All Stories

  1. POSSIBILITIES OF UNAUTHORIZED DATA COLLECTION IN THE SMART HOME ENVIRONMENT
  2. Mishandling of Exceptional Conditions Vulnerability: A Detailed Study
  3. Breaking Barriers: Digital Personal Assistants for the Inclusion of Workers with Disabilities in Production
  4. Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks
  5. Graph Clustering-Based Model for Optimizing the Number of Air Pollution Measurement Stations in Urban Environments
  6. Proactive Detection and Mitigation Strategies for Advanced Persistent Threats
  7. 9th EAI International Conference on Management of Manufacturing Systems
  8. Achieving Economic Sustainability via Low-Cost Automation Techniques: A Novel Study
  9. Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
  10. Enhanced Inception-Aided MobileNet: Optimizing Deep Learning Performance on Resource-Constrained Devices
  11. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  12. Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling
  13. Research on the Impact of Short-Range Technology as Cyber Attack Vector
  14. Evaluation of Supervised Machine Learning Methods in Detection of Phishing Threats
  15. OVERVIEW OF TRAFFIC FORECASTING METHODS IN OPTICAL NETWORKS
  16. A Model of Cloud-Based System for Monitoring Air Quality in Urban Traffic Environment
  17. SARF: Stock Market Prediction with Sentiment-Augmented Random Forest
  18. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  19. Just-in-time Software Distribution in (A)IoT Environments
  20. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  21. Enhancing Industrial IoT Network Security through Blockchain Integration
  22. 8th EAI International Conference on Management of Manufacturing Systems
  23. A Method with Roulette Selection Strategy for Path Planning in UAV-Based Waste Monitoring Systems
  24. A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels
  25. Analyzing the Efficiency of Software Distribution Systems in AIoT Environments
  26. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  27. Role of Blockchain Technology in Supplychain Management
  28. Survey of Cybersecurity Risks in Online Gambling Industry
  29. Internet of Vehicle Moving Objects Detection System for the Rural Road Networks
  30. Systematic Analysis of Quantum Key Distribution Network Simulations Tools and Platforms
  31. Editorial to the Special Issue “Synergies in Smart Technologies and Mobility” MONET Journal
  32. Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies
  33. Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment
  34. DDoS Attack Detection Through Digital Twin Technique in Metaverse
  35. A Novel Attack Detection Technique to Protect AR-Based IoT Devices from DDoS Attacks
  36. Email Spam Detection Using Naive Bayes and Random Forest Classifiers
  37. 6th EAI International Conference on Management of Manufacturing Systems
  38. 7th EAI International Conference on Management of Manufacturing Systems
  39. Cloud computing architecture for evaluating courier driving capability in express courier services
  40. Opportunities of Using Machine Learning Methods in Telecommunications and Industry 4.0 – A Survey
  41. APPLICATION OF THE INTERNET OF THINGS CONCEPT TO INFORM PEOPLE WITH DOWN SYNDROME
  42. Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment
  43. Badoo Android and iOS Dating Application Analysis
  44. Multirole UAVs Supported Parking Surveillance System
  45. An Overview of Smart Home IoT Trends and related Cybersecurity Challenges
  46. Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation
  47. A Novel CNN, Bidirectional Long-Short Term Memory, and Gated Recurrent Unit-Based Hybrid Approach for Human Activity Recognition
  48. A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
  49. End Users and Industry 4.0 Systems Cyber Resilience from XSS Attacks
  50. Modeling the Purchase Process of the InnIoTShop Solution in a Store Environment
  51. Review of algorithms for monitoring urban traffic in smart cities
  52. Boosting-Based DDoS Detection in Internet of Things Systems
  53. Security and Privacy of Cloud-Based Online Online Social Media: A Survey
  54. Spammer Detection Approaches in Online Social Network (OSNs): A Survey
  55. Innovative approaches in technology challenges in the context of industry 4.0
  56. 5th EAI International Conference on Management of Manufacturing Systems
  57. A Model of UAV-Based Waste Monitoring System for Urban Areas
  58. A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)
  59. Advances in Design, Simulation and Manufacturing V
  60. Challenges of Improving the Railway Passenger Information System in the Republic of Croatia
  61. Cybersecurity Validation in the Online Gambling Industry
  62. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
  63. Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
  64. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  65. Machine Learning for Malware Analysis
  66. Sustainable Management of Manufacturing Systems in Industry 4.0
  67. Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  68. Innovations in ICT, management, industrial and materials engineering
  69. ARTIFICIAL INTELLIGENCE APPLICATION IN DIFFERENT SCENARIOS OF THE NETWORKED SOCIETY 5.0 ENVIRONMENT
  70. Security of Cloud-Based Medical Internet of Things (MIoTs)
  71. Novel Classification of IoT Devices Based on Traffic Flow Features
  72. A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
  73. UAV Forensics: DJI Mavic Air Noninvasive Data Extraction and Analysis
  74. Methodology Proposal for Proactive Detection of Network Anomalies in e-Learning System During the COVID-19 Scenario
  75. Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  76. Deep Learning Based Approach for Secure Web of Things (WoT)
  77. Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
  78. Session details: BSCI Session 2
  79. Software architectures in smart manufacturing: Review and experiences
  80. Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0
  81. Privacy Concerns and Trust Issues
  82. A Model for Working Environment Monitoring in Smart Manufacturing
