Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 17, issue 8, 2025
- An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention pp. 1-31

- Ndukwe Ukeje, Jairo A. Gutierrez, Krassie Petrova and Ugochukwu Chinonso Okolie
- TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs pp. 1-31

- Soundes Oumaima Boufaida, Abdelmadjid Benmachiche, Makhlouf Derdour, Majda Maatallah, Moustafa Sadek Kahil and Mohamed Chahine Ghanem
- Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation pp. 1-24

- Jatinder Pal Singh, Aqsa Aqsa, Imran Ghani, Raj Sonani and Vijay Govindarajan
- Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol pp. 1-24

- Franco Frattolillo
- Privacy Framework for the Development of IoT-Based Systems pp. 1-36

- Yaqin Y. Shaheen, Miguel J. Hornos and Carlos Rodríguez-Domínguez
- RestRho: A JSON-Based Domain-Specific Language for Designing and Developing RESTful APIs to Validate RhoArchitecture pp. 1-36

- Enrique Chavarriaga, Luis Rojas, Francy D. Rodríguez, Kat Sorbello and Francisco Jurado
- Harmonized Autonomous–Human Vehicles via Simulation for Emissions Reduction in Riyadh City pp. 1-17

- Ali Louati, Hassen Louati and Elham Kariri
- Augmented Reality and Virtual Reality in Exergaming pp. 1-30

- Georgios Lampropoulos, Theofylaktos Anastasiadis and Juan Garzón
- A Multi-Layer Secure Sharing Framework for Aviation Big Data Based on Blockchain pp. 1-30

- Qing Wang, Zhijun Wu and Yanrong Lu
- Creating Automated Microsoft Bicep Application Infrastructure from GitHub in the Azure Cloud pp. 1-44

- Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
- Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT) pp. 1-18

- Abdullah Mohammed Alharthi, Fahad S. Altuwaijri, Mohammed Alsaadi, Mourad Elloumi and Ali A. M. Al-Kubati
- Editorial for the Special Issue “Virtual Reality and Metaverse: Impact on the Digital Transformation of Society—2nd Edition” pp. 1-3

- Diego Vergara
- Scalable and Efficient GCL Scheduling for Time-Aware Shaping in Autonomous and Cyber-Physical Systems pp. 1-25

- Chengwei Zhang and Yun Wang
- A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems pp. 1-42

- Mohamed Sayed Farghaly, Heba Kamal Aslan and Islam Tharwat Abdel Halim
- Efficient Machine Learning-Based Prediction of Solar Irradiance Using Multi-Site Data pp. 1-37

- Hassan N. Noura, Zaid Allal, Ola Salman and Khaled Chahine
- ETM: Modern Insights into Perspective on Text-to-SQL Evaluation in the Age of Large Language Models pp. 1-16

- Benjamin G. Ascoli, Yasoda Sai Ram Kandikonda and Jinho D. Choi
- An Efficient Internet-Wide Scan Approach Based on Location Awareness pp. 1-16

- Wenqi Shi, Huiling Shi, Hao Hao and Qiuyu Guan
- Transforming Data Annotation with AI Agents: A Review of Architectures, Reasoning, Applications, and Impact pp. 1-38

- Md Monjurul Karim, Sangeen Khan, Dong Hoang Van, Xinyue Liu, Chunhui Wang and Qiang Qu
- Enhancing Industrial Processes Through Augmented Reality: A Scoping Review pp. 1-38

- Alba Miranda, Aracely M. Vallejo, Paulina Ayala, Marcelo V. Garcia and Jose E. Naranjo
- DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN pp. 1-29

- Shengmin Peng, Jialin Tian, Xiangyu Zheng, Shuwu Chen and Zhaogang Shu
- MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT pp. 1-22

- Jian Tang, Zhao Huang and Chunqiang Li
- Neural Network-Informed Lotka–Volterra Dynamics for Cryptocurrency Market Analysis pp. 1-22

- Dimitris Kastoris, Dimitris Papadopoulos and Konstantinos Giotopoulos
- A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains pp. 1-22

- John Byrd, Kritagya Upadhyay, Samir Poudel, Himanshu Sharma and Yi Gu
- The Future of Education: A Systematic Literature Review of Self-Directed Learning with AI pp. 1-22

- Carmen del Rosario Navas Bonilla, Luis Miguel Viñan Carrasco, Jhoanna Carolina Gaibor Pupiales and Daniel Eduardo Murillo Noriega
- Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions pp. 1-28

- Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
- Privacy-Preserving Federated Unlearning with Ontology-Guided Relevance Modeling for Secure Distributed Systems pp. 1-32

- Naglaa E. Ghannam and Esraa A. Mahareek
- EsCorpiusBias: The Contextual Annotation and Transformer-Based Detection of Racism and Sexism in Spanish Dialogue pp. 1-32

- Ksenia Kharitonova, David Pérez-Fernández, Javier Gutiérrez-Hernando, Asier Gutiérrez-Fandiño, Zoraida Callejas and David Griol
- Model Retraining upon Concept Drift Detection in Network Traffic Big Data pp. 1-23

- Sikha S. Bagui, Mohammad Pale Khan, Chedlyne Valmyr, Subhash C. Bagui and Dustin Mink
- SARAC4N: Socially and Resource-Aware Caching in Clustered Content-Centric Networks pp. 1-23

- Amir Raza Khan, Umar Shoaib and Hannan Bin Liaqat
- AI-Supported EUD for Data Visualization: An Exploratory Case Study pp. 1-23

- Sara Beschi, Daniela Fogli, Luigi Gargioni and Angela Locoro
- Edge-FLGuard+: A Federated and Lightweight Anomaly Detection Framework for Securing 5G-Enabled IoT in Smart Homes pp. 1-14

- Manuel J. C. S. Reis
- A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps pp. 1-27

- Zhonghao Zhai, Junyi Liu, Xinying Liu, Yanqin Mao, Xinjun Zhang, Jialin Ma and Chunhua Jin
- Beyond Prompt Chaining: The TB-CSPN Architecture for Agentic AI pp. 1-27

- Uwe M. Borghoff, Paolo Bottoni and Remo Pareschi
- The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses pp. 1-41

- Leandro Antonio Pazmiño Ortiz, Ivonne Fernanda Maldonado Soliz and Vanessa Katherine Guevara Balarezo
- Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks pp. 1-19

- Saif Safaa Shakir, Leyli Mohammad Khanli and Hojjat Emami
- Impact of Audio Delay and Quality in Network Music Performance pp. 1-20

- Konstantinos Tsioutas, George Xylomenos and Ioannis Doumanis
- DigiHortiRobot: An AI-Driven Digital Twin Architecture for Hydroponic Greenhouse Horticulture with Dual-Arm Robotic Automation pp. 1-15

- Roemi Fernández, Eduardo Navas, Daniel Rodríguez-Nieto, Alain Antonio Rodríguez-González and Luis Emmi
- A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics pp. 1-15

- Rajganesh Nagarajan, Vinothiyalakshmi Palanichamy, Ramkumar Thirunavukarasu and J. Arun Pandian
- Rethinking Modbus-UDP for Real-Time IIoT Systems pp. 1-21

- Ivan Cibrario Bertolotti
- Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges pp. 1-21

- Simeon Ogunbunmi, Yu Chen, Qi Zhao, Deeraj Nagothu, Sixiao Wei, Genshe Chen and Erik Blasch
- A Novel Framework Leveraging Large Language Models to Enhance Cold-Start Advertising Systems pp. 1-21

- Albin Uruqi, Iosif Viktoratos and Athanasios Tsadiras
- Enabling Horizontal Collaboration in Logistics Through Secure Multi-Party Computation pp. 1-21

- Gabriele Spini, Stephan Krenn, Erich Teppan, Christina Petschnigg and Elena Wiegelmann
- A Verilog Programming Learning Assistant System Focused on Basic Verilog with a Guided Learning Method pp. 1-34

- Pin-Chieh Hsieh, Tzu-Lun Fang, Shaobo Jin, Yuyan Wang, Nobuo Funabiki and Yu-Cheng Fan
- Lightweight Anomaly Detection in Digit Recognition Using Federated Learning pp. 1-34

- Anja Tanović and Ivan Mezei
- Real-Time Fall Monitoring for Seniors via YOLO and Voice Interaction pp. 1-26

