Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 17, issue 4, 2025
- The Role of AI-Based Chatbots in Public Health Emergencies: A Narrative Review pp. 1-32

- Francesco Branda, Massimo Stella, Cecilia Ceccarelli, Federico Cabitza, Giancarlo Ceccarelli, Antonello Maruotti, Massimo Ciccozzi and Fabio Scarpa
- Scalable and Distributed Cloud Continuum Orchestration for Next-Generation IoT Applications: Latest Advances and Prospects pp. 1-4

- Dimitrios Dechouniotis and Ioannis Dimolitsas
- Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams pp. 1-28

- Ivan Nedyalkov
- Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions pp. 1-21

- Oladele Afolalu and Mohohlo Samuel Tsoeu
- A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies pp. 1-21

- Paul Scalise, Michael Hempel and Hamid Sharif
- Benchmarking Large Language Models from Open and Closed Source Models to Apply Data Annotation for Free-Text Criteria in Healthcare pp. 1-27

- Ali Nemati, Mohammad Assadi Shalmani, Qiang Lu and Jake Luo
- A Cross-Chain-Based Access Control Framework for Cloud Environment pp. 1-19

- Saad Belcaid, Mostapha Zbakh, Siham Aouad, Abdellah Touhafi and An Braeken
- Generative AI-Enhanced Intelligent Tutoring System for Graduate Cybersecurity Programs pp. 1-19

- Madhav Mukherjee, John Le and Yang-Wai Chow
- Balancing Prediction Accuracy and Explanation Power of Path Loss Modeling in a University Campus Environment via Explainable AI pp. 1-19

- Hamed Khalili, Hannes Frey and Maria A. Wimmer
- Explainable Identification of Similarities Between Entities for Discovery in Large Text pp. 1-20

- Akhil Joshi, Sai Teja Erukude and Lior Shamir
- Enhancing IoT Scalability and Interoperability Through Ontology Alignment and FedProx pp. 1-20

- Chaimae Kanzouai, Soukaina Bouarourou, Abderrahim Zannou, Abdelhak Boulaalam and El Habib Nfaoui
- EmoSDS: Unified Emotionally Adaptive Spoken Dialogue System Using Self-Supervised Speech Representations pp. 1-20

- Jaehwan Lee, Youngjun Sim, Jinyou Kim and Young-Joo Suh
- On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective pp. 1-15

- Fragkiskos Ninos, Konstantinos Karalas, Dimitrios Dechouniotis and Michael Polemis
- eHealth and mHealth pp. 1-2

- Bernhard Neumayer, Stefan Sauermann and Sten Hanke
- Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan pp. 1-25

- Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui
- Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms pp. 1-25

- Ali Zaman, Salman A. Khan, Nazeeruddin Mohammad, Abdelhamied A. Ateya, Sadique Ahmad and Mohammed A. ElAffendi
- Task Scheduling for Public Clouds Using a Fuzzy Controller-Based Priority- and Deadline-Aware Approach pp. 1-25

- Saad Qamar, Nesar Ahmad and Parvez Mahmood Khan
- GDPR and Large Language Models: Technical and Legal Obstacles pp. 1-26

- Georgios Feretzakis, Evangelia Vagena, Konstantinos Kalodanis, Paraskevi Peristera, Dimitris Kalles and Athanasios Anastasiou
- Practical Comparison Between the CI/CD Platforms Azure DevOps and GitHub pp. 1-26

- Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
- Data-Driven Diagnostics for Pediatric Appendicitis: Machine Learning to Minimize Misdiagnoses and Unnecessary Surgeries pp. 1-24

- Deborah Maffezzoni, Enrico Barbierato and Alice Gatti
- The New CAP Theorem on Blockchain Consensus Systems pp. 1-24

- Aristidis G. Anagnostakis and Euripidis Glavas
- Integration of a Digital Twin Framework for Trajectory Control of a 2RRR Planar Parallel Manipulator Using ROS/Gazebo and MATLAB pp. 1-23

- Carlos Andrés Mesa-Montoya, Néstor Iván Marín Peláez, Kevin David Ortega-Quiñones, German Andrés Holguín-Londoño, Libardo Vicente Vanegas-Useche, Gian Carlo Daraviña-Peña, Edwan Anderson Ariza-Echeverri and Diego Vergara
- Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance pp. 1-23

- Ade Dotun Ajasa, Hassan Chizari and Abu Alam
- GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering pp. 1-18

