Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 17, issue 5, 2025
- SoK: Delegated Security in the Internet of Things pp. 1-55

- Emiliia Geloczi, Felix Klement, Patrick Struck and Stefan Katzenbeisser
- Industrial Internet of Things (IIoT): Trends and Technologies pp. 1-3

- Zhihao Liu, Franco Davoli and Davide Borsatti
- Integrating AIoT Technologies in Aquaculture: A Systematic Review pp. 1-35

- Fahmida Wazed Tina, Nasrin Afsarimanesh, Anindya Nag and Md Eshrat E. Alahi
- Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods pp. 1-36

- Mohammad Jaminur Islam, Saminur Islam, Mahmud Hossain, Shahid Noor and S. M. Riazul Islam
- Multi-Criteria Genetic Algorithm for Optimizing Distributed Computing Systems in Neural Network Synthesis pp. 1-36

- Valeriya V. Tynchenko, Ivan Malashin, Sergei O. Kurashkin, Vadim Tynchenko, Andrei Gantimurov, Vladimir Nelyub and Aleksei Borodulin
- Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System pp. 1-32

- Hanen Ben Rjeb, Layth Sliman, Hela Zorgati, Raoudha Ben Djemaa and Amine Dhraief
- Towards Safer Cities: AI-Powered Infrastructure Fault Detection Based on YOLOv11 pp. 1-20

- Raiyen Z. Rakin, Mahmudur Rahman, Kanij F. Borsa, Fahmid Al Farid, Shakila Rahman, Jia Uddin and Hezerul Abdul Karim
- BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network pp. 1-20

- Wanwei Huang, Huicong Yu, Yingying Li, Xi He and Rui Chen
- A Network Traffic Characteristics Reconstruction Method for Mitigating the Impact of Packet Loss in Edge Computing Scenarios pp. 1-20

- Jiawei Ye, Yanting Chen, Aierpanjiang Simayi, Yu Liu, Zhihui Lu and Jie Wu
- Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs pp. 1-20

- Jing Li, Wei Zong, Yang-Wai Chow and Willy Susilo
- Ephemeral Node Identifiers for Enhanced Flow Privacy pp. 1-27

- Gregor Tamati Haywood and Saleem Noel Bhatti
- AI-Powered Stroke Diagnosis System: Methodological Framework and Implementation pp. 1-27

- Marta Narigina, Agris Vindecs, Dušanka Bošković, Yuri Merkuryev and Andrejs Romanovs
- DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization pp. 1-27

- Hardi Sabah Talabani, Zrar Khalid Abdul and Hardi Mohammed Mohammed Saleh
- Research on Advancing Radio Wave Source Localization Technology Through UAV Path Optimization pp. 1-27

- Tomoroh Takahashi and Gia Khanh Tran
- Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks pp. 1-19

- Alexander Gegov, Boriana Vatchova, Yordanka Boneva and Alexandar Ichtev
- Feature Extraction in 5G Wireless Systems: A Quantum Cat Swarm and Wavelet-Based Approach pp. 1-17

- Anand Raju and Sathishkumar Samiappan
- A Machine Learning Approach for Predicting Maternal Health Risks in Lower-Middle-Income Countries Using Sparse Data and Vital Signs pp. 1-17

- Avnish Malde, Vishnunarayan Girishan Prabhu, Dishant Banga, Michael Hsieh, Chaithanya Renduchintala and Ronald Pirrallo
- Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security pp. 1-17

- Guobin Xu, Oluwole Adetifa, Jianzhou Mao, Eric Sakk and Shuangbao Wang
- Implementation and Performance Analysis of an Industrial Robot’s Vision System Based on Cloud Vision Services pp. 1-17

- Ioana-Livia Stefan, Andrei Mateescu, Ionut Lentoiu, Silviu Raileanu, Florin Daniel Anton, Dragos Constantin Popescu and Ioan Stefan Sacala
- Adversarial Training for Mitigating Insider-Driven XAI-Based Backdoor Attacks pp. 1-21

- R. G. Gayathri, Atul Sajjanhar and Yong Xiang
- Real-Time Identification of Look-Alike Medical Vials Using Mixed Reality-Enabled Deep Learning pp. 1-21

- Bahar Uddin Mahmud, Guanyue Hong, Virinchi Ravindrakumar Lalwani, Nicholas Brown and Zachary D. Asher
- Enhanced Propaganda Detection in Public Social Media Discussions Using a Fine-Tuned Deep Learning Model: A Diffusion of Innovation Perspective pp. 1-33

- Pir Noman Ahmad, Adnan Muhammad Shah and KangYoon Lee
- Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings pp. 1-38

- Rosario G. Garroppo, Pietro Giuseppe Giardina, Giada Landi and Marco Ruta
- Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR pp. 1-23

- Mingjun Wang, Xuezhi Zhang, Feng Jing and Mei Gao
- A Blockchain-Based Strategy for Certifying Timestamps in a Distributed Healthcare Emergency Response Systems pp. 1-23

- Daniele Marletta, Alessandro Midolo and Emiliano Tramontana
- U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds pp. 1-23