- Eugenia Tîrziu, Ana-Mihaela Vasilevschi, Adriana Alexandru and Eleonora Tudora
- Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments pp. 1-26

- Daniel Sernández-Iglesias, Llanos Tobarra, Rafael Pastor-Vargas, Antonio Robles-Gómez, Pedro Vidal-Balboa and João Sarraipa
- Parallel Algorithm for NP-Hard Problem of Channel Resource Allocation Optimization in Ad Hoc and Sensor Networks pp. 1-26

- Valeriy Ivanov and Maxim Tereshonok
Volume 17, issue 7, 2025
- Lower-Latency Screen Updates over QUIC with Forward Error Correction pp. 1-25

- Nooshin Eghbal and Paul Lu
- Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection pp. 1-25

- Ma Viet Duc, Pham Minh Dang, Tran Thu Phuong, Truong Duc Truong, Vu Hai and Nguyen Huu Thanh
- Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey pp. 1-42

- Manal Alharthi, Faiza Medjek and Djamel Djenouri
- Metaverse Architectures: A Comprehensive Systematic Review of Definitions and Frameworks pp. 1-33

- Cemile Boztas, Essam Ghadafi and Rasha Ibrahim
- TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing pp. 1-33

- Hisham Ali, William J. Buchanan, Jawad Ahmad, Marwan Abubakar, Muhammad Shahbaz Khan and Isam Wadhaj
- IoT-Edge Hybrid Architecture with Cross-Modal Transformer and Federated Manifold Learning for Safety-Critical Gesture Control in Adaptive Mobility Platforms pp. 1-16

- Xinmin Jin, Jian Teng and Jiaji Chen
- AI-Based Learning Recommendations: Use in Higher Education pp. 1-22

- Prabin Dahal, Saptadi Nugroho, Claudia Schmidt and Volker Sänger
- AUV Trajectory Planning for Optimized Sensor Data Collection in Internet of Underwater Things pp. 1-22

- Talal S. Almuzaini and Andrey V. Savkin
- FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments pp. 1-22

- Bruno Ramos-Cruz, Francisco J. Quesada-Real, Javier Andreu-Pérez and Jessica Zaqueros-Martinez
- The Investigation of Queuing Models to Calculate Journey Times to Develop an Intelligent Transport System for Smart Cities pp. 1-22

- Vatsal Mehta, Glenford Mapp and Vaibhav Gandhi
- Responsible Resilience in Cyber–Physical–Social Systems: A New Paradigm for Emergent Cyber Risk Modeling pp. 1-24

- Theresa Sobb, Nour Moustafa and Benjamin Turnbull
- Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review pp. 1-24

- Juan Ochoa-Aldeán, Carlos Silva-Cárdenas, Renato Torres, Jorge Ivan Gonzalez and Sergio Fortes
- ICRSSD: Identification and Classification for Railway Structured Sensitive Data pp. 1-24

- Yage Jin, Hongming Chen, Rui Ma, Yanhua Wu and Qingxin Li
- HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications pp. 1-24

- Saud Alharbi, Wasan Awad and David Bell
- Measurement of the Functional Size of Web Analytics Implementation: A COSMIC-Based Case Study Using Machine Learning pp. 1-31

- Ammar Abdallah, Alain Abran, Munthir Qasaimeh, Malik Qasaimeh and Bashar Abdallah
- A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing pp. 1-31

- Fateme Mazloomi, Shahram Shah Heydari and Khalil El-Khatib
- A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks pp. 1-17

- Sridhar Varadala and Hao Xu
- Tourism Sentiment Chain Representation Model and Construction from Tourist Reviews pp. 1-30

- Bosen Li, Rui Li, Junhao Wang and Aihong Song
- Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector pp. 1-30

- Germán Rodríguez-Galán, Eduardo Benavides-Astudillo, Daniel Nuñez-Agurto, Pablo Puente-Ponce, Sonia Cárdenas-Delgado and Mauricio Loachamín-Valencia
- Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks pp. 1-18

- Matthew Boeding, Paul Scalise, Michael Hempel, Hamid Sharif and Juan Lopez
- A UAV Trajectory Optimization and Task Offloading Strategy Based on Hybrid Metaheuristic Algorithm in Mobile Edge Computing pp. 1-19

- Yeqiang Zheng, An Li, Yihu Wen and Gaocai Wang
- A Case Study on Monolith to Microservices Decomposition with Variational Autoencoder-Based Graph Neural Network pp. 1-19

- Rokin Maharjan, Korn Sooksatra, Tomas Cerny, Yudeep Rajbhandari and Sakshi Shrestha
- Attack Surface Score for Software Systems pp. 1-19

- Yudeep Rajbhandari, Rokin Maharjan, Sakshi Shrestha and Tomas Cerny
- ERA-MADDPG: An Elastic Routing Algorithm Based on Multi-Agent Deep Deterministic Policy Gradient in SDN pp. 1-20

- Wanwei Huang, Hongchang Liu, Yingying Li and Linlin Ma
- Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks pp. 1-20

- Kenan Honore Robacky Mbongo, Kanwal Ahmed, Orken Mamyrbayev, Guanghui Wang, Fang Zuo, Ainur Akhmediyarova, Nurzhan Mukazhanov and Assem Ayapbergenova
- Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions pp. 1-87

- Jean Paul A. Yaacoub, Hassan N. Noura, Ola Salman and Khaled Chahine
- Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV) pp. 1-40

- Isra Mahmoudi, Djallel Eddine Boubiche, Samir Athmani, Homero Toral-Cruz and Freddy I. Chan-Puc
- Optimizing Trajectories for Rechargeable Agricultural Robots in Greenhouse Climatic Sensing Using Deep Reinforcement Learning with Proximal Policy Optimization Algorithm pp. 1-21

- Ashraf Sharifi, Sara Migliorini and Davide Quaglia
- Enhancing Security in 5G and Future 6G Networks: Machine Learning Approaches for Adaptive Intrusion Detection and Prevention pp. 1-21

- Konstantinos Kalodanis, Charalampos Papapavlou and Georgios Feretzakis
- An Experimental Tethered UAV-Based Communication System with Continuous Power Supply pp. 1-34

- Veronica Rodriguez, Christian Tipantuña, Diego Reinoso, Jorge Carvajal-Rodriguez, Carlos Egas Acosta, Pablo Proaño and Xavier Hesselbach
- An Optimized Transformer–GAN–AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets pp. 1-34

- Ahmad Salehiyan, Pardis Sadatian Moghaddam and Masoud Kaveh
- Advancing Neurodegenerative Disease Management: Technical, Ethical, and Regulatory Insights from the NeuroPredict Platform pp. 1-34

- Marilena Ianculescu, Lidia Băjenaru, Ana-Mihaela Vasilevschi, Maria Gheorghe-Moisii and Cristina-Gabriela Gheorghe
- The Role of Multi-Agent Systems in Realizing Asset Administration Shell Type 3 pp. 1-26

- Lucas Sakurada, Fernando De la Prieta and Paulo Leitao
- Leveraging Blockchain for Ethical AI: Mitigating Digital Threats and Strengthening Societal Resilience pp. 1-47

- Chibuzor Udokwu, Roxana Voicu-Dorobanțu, Abiodun Afolayan Ogunyemi, Alex Norta, Nata Sturua and Stefan Craß
- Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing pp. 1-28

- Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty and Elias Kougianos
- Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users pp. 1-28

- George Alex Stelea, Livia Sangeorzan and Nicoleta Enache-David
- Towards Automatic Detection of Pneumothorax in Emergency Care with Deep Learning Using Multi-Source Chest X-ray Data pp. 1-28

- Santiago Ibañez Caturla, Juan de Dios Berná Mestre and Oscar Martinez Mozos
- An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec pp. 1-28

- Xinyu Li, Xiaoying Wang, Guoqing Yang, Jinsha Zhang, Chunhui Li, Fangfang Cui and Ruize Gu
- A Review of Research on Secure Aggregation for Federated Learning pp. 1-39

- Xing Zhang, Yuexiang Luo and Tianning Li
- A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware pp. 1-55

- Mazen Gazzan, Bader Alobaywi, Mohammed Almutairi and Frederick T. Sheldon
- SatScope: A Data-Driven Simulator for Low-Earth-Orbit Satellite Internet pp. 1-23

- Qichen Wang, Guozheng Yang, Yongyu Liang, Chiyu Chen, Qingsong Zhao and Sugai Chen
- The Internet of Things, Fog, and Cloud Continuum: Integration Challenges and Opportunities for Smart Cities pp. 1-23