- Danial Ahmadzadeh, Mehrdad Jalali, Reza Ghaemi and Maryam Kheirabadi
- Knowledge Sharing in Security-Sensitive Communities pp. 1-22

- Yonit Rusho, Daphne Ruth Raban, David Simantov and Gilad Ravid
Volume 17, issue 3, 2025
- Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things pp. 1-48

- John Mulo, Hengshuo Liang, Mian Qian, Milon Biswas, Bharat Rawal, Yifan Guo and Wei Yu
- User-Generated Content and Its Impact on Purchase Intent for Tourism Products: A Comparative Analysis of Millennials and Centennials on TikTok pp. 1-20

- Eva Correia Ramos and Célia M. Q. Ramos
- Mobility Prediction and Resource-Aware Client Selection for Federated Learning in IoT pp. 1-20

- Rana Albelaihi
- SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features pp. 1-20

- Tieqi Xi, Qiuhua Zheng, Chuanhui Cheng, Ting Wu, Guojie Xie, Xuebiao Qian, Haochen Ye and Zhenyu Sun
- A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping pp. 1-20

- Amanda Thomson, Leandros Maglaras and Naghmeh Moradpoor
- CommC: A Multi-Purpose COMModity Hardware Cluster pp. 1-20

- Agorakis Bompotas, Nikitas-Rigas Kalogeropoulos and Christos Makris
- Enabling Tactile Internet via 6G: Application Characteristics, Requirements, and Design Considerations pp. 1-20

- Bharat S. Chaudhari
- How Does Digital Capability Shape Resilient Supply Chains?—Evidence from China’s Electric Vehicle Manufacturing Industry pp. 1-20

- Yanxuan Li and Vatcharapol Sukhotu
- Edge Intelligence: Edge Computing for 5G and the Internet of Things pp. 1-5

- Yuezhi Zhou and Xu Chen
- Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms pp. 1-27

- Andri Santoso, Samsul Huda, Yuta Kodera and Yasuyuki Nogami
- A Regional Multi-Agent Air Monitoring Platform pp. 1-28

- Stanimir Stoyanov, Emil Doychev, Asya Stoyanova-Doycheva, Veneta Tabakova-Komsalova, Ivan Stoyanov and Iliya Nedelchev
- A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models pp. 1-28

- Nicholas Jones, Md Whaiduzzaman, Tony Jan, Amr Adel, Ammar Alazab and Afnan Alkreisat
- An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design pp. 1-28

- J. de Curtò, I. de Zarzà, Leandro Sebastián Fervier, Victoria Sanagustín-Fons and Carlos T. Calafate
- University Students’ Subjective Well-Being in Japan Between 2021 and 2023: Its Relationship with Social Media Use pp. 1-22

- Shaoyu Ye and Kevin K. W. Ho
- Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk pp. 1-24

- Vincenzo Barrile, Emanuela Genovese, Clemente Maesano, Sonia Calluso and Maurizio Pasquale Manti
- Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects’ Stigmergic Communication pp. 1-25

- Ojilvie Avila-Cortés, Saúl E. Pomares Hernández, Julio César Pérez-Sansalvador and Lil María Xibai Rodríguez-Henríquez
- Health Misinformation in Social Networks: A Survey of Information Technology Approaches pp. 1-50

- Vasiliki Papanikou, Panagiotis Papadakos, Theodora Karamanidou, Thanos G. Stavropoulos, Evaggelia Pitoura and Panayiotis Tsaparas
- Edge and Cloud Computing in Smart Cities pp. 1-41

- Maria Trigka and Elias Dritsas
- Metastable Substructure Embedding and Robust Classification of Multichannel EEG Data Using Spectral Graph Kernels pp. 1-19

- Rashmi N. Muralinath, Vishwambhar Pathak and Prabhat K. Mahanti
- Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events pp. 1-19

- J. D. Morillo Reina and T. J. Mateo Sanguino
- A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios pp. 1-19

- Fabrizio Messina, Domenico Rosaci and Giuseppe M. L. Sarnè
- Optimizing Electric Vehicle Routing Efficiency Using K-Means Clustering and Genetic Algorithms pp. 1-19

- Tal Gaon, Yovel Gabay and Miri Weiss Cohen
- Gamitest: A Game-like Online Student Assessment System pp. 1-15

- Jakub Swacha and Artur Kulpa
- Assessing Browser Security: A Detailed Study Based on CVE Metrics pp. 1-15