- Jiawei Ye, Ming Yan, Shenglin Wu, Jingxuan Tan and Jie Wu
- An Improved Reference Paper Collection System Using Web Scraping with Three Enhancements pp. 1-28

- Tresna Maulana Fahrudin, Nobuo Funabiki, Komang Candra Brata, Inzali Naing, Soe Thandar Aung, Amri Muhaimin and Dwi Arman Prasetya
- C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers’ Power Consumption pp. 1-18

- Marcello Artioli, Andrea Borghesi, Marta Chinnici, Anna Ciampolini, Michele Colonna, Davide De Chiara and Daniela Loreti
- A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks pp. 1-18

- Anubhav Kumar, Rajamani Radhakrishnan, Mani Sumithra, Prabu Kaliyaperumal, Balamurugan Balusamy and Francesco Benedetto
- Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers pp. 1-13

- Lingfeng Shen, Jiangtao Nie, Ming Li, Guanghui Wang, Qiankun Zhang and Xin He
- Leveraging Blockchain Technology for Secure 5G Offloading Processes pp. 1-31

- Cristina Regueiro, Santiago de Diego and Borja Urkizu
- Railway Cloud Resource Management as a Service pp. 1-30

- Ivaylo Atanasov, Dragomira Dimitrova, Evelina Pencheva and Ventsislav Trifonov
- Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration pp. 1-30

- Negin Jahanbakhsh, Mario Vega-Barbas, Iván Pau, Lucas Elvira-Martín, Hirad Moosavi and Carolina García-Vázquez
- Explainable AI Assisted IoMT Security in Future 6G Networks pp. 1-30

- Navneet Kaur and Lav Gupta
- Classification of Hacker’s Posts Based on Zero-Shot, Few-Shot, and Fine-Tuned LLMs in Environments with Constrained Resources pp. 1-22

- Theodoros Giannilias, Andreas Papadakis, Nikolaos Nikolaou and Theodore Zahariadis
- A Web-Based Application for Smart City Data Analysis and Visualization pp. 1-22

- Panagiotis Karampakakis, Despoina Ioakeimidou, Periklis Chatzimisios and Konstantinos A. Tsintotas
- A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture pp. 1-22

- Rui Lu, Lei Shi, Yinlong Liu and Zhongkai Dang
- Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach pp. 1-16

- Cristian Bua, Francesco Fiorini, Michele Pagano, Davide Adami and Stefano Giordano
- A Portable Non-Motorized Smart IoT Weather Station Platform for Urban Thermal Comfort Studies pp. 1-16

- Raju Sethupatu Bala, Salaheddin Hosseinzadeh, Farhad Sadeghineko, Craig Scott Thomson and Rohinton Emmanuel
- Using Machine Learning to Detect Vault (Anti-Forensic) Apps pp. 1-15

- Michael N. Johnstone, Wencheng Yang and Mohiuddin Ahmed
- XGBoost-Based Detection of DDoS Attacks in Named Data Networking pp. 1-15

- Liang Liu, Weiqing Yu, Zhijun Wu and Silin Peng
- Correction: Kalodanis et al. High-Risk AI Systems—Lie Detection Application. Future Internet 2025, 17, 26 pp. 1-2

- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou and Dimosthenis Anagnostopoulos
Volume 17, issue 4, 2025
- eHealth and mHealth pp. 1-2

- Bernhard Neumayer, Stefan Sauermann and Sten Hanke
- Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan pp. 1-25

- Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui
- Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms pp. 1-25

- Ali Zaman, Salman A. Khan, Nazeeruddin Mohammad, Abdelhamied A. Ateya, Sadique Ahmad and Mohammed A. ElAffendi
- Task Scheduling for Public Clouds Using a Fuzzy Controller-Based Priority- and Deadline-Aware Approach pp. 1-25

- Saad Qamar, Nesar Ahmad and Parvez Mahmood Khan
- Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms pp. 1-25

- Hajar Zaidani, Rim Koulali, Abderrahim Maizate and Mohamed Ouzzif
- On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective pp. 1-15

- Fragkiskos Ninos, Konstantinos Karalas, Dimitrios Dechouniotis and Michael Polemis
- GDPR and Large Language Models: Technical and Legal Obstacles pp. 1-26

- Georgios Feretzakis, Evangelia Vagena, Konstantinos Kalodanis, Paraskevi Peristera, Dimitris Kalles and Athanasios Anastasiou
- Practical Comparison Between the CI/CD Platforms Azure DevOps and GitHub pp. 1-26

- Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
- Comparative Feature-Guided Regression Network with a Model-Eye Pretrained Model for Online Refractive Error Screening pp. 1-26

- Jiayi Wang, Tianyou Zheng, Yang Zhang, Tianli Zheng and Weiwei Fu
- Edge AI for Real-Time Anomaly Detection in Smart Homes pp. 1-26

- Manuel J. C. S. Reis and Carlos Serôdio
- A Transformer-Based Autoencoder with Isolation Forest and XGBoost for Malfunction and Intrusion Detection in Wireless Sensor Networks for Forest Fire Prediction pp. 1-12

