scispace - formally typeset
Search or ask a question
Conference

International Conference on Internet Technology and Applications 

About: International Conference on Internet Technology and Applications is an academic conference. The conference publishes majorly in the area(s): The Internet & Wireless sensor network. Over the lifetime, 1102 publications have been published by the conference receiving 3251 citations.


Papers
More filters
Proceedings ArticleDOI
01 Sep 2015
TL;DR: The current prominence and future promises of the Internet of Things, Internet of Everything, IoE and Internet of Nano Things are extensively reviewed and a summary survey report is presented.
Abstract: The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analysis clearly distinguishes between IoT and IoE which are wrongly considered to be the same by many people. Upon examining the current advancement in the fields of IoT, IoE and IoNT, the paper presents scenarios for the possible future expansion of their applications.

295 citations

Proceedings ArticleDOI
09 Nov 2017
TL;DR: A portable, wireless oscilloscope based on the ESP-WROOM-32 and a mobile application is described in detail as an example of successful practical implementation of the device.
Abstract: This paper discusses the Espressif Systems latest product ESP32 designed for Internet of Things and embedded system related projects. The ESP32 is a low-cost, low-power system on a chip series of microcontrollers with Wi-Fi and Bluetooth capabilities and a highly integrated structure powered by a dual-core Tensilica Xtensa LX6 microprocessor. This paper provides a comparative analysis of the ESP32 with some other market competitors and introduces the microcontroller specification, features and programming details. A portable, wireless oscilloscope based on the ESP-WROOM-32 and a mobile application is described in detail as an example of successful practical implementation of the device.

158 citations

Proceedings ArticleDOI
30 Aug 2011
TL;DR: The paper focuses on the application of Internet of Things in the nation and even in the global in the future, analysing the existed security risks of the Internet of Thing 's network points, transmission and proposes some suggestive solutions due to these problems.
Abstract: Internet of Things is an up-and-coming information and technology industry, and in such an environment of the concept and the content and the extension of Internet of Things are not very distinctive, the project of Internet of Things which is a piece of small area with small-scale and self-system obtain gratifying achievement and bright future, it can promote the development of Internet of Things in some extent. But there are some serious hidden danger and potential crisis problems. The paper focuses on the application of Internet of Things in the nation and even in the global in the future, analysing the existed security risks of the Internet of Things 's network points, transmission, finally we propose some suggestive solutions due to these problems.

125 citations

Proceedings ArticleDOI
09 Sep 2010
TL;DR: The research applied the original dissimilarity of P2P botnet differing from normal internet behaviors as parameters of data mining, which were then clustered and distinguished to obtain reliable results with acceptable accuracy.
Abstract: Botnet was composed of the virus-infected computers severely threaten the security of internet. Hackers, firstly, implanted virus in targeted computers, which were then commanded and controlled by them via the internet to operate distributed denial of services (DDoS), steal confidential information, distribute junk mails and other malicious acts. By imitating P2P software, P2P botnet used multiple main controller to avoid single point of failure, and failed various misuse detecting technologies together with encryption technologies. Differentiating from the normal network behavior, P2P botnet sets up numerous sessions without consuming bandwidth substantially, causing itself exposed to the anomaly detection technology. The data mining scheme was tested in real internet to prove its capability of discovering the host of P2P botnet. Crucially, the research applied the original dissimilarity of P2P botnet differing from normal internet behaviors as parameters of data mining, which were then clustered and distinguished to obtain reliable results with acceptable accuracy.

62 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: This project targets to narrow the gap between current networking technologies and the foreseen requirements of future 2020 networking, through the recruitment and training of 17 ESRs, and proposes a lightweight security framework built on secure network coding.
Abstract: SECRET is a collaborative European Training Network (ETN) committed to create an excellent educational training platform for Early Stage Researchers (ESRs) in the field of wireless communications and networking for 5G. The project is recently funded by the European Commission under the H2020 research and innovation program, through the Marie Curie People Program. This project targets to narrow the gap between current networking technologies and the foreseen requirements of future 2020 networking, through the recruitment and training of 17 ESRs. SECRET aims to strike a note by delivering higher capacity, ability to support more users, and lowering the cost per bit by adopting technology trends widely accepted to form part of the 5G roadmap, through the deployment of new disruptive “femtocell” type cells on demand, to what we refer to as mobile small cells. This will be complemented by a wireless high-speed fronthaul to bridge the small cell network to the core. Moreover, novel techniques will be investigated, including “network coding”, “cooperation”, and “energy-aware smart front-end”. Additionally, due to the confidential information that will be communicated over in future networks, a lightweight security framework built on secure network coding will be proposed.

57 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
201768
2015101
20143
20137
2011323
2010523