All Stories

  1. The Possibility of Applying Large Language Models as a Cyberattack Method
  2. POSSIBILITIES OF UNAUTHORIZED DATA COLLECTION IN THE SMART HOME ENVIRONMENT
  3. Mishandling of Exceptional Conditions Vulnerability: A Detailed Study
  4. Threat Modeling: A Developer’s Approach
  5. Breaking Barriers: Digital Personal Assistants for the Inclusion of Workers with Disabilities in Production
  6. Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks
  7. Graph Clustering-Based Model for Optimizing the Number of Air Pollution Measurement Stations in Urban Environments
  8. Proactive Detection and Mitigation Strategies for Advanced Persistent Threats
  9. Urban Mobility and Challenges of Intelligent Transportation Systems
  10. 9th EAI International Conference on Management of Manufacturing Systems
  11. Achieving Economic Sustainability via Low-Cost Automation Techniques: A Novel Study
  12. Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
  13. Enhanced Inception-Aided MobileNet: Optimizing Deep Learning Performance on Resource-Constrained Devices
  14. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  15. Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling
  16. Research on the Impact of Short-Range Technology as Cyber Attack Vector
  17. Evaluation of Supervised Machine Learning Methods in Detection of Phishing Threats
  18. OVERVIEW OF TRAFFIC FORECASTING METHODS IN OPTICAL NETWORKS
  19. A Model of Cloud-Based System for Monitoring Air Quality in Urban Traffic Environment
  20. SARF: Stock Market Prediction with Sentiment-Augmented Random Forest
  21. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  22. Just-in-time Software Distribution in (A)IoT Environments
  23. Modeling a LoRAWAN Network for Vehicle Wildlife Collision Avoidance System on Rural Roads
  24. Enhancing Industrial IoT Network Security through Blockchain Integration
  25. 8th EAI International Conference on Management of Manufacturing Systems
  26. A Method with Roulette Selection Strategy for Path Planning in UAV-Based Waste Monitoring Systems
  27. A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels
  28. Analyzing the Efficiency of Software Distribution Systems in AIoT Environments
  29. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  30. Role of Blockchain Technology in Supplychain Management
  31. Survey of Cybersecurity Risks in Online Gambling Industry
  32. Internet of Vehicle Moving Objects Detection System for the Rural Road Networks
  33. Systematic Analysis of Quantum Key Distribution Network Simulations Tools and Platforms
  34. Editorial to the Special Issue “Synergies in Smart Technologies and Mobility” MONET Journal
  35. Energy-Efficient Edge Intelligence: A Comparative Analysis of AIoT Technologies
  36. Deadline-Aware Task Offloading and Resource Allocation in a Secure Fog-Cloud Environment
  37. DDoS Attack Detection Through Digital Twin Technique in Metaverse
  38. A Novel Attack Detection Technique to Protect AR-Based IoT Devices from DDoS Attacks
  39. Email Spam Detection Using Naive Bayes and Random Forest Classifiers
  40. 6th EAI International Conference on Management of Manufacturing Systems
  41. 7th EAI International Conference on Management of Manufacturing Systems
  42. Cloud computing architecture for evaluating courier driving capability in express courier services
  43. Opportunities of Using Machine Learning Methods in Telecommunications and Industry 4.0 – A Survey
  44. APPLICATION OF THE INTERNET OF THINGS CONCEPT TO INFORM PEOPLE WITH DOWN SYNDROME
  45. Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment
  46. Badoo Android and iOS Dating Application Analysis
  47. Multirole UAVs Supported Parking Surveillance System
  48. An Overview of Smart Home IoT Trends and related Cybersecurity Challenges
  49. Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation
  50. A Novel CNN, Bidirectional Long-Short Term Memory, and Gated Recurrent Unit-Based Hybrid Approach for Human Activity Recognition
  51. A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
  52. End Users and Industry 4.0 Systems Cyber Resilience from XSS Attacks
  53. Modeling the Purchase Process of the InnIoTShop Solution in a Store Environment
  54. Review of algorithms for monitoring urban traffic in smart cities
  55. Boosting-Based DDoS Detection in Internet of Things Systems
  56. Security and Privacy of Cloud-Based Online Online Social Media: A Survey
  57. Spammer Detection Approaches in Online Social Network (OSNs): A Survey
  58. Innovative approaches in technology challenges in the context of industry 4.0
  59. 5th EAI International Conference on Management of Manufacturing Systems
  60. A Model of UAV-Based Waste Monitoring System for Urban Areas
  61. A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)
  62. Advances in Design, Simulation and Manufacturing V
  63. Challenges of Improving the Railway Passenger Information System in the Republic of Croatia
  64. Cybersecurity Validation in the Online Gambling Industry
  65. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
  66. Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
  67. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  68. Machine Learning for Malware Analysis
  69. Sustainable Management of Manufacturing Systems in Industry 4.0
  70. Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  71. Innovations in ICT, management, industrial and materials engineering
  72. ARTIFICIAL INTELLIGENCE APPLICATION IN DIFFERENT SCENARIOS OF THE NETWORKED SOCIETY 5.0 ENVIRONMENT
  73. Security of Cloud-Based Medical Internet of Things (MIoTs)
  74. Novel Classification of IoT Devices Based on Traffic Flow Features
  75. A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
  76. UAV Forensics: DJI Mavic Air Noninvasive Data Extraction and Analysis
  77. Methodology Proposal for Proactive Detection of Network Anomalies in e-Learning System During the COVID-19 Scenario
  78. Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
  79. Deep Learning Based Approach for Secure Web of Things (WoT)
  80. Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
  81. Session details: BSCI Session 2
  82. Software architectures in smart manufacturing: Review and experiences
  83. Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0
  84. Privacy Concerns and Trust Issues