- Oleksii Chalyi, Kęstutis Driaunys and Vytautas Rudžionis
- Deep Neural Network-Based Modeling of Multimodal Human–Computer Interaction in Aircraft Cockpits pp. 1-15

- Li Wang, Heming Zhang and Changyuan Wang
- Resource-Aware ECG Classification with Heterogeneous Models in Federated Learning pp. 1-15

- Mohammad Munzurul Islam and Mohammed Alawad
- Blockchain-Based Decentralised Authentication in Closed Environments pp. 1-15

- Wata Kanjanapruthipong and Sirapat Boonkrong
- Dynamic Workload Management System in the Public Sector: A Comparative Analysis pp. 1-39

- Konstantinos C. Giotopoulos, Dimitrios Michalopoulos, Gerasimos Vonitsanos, Dimitris Papadopoulos, Ioanna Giannoukou and Spyros Sioutas
- GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning pp. 1-16

- Yulin Kang, Wuzheng Tan, Linlin Fan, Yinuo Chen, Xinbin Lai and Jian Weng
- CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality pp. 1-36

- Daneesha Ranasinghe, Nayomi Kankanamge, Chathura De Silva, Nuwani Kangana, Rifat Mahamood and Tan Yigitcanlar
- Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks pp. 1-34

- Jinying Li and Ananda Maiti
- A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles pp. 1-21

- Hani Alnami, Imad Mahgoub, Hamzah Al-Najada and Easa Alalwany
- Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network pp. 1-32

- Mario Martínez-Morfa, Carlos Ruiz de Mendoza, Cristina Cervelló-Pastor and Sebastia Sallent-Ribes
- Frame Aggregation with Simple Block Acknowledgement Mechanism to Provide Strict Quality of Service Guarantee to Emergency Traffic in Wireless Networks pp. 1-18

- Shuaib K. Memon, Md Akbar Hossain and Nurul I. Sarkar
- FedRecI2C: A Novel Federated Recommendation Framework Integrating Communication and Computation to Accelerate Convergence Under Communication Constraints pp. 1-23

- Qizhong Zheng and Xiujie Huang
- IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System pp. 1-23

- Nicoletta González-Cancelas, Javier Vaca-Cabrero and Alberto Camarero-Orive
- Advanced Trajectory Analysis of NASA’s Juno Mission Using Unsupervised Machine Learning: Insights into Jupiter’s Orbital Dynamics pp. 1-30

- Ashraf ALDabbas, Zaid Mustafa and Zoltan Gal
Volume 17, issue 2, 2025
- Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes pp. 1-61

- Henrich C. Pöhls, Fabian Kügler, Emiliia Geloczi and Felix Klement
- Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection pp. 1-43

- Tahesin Samira Delwar, Sayak Mukhopadhyay, Akshay Kumar, Mangal Singh, Yang-won Lee, Jee-Youl Ryu and A. S. M. Sanwar Hosen
- The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning pp. 1-55

- Leyli Nouraei Yeganeh, Nicole Scarlett Fenty, Yu Chen, Amber Simpson and Mohsen Hatami
- AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-Agents pp. 1-30

- Md Monjurul Karim, Dong Hoang Van, Sangeen Khan, Qiang Qu and Yaroslav Kholodov
- Ubunye: An MEC Orchestration Service Based on QoE, QoS, and Service Classification Using Machine Learning pp. 1-30

- Kilbert Amorim Maciel, David Martins Leite, Guilherme Alves de Araújo, Flavia C. Delicato and Atslands R. Rocha
- When Cybersecurity Meets Accessibility: A Holistic Development Architecture for Inclusive Cyber-Secure Web Applications and Websites pp. 1-30

- George Alex Stelea, Livia Sangeorzan and Nicoleta Enache-David
- Task-Driven Virtual Machine Optimization Placement Model and Algorithm pp. 1-30

- Ran Yang, Zhaonan Li, Junhao Qian and Zhihua Li
- Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality pp. 1-18

- Ana Cassia Cruz, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão, Anabela Marto and Alexandrino Gonçalves
- MAGIC: Multi-User Advanced Graphic Immersive Configurator for Sustainable Customization of Complex Design Products—A Sailing Yacht Case Study pp. 1-18

- Saverio Piccininni, Mine Dastan, Fabio Vangi and Michele Fiorentino
- IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model pp. 1-23

- Huu Dang Quoc, Loc Nguyen The, Truong Bui Quang and Phuong Han Minh
- On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification pp. 1-23