- Rodger Lea, Toni Adame, Alexandre Berne and Selma Azaiez
- An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network pp. 1-23

- Vidhya Prakash Rajendran, Deepalakshmi Perumalsamy, Chinnasamy Ponnusamy and Ezhil Kalaimannan
- Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks pp. 1-35

- Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb and Adnan Kabbani
- Intelligent Transmission Control Scheme for 5G mmWave Networks Employing Hybrid Beamforming pp. 1-35

- Hazem (Moh’d Said) Hatamleh, As’ad Mahmoud As’ad Alnaser, Roba Mahmoud Ali Aloglah, Tomader Jamil Bani Ata, Awad Mohamed Ramadan and Omar Radhi Aqeel Alzoubi
- Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions pp. 1-35

- Shruti Kulkarni, Alexios Mylonas and Stilianos Vidalis
- Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City pp. 1-14

- Gabriel Sepúlveda-Cervantes, Eduardo Vega-Alvarado, Edgar Alfredo Portilla-Flores and Eduardo Vivanco-Rodríguez
- Cross-Lingual Cross-Domain Transfer Learning for Rumor Detection pp. 1-27

- Eliana Providel, Marcelo Mendoza and Mauricio Solar
- Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications pp. 1-27

- Haoming Wang, Aryan Sharma, Deepak Mishra, Aruna Seneviratne and Eliathamby Ambikairajah
- TriagE-NLU: A Natural Language Understanding System for Clinical Triage and Intervention in Multilingual Emergency Dialogues pp. 1-27

- Béatrix-May Balaban, Ioan Sacală and Alina-Claudia Petrescu-Niţă
- Parallel Agent-Based Framework for Analyzing Urban Agricultural Supply Chains pp. 1-27

- Manuel Ignacio Manríquez, Veronica Gil-Costa and Mauricio Marin
Volume 17, issue 6, 2025
- Machine Learning and Deep Learning-Based Atmospheric Duct Interference Detection and Mitigation in TD-LTE Networks pp. 1-29

- Rasendram Muralitharan, Upul Jayasinghe, Roshan G. Ragel and Gyu Myoung Lee
- Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8 pp. 1-29

- Momotaz Begum, Abm Kamrul Islam Riad, Abdullah Al Mamun, Thofazzol Hossen, Salah Uddin, Md Nurul Absur and Hossain Shahriar
- Inter-Data Center RDMA: Challenges, Status, and Future Directions pp. 1-22

- Xiaoying Huang and Jingwei Wang
- An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain pp. 1-22

- Mahmoud Elkhodr
- Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine pp. 1-25

- Rene Francisco Santana-Cruz, Martin Moreno, Daniel Aguilar-Torres, Román Arturo Valverde-Domínguez and Rubén Vázquez-Medina
- Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks pp. 1-60

- Mohammed El-Hajj
- LLM4Rec: A Comprehensive Survey on the Integration of Large Language Models in Recommender Systems—Approaches, Applications and Challenges pp. 1-37

- Sarama Shehmir and Rasha Kashef
- Resource Allocation for Federated Learning with Heterogeneous Computing Capability in Cloud–Edge–Client IoT Architecture pp. 1-18

- Xubo Zhang and Yang Luo
- Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT pp. 1-18

- Haixu Niu, Yonghai Li, Shuaixin Hou, Tianfei Chen, Lijun Sun, Mingyang Gu and Muhammad Irsyad Abdullah
- Network-, Cost-, and Renewable-Aware Ant Colony Optimization for Energy-Efficient Virtual Machine Placement in Cloud Datacenters pp. 1-30

- Ali Mohammad Baydoun and Ahmed Sherif Zekri
- Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach pp. 1-30

- Hany F. Atlam and Yifu Yang
- Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review pp. 1-17

- Tobias Rødahl Thingnes and Per Håkon Meland
- Multi Stage Retrieval for Web Search During Crisis pp. 1-17

- Claudiu Constantin Tcaciuc, Daniele Rege Cambrin and Paolo Garza
- Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments pp. 1-36

- Pardis Sadatian Moghaddam, Ali Vaziri, Sarvenaz Sadat Khatami, Francisco Hernando-Gallego and Diego Martín
- A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy pp. 1-36

- Pilleriin Lillemets, Nabaa Bashir Jawad, Joseph Kashi, Ahmad Sabah and Nicola Dragoni
- A Tale of Many Networks: Splitting and Merging of Chord-like Overlays in Partitioned Networks pp. 1-31

- Tobias Amft and Kalman Graffi
- LLM Performance in Low-Resource Languages: Selecting an Optimal Model for Migrant Integration Support in Greek pp. 1-24

- Alexandros Tassios, Stergios Tegos, Christos Bouas, Konstantinos Manousaridis, Maria Papoutsoglou, Maria Kaltsa, Eleni Dimopoulou, Thanassis Mavropoulos, Stefanos Vrochidis and Georgios Meditskos
- Joint Exploitation of Physical-Layer and Artificial Features for Privacy-Preserving Distributed Source Camera Identification pp. 1-24

- Hui Tian, Haibao Chen, Yuyan Zhao and Jiawei Zhang
- An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels pp. 1-24

- Yiannis Kiouvrekis, Katerina Gkirtzou, Sotiris Zikas, Dimitris Kalatzis, Theodor Panagiotakopoulos, Zoran Lajic, Dimitris Papathanasiou and Ioannis Filippopoulos
- Enhancing Customer Quality of Experience Through Omnichannel Digital Strategies: Evidence from a Service Environment in an Emerging Context pp. 1-26

- Fabricio Miguel Moreno-Menéndez, Victoriano Eusebio Zacarías-Rodríguez, Sara Ricardina Zacarías-Vallejos, Vicente González-Prida, Pedro Emil Torres-Quillatupa, Hilario Romero-Girón, José Francisco Vía y Rada-Vittes and Luis Ángel Huaynate-Espejo
- Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems pp. 1-26

- Mohammed N. Alenezi
- A Deep Learning Approach for Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional Neural Networks pp. 1-21

- Ali Abdi Seyedkolaei, Fatemeh Mahmoudi and José García
- AI-Driven Framework for Evaluating Climate Misinformation and Data Quality on Social Media pp. 1-21

- Zeinab Shahbazi, Rezvan Jalali and Zahra Shahbazi
- Navigating Data Corruption in Machine Learning: Balancing Quality, Quantity, and Imputation Strategies pp. 1-21

- Qi Liu and Wanjing Ma
- Building Equi-Width Histograms on Homomorphically Encrypted Data pp. 1-21

- Dragoș Lazea, Anca Hangan and Tudor Cioara
- JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs) pp. 1-21

- Jorge Cisneros-González, Natalia Gordo-Herrera, Iván Barcia-Santos and Javier Sánchez-Soriano
- Analysis of Digital Skills and Infrastructure in EU Countries Based on DESI 2024 Data pp. 1-20

- Kvitoslava Obelovska, Andrii Abziatov, Anastasiya Doroshenko, Ivanna Dronyuk, Oleh Liskevych and Rostyslav Liskevych
- Grouping-Based Dynamic Routing, Core, and Spectrum Allocation Method for Avoiding Spectrum Fragmentation and Inter-Core Crosstalk in Multi-Core Fiber Networks pp. 1-20

- Funa Fukui, Tomotaka Kimura, Yutaka Fukuchi and Kouji Hirata
- Exact and Approximation Algorithms for Task Offloading with Service Caching and Dependency in Mobile Edge Computing pp. 1-20

- Bowen Cui and Jianwei Zhang
- Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services pp. 1-54

- Dimitrios G. Arnaoutoglou, Tzichat M. Empliouk, Theodoros N. F. Kaifas, Constantinos L. Zekios and George A. Kyriacou
- A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols pp. 1-19

- Iftikhar Hussain, Manuel J. C. S. Reis, Carlos Serôdio and Frederico Branco
- Position Accuracy and Distributed Beamforming Performance in WSNs: A Simulation Study pp. 1-12

- José Casca, Prabhat Gupta, Marco Gomes, Vitor Silva and Rui Dinis
- Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment pp. 1-35

- Sikha S. Bagui, Germano Correa Silva De Carvalho, Asmi Mishra, Dustin Mink, Subhash C. Bagui and Stephanie Eager
- Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP pp. 1-23

