All Stories

  1. POSSIBILITIES OF UNAUTHORIZED DATA COLLECTION IN THE SMART HOME ENVIRONMENT
  2. Mishandling of Exceptional Conditions Vulnerability: A Detailed Study
  3. Threat Modeling: A Developer’s Approach
  4. Breaking Barriers: Digital Personal Assistants for the Inclusion of Workers with Disabilities in Production
  5. Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks
  6. Graph Clustering-Based Model for Optimizing the Number of Air Pollution Measurement Stations in Urban Environments
  7. Proactive Detection and Mitigation Strategies for Advanced Persistent Threats
  8. Urban Mobility and Challenges of Intelligent Transportation Systems
  9. 9th EAI International Conference on Management of Manufacturing Systems
  10. Achieving Economic Sustainability via Low-Cost Automation Techniques: A Novel Study
  11. Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
  12. Enhanced Inception-Aided MobileNet: Optimizing Deep Learning Performance on Resource-Constrained Devices
  13. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  14. Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling
  15. Research on the Impact of Short-Range Technology as Cyber Attack Vector
  16. Evaluation of Supervised Machine Learning Methods in Detection of Phishing Threats
  17. OVERVIEW OF TRAFFIC FORECASTING METHODS IN OPTICAL NETWORKS
  18. A Model of Cloud-Based System for Monitoring Air Quality in Urban Traffic Environment
  19. SARF: Stock Market Prediction with Sentiment-Augmented Random Forest
  20. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  21. Just-in-time Software Distribution in (A)IoT Environments
  22. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  23. Enhancing Industrial IoT Network Security through Blockchain Integration
  24. 8th EAI International Conference on Management of Manufacturing Systems
  25. A Method with Roulette Selection Strategy for Path Planning in UAV-Based Waste Monitoring Systems
  26. A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels
  27. Analyzing the Efficiency of Software Distribution Systems in AIoT Environments
  28. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  29. Role of Blockchain Technology in Supplychain Management
  30. Survey of Cybersecurity Risks in Online Gambling Industry
  31. Internet of Vehicle Moving Objects Detection System for the Rural Road Networks
  32. Systematic Analysis of Quantum Key Distribution Network Simulations Tools and Platforms
  33. Editorial to the Special Issue “Synergies in Smart Technologies and Mobility” MONET Journal
  34. Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies
  35. Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment
  36. DDoS Attack Detection Through Digital Twin Technique in Metaverse
  37. A Novel Attack Detection Technique to Protect AR-Based IoT Devices from DDoS Attacks
  38. Email Spam Detection Using Naive Bayes and Random Forest Classifiers
  39. 6th EAI International Conference on Management of Manufacturing Systems
  40. 7th EAI International Conference on Management of Manufacturing Systems
  41. Cloud computing architecture for evaluating courier driving capability in express courier services
  42. Opportunities of Using Machine Learning Methods in Telecommunications and Industry 4.0 – A Survey
  43. APPLICATION OF THE INTERNET OF THINGS CONCEPT TO INFORM PEOPLE WITH DOWN SYNDROME
  44. Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment
  45. Badoo Android and iOS Dating Application Analysis
  46. Multirole UAVs Supported Parking Surveillance System
  47. An Overview of Smart Home IoT Trends and related Cybersecurity Challenges
  48. Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation
  49. A Novel CNN, Bidirectional Long-Short Term Memory, and Gated Recurrent Unit-Based Hybrid Approach for Human Activity Recognition
  50. A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
  51. End Users and Industry 4.0 Systems Cyber Resilience from XSS Attacks
  52. Modeling the Purchase Process of the InnIoTShop Solution in a Store Environment
  53. Review of algorithms for monitoring urban traffic in smart cities
  54. Boosting-Based DDoS Detection in Internet of Things Systems
  55. Security and Privacy of Cloud-Based Online Online Social Media: A Survey
  56. Spammer Detection Approaches in Online Social Network (OSNs): A Survey
  57. Innovative approaches in technology challenges in the context of industry 4.0
  58. 5th EAI International Conference on Management of Manufacturing Systems
  59. A Model of UAV-Based Waste Monitoring System for Urban Areas
  60. A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)
  61. Advances in Design, Simulation and Manufacturing V
  62. Challenges of Improving the Railway Passenger Information System in the Republic of Croatia
  63. Cybersecurity Validation in the Online Gambling Industry
  64. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
  65. Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
  66. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  67. Machine Learning for Malware Analysis
  68. Sustainable Management of Manufacturing Systems in Industry 4.0
  69. Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  70. Innovations in ICT, management, industrial and materials engineering
  71. ARTIFICIAL INTELLIGENCE APPLICATION IN DIFFERENT SCENARIOS OF THE NETWORKED SOCIETY 5.0 ENVIRONMENT
  72. Security of Cloud-Based Medical Internet of Things (MIoTs)
  73. Novel Classification of IoT Devices Based on Traffic Flow Features
  74. A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
  75. UAV Forensics: DJI Mavic Air Noninvasive Data Extraction and Analysis
  76. Methodology Proposal for Proactive Detection of Network Anomalies in e-Learning System During the COVID-19 Scenario
  77. Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  78. Deep Learning Based Approach for Secure Web of Things (WoT)
  79. Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
  80. Session details: BSCI Session 2
  81. Software architectures in smart manufacturing: Review and experiences
  82. Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0
  83. Privacy Concerns and Trust Issues
  84. A Model for Working Environment Monitoring in Smart Manufacturing