- Gianmarco Baldini
- Security and Privacy in Physical–Digital Environments: Trends and Opportunities pp. 1-23

- Carolina Pereira, Anabela Marto, Roberto Ribeiro, Alexandrino Gonçalves, Nuno Rodrigues, Carlos Rabadão, Rogério Luís de Carvalho Costa and Leonel Santos
- Enhancing Human–Agent Interaction via Artificial Agents That Speculate About the Future pp. 1-21

- Casey C. Bennett, Young-Ho Bae, Jun-Hyung Yoon, Say Young Kim and Benjamin Weiss
- Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach pp. 1-21

- Alfredo Cuzzocrea, Mst Shapna Akter, Hossain Shahriar and Pablo García Bringas
- BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups pp. 1-32

- Brahim Benaissa, Filip Hendrichovsky, Mansur As and Kaori Yoshida
- Trends, Challenges, and Applications of Large Language Models in Healthcare: A Bibliometric and Scoping Review pp. 1-32

- Vincenza Carchiolo and Michele Malgeri
- Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN pp. 1-14

- Azita Pourghasem, Raimund Kirner, Athanasios Tsokanos, Iosif Mporas and Alexios Mylonas
- From Bottom of Sea to Space: Quo Vadis IoT? So What About Security? pp. 1-57

- Behrouz Zolfaghari, Jacob Krzciok and Khodakhast Bibak
- Transmission Power Control in Multi-Hop Communications of THz Communication Using a Potential Game Approach pp. 1-19

- Evangelos D. Spyrou, Vassilios Kappatos and Chrysostomos Stylios
- Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures pp. 1-19

- Peng Liu, Lili Jia and Yang Xiao
- Framework of Best Practices to Drive the Digital Transition: Towards a 4.0 Paradigm Based on Evidence from Case Studies pp. 1-19

- Tiago Bastos, Cármen Guimarães and Leonor Teixeira
- Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing pp. 1-15

- David Ortiz-Perez, Pablo Ruiz-Ponce, David Mulero-Pérez, Manuel Benavent-Lledo, Javier Rodriguez-Juan, Hugo Hernandez-Lopez, Anatoli Iarovikov, Srdjan Krco, Daliborka Nedic, Dejan Vukobratovic and Jose Garcia-Rodriguez
- Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems pp. 1-15

- Manuel Cheminod, Ivan Cibrario Bertolotti, Adriano Valenzano and Luca Durante
- A Weighted Composite Metric for Evaluating User Experience in Educational Chatbots: Balancing Usability, Engagement, and Effectiveness pp. 1-35

- Abeer Alabbas and Khalid Alomar
- Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm pp. 1-50

- Gaetanino Paolone, Romolo Paesani, Francesco Pilotti, Jacopo Camplone, Andrea Piazza and Paolino Di Felice
- Correction: Marti et al. Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. Future Internet 2024, 16, 446 pp. 1-1

- Patrizia Marti, Giulia Teverini, Cecilia Goracci and Lorenzo Franchi
- A Methodological Framework for AI-Driven Textual Data Analysis in Digital Media pp. 1-26

- Douglas Cordeiro, Carlos Lopezosa and Javier Guallar
- Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling pp. 1-26

- Saif Al-Dean Qawasmeh and Ali Abdullah S. AlQahtani
- Intelligent Virtual Reality and Augmented Reality Technologies: An Overview pp. 1-25

- Georgios Lampropoulos
- Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms pp. 1-25

- Jannatul Ferdush, Joarder Kamruzzaman, Gour Karmakar, Iqbal Gondal and Rajkumar Das
- Investigation of Smart Machines with DNAs in SpiderNet pp. 1-25

- Mo Adda and Nancy Scheidt
- Survey on Secure Scientific Workflow Scheduling in Cloud Environments pp. 1-29

- Hadeel Amjed Saeed, Sufyan T. Faraj Al-Janabi, Esam Taha Yassen and Omar A. Aldhaibani
- Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks pp. 1-29

- Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei and Riad Alharbey
- Sixth Generation Enabling Technologies and Machine Learning Intersection: A Performance Optimization Perspective pp. 1-44

- Emmanuel Ekene Okere and Vipin Balyan
- DTL-GNN: Digital Twin Lightweight Method Based on Graph Neural Network pp. 1-24

- Chengjun Li, Liguo Yao, Yao Lu, Songsong Zhang and Taihua Zhang
- A Review and Experimental Evaluation on Split Learning pp. 1-24

