Open Access
SHS Web Conf.
Volume 139, 2022
The 4th ETLTC International Conference on ICT Integration in Technical Education (ETLTC2022)
Article Number 03013
Number of page(s) 6
Section Topics in Computer Science
Published online 13 May 2022
  1. M. Javaid, I.H. Khan, Journal of Oral Biology and Craniofacial Research 11, 209 (2021) [Google Scholar]
  2. L. Xu, W. He, S. Li, IEEE Transactions on Industrial Informatics 10, 2233 (2014) [Google Scholar]
  3. A. Bassi, M. Bauer, M. Fiedler, T. Kramp, R. Van Kranenburg, S. Lange, S. Meissner, Enabling things to talk (Springer Nature, 2013) [CrossRef] [Google Scholar]
  4. Y. Yang, L. Wu, G. Yin, L. Li, H. Zhao, IEEE Internet of Things Journal 4, 1250 (2017) [Google Scholar]
  5. M. Razzaque, M. Milojevic-Jevric, A. Palade, S. Clarke, IEEE Internet of Things Journal 3, 70 (2016) [Google Scholar]
  6. K. Ashton et al., RFID journal 22, 97 (2009) [Google Scholar]
  7. R. Betts, Architecting for the Internet of Things (O’Reilly Media, 2016) [Google Scholar]
  8. M. Bansal, S. Garg,Internet of Things (IoT) based assistive devices, in 2021 6th International Conference on Inventive Computation Technologies (ICICT) (IEEE, 2021), pp. 1006–1009 [Google Scholar]
  9. O. Vermesan, P. Friess et al., Internet of things-from research and innovation to market deployment, Vol. 29 (River publishers Aalborg, 2014) [Google Scholar]
  10. K.K. Patel, S.M. Patel, Internet of Things-IOT : Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges (2016) [Google Scholar]
  11. C. Wu, D. Gunatilaka, M. Sha, C. Lu, Real-Time Wireless Routing for Industrial Internet of Things, in 2018 IEEE / ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI) (2018), pp. 261–266 [Google Scholar]
  12. K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis, G. Stephanides, Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols, in E-business and Telecommunications, edited by J. Filipe, M.S. Obaidat (Springer Berlin Heidelberg, Berlin, Heidelberg, 2009), pp. 227–238, ISBN 978-3-540-88653-2 [Google Scholar]
  13. J.c. Kao, R. Marculescu, Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks, in 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks (2006), Vol. 2, pp. 707–714 [Google Scholar]
  14. G.J. Cheng, L.T. Liu, X.J. Qiang, Y. Liu, Industry 4.0 development and application of intelligent manufacturing, in 2016 international conference on information system and artificial intelligence (ISAI) (IEEE, 2016), pp. 407–410 [Google Scholar]
  15. M. Burhan, R.A. Rehman, B. Khan, B.S. Kim, Sensors (Basel, Switzerland) 18 (2018) [Google Scholar]
  16. J. Wurm, Y. Jin, Y. Liu, S. Hu, K. Heffner, F. Rahman, M. Tehranipoor, IEEE Transactions on Multi-Scale Computing Systems 3, 215 (2017) [Google Scholar]
  17. G.F. Fragulis, M. Papatsimouli, L. Lazaridis, I.A. Skordas, Software Impacts 7, 100046 (2021) [Google Scholar]
  18. M. Papatsimouli, L. Lazaridis, K.F. Kollias, I. Skordas, G.F. Fragulis, SHS Web Conf. 102, 01008 (2021) [Google Scholar]
  19. L. Lazaridis, M. Papatsimouli, K.F. Kollias, P. Sari-giannidis, G.F. Fragulis, Hitboxes: A Survey About Collision Detection in Video Games, in International Conference on Human-Computer Interaction (Springer, 2021), pp. 314–326 [Google Scholar]
  20. K.F. Kollias, C.K. Syriopoulou-Delli, P. Sarigiannidis, G.F. Fragulis, Electronics 10, 2982 (2021) [Google Scholar]
  21. K. Pelechrinis, M. Iliofotou, S.V. Krishnamurthy, IEEE Communications Surveys Tutorials 13, 245 (2011) [Google Scholar]
  22. R. Mahmoud, T. Yousuf, F. Aloul, I. Zualkernan, Internet of things (IoT) security: Current status, challenges and prospective measures, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) (2015), pp. 336–341 [Google Scholar]
  23. A.A. Cardenas, S. Amin, S. Sastry, Secure Control: Towards Survivable Cyber-Physical Systems, in 2008 The 28th International Conference on Distributed Computing Systems Workshops (2008), pp. 495–500 [Google Scholar]
  24. W. Zhang, B. Qu, Security Architecture of the Internet of Things Oriented to Perceptual Layer (2013) [Google Scholar]
  25. C. Stergiou, K. Psannis, B.G. Kim, B. Gupta, Future Gener. Comput. Syst. 78, 964 (2018) [Google Scholar]
  26. M. Intelligence, Smart building market - growth, trends, covid-19 impact, and forecasts (2021 - 2026) report (2020), [Google Scholar]
  27. Statista, Internet of things (iot) total annual revenue worldwide from 2019 to 2030 (2021), [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.