- Kazi Fatema, Samrat Kumar Dey, Mehrin Anannya, Risala Tasin Khan, Mohammad Mamunur Rashid, Chunhua Su and Rashed Mazumder
- Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT) pp. 1-23

- Naveed Ahmed, Md Asri Ngadi, Abdulaleem Ali Almazroi and Nouf Atiahallah Alghanmi
- Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI pp. 1-23

- Leandro Antonio Pazmiño Ortiz, Ivonne Fernanda Maldonado Soliz and Vanessa Katherine Guevara Balarezo
- A Robust Conformal Framework for IoT-Based Predictive Maintenance pp. 1-27

- Alberto Moccardi, Claudia Conte, Rajib Chandra Ghosh and Francesco Moscato
- Semantic Fusion of Health Data: Implementing a Federated Virtualized Knowledge Graph Framework Leveraging Ontop System pp. 1-27

- Abid Ali Fareedi, Stephane Gagnon, Ahmad Ghazawneh and Raul Valverde
- Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection pp. 1-27

- Sangita Baruah, Vaskar Deka, Dulumani Das, Utpal Barman and Manob Jyoti Saikia
- A C-Based Framework for Low-Cost Real-Time Embedded Systems pp. 1-27

- Ivan Cibrario Bertolotti
- A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication pp. 1-14

- Tzung-Her Chen
- Optimization of Ground Station Energy Saving in LEO Satellite Constellations for Earth Observation Applications pp. 1-32

- Francesco Valente, Francesco Giacinto Lavacca, Marco Polverini, Tiziana Fiori and Vincenzo Eramo
Volume 17, issue 5, 2025
- Using Machine Learning to Detect Vault (Anti-Forensic) Apps pp. 1-15

- Michael N. Johnstone, Wencheng Yang and Mohiuddin Ahmed
- XGBoost-Based Detection of DDoS Attacks in Named Data Networking pp. 1-15

- Liang Liu, Weiqing Yu, Zhijun Wu and Silin Peng
- Ephemeral Node Identifiers for Enhanced Flow Privacy pp. 1-26

- Gregor Tamati Haywood and Saleem Noel Bhatti
- Research on Advancing Radio Wave Source Localization Technology Through UAV Path Optimization pp. 1-26

- Tomoroh Takahashi and Gia Khanh Tran
- Adversarial Training for Mitigating Insider-Driven XAI-Based Backdoor Attacks pp. 1-21

- R. G. Gayathri, Atul Sajjanhar and Yong Xiang
- Real-Time Identification of Look-Alike Medical Vials Using Mixed Reality-Enabled Deep Learning pp. 1-21

- Bahar Uddin Mahmud, Guanyue Hong, Virinchi Ravindrakumar Lalwani, Nicholas Brown and Zachary D. Asher
- Towards Safer Cities: AI-Powered Infrastructure Fault Detection Based on YOLOv11 pp. 1-20

- Raiyen Z. Rakin, Mahmudur Rahman, Kanij F. Borsa, Fahmid Al Farid, Shakila Rahman, Jia Uddin and Hezerul Abdul Karim
- BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network pp. 1-20

- Wanwei Huang, Huicong Yu, Yingying Li, Xi He and Rui Chen
- A Network Traffic Characteristics Reconstruction Method for Mitigating the Impact of Packet Loss in Edge Computing Scenarios pp. 1-20

- Jiawei Ye, Yanting Chen, Aierpanjiang Simayi, Yu Liu, Zhihui Lu and Jie Wu
- Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs pp. 1-20

- Jing Li, Wei Zong, Yang-Wai Chow and Willy Susilo
- Correction: Kalodanis et al. High-Risk AI Systems—Lie Detection Application. Future Internet 2025, 17, 26 pp. 1-2

- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou and Dimosthenis Anagnostopoulos
- Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR pp. 1-23

- Mingjun Wang, Xuezhi Zhang, Feng Jing and Mei Gao
- A Blockchain-Based Strategy for Certifying Timestamps in a Distributed Healthcare Emergency Response Systems pp. 1-23

- Daniele Marletta, Alessandro Midolo and Emiliano Tramontana
- U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds pp. 1-23

- Jiawei Ye, Ming Yan, Shenglin Wu, Jingxuan Tan and Jie Wu
- Integrating AIoT Technologies in Aquaculture: A Systematic Review pp. 1-35

- Fahmida Wazed Tina, Nasrin Afsarimanesh, Anindya Nag and Md Eshrat E. Alahi
- AI-Powered Stroke Diagnosis System: Methodological Framework and Implementation pp. 1-27

- Marta Narigina, Agris Vindecs, Dušanka Bošković, Yuri Merkuryev and Andrejs Romanovs
- DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization pp. 1-27

- Hardi Sabah Talabani, Zrar Khalid Abdul and Hardi Mohammed Mohammed Saleh
- An Improved Reference Paper Collection System Using Web Scraping with Three Enhancements pp. 1-28

- Tresna Maulana Fahrudin, Nobuo Funabiki, Komang Candra Brata, Inzali Naing, Soe Thandar Aung, Amri Muhaimin and Dwi Arman Prasetya
- Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System pp. 1-32

- Hanen Ben Rjeb, Layth Sliman, Hela Zorgati, Raoudha Ben Djemaa and Amine Dhraief
- SoK: Delegated Security in the Internet of Things pp. 1-55

- Emiliia Geloczi, Felix Klement, Patrick Struck and Stefan Katzenbeisser
- Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings pp. 1-38

- Rosario G. Garroppo, Pietro Giuseppe Giardina, Giada Landi and Marco Ruta
- Classification of Hacker’s Posts Based on Zero-Shot, Few-Shot, and Fine-Tuned LLMs in Environments with Constrained Resources pp. 1-22

- Theodoros Giannilias, Andreas Papadakis, Nikolaos Nikolaou and Theodore Zahariadis
- A Web-Based Application for Smart City Data Analysis and Visualization pp. 1-22

- Panagiotis Karampakakis, Despoina Ioakeimidou, Periklis Chatzimisios and Konstantinos A. Tsintotas
- A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture pp. 1-22

- Rui Lu, Lei Shi, Yinlong Liu and Zhongkai Dang
- Enhanced Propaganda Detection in Public Social Media Discussions Using a Fine-Tuned Deep Learning Model: A Diffusion of Innovation Perspective pp. 1-33

- Pir Noman Ahmad, Adnan Muhammad Shah and KangYoon Lee
- Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach pp. 1-16

- Cristian Bua, Francesco Fiorini, Michele Pagano, Davide Adami and Stefano Giordano
- A Portable Non-Motorized Smart IoT Weather Station Platform for Urban Thermal Comfort Studies pp. 1-16

- Raju Sethupatu Bala, Salaheddin Hosseinzadeh, Farhad Sadeghineko, Craig Scott Thomson and Rohinton Emmanuel
- Railway Cloud Resource Management as a Service pp. 1-30

- Ivaylo Atanasov, Dragomira Dimitrova, Evelina Pencheva and Ventsislav Trifonov
- Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration pp. 1-30

- Negin Jahanbakhsh, Mario Vega-Barbas, Iván Pau, Lucas Elvira-Martín, Hirad Moosavi and Carolina García-Vázquez
- Explainable AI Assisted IoMT Security in Future 6G Networks pp. 1-30

- Navneet Kaur and Lav Gupta
- Feature Extraction in 5G Wireless Systems: A Quantum Cat Swarm and Wavelet-Based Approach pp. 1-18

- Anand Raju and Sathishkumar Samiappan
- C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers’ Power Consumption pp. 1-18

- Marcello Artioli, Andrea Borghesi, Marta Chinnici, Anna Ciampolini, Michele Colonna, Davide De Chiara and Daniela Loreti
- A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks pp. 1-18

- Anubhav Kumar, Rajamani Radhakrishnan, Mani Sumithra, Prabu Kaliyaperumal, Balamurugan Balusamy and Francesco Benedetto
- Industrial Internet of Things (IIoT): Trends and Technologies pp. 1-3

- Zhihao Liu, Franco Davoli and Davide Borsatti
- Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers pp. 1-13

- Lingfeng Shen, Jiangtao Nie, Ming Li, Guanghui Wang, Qiankun Zhang and Xin He
- Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods pp. 1-36

- Mohammad Jaminur Islam, Saminur Islam, Mahmud Hossain, Shahid Noor and S. M. Riazul Islam
- Multi-Criteria Genetic Algorithm for Optimizing Distributed Computing Systems in Neural Network Synthesis pp. 1-36