- Ahshanul Haque and Hamdy Soliman
- Knowledge Sharing in Security-Sensitive Communities pp. 1-22

- Yonit Rusho, Daphne Ruth Raban, David Simantov and Gilad Ravid
- Reinforcement Learning-Based Dynamic Fuzzy Weight Adjustment for Adaptive User Interfaces in Educational Software pp. 1-22

- Christos Troussas, Akrivi Krouska, Phivos Mylonas and Cleo Sgouropoulou
- Multimodal Fall Detection Using Spatial–Temporal Attention and Bi-LSTM-Based Feature Fusion pp. 1-22

- Jungpil Shin, Abu Saleh Musa Miah, Rei Egawa, Najmul Hassan, Koki Hirooka and Yoichi Tomioka
- Internet of Things and Deep Learning for Citizen Security: A Systematic Literature Review on Violence and Crime pp. 1-30

- Chrisbel Simisterra-Batallas, Pablo Pico-Valencia, Jaime Sayago-Heredia and Xavier Quiñónez-Ku
- Multi-Class Intrusion Detection in Internet of Vehicles: Optimizing Machine Learning Models on Imbalanced Data pp. 1-14

- Ágata Palma, Mário Antunes, Jorge Bernardino and Ana Alves
- NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters pp. 1-14

- Peng Li, Chen Qing and Hao Liu
- Employing Streaming Machine Learning for Modeling Workload Patterns in Multi-Tiered Data Storage Systems pp. 1-37

- Edson Ramiro Lucas Filho, George Savva, Lun Yang, Kebo Fu, Jianqiang Shen and Herodotos Herodotou
- Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology pp. 1-37

- Adrian Alexandrescu, Delia-Elena Bărbuță, Cristian Nicolae Buțincu, Alexandru Archip, Silviu-Dumitru Pavăl, Cătălin Mironeanu and Gabriel-Alexandru Scînteie
- Enabling Green Cellular Networks: A Review and Proposal Leveraging Software-Defined Networking, Network Function Virtualization, and Cloud-Radio Access Network pp. 1-39

- Radheshyam Singh, Line M. P. Larsen, Eder Ollora Zaballa, Michael Stübert Berger, Christian Kloch and Lars Dittmann
- Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets pp. 1-31

- Mohammed Salem Atoum, Ala Abdulsalam Alarood, Eesa Alsolami, Adamu Abubakar, Ahmad K. Al Hwaitat and Izzat Alsmadi
- Data-Driven Diagnostics for Pediatric Appendicitis: Machine Learning to Minimize Misdiagnoses and Unnecessary Surgeries pp. 1-24

- Deborah Maffezzoni, Enrico Barbierato and Alice Gatti
- The New CAP Theorem on Blockchain Consensus Systems pp. 1-24

- Aristidis G. Anagnostakis and Euripidis Glavas
- CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks pp. 1-24

- Junchao Wang, Honglin Li, Yan Sun, Chris Phillips, Alexios Mylonas and Dimitris Gritzalis
- Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario pp. 1-24

- Ivan Cibrario Bertolotti, Luca Durante and Enrico Cambiaso
- Analysis of Universal Decoding Techniques for 6G Ultra-Reliable and Low-Latency Communication Scenario pp. 1-24

- Abhilasha Gautam, Prabhat Thakur and Ghanshyam Singh
- A Systematic Review on the Combination of VR, IoT and AI Technologies, and Their Integration in Applications pp. 1-40

- Dimitris Kostadimas, Vlasios Kasapakis and Konstantinos Kotis
- Distributed Reputation for Accurate Vehicle Misbehavior Reporting (DRAMBR) pp. 1-40

- Dimah Almani, Tim Muller and Steven Furnell
- GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering pp. 1-18

- Danial Ahmadzadeh, Mehrdad Jalali, Reza Ghaemi and Maryam Kheirabadi
- C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control pp. 1-18

- Efstratios Chatzoglou and Georgios Kambourakis
- Enhancing Transplantation Care with eHealth: Benefits, Challenges, and Key Considerations for the Future pp. 1-47

- Ilaisaane Falevai and Farkhondeh Hassandoust
- Integration of a Digital Twin Framework for Trajectory Control of a 2RRR Planar Parallel Manipulator Using ROS/Gazebo and MATLAB pp. 1-23

- Carlos Andrés Mesa-Montoya, Néstor Iván Marín Peláez, Kevin David Ortega-Quiñones, German Andrés Holguín-Londoño, Libardo Vicente Vanegas-Useche, Gian Carlo Daraviña-Peña, Edwan Anderson Ariza-Echeverri and Diego Vergara
- Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance pp. 1-23

- Ade Dotun Ajasa, Hassan Chizari and Abu Alam
- Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams pp. 1-28

- Ivan Nedyalkov
- Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies pp. 1-41

- Md Kamrul Siam, Bilash Saha, Md Mehedi Hasan, Md Jobair Hossain Faruk, Nafisa Anjum, Sharaban Tahora, Aiasha Siddika and Hossain Shahriar
- A Cross-Chain-Based Access Control Framework for Cloud Environment pp. 1-19