  83. Innovative ecosystem for informing visual impaired person in smart shopping environment: InnIoTShop
  84. Challenges of Industrial Engineering, Management and ICT
  85. A review of optical networking technologies supporting 5G communication infrastructure
  86. Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
  87. Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks
  88. Ensemble machine learning approach for classification of IoT devices in smart home
  89. Analysis of IoT Concept Applications: Smart Home Perspective
  90. Information and Communication Architecture of the Passenger Information System on the Railway Network of the Republic of Croatia
  91. Smart UAV Monitoring System for Parking Supervision
  92. Advances in Design, Simulation and Manufacturing IV
  93. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  94. ANALYSIS OF PRODUCT CONFIGURATORS USED IN THE MASS CUSTOMIZATION PRODUCTION
  95. 4th EAI International Conference on Management of Manufacturing Systems
  96. New Approaches in Management of Smart Manufacturing Systems
  97. Definition of the IoT Device Classes Based on Network Traffic Flow Features
  98. Advances in Design, Simulation and Manufacturing II
  99. Advances in Design, Simulation and Manufacturing III
  100. Business Process Modeling in Industry 4.0 Using Transformation Accelerator Tool
  101. Development and Implementation Possibilities of 5G in Industry 4.0
  102. INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE SOCIETY 5.0 ENVIRONMENT
  103. Identification of the Relevant Parameters for Modeling the Ecosystem Elements in Industry 4.0
  104. An Overview of Distributed Denial of Service Traffic Detection Approaches
  105. Challenges and Issues of ICT in Industry 4.0
  106. Novel approach for detection of IoT generated DDoS traffic
  107. BEACON TECHNOLOGY FOR REAL-TIME INFORMING THE TRAFFIC NETWORK USERS ABOUT THE ENVIRONMENT
  108. Smart Wristband System for Improving Quality of Life for Users in Traffic Environment
  109. Advances in Design, Simulation and Manufacturing
  110. Internet of Things Concept for Informing Visually Impaired Persons in Smart Factory Environments
  111. Analysis of Wireless Routers Vulnerabilities Applied in the Contemporary Networks
  112. Innovative services for informing visually impaired persons in indoor environments
  113. The Impact of Using Modern Information and Communication Equipment and Services on Driving Safety
  114. Information and Communication Technologies Within Industry 4.0 Concept
  115. Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users
  116. Internet of things concept for informing visually impaired persons in indoor environments
  117. Smart Home IoT Traffic Characteristics as a Basis for DDoS Traffic Detection
  118. The impact of Indusi technology on disruption of interoperability in European rail traffic
  119. Proceedings of the 3rd EAI International Conference on Management of Manufacturing Systems
  120. Using mobile devices while driving in Croatia – preliminary analysis
  121. An Overview of the Cyber Security Strategic Management in Republic of Croatia
  122. Network parameters applicable in detection of infrastructure level DDoS attacks
  123. E-Business - State of the Art of ICT Based Challenges and Solutions
  124. Information and Communication System for informing Users in Traffic Environment – SaforA
  125. Model for detection and classification of DDoS traffic based on artificial neural network
  126. Availability Factors in Delivery of Information and Communication Resources to Traffic System Users
  127. 10.18638/rcitd.2016.4.1
  128. Proceedings of The 4th International Virtual Research Conference In Technical Disciplines
  129. Hedonic modeling to explore the relationship of cell phone plan price and quality in Croatia
  130. Artificial neuron network implementation in detection and classification of DDoS traffic
  131. Relevant Affect Factors of Smartphone Mobile Data Traffic
  132. Impact of Sorting Machine on Life Cycle of Passive UHF RFID Tags Placed on Letter Mail
  133. Identification and Prediction of User Behavior Depending on the Context of the Use of Smart Mobile Devices
  134. Laboratory Testing of Active and Passive UHF RFID Tags
  135. Availability Protection of IoT Concept Based Telematics System in Transport
  136. Its Solution in Railway Signalization, Control and Traffic Management
  137. Total Cost of Ownership Model for Three-part Cell Phone Plans
  138. Search and Rescue Radar Transponder under Dynamic Operating Conditions
  139. Possibilities of using Location-based Services in the Public Bicycle Systems
  140. Web for Health
  141. Possibilities of Applying ICT to Improve Safe Movement of Blind and Visually Impaired Persons
  142. Model of guidance for visually impaired persons in the traffic network
  143. Adaptive technologies for the blind and visual impaired persons
  144. Telematics System in Usage Based Motor Insurance
  145. Optimizing Data Traffic Route for Maritime Vessels Communications
  146. Application of the Internet of Things Concept in Carsharing System
  147. IoT infrastructure as a basis for new information services in the ITS environment
  148. Contribution to ECDIS Reliability using Markov Model
  149. Conceptual Model of Providing Traffic Navigation Services to Visually Impaired Persons
  150. Possibilities of Using Speech Recognition Systems of Smart Terminal Devices in Traffic Environment
  151. Interdependence between Inventory Management and Employees’ Satisfaction
  152. Modelling of System for Transport and Traffic Information Management in Republic of Croatia
  153. Cutting Edge Research in New Technologies
  154. Research of Security Threats in the Use of Modern Terminal Devices
  155. The Framework of e-Forensics in the Republic of Croatia
  156. XaaS Services as Modern Infrastructure of ITS
  157. Model of the New LMS Generation with User-Created Content
  158. New Trends in Technologies: Devices, Computer, Communication and Industrial Systems
  159. Possible Collision Avoidance with Off-line Route Selection
  160. Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
  161. Preface
  162. Bandwidth optimization in SLA negotiation process