All Stories

  1. POSSIBILITIES OF UNAUTHORIZED DATA COLLECTION IN THE SMART HOME ENVIRONMENT
  2. Breaking Barriers: Digital Personal Assistants for the Inclusion of Workers with Disabilities in Production
  3. Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks
  4. Graph Clustering-Based Model for Optimizing the Number of Air Pollution Measurement Stations in Urban Environments
  5. Proactive Detection and Mitigation Strategies for Advanced Persistent Threats
  6. 9th EAI International Conference on Management of Manufacturing Systems
  7. Achieving Economic Sustainability via Low-Cost Automation Techniques: A Novel Study
  8. Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
  9. Enhanced Inception-Aided MobileNet: Optimizing Deep Learning Performance on Resource-Constrained Devices
  10. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  11. Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling
  12. Research on the Impact of Short-Range Technology as Cyber Attack Vector
  13. OVERVIEW OF TRAFFIC FORECASTING METHODS IN OPTICAL NETWORKS
  14. A Model of Cloud-Based System for Monitoring Air Quality in Urban Traffic Environment
  15. SARF: Stock Market Prediction with Sentiment-Augmented Random Forest
  16. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  17. Just-in-time Software Distribution in (A)IoT Environments
  18. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  19. Enhancing Industrial IoT Network Security through Blockchain Integration
  20. 8th EAI International Conference on Management of Manufacturing Systems
  21. A Method with Roulette Selection Strategy for Path Planning in UAV-Based Waste Monitoring Systems
  22. A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels
  23. Analyzing the Efficiency of Software Distribution Systems in AIoT Environments
  24. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  25. Role of Blockchain Technology in Supplychain Management
  26. Survey of Cybersecurity Risks in Online Gambling Industry
  27. Internet of Vehicle Moving Objects Detection System for the Rural Road Networks
  28. Systematic Analysis of Quantum Key Distribution Network Simulations Tools and Platforms
  29. Editorial to the Special Issue “Synergies in Smart Technologies and Mobility” MONET Journal
  30. Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies
  31. Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment
  32. DDoS Attack Detection Through Digital Twin Technique in Metaverse
  33. A Novel Attack Detection Technique to Protect AR-Based IoT Devices from DDoS Attacks
  34. Email Spam Detection Using Naive Bayes and Random Forest Classifiers
  35. 6th EAI International Conference on Management of Manufacturing Systems
  36. 7th EAI International Conference on Management of Manufacturing Systems
  37. Cloud computing architecture for evaluating courier driving capability in express courier services
  38. Opportunities of Using Machine Learning Methods in Telecommunications and Industry 4.0 – A Survey
  39. APPLICATION OF THE INTERNET OF THINGS CONCEPT TO INFORM PEOPLE WITH DOWN SYNDROME
  40. Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment
  41. Badoo Android and iOS Dating Application Analysis
  42. Multirole UAVs Supported Parking Surveillance System
  43. An Overview of Smart Home IoT Trends and related Cybersecurity Challenges
  44. Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation
  45. A Novel CNN, Bidirectional Long-Short Term Memory, and Gated Recurrent Unit-Based Hybrid Approach for Human Activity Recognition
  46. A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
  47. End Users and Industry 4.0 Systems Cyber Resilience from XSS Attacks
  48. Modeling the Purchase Process of the InnIoTShop Solution in a Store Environment
  49. Review of algorithms for monitoring urban traffic in smart cities
  50. Boosting-Based DDoS Detection in Internet of Things Systems
  51. Security and Privacy of Cloud-Based Online Online Social Media: A Survey
  52. Spammer Detection Approaches in Online Social Network (OSNs): A Survey
  53. Innovative approaches in technology challenges in the context of industry 4.0
  54. 5th EAI International Conference on Management of Manufacturing Systems
  55. A Model of UAV-Based Waste Monitoring System for Urban Areas
  56. A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)
  57. Advances in Design, Simulation and Manufacturing V
  58. Challenges of Improving the Railway Passenger Information System in the Republic of Croatia
  59. Cybersecurity Validation in the Online Gambling Industry
  60. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
  61. Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
  62. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  63. Machine Learning for Malware Analysis
  64. Sustainable Management of Manufacturing Systems in Industry 4.0
  65. Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  66. Innovations in ICT, management, industrial and materials engineering
  67. ARTIFICIAL INTELLIGENCE APPLICATION IN DIFFERENT SCENARIOS OF THE NETWORKED SOCIETY 5.0 ENVIRONMENT
  68. Security of Cloud-Based Medical Internet of Things (MIoTs)
  69. Novel Classification of IoT Devices Based on Traffic Flow Features
  70. A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
  71. UAV Forensics: DJI Mavic Air Noninvasive Data Extraction and Analysis
  72. Methodology Proposal for Proactive Detection of Network Anomalies in e-Learning System During the COVID-19 Scenario
  73. Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  74. Deep Learning Based Approach for Secure Web of Things (WoT)
  75. Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
  76. Session details: BSCI Session 2
  77. Software architectures in smart manufacturing: Review and experiences
  78. Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0
  79. Privacy Concerns and Trust Issues
  80. A Model for Working Environment Monitoring in Smart Manufacturing
  81. Innovative ecosystem for informing visual impaired person in smart shopping environment: InnIoTShop