- Saad Belcaid, Mostapha Zbakh, Siham Aouad, Abdellah Touhafi and An Braeken
- Generative AI-Enhanced Intelligent Tutoring System for Graduate Cybersecurity Programs pp. 1-19

- Madhav Mukherjee, John Le and Yang-Wai Chow
- Balancing Prediction Accuracy and Explanation Power of Path Loss Modeling in a University Campus Environment via Explainable AI pp. 1-19

- Hamed Khalili, Hannes Frey and Maria A. Wimmer
- A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks pp. 1-17

- Sunan Wang, Rong Song, Xiangyu Zheng, Wanwei Huang and Hongchang Liu
- A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies pp. 1-54

- Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb and Adnan Kabbani
- AI-MDD-UX: Revolutionizing E-Commerce User Experience with Generative AI and Model-Driven Development pp. 1-34

- Adel Alti and Abderrahim Lakehal
- Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions pp. 1-21

- Oladele Afolalu and Mohohlo Samuel Tsoeu
- A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies pp. 1-21

- Paul Scalise, Michael Hempel and Hamid Sharif
- Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models pp. 1-21

- Jaewoo Yang, Hayun Kim, Junyung Ji and Younghoon Kim
- Explainable Identification of Similarities Between Entities for Discovery in Large Text pp. 1-20

- Akhil Joshi, Sai Teja Erukude and Lior Shamir
- Enhancing IoT Scalability and Interoperability Through Ontology Alignment and FedProx pp. 1-20

- Chaimae Kanzouai, Soukaina Bouarourou, Abderrahim Zannou, Abdelhak Boulaalam and El Habib Nfaoui
- EmoSDS: Unified Emotionally Adaptive Spoken Dialogue System Using Self-Supervised Speech Representations pp. 1-20

- Jaehwan Lee, Youngjun Sim, Jinyou Kim and Young-Joo Suh
- Benchmarking Large Language Models from Open and Closed Source Models to Apply Data Annotation for Free-Text Criteria in Healthcare pp. 1-27

- Ali Nemati, Mohammad Assadi Shalmani, Qiang Lu and Jake Luo
- Detecting Disinformation in Croatian Social Media Comments pp. 1-27

- Igor Ljubi, Zdravko Grgić, Marin Vuković and Gordan Gledec
- Big-Delay Estimation for Speech Separation in Assisted Living Environments pp. 1-27

- Swarnadeep Bagchi and Ruairí de Fréin
- Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach pp. 1-29

- Ali Vaziri, Pardis Sadatian Moghaddam, Mehrdad Shoeibi and Masoud Kaveh
- The Role of AI-Based Chatbots in Public Health Emergencies: A Narrative Review pp. 1-32

- Francesco Branda, Massimo Stella, Cecilia Ceccarelli, Federico Cabitza, Giancarlo Ceccarelli, Antonello Maruotti, Massimo Ciccozzi and Fabio Scarpa
- Scalable and Distributed Cloud Continuum Orchestration for Next-Generation IoT Applications: Latest Advances and Prospects pp. 1-4

- Dimitrios Dechouniotis and Ioannis Dimolitsas
Volume 17, issue 3, 2025
- Frame Aggregation with Simple Block Acknowledgement Mechanism to Provide Strict Quality of Service Guarantee to Emergency Traffic in Wireless Networks pp. 1-18

- Shuaib K. Memon, Md Akbar Hossain and Nurul I. Sarkar
- IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System pp. 1-23

- Nicoletta González-Cancelas, Javier Vaca-Cabrero and Alberto Camarero-Orive
- A Regional Multi-Agent Air Monitoring Platform pp. 1-28

- Stanimir Stoyanov, Emil Doychev, Asya Stoyanova-Doycheva, Veneta Tabakova-Komsalova, Ivan Stoyanov and Iliya Nedelchev
- A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models pp. 1-28

- Nicholas Jones, Md Whaiduzzaman, Tony Jan, Amr Adel, Ammar Alazab and Afnan Alkreisat
- An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design pp. 1-28

- J. de Curtò, I. de Zarzà, Leandro Sebastián Fervier, Victoria Sanagustín-Fons and Carlos T. Calafate
- Edge and Cloud Computing in Smart Cities pp. 1-41

- Maria Trigka and Elias Dritsas
- Health Misinformation in Social Networks: A Survey of Information Technology Approaches pp. 1-50

- Vasiliki Papanikou, Panagiotis Papadakos, Theodora Karamanidou, Thanos G. Stavropoulos, Evaggelia Pitoura and Panayiotis Tsaparas
- Advanced Trajectory Analysis of NASA’s Juno Mission Using Unsupervised Machine Learning: Insights into Jupiter’s Orbital Dynamics pp. 1-30

- Ashraf ALDabbas, Zaid Mustafa and Zoltan Gal
- Dynamic Workload Management System in the Public Sector: A Comparative Analysis pp. 1-39

- Konstantinos C. Giotopoulos, Dimitrios Michalopoulos, Gerasimos Vonitsanos, Dimitris Papadopoulos, Ioanna Giannoukou and Spyros Sioutas
- Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk pp. 1-24