- Zhanyi Hu, Tianchen Zhou, Bingzhe Wu, Cen Chen and Yanhao Wang
- Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning pp. 1-22

- Abimbola Efunogbon, Enjie Liu, Renxie Qiu and Taiwo Efunogbon
- Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System pp. 1-22

- Hemin Sardar Abdulla and Aso M. Aladdin
- CORES: Context-Aware Emotion-Driven Recommendation System-Based LLM to Improve Virtual Shopping Experiences pp. 1-31

- Abderrahim Lakehal, Adel Alti and Boubakeur Annane
- Robust Synthetic Data Generation for Sequential Financial Models Using Hybrid Variational Autoencoder–Markov Chain Monte Carlo Architectures pp. 1-31

- Francesco Bruni Prenestino, Enrico Barbierato and Alice Gatti
- Secure Tiny Machine Learning on Edge Devices: A Lightweight Dual Attestation Mechanism for Machine Learning pp. 1-27

- Vlad-Eusebiu Baciu, An Braeken, Laurent Segers and Bruno da Silva
- ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks pp. 1-28

- Rodrigo Asensio-Garriga, Alejandro Molina Zarca, Jordi Ortiz, Ana Hermosilla, Hugo Ramón Pascual, Antonio Pastor and Antonio Skarmeta
- Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review pp. 1-40

- Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, Pramod Kumar Soni and Vipin Balyan
- Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification pp. 1-20

- Oleksandr Kuznetsov, Emanuele Frontoni, Kateryna Kuznetsova and Marco Arnesano
- Hybrid Solution Through Systematic Electrical Impedance Tomography Data Reduction and CNN Compression for Efficient Hand Gesture Recognition on Resource-Constrained IoT Devices pp. 1-20

- Salwa Sahnoun, Mahdi Mnif, Bilel Ghoul, Mohamed Jemal, Ahmed Fakhfakh and Olfa Kanoun
- Machine Learning for Blockchain and IoT Systems in Smart City pp. 1-5

- Cheng-Chi Lee, Dinh-Thuan Do and Agbotiname Lucky Imoize
Volume 17, issue 1, 2025
- WebTrackingScore: A Combined Web Tracking Risk Score System for Websites pp. 1-20

- Álvaro D. Guillén Cava and Antonio Ruiz-Martínez
- A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT pp. 1-20

- Innocent Boakye Ababio, Jan Bieniek, Mohamed Rahouti, Thaier Hayajneh, Mohammed Aledhari, Dinesh C. Verma and Abdellah Chehri
- IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit pp. 1-20

- Wei Zhou, Shandian Shen and Peng Liu
- Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss pp. 1-20

- Aryan Sharma, Haoming Wang, Deepak Mishra and Aruna Seneviratne
- End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT pp. 1-20

- Matthew Boeding, Michael Hempel and Hamid Sharif
- A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints pp. 1-27

- Antonio Pinizzotto and Raffaele Bruno
- Explainable Security Requirements Classification Through Transformer Models pp. 1-27

- Luca Petrillo, Fabio Martinelli, Antonella Santone and Francesco Mercaldo
- Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading pp. 1-27

- Giuseppe Baruffa and Luca Rugini
- XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System pp. 1-28

- Maiada M. Mahmoud, Yasser Omar Youssef and Ayman A. Abdel-Hamid
- Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities pp. 1-28

- Marica Amadeo and Giuseppe Ruggeri
- Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering pp. 1-22

- M. Baqer
- Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT) pp. 1-24

- Nemat Hazrati, Sajjad Pirahesh, Bahman Arasteh, Seyed Salar Sefati, Octavian Fratu and Simona Halunga
- FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model pp. 1-24

- Xiaozheng Du, Shijing Hu, Feng Zhou, Cheng Wang and Binh Minh Nguyen
- Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios pp. 1-24

- Zhiyuan Wang and Yuezhi Zhou
- Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks pp. 1-24

- Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu and Kuo-Yu Tsai
- Deep Learning Framework for Advanced De-Identification of Protected Health Information pp. 1-24

- Ahmad Aloqaily, Emad E. Abdallah, Rahaf Al-Zyoud, Esraa Abu Elsoud, Malak Al-Hassan and Alaa E. Abdallah
- GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks pp. 1-26

- Vahid Babaey and Arun Ravindran
- Impact of Weather Factors on Unmanned Aerial Vehicles’ Wireless Communications pp. 1-26