- Valeriya V. Tynchenko, Ivan Malashin, Sergei O. Kurashkin, Vadim Tynchenko, Andrei Gantimurov, Vladimir Nelyub and Aleksei Borodulin
- Leveraging Blockchain Technology for Secure 5G Offloading Processes pp. 1-31

- Cristina Regueiro, Santiago de Diego and Borja Urkizu
- A Machine Learning Approach for Predicting Maternal Health Risks in Lower-Middle-Income Countries Using Sparse Data and Vital Signs pp. 1-17

- Avnish Malde, Vishnunarayan Girishan Prabhu, Dishant Banga, Michael Hsieh, Chaithanya Renduchintala and Ronald Pirrallo
- Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security pp. 1-17

- Guobin Xu, Oluwole Adetifa, Jianzhou Mao, Eric Sakk and Shuangbao Wang
- Implementation and Performance Analysis of an Industrial Robot’s Vision System Based on Cloud Vision Services pp. 1-17

- Ioana-Livia Stefan, Andrei Mateescu, Ionut Lentoiu, Silviu Raileanu, Florin Daniel Anton, Dragos Constantin Popescu and Ioan Stefan Sacala
- Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks pp. 1-17

- Alexander Gegov, Boriana Vatchova, Yordanka Boneva and Alexandar Ichtev
Volume 17, issue 4, 2025
- Knowledge Sharing in Security-Sensitive Communities pp. 1-22

- Yonit Rusho, Daphne Ruth Raban, David Simantov and Gilad Ravid
- Reinforcement Learning-Based Dynamic Fuzzy Weight Adjustment for Adaptive User Interfaces in Educational Software pp. 1-22

- Christos Troussas, Akrivi Krouska, Phivos Mylonas and Cleo Sgouropoulou
- Multimodal Fall Detection Using Spatial–Temporal Attention and Bi-LSTM-Based Feature Fusion pp. 1-22

- Jungpil Shin, Abu Saleh Musa Miah, Rei Egawa, Najmul Hassan, Koki Hirooka and Yoichi Tomioka
- Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach pp. 1-29

- Ali Vaziri, Pardis Sadatian Moghaddam, Mehrdad Shoeibi and Masoud Kaveh
- Employing Streaming Machine Learning for Modeling Workload Patterns in Multi-Tiered Data Storage Systems pp. 1-37

- Edson Ramiro Lucas Filho, George Savva, Lun Yang, Kebo Fu, Jianqiang Shen and Herodotos Herodotou
- Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology pp. 1-37

- Adrian Alexandrescu, Delia-Elena Bărbuță, Cristian Nicolae Buțincu, Alexandru Archip, Silviu-Dumitru Pavăl, Cătălin Mironeanu and Gabriel-Alexandru Scînteie
- Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan pp. 1-25

- Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui
- Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms pp. 1-25

- Ali Zaman, Salman A. Khan, Nazeeruddin Mohammad, Abdelhamied A. Ateya, Sadique Ahmad and Mohammed A. ElAffendi
- Task Scheduling for Public Clouds Using a Fuzzy Controller-Based Priority- and Deadline-Aware Approach pp. 1-25

- Saad Qamar, Nesar Ahmad and Parvez Mahmood Khan
- Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms pp. 1-25

- Hajar Zaidani, Rim Koulali, Abderrahim Maizate and Mohamed Ouzzif
- GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering pp. 1-18

- Danial Ahmadzadeh, Mehrdad Jalali, Reza Ghaemi and Maryam Kheirabadi
- C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control pp. 1-18

- Efstratios Chatzoglou and Georgios Kambourakis
- Internet of Things and Deep Learning for Citizen Security: A Systematic Literature Review on Violence and Crime pp. 1-30

- Chrisbel Simisterra-Batallas, Pablo Pico-Valencia, Jaime Sayago-Heredia and Xavier Quiñónez-Ku
- A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks pp. 1-17

- Sunan Wang, Rong Song, Xiangyu Zheng, Wanwei Huang and Hongchang Liu
- Data-Driven Diagnostics for Pediatric Appendicitis: Machine Learning to Minimize Misdiagnoses and Unnecessary Surgeries pp. 1-24

- Deborah Maffezzoni, Enrico Barbierato and Alice Gatti
- The New CAP Theorem on Blockchain Consensus Systems pp. 1-24

- Aristidis G. Anagnostakis and Euripidis Glavas
- CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks pp. 1-24

- Junchao Wang, Honglin Li, Yan Sun, Chris Phillips, Alexios Mylonas and Dimitris Gritzalis
- Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario pp. 1-24

- Ivan Cibrario Bertolotti, Luca Durante and Enrico Cambiaso
- Analysis of Universal Decoding Techniques for 6G Ultra-Reliable and Low-Latency Communication Scenario pp. 1-24

- Abhilasha Gautam, Prabhat Thakur and Ghanshyam Singh
- Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets pp. 1-31

- Mohammed Salem Atoum, Ala Abdulsalam Alarood, Eesa Alsolami, Adamu Abubakar, Ahmad K. Al Hwaitat and Izzat Alsmadi
- GDPR and Large Language Models: Technical and Legal Obstacles pp. 1-26

- Georgios Feretzakis, Evangelia Vagena, Konstantinos Kalodanis, Paraskevi Peristera, Dimitris Kalles and Athanasios Anastasiou
- Practical Comparison Between the CI/CD Platforms Azure DevOps and GitHub pp. 1-26

- Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
- Comparative Feature-Guided Regression Network with a Model-Eye Pretrained Model for Online Refractive Error Screening pp. 1-26

- Jiayi Wang, Tianyou Zheng, Yang Zhang, Tianli Zheng and Weiwei Fu
- Edge AI for Real-Time Anomaly Detection in Smart Homes pp. 1-26

- Manuel J. C. S. Reis and Carlos Serôdio
- AI-MDD-UX: Revolutionizing E-Commerce User Experience with Generative AI and Model-Driven Development pp. 1-34

- Adel Alti and Abderrahim Lakehal
- Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions pp. 1-21

- Oladele Afolalu and Mohohlo Samuel Tsoeu
- A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies pp. 1-21

- Paul Scalise, Michael Hempel and Hamid Sharif
- Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models pp. 1-21

- Jaewoo Yang, Hayun Kim, Junyung Ji and Younghoon Kim
- A Systematic Review on the Combination of VR, IoT and AI Technologies, and Their Integration in Applications pp. 1-40

- Dimitris Kostadimas, Vlasios Kasapakis and Konstantinos Kotis
- Distributed Reputation for Accurate Vehicle Misbehavior Reporting (DRAMBR) pp. 1-40

- Dimah Almani, Tim Muller and Steven Furnell
- Scalable and Distributed Cloud Continuum Orchestration for Next-Generation IoT Applications: Latest Advances and Prospects pp. 1-4

- Dimitrios Dechouniotis and Ioannis Dimolitsas
- On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective pp. 1-15

- Fragkiskos Ninos, Konstantinos Karalas, Dimitrios Dechouniotis and Michael Polemis
- eHealth and mHealth pp. 1-2

- Bernhard Neumayer, Stefan Sauermann and Sten Hanke
- A Transformer-Based Autoencoder with Isolation Forest and XGBoost for Malfunction and Intrusion Detection in Wireless Sensor Networks for Forest Fire Prediction pp. 1-12

- Ahshanul Haque and Hamdy Soliman
- A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies pp. 1-54

- Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb and Adnan Kabbani
- Explainable Identification of Similarities Between Entities for Discovery in Large Text pp. 1-20

- Akhil Joshi, Sai Teja Erukude and Lior Shamir
- Enhancing IoT Scalability and Interoperability Through Ontology Alignment and FedProx pp. 1-20

- Chaimae Kanzouai, Soukaina Bouarourou, Abderrahim Zannou, Abdelhak Boulaalam and El Habib Nfaoui
- EmoSDS: Unified Emotionally Adaptive Spoken Dialogue System Using Self-Supervised Speech Representations pp. 1-20

- Jaehwan Lee, Youngjun Sim, Jinyou Kim and Young-Joo Suh
- Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies pp. 1-41

