Proceedings of 3rd International Conference on Inter-
net of Things and Connected Technologies (ICIoTCT),
2018, pages 267–272.
Ashraf, C. (2019). 5g and mixed reality glasses help change
how we see the world. verizon enterprise tech.
Atzori, L., Iera, A., and Morabito, G. (2010). The internet of
things: A survey. Computer networks, 54(15):2787–
2805.
Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., and
Mastroianni, M. (2020). Computer network simula-
tion with ns-3: A systematic literature review. Elec-
tronics, 9(2):272.
Casolare, R., Martinelli, F., Mercaldo, F., and Santone, A.
(2019). A model checking based proposal for mo-
bile colluding attack detection. In 2019 IEEE Inter-
national Conference on Big Data (Big Data), pages
5998–6000. IEEE.
Cimino, M. G., De Francesco, N., Mercaldo, F., San-
tone, A., and Vaglini, G. (2020). Model checking
for malicious family detection and phylogenetic anal-
ysis in mobile environment. Computers & Security,
90:101691.
Christidis, K. and Devetsikiotis, M. (2016). Blockchains
and Smart Contracts for the Internet of Things. IEEE
Access, 4:2292–2303.
Di Martino, B., Mastroianni, M., Campaiola, M., Morelli,
G., and Sparaco, E. (2019). Semantic techniques for
validation of gdpr compliance of business processes.
In Conference on Complex, Intelligent, and Software
Intensive Systems, pages 847–855. Springer.
Feng, C. Q. and Wang, T. (2019). Does cio risk appetite
matter? evidence from information security breach in-
cidents. International Journal of Accounting Informa-
tion Systems, 32:59–75.
Frattolillo, F., Landolfi, F., and Marulli, F. (2009). A novel
approach to drm systems. In 2009 International Con-
ference on Computational Science and Engineering,
volume 3, pages 492–497. IEEE.
Karpiriski, M., Senart, A., and Cahill, V. (2006). Sensor
networks for smart roads. In Fourth Annual IEEE In-
ternational Conference on Pervasive Computing and
Communications Workshops (PERCOMW’06), pages
5 pp.-310
Landoll, D. J. and Landoll, D. (2005). The security risk as-
sessment handbook: A complete guide for performing
security risk assessments. CRC Press.
Maple, C. (2017). Security and privacy in the internet of
things. Journal of Cyber Policy, 2(2):155–184.
Marulli, F., Pareschi, R., and Baldacci, D. (2016). The inter-
net of speaking things and its applications to cultural
heritage. In IoTBD, pages 107–117.
Marulli, F. and Vallifuoco, L. (2017). Internet of things for
driving human-like interactions: a case study for cul-
tural smart environment. In Proceedings of the Second
International Conference on Internet of things, Data
and Cloud Computing, pages 1–9.
Mena, D. M., Papapanagiotou, I., and Yang, B. (2018). In-
ternet of things: Survey on security. Information Se-
curity Journal: A Global Perspective, 27(3):162–182.
Mercaldo, F. and Santone, A. Deep learning for image-
based mobile malware detection. Journal of Computer
Virology and Hacking Techniques, pages 1–15.
Odiete, O., Lomotey, R. K., and Deters, R. (2018). Using
blockchain to support data and service management
in IoV/IoT. In Peng, S.-L., Wang, S.-J., Balas, V. E.,
and Zhao, M., editors, Security with Intelligent Com-
puting and Big-data Services, pages 344–362, Cham.
Springer International Publishing.
Parker, D. B. (1983). Fighting computer crime. Scribner
New York, NY.
Reyna, A., Mart
´
ın, C., Chen, J., Soler, E., and D
´
ıaz,
M. (2018). On blockchain and its integration with
IoT. Challenges and opportunities. Future Genera-
tion Computer Systems, 88:173–190.
Sattarova Feruza, Y. and Kim, T. (2007). It security review:
Privacy, protection, access control, assurance and sys-
tem security. International journal of multimedia and
ubiquitous engineering, 2(2):17–32.
Shameli-Sendi, A., Aghababaei-Barzegar, R., and Cheriet,
M. (2016). Taxonomy of information security risk as-
sessment (isra). Computers & security, 57:14–30.
Solangi, Z. A., Solangi, Y. A., Chandio, S., bt. S. Abd. Aziz,
M., bin Hamzah, M. S., and Shah, A. (2018). The
future of data privacy and security concerns in internet
of things. In 2018 IEEE International Conference on
Innovative Research and Development (ICIRD), pages
1–4.
Sterbenz, J. P., Hutchison, D., C¸ etinkaya, E. K., Jabbar, A.,
Rohrer, J. P., Sch
¨
oller, M., and Smith, P. (2010). Re-
silience and survivability in communication networks:
Strategies, principles, and survey of disciplines. Com-
puter Networks, 54(8):1245–1265.
Team, I. P. (2017). EU general data protection regulation
(GDPR): an implementation and compliance guide.
IT Governance Ltd.
The European Union (2016). Regulation (EU) 2016/679
on the protection of natural persons with regard to the
processing of personal data and on the free movement
of such data, and repealing Directive 95/46/EC (Gen-
eral Data Protection Regulation). Official Journal of
the European Union.
Truong, N. B., Um, T., Zhou, B., and Lee, G. M. (2018).
Strengthening the blockchain-based Internet of Value
with trust. In 2018 IEEE International Conference on
Communications (ICC), pages 1–7.
van Geelkerken, F. W. J. and Konings, K. (2017). Using
blockchain to strengthen the rights granted through
the GDPR. In 7th International youth science forum
”Litteris et Artibus”, pages 458–461.
Voigt, P. and Von dem Bussche, A. (2017). The eu general
data protection regulation (gdpr). A Practical Guide,
1st Ed., Cham: Springer International Publishing.
Wang, X., Zha, X., Ni, W., Liu, R. P., Guo, Y. J., Niu, X.,
and Zheng, K. (2019). Survey on blockchain for inter-
net of things. Computer Communications, 136:10–29.
YANG, J., KIM, C., and ONIK, M. M. H. (2019). Aggre-
gated risk modelling of personal data privacy in inter-
net of things. In 2019 21st International Conference
on Advanced Communication Technology (ICACT),
pages 425–430.
Zheng, X., Zhu, Y., and Si, X. (2019). A survey on chal-
lenges and progresses in blockchain technologies: A
performance and security perspective. Applied Sci-
ences, 9(22):4731.
AI4EIoTs 2020 - Special Session on Artificial Intelligence for Emerging IoT Systems: Open Challenges and Novel Perspectives
518