  85. A Model for Working Environment Monitoring in Smart Manufacturing
  86. Innovative ecosystem for informing visual impaired person in smart shopping environment: InnIoTShop
  87. Challenges of Industrial Engineering, Management and ICT
  88. A review of optical networking technologies supporting 5G communication infrastructure
  89. Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
  90. Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks
  91. Ensemble machine learning approach for classification of IoT devices in smart home
  92. Analysis of IoT Concept Applications: Smart Home Perspective
  93. Information and Communication Architecture of the Passenger Information System on the Railway Network of the Republic of Croatia
  94. Smart UAV Monitoring System for Parking Supervision
  95. Advances in Design, Simulation and Manufacturing IV
  96. Future Access Enablers for Ubiquitous and Intelligent Infrastructures
  97. ANALYSIS OF PRODUCT CONFIGURATORS USED IN THE MASS CUSTOMIZATION PRODUCTION
  98. 4th EAI International Conference on Management of Manufacturing Systems
  99. New Approaches in Management of Smart Manufacturing Systems
  100. Definition of the IoT Device Classes Based on Network Traffic Flow Features
  101. Advances in Design, Simulation and Manufacturing II
  102. Advances in Design, Simulation and Manufacturing III
  103. Business Process Modeling in Industry 4.0 Using Transformation Accelerator Tool
  104. Development and Implementation Possibilities of 5G in Industry 4.0
  105. INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE SOCIETY 5.0 ENVIRONMENT
  106. Identification of the Relevant Parameters for Modeling the Ecosystem Elements in Industry 4.0
  107. An Overview of Distributed Denial of Service Traffic Detection Approaches
  108. Challenges and Issues of ICT in Industry 4.0
  109. Novel approach for detection of IoT generated DDoS traffic
  110. BEACON TECHNOLOGY FOR REAL-TIME INFORMING THE TRAFFIC NETWORK USERS ABOUT THE ENVIRONMENT
  111. Smart Wristband System for Improving Quality of Life for Users in Traffic Environment
  112. Advances in Design, Simulation and Manufacturing
  113. Internet of Things Concept for Informing Visually Impaired Persons in Smart Factory Environments
  114. Analysis of Wireless Routers Vulnerabilities Applied in the Contemporary Networks
  115. Innovative services for informing visually impaired persons in indoor environments
  116. The Impact of Using Modern Information and Communication Equipment and Services on Driving Safety
  117. Information and Communication Technologies Within Industry 4.0 Concept
  118. Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users
  119. Internet of things concept for informing visually impaired persons in indoor environments
  120. Smart Home IoT Traffic Characteristics as a Basis for DDoS Traffic Detection
  121. The impact of Indusi technology on disruption of interoperability in European rail traffic
  122. Proceedings of the 3rd EAI International Conference on Management of Manufacturing Systems
  123. Using mobile devices while driving in Croatia – preliminary analysis
  124. An Overview of the Cyber Security Strategic Management in Republic of Croatia
  125. Network parameters applicable in detection of infrastructure level DDoS attacks
  126. E-Business - State of the Art of ICT Based Challenges and Solutions
  127. Information and Communication System for informing Users in Traffic Environment – SaforA
  128. Model for detection and classification of DDoS traffic based on artificial neural network
  129. Availability Factors in Delivery of Information and Communication Resources to Traffic System Users
  130. 10.18638/rcitd.2016.4.1
  131. Proceedings of The 4th International Virtual Research Conference In Technical Disciplines
  132. Hedonic modeling to explore the relationship of cell phone plan price and quality in Croatia
  133. Artificial neuron network implementation in detection and classification of DDoS traffic
  134. Relevant Affect Factors of Smartphone Mobile Data Traffic
  135. Impact of Sorting Machine on Life Cycle of Passive UHF RFID Tags Placed on Letter Mail
  136. Identification and Prediction of User Behavior Depending on the Context of the Use of Smart Mobile Devices
  137. Laboratory Testing of Active and Passive UHF RFID Tags
  138. Availability Protection of IoT Concept Based Telematics System in Transport
  139. Its Solution in Railway Signalization, Control and Traffic Management
  140. Total Cost of Ownership Model for Three-part Cell Phone Plans
  141. Search and Rescue Radar Transponder under Dynamic Operating Conditions
  142. Possibilities of using Location-based Services in the Public Bicycle Systems
  143. Web for Health
  144. Possibilities of Applying ICT to Improve Safe Movement of Blind and Visually Impaired Persons
  145. Model of guidance for visually impaired persons in the traffic network
  146. Adaptive technologies for the blind and visual impaired persons
  147. Telematics System in Usage Based Motor Insurance
  148. Optimizing Data Traffic Route for Maritime Vessels Communications
  149. Application of the Internet of Things Concept in Carsharing System
  150. IoT infrastructure as a basis for new information services in the ITS environment
  151. Contribution to ECDIS Reliability using Markov Model
  152. Conceptual Model of Providing Traffic Navigation Services to Visually Impaired Persons
  153. Possibilities of Using Speech Recognition Systems of Smart Terminal Devices in Traffic Environment
  154. Interdependence between Inventory Management and Employees’ Satisfaction
  155. Modelling of System for Transport and Traffic Information Management in Republic of Croatia
  156. Cutting Edge Research in New Technologies
  157. Research of Security Threats in the Use of Modern Terminal Devices
  158. The Framework of e-Forensics in the Republic of Croatia
  159. XaaS Services as Modern Infrastructure of ITS
  160. Model of the New LMS Generation with User-Created Content
  161. New Trends in Technologies: Devices, Computer, Communication and Industrial Systems
  162. Possible Collision Avoidance with Off-line Route Selection
  163. Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
  164. Preface
  165. Bandwidth optimization in SLA negotiation process