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture)
  41. Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM)
  42. Multi-label Classifier to Deal with Misclassification in Non-functional Requirements
  43. Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT
  44. Class Feature Pyramids for Video Explanation
  45. Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions
  46. Granularity Cost Analysis for Function Block as a Service
  47. Authentication Layer for IEC 61113-3 Applications
  48. Personalized Micro-Service Recommendation System for Online News
  49. A Mentoring Platform for Older Adults Supporting the “Live and Learn” Concept
  50. Traffic Sign Recognition based on Synthesised Training Data
  51. Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case
  52. Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid
  53. Building an Adaptive E-Learning System
  54. A service oriented QoS architecture targeting the smart grid world & machine learning aspects
  55. Tolerating partial failures on IEC 61499 applications
  56. Multiply and conquer: A replication framework for building fault tolerant industrial applications
  57. Exploiting voting strategies in partially replicated IEC 61499 applications
  58. The arrowhead approach for SOA application development and documentation
  59. Arrowhead compliant virtual market of energy
  60. Resource Management and Service Deployment in Grids
  61. Enhancing service portability in upcoming 3G UMTS networks & security aspects
  62. A Web-Services Based Architecture for Dynamic-Service Deployment
  63. Proposing a service-enabled semantic grid model
  64. Towards a resource management and service deployment framework
  65. Distributed, service-enabled router architecture
  66. Dynamic Service Deployment using an Ontologybased Description of Devices and Services