- Md Kamrul Siam, Bilash Saha, Md Mehedi Hasan, Md Jobair Hossain Faruk, Nafisa Anjum, Sharaban Tahora, Aiasha Siddika and Hossain Shahriar
- A Cross-Chain-Based Access Control Framework for Cloud Environment pp. 1-19

- Saad Belcaid, Mostapha Zbakh, Siham Aouad, Abdellah Touhafi and An Braeken
- Generative AI-Enhanced Intelligent Tutoring System for Graduate Cybersecurity Programs pp. 1-19

- Madhav Mukherjee, John Le and Yang-Wai Chow
- Balancing Prediction Accuracy and Explanation Power of Path Loss Modeling in a University Campus Environment via Explainable AI pp. 1-19

- Hamed Khalili, Hannes Frey and Maria A. Wimmer
- Benchmarking Large Language Models from Open and Closed Source Models to Apply Data Annotation for Free-Text Criteria in Healthcare pp. 1-27

- Ali Nemati, Mohammad Assadi Shalmani, Qiang Lu and Jake Luo
- Detecting Disinformation in Croatian Social Media Comments pp. 1-27

- Igor Ljubi, Zdravko Grgić, Marin Vuković and Gordan Gledec
- Big-Delay Estimation for Speech Separation in Assisted Living Environments pp. 1-27

- Swarnadeep Bagchi and Ruairí de Fréin
- Multi-Class Intrusion Detection in Internet of Vehicles: Optimizing Machine Learning Models on Imbalanced Data pp. 1-14

- Ágata Palma, Mário Antunes, Jorge Bernardino and Ana Alves
- NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters pp. 1-14

- Peng Li, Chen Qing and Hao Liu
- Integration of a Digital Twin Framework for Trajectory Control of a 2RRR Planar Parallel Manipulator Using ROS/Gazebo and MATLAB pp. 1-23

- Carlos Andrés Mesa-Montoya, Néstor Iván Marín Peláez, Kevin David Ortega-Quiñones, German Andrés Holguín-Londoño, Libardo Vicente Vanegas-Useche, Gian Carlo Daraviña-Peña, Edwan Anderson Ariza-Echeverri and Diego Vergara
- Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance pp. 1-23

- Ade Dotun Ajasa, Hassan Chizari and Abu Alam
- The Role of AI-Based Chatbots in Public Health Emergencies: A Narrative Review pp. 1-32

- Francesco Branda, Massimo Stella, Cecilia Ceccarelli, Federico Cabitza, Giancarlo Ceccarelli, Antonello Maruotti, Massimo Ciccozzi and Fabio Scarpa
- Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams pp. 1-28

- Ivan Nedyalkov
- Enabling Green Cellular Networks: A Review and Proposal Leveraging Software-Defined Networking, Network Function Virtualization, and Cloud-Radio Access Network pp. 1-39

- Radheshyam Singh, Line M. P. Larsen, Eder Ollora Zaballa, Michael Stübert Berger, Christian Kloch and Lars Dittmann
- Enhancing Transplantation Care with eHealth: Benefits, Challenges, and Key Considerations for the Future pp. 1-47

- Ilaisaane Falevai and Farkhondeh Hassandoust
Volume 17, issue 3, 2025
- Mobility Prediction and Resource-Aware Client Selection for Federated Learning in IoT pp. 1-20

- Rana Albelaihi
- SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features pp. 1-20

- Tieqi Xi, Qiuhua Zheng, Chuanhui Cheng, Ting Wu, Guojie Xie, Xuebiao Qian, Haochen Ye and Zhenyu Sun
- A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping pp. 1-20

- Amanda Thomson, Leandros Maglaras and Naghmeh Moradpoor
- CommC: A Multi-Purpose COMModity Hardware Cluster pp. 1-20

- Agorakis Bompotas, Nikitas-Rigas Kalogeropoulos and Christos Makris
- Enabling Tactile Internet via 6G: Application Characteristics, Requirements, and Design Considerations pp. 1-20

- Bharat S. Chaudhari
- How Does Digital Capability Shape Resilient Supply Chains?—Evidence from China’s Electric Vehicle Manufacturing Industry pp. 1-20

- Yanxuan Li and Vatcharapol Sukhotu
- Metastable Substructure Embedding and Robust Classification of Multichannel EEG Data Using Spectral Graph Kernels pp. 1-19

- Rashmi N. Muralinath, Vishwambhar Pathak and Prabhat K. Mahanti
- Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events pp. 1-19

- J. D. Morillo Reina and T. J. Mateo Sanguino
- A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios pp. 1-19

- Fabrizio Messina, Domenico Rosaci and Giuseppe M. L. Sarnè
- Optimizing Electric Vehicle Routing Efficiency Using K-Means Clustering and Genetic Algorithms pp. 1-19

- Tal Gaon, Yovel Gabay and Miri Weiss Cohen
- Edge and Cloud Computing in Smart Cities pp. 1-41

- Maria Trigka and Elias Dritsas
- Gamitest: A Game-like Online Student Assessment System pp. 1-15

- Jakub Swacha and Artur Kulpa
- Assessing Browser Security: A Detailed Study Based on CVE Metrics pp. 1-15

- Oleksii Chalyi, Kęstutis Driaunys and Vytautas Rudžionis
- Deep Neural Network-Based Modeling of Multimodal Human–Computer Interaction in Aircraft Cockpits pp. 1-15

- Li Wang, Heming Zhang and Changyuan Wang
- Resource-Aware ECG Classification with Heterogeneous Models in Federated Learning pp. 1-15

- Mohammad Munzurul Islam and Mohammed Alawad
- Blockchain-Based Decentralised Authentication in Closed Environments pp. 1-15

- Wata Kanjanapruthipong and Sirapat Boonkrong
- Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks pp. 1-34

- Jinying Li and Ananda Maiti
- User-Generated Content and Its Impact on Purchase Intent for Tourism Products: A Comparative Analysis of Millennials and Centennials on TikTok pp. 1-21

- Eva Correia Ramos and Célia M. Q. Ramos
- A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles pp. 1-21

- Hani Alnami, Imad Mahgoub, Hamzah Al-Najada and Easa Alalwany
- A Regional Multi-Agent Air Monitoring Platform pp. 1-28

- Stanimir Stoyanov, Emil Doychev, Asya Stoyanova-Doycheva, Veneta Tabakova-Komsalova, Ivan Stoyanov and Iliya Nedelchev
- A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models pp. 1-28

- Nicholas Jones, Md Whaiduzzaman, Tony Jan, Amr Adel, Ammar Alazab and Afnan Alkreisat
- An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design pp. 1-28

- J. de Curtò, I. de Zarzà, Leandro Sebastián Fervier, Victoria Sanagustín-Fons and Carlos T. Calafate
- Dynamic Workload Management System in the Public Sector: A Comparative Analysis pp. 1-39

- Konstantinos C. Giotopoulos, Dimitrios Michalopoulos, Gerasimos Vonitsanos, Dimitris Papadopoulos, Ioanna Giannoukou and Spyros Sioutas
- Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network pp. 1-32

- Mario Martínez-Morfa, Carlos Ruiz de Mendoza, Cristina Cervelló-Pastor and Sebastia Sallent-Ribes
- IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System pp. 1-23

- Nicoletta González-Cancelas, Javier Vaca-Cabrero and Alberto Camarero-Orive
- Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms pp. 1-27

- Andri Santoso, Samsul Huda, Yuta Kodera and Yasuyuki Nogami
- Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things pp. 1-48

- John Mulo, Hengshuo Liang, Mian Qian, Milon Biswas, Bharat Rawal, Yifan Guo and Wei Yu
- Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects’ Stigmergic Communication pp. 1-25

- Ojilvie Avila-Cortés, Saúl E. Pomares Hernández, Julio César Pérez-Sansalvador and Lil María Xibai Rodríguez-Henríquez
- GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning pp. 1-16

- Yulin Kang, Wuzheng Tan, Linlin Fan, Yinuo Chen, Xinbin Lai and Jian Weng
- University Students’ Subjective Well-Being in Japan Between 2021 and 2023: Its Relationship with Social Media Use pp. 1-22

- Shaoyu Ye and Kevin K. W. Ho
- FedRecI2C: A Novel Federated Recommendation Framework Integrating Communication and Computation to Accelerate Convergence Under Communication Constraints pp. 1-22

- Qizhong Zheng and Xiujie Huang
- Edge Intelligence: Edge Computing for 5G and the Internet of Things pp. 1-5

- Yuezhi Zhou and Xu Chen
- CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality pp. 1-36