- Vincenzo Barrile, Emanuela Genovese, Clemente Maesano, Sonia Calluso and Maurizio Pasquale Manti
- GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning pp. 1-16

- Yulin Kang, Wuzheng Tan, Linlin Fan, Yinuo Chen, Xinbin Lai and Jian Weng
- University Students’ Subjective Well-Being in Japan Between 2021 and 2023: Its Relationship with Social Media Use pp. 1-22

- Shaoyu Ye and Kevin K. W. Ho
- FedRecI2C: A Novel Federated Recommendation Framework Integrating Communication and Computation to Accelerate Convergence Under Communication Constraints pp. 1-22

- Qizhong Zheng and Xiujie Huang
- Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects’ Stigmergic Communication pp. 1-25

- Ojilvie Avila-Cortés, Saúl E. Pomares Hernández, Julio César Pérez-Sansalvador and Lil María Xibai Rodríguez-Henríquez
- Gamitest: A Game-like Online Student Assessment System pp. 1-15

- Jakub Swacha and Artur Kulpa
- Assessing Browser Security: A Detailed Study Based on CVE Metrics pp. 1-15

- Oleksii Chalyi, Kęstutis Driaunys and Vytautas Rudžionis
- Deep Neural Network-Based Modeling of Multimodal Human–Computer Interaction in Aircraft Cockpits pp. 1-15

- Li Wang, Heming Zhang and Changyuan Wang
- Resource-Aware ECG Classification with Heterogeneous Models in Federated Learning pp. 1-15

- Mohammad Munzurul Islam and Mohammed Alawad
- Blockchain-Based Decentralised Authentication in Closed Environments pp. 1-15

- Wata Kanjanapruthipong and Sirapat Boonkrong
- Edge Intelligence: Edge Computing for 5G and the Internet of Things pp. 1-5

- Yuezhi Zhou and Xu Chen
- Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network pp. 1-32

- Mario Martínez-Morfa, Carlos Ruiz de Mendoza, Cristina Cervelló-Pastor and Sebastia Sallent-Ribes
- CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality pp. 1-36

- Daneesha Ranasinghe, Nayomi Kankanamge, Chathura De Silva, Nuwani Kangana, Rifat Mahamood and Tan Yigitcanlar
- Metastable Substructure Embedding and Robust Classification of Multichannel EEG Data Using Spectral Graph Kernels pp. 1-19

- Rashmi N. Muralinath, Vishwambhar Pathak and Prabhat K. Mahanti
- Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events pp. 1-19

- J. D. Morillo Reina and T. J. Mateo Sanguino
- A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios pp. 1-19

- Fabrizio Messina, Domenico Rosaci and Giuseppe M. L. Sarnè
- Optimizing Electric Vehicle Routing Efficiency Using K-Means Clustering and Genetic Algorithms pp. 1-19

- Tal Gaon, Yovel Gabay and Miri Weiss Cohen
- Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks pp. 1-34

- Jinying Li and Ananda Maiti
- Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things pp. 1-48

- John Mulo, Hengshuo Liang, Mian Qian, Milon Biswas, Bharat Rawal, Yifan Guo and Wei Yu
- User-Generated Content and Its Impact on Purchase Intent for Tourism Products: A Comparative Analysis of Millennials and Centennials on TikTok pp. 1-21

- Eva Correia Ramos and Célia M. Q. Ramos
- A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles pp. 1-21

- Hani Alnami, Imad Mahgoub, Hamzah Al-Najada and Easa Alalwany
- Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms pp. 1-27

- Andri Santoso, Samsul Huda, Yuta Kodera and Yasuyuki Nogami
- Mobility Prediction and Resource-Aware Client Selection for Federated Learning in IoT pp. 1-20

- Rana Albelaihi
- SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features pp. 1-20

- Tieqi Xi, Qiuhua Zheng, Chuanhui Cheng, Ting Wu, Guojie Xie, Xuebiao Qian, Haochen Ye and Zhenyu Sun
- A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping pp. 1-20

- Amanda Thomson, Leandros Maglaras and Naghmeh Moradpoor
- CommC: A Multi-Purpose COMModity Hardware Cluster pp. 1-20

- Agorakis Bompotas, Nikitas-Rigas Kalogeropoulos and Christos Makris
- Enabling Tactile Internet via 6G: Application Characteristics, Requirements, and Design Considerations pp. 1-20

- Bharat S. Chaudhari
- How Does Digital Capability Shape Resilient Supply Chains?—Evidence from China’s Electric Vehicle Manufacturing Industry pp. 1-20

- Yanxuan Li and Vatcharapol Sukhotu
Volume 17, issue 2, 2025
- Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification pp. 1-20

- Oleksandr Kuznetsov, Emanuele Frontoni, Kateryna Kuznetsova and Marco Arnesano
- Hybrid Solution Through Systematic Electrical Impedance Tomography Data Reduction and CNN Compression for Efficient Hand Gesture Recognition on Resource-Constrained IoT Devices pp. 1-20