  85. Innovative ecosystem for informing visual impaired person in smart shopping environment: InnIoTShop
  86. Challenges of Industrial Engineering, Management and ICT
  87. A review of optical networking technologies supporting 5G communication infrastructure
  88. Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
  89. Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks
  90. Ensemble machine learning approach for classification of IoT devices in smart home
  91. Analysis of IoT Concept Applications: Smart Home Perspective
  92. Information and Communication Architecture of the Passenger Information System on the Railway Network of the Republic of Croatia
  93. Smart UAV Monitoring System for Parking Supervision
  94. Advances in Design, Simulation and Manufacturing IV
  95. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  96. ANALYSIS OF PRODUCT CONFIGURATORS USED IN THE MASS CUSTOMIZATION PRODUCTION
  97. 4th EAI International Conference on Management of Manufacturing Systems
  98. New Approaches in Management of Smart Manufacturing Systems
  99. Definition of the IoT Device Classes Based on Network Traffic Flow Features
  100. Advances in Design, Simulation and Manufacturing II
  101. Advances in Design, Simulation and Manufacturing III
  102. Business Process Modeling in Industry 4.0 Using Transformation Accelerator Tool
  103. Development and Implementation Possibilities of 5G in Industry 4.0
  104. INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE SOCIETY 5.0 ENVIRONMENT
  105. Identification of the Relevant Parameters for Modeling the Ecosystem Elements in Industry 4.0
  106. An Overview of Distributed Denial of Service Traffic Detection Approaches
  107. Challenges and Issues of ICT in Industry 4.0
  108. Novel approach for detection of IoT generated DDoS traffic
  109. BEACON TECHNOLOGY FOR REAL-TIME INFORMING THE TRAFFIC NETWORK USERS ABOUT THE ENVIRONMENT
  110. Smart Wristband System for Improving Quality of Life for Users in Traffic Environment
  111. Advances in Design, Simulation and Manufacturing
  112. Internet of Things Concept for Informing Visually Impaired Persons in Smart Factory Environments
  113. Analysis of Wireless Routers Vulnerabilities Applied in the Contemporary Networks
  114. Innovative services for informing visually impaired persons in indoor environments
  115. The Impact of Using Modern Information and Communication Equipment and Services on Driving Safety
  116. Information and Communication Technologies Within Industry 4.0 Concept
  117. Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users
  118. Internet of things concept for informing visually impaired persons in indoor environments
  119. Smart Home IoT Traffic Characteristics as a Basis for DDoS Traffic Detection
  120. The impact of Indusi technology on disruption of interoperability in European rail traffic
  121. Proceedings of the 3rd EAI International Conference on Management of Manufacturing Systems
  122. Using mobile devices while driving in Croatia – preliminary analysis
  123. An Overview of the Cyber Security Strategic Management in Republic of Croatia
  124. Network parameters applicable in detection of infrastructure level DDoS attacks
  125. E-Business - State of the Art of ICT Based Challenges and Solutions
  126. Information and Communication System for informing Users in Traffic Environment – SaforA
  127. Model for detection and classification of DDoS traffic based on artificial neural network
  128. Availability Factors in Delivery of Information and Communication Resources to Traffic System Users
  129. 10.18638/rcitd.2016.4.1
  130. Proceedings of The 4th International Virtual Research Conference In Technical Disciplines
  131. Hedonic modeling to explore the relationship of cell phone plan price and quality in Croatia
  132. Artificial neuron network implementation in detection and classification of DDoS traffic
  133. Relevant Affect Factors of Smartphone Mobile Data Traffic
  134. Impact of Sorting Machine on Life Cycle of Passive UHF RFID Tags Placed on Letter Mail
  135. Identification and Prediction of User Behavior Depending on the Context of the Use of Smart Mobile Devices
  136. Laboratory Testing of Active and Passive UHF RFID Tags
  137. Availability Protection of IoT Concept Based Telematics System in Transport
  138. Its Solution in Railway Signalization, Control and Traffic Management
  139. Total Cost of Ownership Model for Three-part Cell Phone Plans
  140. Search and Rescue Radar Transponder under Dynamic Operating Conditions
  141. Possibilities of using Location-based Services in the Public Bicycle Systems
  142. Web for Health
  143. Possibilities of Applying ICT to Improve Safe Movement of Blind and Visually Impaired Persons
  144. Model of guidance for visually impaired persons in the traffic network
  145. Adaptive technologies for the blind and visual impaired persons
  146. Telematics System in Usage Based Motor Insurance
  147. Optimizing Data Traffic Route for Maritime Vessels Communications
  148. Application of the Internet of Things Concept in Carsharing System
  149. IoT infrastructure as a basis for new information services in the ITS environment
  150. Contribution to ECDIS Reliability using Markov Model
  151. Conceptual Model of Providing Traffic Navigation Services to Visually Impaired Persons
  152. Possibilities of Using Speech Recognition Systems of Smart Terminal Devices in Traffic Environment
  153. Interdependence between Inventory Management and Employees’ Satisfaction
  154. Modelling of System for Transport and Traffic Information Management in Republic of Croatia
  155. Cutting Edge Research in New Technologies
  156. Research of Security Threats in the Use of Modern Terminal Devices
  157. The Framework of e-Forensics in the Republic of Croatia
  158. XaaS Services as Modern Infrastructure of ITS
  159. Model of the New LMS Generation with User-Created Content
  160. New Trends in Technologies: Devices, Computer, Communication and Industrial Systems
  161. Possible Collision Avoidance with Off-line Route Selection
  162. Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
  163. Preface
  164. Bandwidth optimization in SLA negotiation process