  82. Challenges of Industrial Engineering, Management and ICT
  83. A review of optical networking technologies supporting 5G communication infrastructure
  84. Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
  85. Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks
  86. Ensemble machine learning approach for classification of IoT devices in smart home
  87. Analysis of IoT Concept Applications: Smart Home Perspective
  88. Information and Communication Architecture of the Passenger Information System on the Railway Network of the Republic of Croatia
  89. Smart UAV Monitoring System for Parking Supervision
  90. Advances in Design, Simulation and Manufacturing IV
  91. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  92. ANALYSIS OF PRODUCT CONFIGURATORS USED IN THE MASS CUSTOMIZATION PRODUCTION
  93. 4th EAI International Conference on Management of Manufacturing Systems
  94. New Approaches in Management of Smart Manufacturing Systems
  95. Definition of the IoT Device Classes Based on Network Traffic Flow Features
  96. Advances in Design, Simulation and Manufacturing II
  97. Advances in Design, Simulation and Manufacturing III
  98. Business Process Modeling in Industry 4.0 Using Transformation Accelerator Tool
  99. Development and Implementation Possibilities of 5G in Industry 4.0
  100. INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE SOCIETY 5.0 ENVIRONMENT
  101. Identification of the Relevant Parameters for Modeling the Ecosystem Elements in Industry 4.0
  102. An Overview of Distributed Denial of Service Traffic Detection Approaches
  103. Challenges and Issues of ICT in Industry 4.0
  104. Novel approach for detection of IoT generated DDoS traffic
  105. BEACON TECHNOLOGY FOR REAL-TIME INFORMING THE TRAFFIC NETWORK USERS ABOUT THE ENVIRONMENT
  106. Smart Wristband System for Improving Quality of Life for Users in Traffic Environment
  107. Advances in Design, Simulation and Manufacturing
  108. Internet of Things Concept for Informing Visually Impaired Persons in Smart Factory Environments
  109. Analysis of Wireless Routers Vulnerabilities Applied in the Contemporary Networks
  110. Innovative services for informing visually impaired persons in indoor environments
  111. The Impact of Using Modern Information and Communication Equipment and Services on Driving Safety
  112. Information and Communication Technologies Within Industry 4.0 Concept
  113. Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users
  114. Internet of things concept for informing visually impaired persons in indoor environments
  115. Smart Home IoT Traffic Characteristics as a Basis for DDoS Traffic Detection
  116. The impact of Indusi technology on disruption of interoperability in European rail traffic
  117. Proceedings of the 3rd EAI International Conference on Management of Manufacturing Systems
  118. Using mobile devices while driving in Croatia – preliminary analysis
  119. An Overview of the Cyber Security Strategic Management in Republic of Croatia
  120. Network parameters applicable in detection of infrastructure level DDoS attacks
  121. E-Business - State of the Art of ICT Based Challenges and Solutions
  122. Information and Communication System for informing Users in Traffic Environment – SaforA
  123. Model for detection and classification of DDoS traffic based on artificial neural network
  124. Availability Factors in Delivery of Information and Communication Resources to Traffic System Users
  125. 10.18638/rcitd.2016.4.1
  126. Proceedings of The 4th International Virtual Research Conference In Technical Disciplines
  127. Hedonic modeling to explore the relationship of cell phone plan price and quality in Croatia
  128. Artificial neuron network implementation in detection and classification of DDoS traffic
  129. Relevant Affect Factors of Smartphone Mobile Data Traffic
  130. Impact of Sorting Machine on Life Cycle of Passive UHF RFID Tags Placed on Letter Mail
  131. Identification and Prediction of User Behavior Depending on the Context of the Use of Smart Mobile Devices
  132. Laboratory Testing of Active and Passive UHF RFID Tags
  133. Availability Protection of IoT Concept Based Telematics System in Transport
  134. Its Solution in Railway Signalization, Control and Traffic Management
  135. Total Cost of Ownership Model for Three-part Cell Phone Plans
  136. Search and Rescue Radar Transponder under Dynamic Operating Conditions
  137. Possibilities of using Location-based Services in the Public Bicycle Systems
  138. Web for Health
  139. Possibilities of Applying ICT to Improve Safe Movement of Blind and Visually Impaired Persons
  140. Model of guidance for visually impaired persons in the traffic network
  141. Adaptive technologies for the blind and visual impaired persons
  142. Telematics System in Usage Based Motor Insurance
  143. Optimizing Data Traffic Route for Maritime Vessels Communications
  144. Application of the Internet of Things Concept in Carsharing System
  145. IoT infrastructure as a basis for new information services in the ITS environment
  146. Contribution to ECDIS Reliability using Markov Model
  147. Conceptual Model of Providing Traffic Navigation Services to Visually Impaired Persons
  148. Possibilities of Using Speech Recognition Systems of Smart Terminal Devices in Traffic Environment
  149. Interdependence between Inventory Management and Employees’ Satisfaction
  150. Modelling of System for Transport and Traffic Information Management in Republic of Croatia
  151. Cutting Edge Research in New Technologies
  152. Research of Security Threats in the Use of Modern Terminal Devices
  153. The Framework of e-Forensics in the Republic of Croatia
  154. XaaS Services as Modern Infrastructure of ITS
  155. Model of the New LMS Generation with User-Created Content
  156. New Trends in Technologies: Devices, Computer, Communication and Industrial Systems
  157. Possible Collision Avoidance with Off-line Route Selection
  158. Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
  159. Preface
  160. Bandwidth optimization in SLA negotiation process