- Salwa Sahnoun, Mahdi Mnif, Bilel Ghoul, Mohamed Jemal, Ahmed Fakhfakh and Olfa Kanoun
- Secure Tiny Machine Learning on Edge Devices: A Lightweight Dual Attestation Mechanism for Machine Learning pp. 1-27

- Vlad-Eusebiu Baciu, An Braeken, Laurent Segers and Bruno da Silva
- Survey on Secure Scientific Workflow Scheduling in Cloud Environments pp. 1-29

- Hadeel Amjed Saeed, Sufyan T. Faraj Al-Janabi, Esam Taha Yassen and Omar A. Aldhaibani
- Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks pp. 1-29

- Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei and Riad Alharbey
- Transmission Power Control in Multi-Hop Communications of THz Communication Using a Potential Game Approach pp. 1-19

- Evangelos D. Spyrou, Vassilios Kappatos and Chrysostomos Stylios
- Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures pp. 1-19

- Peng Liu, Lili Jia and Yang Xiao
- Framework of Best Practices to Drive the Digital Transition: Towards a 4.0 Paradigm Based on Evidence from Case Studies pp. 1-19

- Tiago Bastos, Cármen Guimarães and Leonor Teixeira
- Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection pp. 1-43

- Tahesin Samira Delwar, Sayak Mukhopadhyay, Akshay Kumar, Mangal Singh, Yang-won Lee, Jee-Youl Ryu and A. S. M. Sanwar Hosen
- Enhancing Human–Agent Interaction via Artificial Agents That Speculate About the Future pp. 1-21

- Casey C. Bennett, Young-Ho Bae, Jun-Hyung Yoon, Say Young Kim and Benjamin Weiss
- Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach pp. 1-21

- Alfredo Cuzzocrea, Mst Shapna Akter, Hossain Shahriar and Pablo García Bringas
- Sixth Generation Enabling Technologies and Machine Learning Intersection: A Performance Optimization Perspective pp. 1-44

- Emmanuel Ekene Okere and Vipin Balyan
- The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning pp. 1-55

- Leyli Nouraei Yeganeh, Nicole Scarlett Fenty, Yu Chen, Amber Simpson and Mohsen Hatami
- Machine Learning for Blockchain and IoT Systems in Smart City pp. 1-5

- Cheng-Chi Lee, Dinh-Thuan Do and Agbotiname Lucky Imoize
- A Weighted Composite Metric for Evaluating User Experience in Educational Chatbots: Balancing Usability, Engagement, and Effectiveness pp. 1-35

- Abeer Alabbas and Khalid Alomar
- BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups pp. 1-32

- Brahim Benaissa, Filip Hendrichovsky, Mansur As and Kaori Yoshida
- Trends, Challenges, and Applications of Large Language Models in Healthcare: A Bibliometric and Scoping Review pp. 1-32

- Vincenza Carchiolo and Michele Malgeri
- Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning pp. 1-22

- Abimbola Efunogbon, Enjie Liu, Renxie Qiu and Taiwo Efunogbon
- Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System pp. 1-22

- Hemin Sardar Abdulla and Aso M. Aladdin
- A Methodological Framework for AI-Driven Textual Data Analysis in Digital Media pp. 1-26

- Douglas Cordeiro, Carlos Lopezosa and Javier Guallar
- Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling pp. 1-26

- Saif Al-Dean Qawasmeh and Ali Abdullah S. AlQahtani
- Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing pp. 1-15

- David Ortiz-Perez, Pablo Ruiz-Ponce, David Mulero-Pérez, Manuel Benavent-Lledo, Javier Rodriguez-Juan, Hugo Hernandez-Lopez, Anatoli Iarovikov, Srdjan Krco, Daliborka Nedic, Dejan Vukobratovic and Jose Garcia-Rodriguez
- Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems pp. 1-15

- Manuel Cheminod, Ivan Cibrario Bertolotti, Adriano Valenzano and Luca Durante
- Correction: Marti et al. Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. Future Internet 2024, 16, 446 pp. 1-1

- Patrizia Marti, Giulia Teverini, Cecilia Goracci and Lorenzo Franchi
- Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes pp. 1-61

- Henrich C. Pöhls, Fabian Kügler, Emiliia Geloczi and Felix Klement
- Intelligent Virtual Reality and Augmented Reality Technologies: An Overview pp. 1-25

- Georgios Lampropoulos
- Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms pp. 1-25

- Jannatul Ferdush, Joarder Kamruzzaman, Gour Karmakar, Iqbal Gondal and Rajkumar Das
- IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model pp. 1-23

- Huu Dang Quoc, Loc Nguyen The, Truong Bui Quang and Phuong Han Minh
- On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification pp. 1-23

- Gianmarco Baldini
- Security and Privacy in Physical–Digital Environments: Trends and Opportunities pp. 1-23

- Carolina Pereira, Anabela Marto, Roberto Ribeiro, Alexandrino Gonçalves, Nuno Rodrigues, Carlos Rabadão, Rogério Luís de Carvalho Costa and Leonel Santos
- ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks pp. 1-28

- Rodrigo Asensio-Garriga, Alejandro Molina Zarca, Jordi Ortiz, Ana Hermosilla, Hugo Ramón Pascual, Antonio Pastor and Antonio Skarmeta
- Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review pp. 1-40

- Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, Pramod Kumar Soni and Vipin Balyan
- Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality pp. 1-18

- Ana Cassia Cruz, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão, Anabela Marto and Alexandrino Gonçalves
- MAGIC: Multi-User Advanced Graphic Immersive Configurator for Sustainable Customization of Complex Design Products—A Sailing Yacht Case Study pp. 1-18

- Saverio Piccininni, Mine Dastan, Fabio Vangi and Michele Fiorentino
- DTL-GNN: Digital Twin Lightweight Method Based on Graph Neural Network pp. 1-24

- Chengjun Li, Liguo Yao, Yao Lu, Songsong Zhang and Taihua Zhang
- A Review and Experimental Evaluation on Split Learning pp. 1-24

- Zhanyi Hu, Tianchen Zhou, Bingzhe Wu, Cen Chen and Yanhao Wang
- Investigation of Smart Machines with DNAs in SpiderNet pp. 1-24

- Mo Adda and Nancy Scheidt
- CORES: Context-Aware Emotion-Driven Recommendation System-Based LLM to Improve Virtual Shopping Experiences pp. 1-31

- Abderrahim Lakehal, Adel Alti and Boubakeur Annane
- Robust Synthetic Data Generation for Sequential Financial Models Using Hybrid Variational Autoencoder–Markov Chain Monte Carlo Architectures pp. 1-31

- Francesco Bruni Prenestino, Enrico Barbierato and Alice Gatti
- AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-Agents pp. 1-30

- Md Monjurul Karim, Dong Hoang Van, Sangeen Khan, Qiang Qu and Yaroslav Kholodov
- Ubunye: An MEC Orchestration Service Based on QoE, QoS, and Service Classification Using Machine Learning pp. 1-30

- Kilbert Amorim Maciel, David Martins Leite, Guilherme Alves de Araújo, Flavia C. Delicato and Atslands R. Rocha
- When Cybersecurity Meets Accessibility: A Holistic Development Architecture for Inclusive Cyber-Secure Web Applications and Websites pp. 1-30

- George Alex Stelea, Livia Sangeorzan and Nicoleta Enache-David
- Task-Driven Virtual Machine Optimization Placement Model and Algorithm pp. 1-30

- Ran Yang, Zhaonan Li, Junhao Qian and Zhihua Li
- From Bottom of Sea to Space: Quo Vadis IoT? So What About Security? pp. 1-57

- Behrouz Zolfaghari, Jacob Krzciok and Khodakhast Bibak
- Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN pp. 1-14

- Azita Pourghasem, Raimund Kirner, Athanasios Tsokanos, Iosif Mporas and Alexios Mylonas
- Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm pp. 1-50

- Gaetanino Paolone, Romolo Paesani, Francesco Pilotti, Jacopo Camplone, Andrea Piazza and Paolino Di Felice
Volume 17, issue 1, 2025
- A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility pp. 1-29

- Aviral Goel and Yogachandran Rahulamathavan
- Fake News Detection and Classification: A Comparative Study of Convolutional Neural Networks, Large Language Models, and Natural Language Processing Models pp. 1-29

- Konstantinos I. Roumeliotis, Nikolaos D. Tselikas and Dimitrios K. Nasiopoulos
- Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency pp. 1-29

- Alessio Ferone and Stefano Verrilli
- WebTrackingScore: A Combined Web Tracking Risk Score System for Websites pp. 1-20

- Álvaro D. Guillén Cava and Antonio Ruiz-Martínez
- A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT pp. 1-20

- Innocent Boakye Ababio, Jan Bieniek, Mohamed Rahouti, Thaier Hayajneh, Mohammed Aledhari, Dinesh C. Verma and Abdellah Chehri
- IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit pp. 1-20

- Wei Zhou, Shandian Shen and Peng Liu
- Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss pp. 1-20

- Aryan Sharma, Haoming Wang, Deepak Mishra and Aruna Seneviratne
- End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT pp. 1-20

- Matthew Boeding, Michael Hempel and Hamid Sharif
- A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints pp. 1-27

- Antonio Pinizzotto and Raffaele Bruno
- Explainable Security Requirements Classification Through Transformer Models pp. 1-27

- Luca Petrillo, Fabio Martinelli, Antonella Santone and Francesco Mercaldo
- Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading pp. 1-27

- Giuseppe Baruffa and Luca Rugini
- A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things pp. 1-54

- Yang Yang, Min Lin, Yangfei Lin, Chen Zhang and Celimuge Wu
- Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment pp. 1-17

- Francesco Morgan Bono, Alessio Polinelli, Luca Radicioni, Lorenzo Benedetti, Francesco Castelli-Dezza, Simone Cinquemani and Marco Belloli
- Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers pp. 1-17

- Daniela Gifu and Covaci Silviu-Vasile
- EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks pp. 1-21

- Sakshi Patni and Joohyung Lee
- Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention pp. 1-21