- Daneesha Ranasinghe, Nayomi Kankanamge, Chathura De Silva, Nuwani Kangana, Rifat Mahamood and Tan Yigitcanlar
- Health Misinformation in Social Networks: A Survey of Information Technology Approaches pp. 1-50

- Vasiliki Papanikou, Panagiotis Papadakos, Theodora Karamanidou, Thanos G. Stavropoulos, Evaggelia Pitoura and Panayiotis Tsaparas
- Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk pp. 1-24

- Vincenzo Barrile, Emanuela Genovese, Clemente Maesano, Sonia Calluso and Maurizio Pasquale Manti
- Frame Aggregation with Simple Block Acknowledgement Mechanism to Provide Strict Quality of Service Guarantee to Emergency Traffic in Wireless Networks pp. 1-18

- Shuaib K. Memon, Md Akbar Hossain and Nurul I. Sarkar
- Advanced Trajectory Analysis of NASA’s Juno Mission Using Unsupervised Machine Learning: Insights into Jupiter’s Orbital Dynamics pp. 1-30

- Ashraf ALDabbas, Zaid Mustafa and Zoltan Gal
Volume 17, issue 2, 2025
- From Bottom of Sea to Space: Quo Vadis IoT? So What About Security? pp. 1-57

- Behrouz Zolfaghari, Jacob Krzciok and Khodakhast Bibak
- Survey on Secure Scientific Workflow Scheduling in Cloud Environments pp. 1-29

- Hadeel Amjed Saeed, Sufyan T. Faraj Al-Janabi, Esam Taha Yassen and Omar A. Aldhaibani
- Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks pp. 1-29

- Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei and Riad Alharbey
- Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning pp. 1-22

- Abimbola Efunogbon, Enjie Liu, Renxie Qiu and Taiwo Efunogbon
- Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System pp. 1-22

- Hemin Sardar Abdulla and Aso M. Aladdin
- Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes pp. 1-61

- Henrich C. Pöhls, Fabian Kügler, Emiliia Geloczi and Felix Klement
- Correction: Marti et al. Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. Future Internet 2024, 16, 446 pp. 1-1

- Patrizia Marti, Giulia Teverini, Cecilia Goracci and Lorenzo Franchi
- Intelligent Virtual Reality and Augmented Reality Technologies: An Overview pp. 1-25

- Georgios Lampropoulos
- Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms pp. 1-25

- Jannatul Ferdush, Joarder Kamruzzaman, Gour Karmakar, Iqbal Gondal and Rajkumar Das
- AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-Agents pp. 1-30

- Md Monjurul Karim, Dong Hoang Van, Sangeen Khan, Qiang Qu and Yaroslav Kholodov
- Ubunye: An MEC Orchestration Service Based on QoE, QoS, and Service Classification Using Machine Learning pp. 1-30

- Kilbert Amorim Maciel, David Martins Leite, Guilherme Alves de Araújo, Flavia C. Delicato and Atslands R. Rocha
- When Cybersecurity Meets Accessibility: A Holistic Development Architecture for Inclusive Cyber-Secure Web Applications and Websites pp. 1-30

- George Alex Stelea, Livia Sangeorzan and Nicoleta Enache-David
- Task-Driven Virtual Machine Optimization Placement Model and Algorithm pp. 1-30

- Ran Yang, Zhaonan Li, Junhao Qian and Zhihua Li
- Sixth Generation Enabling Technologies and Machine Learning Intersection: A Performance Optimization Perspective pp. 1-44

- Emmanuel Ekene Okere and Vipin Balyan
- Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality pp. 1-18

- Ana Cassia Cruz, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão, Anabela Marto and Alexandrino Gonçalves
- MAGIC: Multi-User Advanced Graphic Immersive Configurator for Sustainable Customization of Complex Design Products—A Sailing Yacht Case Study pp. 1-18

- Saverio Piccininni, Mine Dastan, Fabio Vangi and Michele Fiorentino
- Machine Learning for Blockchain and IoT Systems in Smart City pp. 1-5

- Cheng-Chi Lee, Dinh-Thuan Do and Agbotiname Lucky Imoize
- DTL-GNN: Digital Twin Lightweight Method Based on Graph Neural Network pp. 1-24

- Chengjun Li, Liguo Yao, Yao Lu, Songsong Zhang and Taihua Zhang
- A Review and Experimental Evaluation on Split Learning pp. 1-24

- Zhanyi Hu, Tianchen Zhou, Bingzhe Wu, Cen Chen and Yanhao Wang
- Investigation of Smart Machines with DNAs in SpiderNet pp. 1-24

- Mo Adda and Nancy Scheidt
- CORES: Context-Aware Emotion-Driven Recommendation System-Based LLM to Improve Virtual Shopping Experiences pp. 1-31

- Abderrahim Lakehal, Adel Alti and Boubakeur Annane
- Robust Synthetic Data Generation for Sequential Financial Models Using Hybrid Variational Autoencoder–Markov Chain Monte Carlo Architectures pp. 1-31

- Francesco Bruni Prenestino, Enrico Barbierato and Alice Gatti
- Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm pp. 1-50

- Gaetanino Paolone, Romolo Paesani, Francesco Pilotti, Jacopo Camplone, Andrea Piazza and Paolino Di Felice
- Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing pp. 1-15

- David Ortiz-Perez, Pablo Ruiz-Ponce, David Mulero-Pérez, Manuel Benavent-Lledo, Javier Rodriguez-Juan, Hugo Hernandez-Lopez, Anatoli Iarovikov, Srdjan Krco, Daliborka Nedic, Dejan Vukobratovic and Jose Garcia-Rodriguez
- Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems pp. 1-15

- Manuel Cheminod, Ivan Cibrario Bertolotti, Adriano Valenzano and Luca Durante
- Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review pp. 1-40

- Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, Pramod Kumar Soni and Vipin Balyan
- A Methodological Framework for AI-Driven Textual Data Analysis in Digital Media pp. 1-26

- Douglas Cordeiro, Carlos Lopezosa and Javier Guallar
- Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling pp. 1-26

- Saif Al-Dean Qawasmeh and Ali Abdullah S. AlQahtani
- Enhancing Human–Agent Interaction via Artificial Agents That Speculate About the Future pp. 1-21

- Casey C. Bennett, Young-Ho Bae, Jun-Hyung Yoon, Say Young Kim and Benjamin Weiss
- Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach pp. 1-21

- Alfredo Cuzzocrea, Mst Shapna Akter, Hossain Shahriar and Pablo García Bringas
- Transmission Power Control in Multi-Hop Communications of THz Communication Using a Potential Game Approach pp. 1-19

- Evangelos D. Spyrou, Vassilios Kappatos and Chrysostomos Stylios
- Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures pp. 1-19

- Peng Liu, Lili Jia and Yang Xiao
- Framework of Best Practices to Drive the Digital Transition: Towards a 4.0 Paradigm Based on Evidence from Case Studies pp. 1-19

- Tiago Bastos, Cármen Guimarães and Leonor Teixeira
- Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification pp. 1-20

- Oleksandr Kuznetsov, Emanuele Frontoni, Kateryna Kuznetsova and Marco Arnesano
- Hybrid Solution Through Systematic Electrical Impedance Tomography Data Reduction and CNN Compression for Efficient Hand Gesture Recognition on Resource-Constrained IoT Devices pp. 1-20

- Salwa Sahnoun, Mahdi Mnif, Bilel Ghoul, Mohamed Jemal, Ahmed Fakhfakh and Olfa Kanoun
- IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model pp. 1-23

- Huu Dang Quoc, Loc Nguyen The, Truong Bui Quang and Phuong Han Minh
- On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification pp. 1-23

- Gianmarco Baldini
- Security and Privacy in Physical–Digital Environments: Trends and Opportunities pp. 1-23

- Carolina Pereira, Anabela Marto, Roberto Ribeiro, Alexandrino Gonçalves, Nuno Rodrigues, Carlos Rabadão, Rogério Luís de Carvalho Costa and Leonel Santos
- A Weighted Composite Metric for Evaluating User Experience in Educational Chatbots: Balancing Usability, Engagement, and Effectiveness pp. 1-35

- Abeer Alabbas and Khalid Alomar
- Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN pp. 1-14

- Azita Pourghasem, Raimund Kirner, Athanasios Tsokanos, Iosif Mporas and Alexios Mylonas
- Secure Tiny Machine Learning on Edge Devices: A Lightweight Dual Attestation Mechanism for Machine Learning pp. 1-27

