default search action
FTC 2022: Virtual Event
- Kohei Arai:
Proceedings of the Future Technologies Conference, FTC 2022, Virtual Event, 20-21 October 2022, Volume 2. Lecture Notes in Networks and Systems 560, Springer 2023, ISBN 978-3-031-18457-4 - Janei Elliston, Hongmei Chi, Shonda Bernadin, Maryam Taeb
:
Integrating Blockchain Technology into Cybersecurity Education. 1-15 - Mahmoud Abdulaziz Elsayed Yousef
:
Developing and Implementing Blockchain Identity Management to Verify Students' Certifications and Data (VeriOn). 16-35 - Kushal Soni, Olga De Troyer:
Specifying Blockchain-Based Resource-Exchange Systems by Business-Level Users Using a Generic Easy-To-Use Framework. 36-54 - Vasanth Iyer, Asif Mehmood, Baniya Babu, Yenumula B. Reddy:
Spatial Blockchain: Smart Contract Using Multiple Camera Censuses. 55-66 - DongMei Xing:
Local Adjustment Strategy of Aggregation Tree Based on Energy Sensitivity. 67-77 - Chia-Yin Yu
:
Design and Usability of an Information Interface for Bird Species Endemic to Taiwan. 78-91 - Mohammad Tanvir Kawser, Zebun Nasreen Ahmed:
Dependency of Indoor Delay Spread and Path Loss on 5G and 6G Frequencies and Its Simple Formulation. 92-105 - Pierre Boulanger:
Is Free-Viewpoint Video the Future of Online TV? 106-119 - Megan Cackett, Laura Fulton, David Pearl
:
Sound as an Interface, Methods to Evaluate Voice User Interface (VUI) Experiences in Various Contexts. 120-129 - Alaa Hassan:
Implementation of Lightweight Cryptographic Algorithms in IoT Devices and Sensor Networks. 130-146 - Matthew Chun, Stefan Weber, Hitesh Tewari:
A Lightweight Encryption Scheme for IoT Devices in the Fog. 147-161 - Hadi Ashraf Raja
, Toomas Vaimann
, Anton Rassõlkin, Ants Kallaste:
Condition Monitoring and Fault Detection for Electrical Machines Using IOT. 162-173 - Hameed Almubark, Omar Masmali:
The Awareness of Internet of Things (IoT) Privacy Risk: A Survey Study. 174-190 - S. K. Arun, I. N. Anida, J. S. Norbakyah, A. R. Salisa:
A New Approach of IoT Implementation for Driving Cycle Tracking Device (DC-TRAD). 191-201 - Matthew Moore, Kristen R. Walcott:
Generating Human-Like Motion to Defeat Interaction-Based CAPTCHAs. 202-217 - Alaa Hassan:
Internet of Things (IoT) and Its Empowering Applications. 218-232 - Kelvin N. Lawal, Titus K. Olaniyi
, Ryan M. Gibson:
A Fog Computing-Based Efficient Data Management Smart Home Architecture. 233-257 - Sk Alamgir Hossain, Md. Anisur Rahman, M. Anwar Hossain
:
S-Image (Situation Image): A New Technique for Data Aggregation in Cloud Server for IoT Based Smart City. 258-273 - Mona Alotaibi
, Mike Joy
:
Internet of Things Support System for Diabetic Students: An Exploratory Study. 274-283 - Federico Hahn, Fermín Martinez:
WSN System Warns "Atta Cephalotes" Climbing in Mango Fruit Trees. 284-296 - Alaa Hassan:
State-of-the-Art Lightweight Cryptographic Protocols for IoT Networks. 297-310 - E. Ortiz Ruiz:
Cybernetic Risk Management for Methodological Model of NIST-Based to Prevent Cybercrime Approach in Organizations. 311-325 - Neiler W. Pérez-Díaz, Jorge O. Chinchay-Maldonado, Heber I. Mejía-Cabrera, David E. Bances-Saavedra, Jaime A. Bravo-Ruiz
:
Ransomware Identification Through Sandbox Environment. 326-335 - Yuri Bobbert:
On the Empirical Validation of a Zero Trust Security Framework via Group Support System Research. 336-353 - Sreejith Gopinath
, Aspen Olmsted:
Safeguarding National Security Interests Utilizing Location-Aware Camera Devices. 354-371 - Roger Zhang, Abubakar Bello, Jeffrey L. Foster
:
BYOD Security: Using Dual Process Theory to Adapt Effective Security Habits in BYOD. 372-386 - Abdirahman Mohamed, Ayobami Esther Olanrewaju, Christopher Dare, Mercyleen Tanui, Fonyuy Boris Lami:
State of Security and Privacy Practices of Top Websites in the East African Community (EAC). 387-398 - Arij Alfaidi, Sudhanshu Semwal:
Analyzing Secure Protocol for Majority Based Pairing in Attribute Chameleon Hash Consensus. 399-414 - Nataliya Kosmyna, Arnav Balyan, Eugene Hauptmann:
Decoding Visual Imagery Using EEG/EOG Glasses: A Pilot Study. 415-432 - Nataliya Kosmyna, Arnav Balyan, Eugene Hauptmann:
Target Speaker Detection with EEG/EOG Glasses: A Pilot Study. 433-446 - Daniel Peters, Florian Thiel:
e-Voting: I Changed My Mind, Now What? 447-466 - Ivo Tasevski, Viktorija Nikolovska, Anastasija Petrova, Jovana Dobreva, Aleksandra Popovska-Mitrovikj, Vesna Dimitrova:
StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images. 467-485 - Abdelfateh Rahmouni, Saliha Oukid, Yasmina Ghebghoub:
Upgrade SecSLA Using Security as a Service Based on Knowledge Graph. 486-498 - Anteneh Girma, Michelle A. Guo, John Irungu
:
Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System (OS) of Mobile Devices. 499-513 - Abdulmonem Alshahrani
, John A. Clark:
On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary Algorithm. 514-535 - Andrew K. Blaskovic, John-David Rusk, Victor C. Parker, Bryson R. Payne
:
Cybercrime and Intellectual Property Theft: An Analysis of Modern Digital Forensics. 536-542 - Henoc Soude, Bill Padonou, Charly Agboton:
Resource Oriented Programming: Design Pattern for Describing Restful Service Composition. 543-560 - Ian Gonsher, Daniel Rapoport, Alice Marbach, Dana Kurniawan, Seth Eiseman, Emily Zhang, Amy Qu, Mikey Abela, Xinru Li, Aanchal M. Sheth, Annie Chen, Rohan Upadhyayula, Sunny Li, Sahil Bansal, Ivan Zhao, Grace Chen, Charles Tan, Zhenhong Lei:
Designing the Metaverse: A Study of Design Research and Creative Practice from Speculative Fictions to Functioning Prototypes. 561-573 - Fernando Beltrán, Jing Geng:
Look at, Look into and Look Around: A New Approach to Visualizing Network Data and Increasing the Quality of Decisions. 574-591 - Joanna Ejdys:
Factors Affecting Trust in Selected Gerontechnologies: The Case of Poland. 592-601 - Check-Yee Law
, Yong-Wee Sek
, Choo-Chuan Tay
, Tze-Hui Liew
:
School Canteen Food Ordering Application with Food Allergy Alert Feature: Malaysia Perspective. 602-618 - Logan T. Bateman, Marc A. Butler, Germán H. Alférez:
Database Query Execution Through Virtual Reality. 619-633 - Taniza Sultana, Kristen R. Walcott:
NaPP: Notification and Push Performance in Wearable Devices. 634-648 - Ning Luo, Yue Xiong:
Quality Coin for Software Quality Improvement. 649-660 - Vincent Hui, Alvin Huang, Ariel Weiss, Justin Lieberman, Kelvin Hoang:
Bridging the Divide Between Design and Reality in Student Design Builds in Increasing Accessibility to Emerging Technologies. 661-678 - Yassine Zouhair, Mustapha Belaïssaoui, Younous El Mrini:
Difficulties Affecting the Success of the ERP Implementation in the Context of Moroccan SMEs. 679-688 - Grant Royd Howard
:
A Holistic and Universal Approach for Managing Technology and Organizational Change. 689-707 - Mahmoud Abdulaziz Elsayed Yousef
, Vishal Dattana
:
Design and Development of a Correspondence Management System (CMS). 708-728 - Kenji Saito:
Reverse Gutenberg Galaxy: Digital Transformation of Economy and Labor. 729-748 - Kenneth Otasowie, Matthew Ikuabe, Clinton Aigbavboa, Ayodeji Oke
:
Factors Militating Against the Use of Digital Technology by Sub-contractors in South Africa. 749-757 - Aryan Saha:
Conducting Semantic Segmentation on Landcover Satellite Imagery Through U-Net Architectures. 758-764 - Hannes Fassold:
A Qualitative Investigation of Optical Flow Algorithms for Video Denoising. 765-775 - Muhammad Tanveer Jan
, Ali Hashemi, Jinwoo Jang, KwangSoo Yang, Jiannan Zhai, David Newman, Ruth Tappen, Borko Furht:
Non-intrusive Drowsiness Detection Techniques and Their Application in Detecting Early Dementia in Older Drivers. 776-796 - Hsi-Chin Hsin, Chien-Kun Su:
SHE-Based Video Retargeting with Multiple Ground Control Points. 797-805 - Diane Guevara
:
A Process Innovation: Introducing a Technology Tool into Curriculum. 806-817 - Abeer M. Almalky
, Khaled R. Ahmed, Mustafa Guzel, Bülent Turan:
An Efficient Deep Learning Technique for Detecting and Classifying the Growth of Weeds on Fields. 818-835 - Md Shakil Hossain, Dhruv Pandya, Andrew A. Allen
, Felix G. Hamza-Lup:
Learner Attention Quantification Using Eye Tracking and EEG Signals. 836-847 - Mahmoud Salem
, Ahmed Elkaseer
, Andrew Rees, Steffen G. Scholz
:
A Hybrid Learning-Driven Computer Vision Framework for Reverse Engineering via Enhanced 3D Shape Reconstruction. 848-861
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.