- Salvador López-Barajas, Pedro J. Sanz, Raúl Marín-Prades, Juan Echagüe and Sebastian Realpe
- Shared-Custodial Wallet for Multi-Party Crypto-Asset Management pp. 1-19

- Yimika Erinle, Yebo Feng, Jiahua Xu, Nikhil Vadgama and Paolo Tasca
- Ventinel: Automated Detection of Android Vishing Apps Using Optical Character Recognition pp. 1-19

- Daegyeom Kim, Sehwan O, Younghoon Ban, Jungsoo Park, Kyungho Joo and Haehyun Cho
- Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications pp. 1-19

- Teguh Indra Bayu, Yung-Fa Huang, Jeang-Kuo Chen, Cheng-Hsiung Hsieh, Budhi Kristianto, Erwien Christianto and Suharyadi Suharyadi
- A Survey on Cybersecurity in IoT pp. 1-32

- Elias Dritsas and Maria Trigka
- Survey of Artificial Intelligence Model Marketplace pp. 1-32

- Mian Qian, Abubakar Ahmad Musa, Milon Biswas, Yifan Guo, Weixian Liao and Wei Yu
- Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology pp. 1-35

- Tamai Ramírez-Gordillo, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López and Higinio Mora
- A Reference Architecture for Virtual Human Integration in the Metaverse: Enhancing the Galleries, Libraries, Archives, and Museums (GLAM) Sector with AI-Driven Experiences pp. 1-15

- Orestis Spyrou, William Hurst and Caspar Krampe
- The Time Machine: Future Scenario Generation Through Generative AI Tools pp. 1-15

- Jan Ferrer i Picó, Michelle Catta-Preta, Alex Trejo Omeñaca, Marc Vidal and Josep Maria Monguet i Fierro
- Blockchain and Artificial Intelligence for Decentralized Edge Environments pp. 1-2

- Yuansong Qiao
- Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency pp. 1-25

- Chen Qiu, Ziang Wu, Haoda Wang, Qinglin Yang, Yu Wang and Chunhua Su
- Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0 pp. 1-16

- Italo Cesidio Fantozzi, Annalisa Santolamazza, Giancarlo Loy and Massimiliano Maria Schiraldi
- Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering pp. 1-22

- M. Baqer
- GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks pp. 1-26

- Vahid Babaey and Arun Ravindran
- Impact of Weather Factors on Unmanned Aerial Vehicles’ Wireless Communications pp. 1-26

- Lalan Mishra and Naima Kaabouch
- Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT) pp. 1-24

- Nemat Hazrati, Sajjad Pirahesh, Bahman Arasteh, Seyed Salar Sefati, Octavian Fratu and Simona Halunga
- FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model pp. 1-24

- Xiaozheng Du, Shijing Hu, Feng Zhou, Cheng Wang and Binh Minh Nguyen
- Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios pp. 1-24

- Zhiyuan Wang and Yuezhi Zhou
- Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks pp. 1-24

- Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu and Kuo-Yu Tsai
- Deep Learning Framework for Advanced De-Identification of Protected Health Information pp. 1-24

- Ahmad Aloqaily, Emad E. Abdallah, Rahaf Al-Zyoud, Esraa Abu Elsoud, Malak Al-Hassan and Alaa E. Abdallah
- Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning pp. 1-39

- Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier García Villalba
- Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites pp. 1-30

- Georgios Fevgas, Thomas Lagkas, Panagiotis Sarigiannidis and Vasileios Argyriou
- Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning pp. 1-30

- Muhammad Dilshad, Madiha Haider Syed and Semeen Rehman
- Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution pp. 1-41

- Elmin Marevac, Esad Kadušić, Nataša Živić, Nevzudin Buzađija and Samir Lemeš
- XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System pp. 1-28

- Maiada M. Mahmoud, Yasser Omar Youssef and Ayman A. Abdel-Hamid
- Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities pp. 1-28

- Marica Amadeo and Giuseppe Ruggeri
- A Blockchain-Based Protocol for Fair Delivery for Receipts pp. 1-23

- M. Francisca Hinarejos, Josep-Lluis Ferrer-Gomila, Andreu-Pere Isern-Deyà and Gerardo-Francisco Chévez-Alvarado
- A Lightweight AI-Based Approach for Drone Jamming Detection pp. 1-23

- Sergio Cibecchini, Francesco Chiti and Laura Pierucci
- A Hierarchical Cache Architecture-Oriented Cache Management Scheme for Information-Centric Networking pp. 1-23

- Yichao Chao and Rui Han
- Collaboration in a Virtual Reality Serious Escape Room in the Metaverse Improves Academic Performance and Learners’ Experiences pp. 1-23

- Antonia-Maria Pazakou, Stylianos Mystakidis and Ioannis Kazanidis
- On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture pp. 1-23

- Niroshinie Fernando, Samir Shrestha, Seng W. Loke and Kevin Lee
- High-Risk AI Systems—Lie Detection Application pp. 1-23

- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou and Dimosthenis Anagnostopoulos
- Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things pp. 1-23

- Sumaiah Algarni and Fathi E. Abd El-Samie
- Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers pp. 1-23

- Víctor Pérez-Cano and Francisco Jurado
| |