- Vlad-Eusebiu Baciu, An Braeken, Laurent Segers and Bruno da Silva
- ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks pp. 1-28

- Rodrigo Asensio-Garriga, Alejandro Molina Zarca, Jordi Ortiz, Ana Hermosilla, Hugo Ramón Pascual, Antonio Pastor and Antonio Skarmeta
- Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection pp. 1-43

- Tahesin Samira Delwar, Sayak Mukhopadhyay, Akshay Kumar, Mangal Singh, Yang-won Lee, Jee-Youl Ryu and A. S. M. Sanwar Hosen
- BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups pp. 1-32

- Brahim Benaissa, Filip Hendrichovsky, Mansur As and Kaori Yoshida
- Trends, Challenges, and Applications of Large Language Models in Healthcare: A Bibliometric and Scoping Review pp. 1-32

- Vincenza Carchiolo and Michele Malgeri
- The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning pp. 1-55

- Leyli Nouraei Yeganeh, Nicole Scarlett Fenty, Yu Chen, Amber Simpson and Mohsen Hatami
Volume 17, issue 1, 2025
- Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering pp. 1-22

- M. Baqer
- A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility pp. 1-29

- Aviral Goel and Yogachandran Rahulamathavan
- Fake News Detection and Classification: A Comparative Study of Convolutional Neural Networks, Large Language Models, and Natural Language Processing Models pp. 1-29

- Konstantinos I. Roumeliotis, Nikolaos D. Tselikas and Dimitrios K. Nasiopoulos
- Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency pp. 1-29

- Alessio Ferone and Stefano Verrilli
- Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0 pp. 1-16

- Italo Cesidio Fantozzi, Annalisa Santolamazza, Giancarlo Loy and Massimiliano Maria Schiraldi
- Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency pp. 1-25

- Chen Qiu, Ziang Wu, Haoda Wang, Qinglin Yang, Yu Wang and Chunhua Su
- Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites pp. 1-30

- Georgios Fevgas, Thomas Lagkas, Panagiotis Sarigiannidis and Vasileios Argyriou
- Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning pp. 1-30

- Muhammad Dilshad, Madiha Haider Syed and Semeen Rehman
- Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment pp. 1-17

- Francesco Morgan Bono, Alessio Polinelli, Luca Radicioni, Lorenzo Benedetti, Francesco Castelli-Dezza, Simone Cinquemani and Marco Belloli
- Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers pp. 1-17

- Daniela Gifu and Covaci Silviu-Vasile
- Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT) pp. 1-24

- Nemat Hazrati, Sajjad Pirahesh, Bahman Arasteh, Seyed Salar Sefati, Octavian Fratu and Simona Halunga
- FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model pp. 1-24

- Xiaozheng Du, Shijing Hu, Feng Zhou, Cheng Wang and Binh Minh Nguyen
- Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios pp. 1-24

- Zhiyuan Wang and Yuezhi Zhou
- Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks pp. 1-24

- Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu and Kuo-Yu Tsai
- Deep Learning Framework for Advanced De-Identification of Protected Health Information pp. 1-24

- Ahmad Aloqaily, Emad E. Abdallah, Rahaf Al-Zyoud, Esraa Abu Elsoud, Malak Al-Hassan and Alaa E. Abdallah
- EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks pp. 1-21

- Sakshi Patni and Joohyung Lee
- Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention pp. 1-21

- Salvador López-Barajas, Pedro J. Sanz, Raúl Marín-Prades, Juan Echagüe and Sebastian Realpe
- GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks pp. 1-26

- Vahid Babaey and Arun Ravindran
- Impact of Weather Factors on Unmanned Aerial Vehicles’ Wireless Communications pp. 1-26

- Lalan Mishra and Naima Kaabouch
- A Reference Architecture for Virtual Human Integration in the Metaverse: Enhancing the Galleries, Libraries, Archives, and Museums (GLAM) Sector with AI-Driven Experiences pp. 1-15

- Orestis Spyrou, William Hurst and Caspar Krampe
- The Time Machine: Future Scenario Generation Through Generative AI Tools pp. 1-15

- Jan Ferrer i Picó, Michelle Catta-Preta, Alex Trejo Omeñaca, Marc Vidal and Josep Maria Monguet i Fierro
- Blockchain and Artificial Intelligence for Decentralized Edge Environments pp. 1-2

- Yuansong Qiao
- A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things pp. 1-54

- Yang Yang, Min Lin, Yangfei Lin, Chen Zhang and Celimuge Wu
- WebTrackingScore: A Combined Web Tracking Risk Score System for Websites pp. 1-20

- Álvaro D. Guillén Cava and Antonio Ruiz-Martínez
- A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT pp. 1-20

- Innocent Boakye Ababio, Jan Bieniek, Mohamed Rahouti, Thaier Hayajneh, Mohammed Aledhari, Dinesh C. Verma and Abdellah Chehri
- IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit pp. 1-20

- Wei Zhou, Shandian Shen and Peng Liu
- Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss pp. 1-20

- Aryan Sharma, Haoming Wang, Deepak Mishra and Aruna Seneviratne
- End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT pp. 1-20

- Matthew Boeding, Michael Hempel and Hamid Sharif
- Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution pp. 1-41

- Elmin Marevac, Esad Kadušić, Nataša Živić, Nevzudin Buzađija and Samir Lemeš
- Shared-Custodial Wallet for Multi-Party Crypto-Asset Management pp. 1-19

- Yimika Erinle, Yebo Feng, Jiahua Xu, Nikhil Vadgama and Paolo Tasca
- Ventinel: Automated Detection of Android Vishing Apps Using Optical Character Recognition pp. 1-19

- Daegyeom Kim, Sehwan O, Younghoon Ban, Jungsoo Park, Kyungho Joo and Haehyun Cho
- Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications pp. 1-19

- Teguh Indra Bayu, Yung-Fa Huang, Jeang-Kuo Chen, Cheng-Hsiung Hsieh, Budhi Kristianto, Erwien Christianto and Suharyadi Suharyadi
- A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints pp. 1-27

- Antonio Pinizzotto and Raffaele Bruno
- Explainable Security Requirements Classification Through Transformer Models pp. 1-27

- Luca Petrillo, Fabio Martinelli, Antonella Santone and Francesco Mercaldo
- Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading pp. 1-27

- Giuseppe Baruffa and Luca Rugini
- Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology pp. 1-35

- Tamai Ramírez-Gordillo, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López and Higinio Mora
- A Blockchain-Based Protocol for Fair Delivery for Receipts pp. 1-23

- M. Francisca Hinarejos, Josep-Lluis Ferrer-Gomila, Andreu-Pere Isern-Deyà and Gerardo-Francisco Chévez-Alvarado
- A Lightweight AI-Based Approach for Drone Jamming Detection pp. 1-23

- Sergio Cibecchini, Francesco Chiti and Laura Pierucci
- A Hierarchical Cache Architecture-Oriented Cache Management Scheme for Information-Centric Networking pp. 1-23

- Yichao Chao and Rui Han
- Collaboration in a Virtual Reality Serious Escape Room in the Metaverse Improves Academic Performance and Learners’ Experiences pp. 1-23

- Antonia-Maria Pazakou, Stylianos Mystakidis and Ioannis Kazanidis
- On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture pp. 1-23

- Niroshinie Fernando, Samir Shrestha, Seng W. Loke and Kevin Lee
- High-Risk AI Systems—Lie Detection Application pp. 1-23

- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou and Dimosthenis Anagnostopoulos
- Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things pp. 1-23

- Sumaiah Algarni and Fathi E. Abd El-Samie
- Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers pp. 1-23

- Víctor Pérez-Cano and Francisco Jurado
- A Survey on Cybersecurity in IoT pp. 1-32

- Elias Dritsas and Maria Trigka
- Survey of Artificial Intelligence Model Marketplace pp. 1-32

- Mian Qian, Abubakar Ahmad Musa, Milon Biswas, Yifan Guo, Weixian Liao and Wei Yu
- Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning pp. 1-39

- Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier García Villalba
- XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System pp. 1-28

- Maiada M. Mahmoud, Yasser Omar Youssef and Ayman A. Abdel-Hamid
- Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities pp. 1-28

- Marica Amadeo and Giuseppe Ruggeri
| |