- Lalan Mishra and Naima Kaabouch
- Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency pp. 1-25

- Chen Qiu, Ziang Wu, Haoda Wang, Qinglin Yang, Yu Wang and Chunhua Su
- A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility pp. 1-29

- Aviral Goel and Yogachandran Rahulamathavan
- Fake News Detection and Classification: A Comparative Study of Convolutional Neural Networks, Large Language Models, and Natural Language Processing Models pp. 1-29

- Konstantinos I. Roumeliotis, Nikolaos D. Tselikas and Dimitrios K. Nasiopoulos
- Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency pp. 1-29

- Alessio Ferone and Stefano Verrilli
- Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution pp. 1-41

- Elmin Marevac, Esad Kadušić, Nataša Živić, Nevzudin Buzađija and Samir Lemeš
- Blockchain and Artificial Intelligence for Decentralized Edge Environments pp. 1-2

- Yuansong Qiao
- Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning pp. 1-39

- Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado and Luis Javier García Villalba
- Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology pp. 1-35

- Tamai Ramírez-Gordillo, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López and Higinio Mora
- Shared-Custodial Wallet for Multi-Party Crypto-Asset Management pp. 1-19

- Yimika Erinle, Yebo Feng, Jiahua Xu, Nikhil Vadgama and Paolo Tasca
- Ventinel: Automated Detection of Android Vishing Apps Using Optical Character Recognition pp. 1-19

- Daegyeom Kim, Sehwan O, Younghoon Ban, Jungsoo Park, Kyungho Joo and Haehyun Cho
- Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications pp. 1-19

- Teguh Indra Bayu, Yung-Fa Huang, Jeang-Kuo Chen, Cheng-Hsiung Hsieh, Budhi Kristianto, Erwien Christianto and Suharyadi Suharyadi
- A Reference Architecture for Virtual Human Integration in the Metaverse: Enhancing the Galleries, Libraries, Archives, and Museums (GLAM) Sector with AI-Driven Experiences pp. 1-15

- Orestis Spyrou, William Hurst and Caspar Krampe
- The Time Machine: Future Scenario Generation Through Generative AI Tools pp. 1-15

- Jan Ferrer i Picó, Michelle Catta-Preta, Alex Trejo Omeñaca, Marc Vidal and Josep Maria Monguet i Fierro
- Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0 pp. 1-16

- Italo Cesidio Fantozzi, Annalisa Santolamazza, Giancarlo Loy and Massimiliano Maria Schiraldi
- EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks pp. 1-21

- Sakshi Patni and Joohyung Lee
- Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention pp. 1-21

- Salvador López-Barajas, Pedro J. Sanz, Raúl Marín-Prades, Juan Echagüe and Sebastian Realpe
- A Survey on Cybersecurity in IoT pp. 1-32

- Elias Dritsas and Maria Trigka
- Survey of Artificial Intelligence Model Marketplace pp. 1-32

- Mian Qian, Abubakar Ahmad Musa, Milon Biswas, Yifan Guo, Weixian Liao and Wei Yu
- A Blockchain-Based Protocol for Fair Delivery for Receipts pp. 1-23

- M. Francisca Hinarejos, Josep-Lluis Ferrer-Gomila, Andreu-Pere Isern-Deyà and Gerardo-Francisco Chévez-Alvarado
- A Lightweight AI-Based Approach for Drone Jamming Detection pp. 1-23

- Sergio Cibecchini, Francesco Chiti and Laura Pierucci
- A Hierarchical Cache Architecture-Oriented Cache Management Scheme for Information-Centric Networking pp. 1-23

- Yichao Chao and Rui Han
- Collaboration in a Virtual Reality Serious Escape Room in the Metaverse Improves Academic Performance and Learners’ Experiences pp. 1-23

- Antonia-Maria Pazakou, Stylianos Mystakidis and Ioannis Kazanidis
- On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture pp. 1-23

- Niroshinie Fernando, Samir Shrestha, Seng W. Loke and Kevin Lee
- High-Risk AI Systems—Lie Detection Application pp. 1-23

- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou and Dimosthenis Anagnostopoulos
- Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things pp. 1-23

- Sumaiah Algarni and Fathi E. Abd El-Samie
- Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers pp. 1-23

- Víctor Pérez-Cano and Francisco Jurado
- Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment pp. 1-17

- Francesco Morgan Bono, Alessio Polinelli, Luca Radicioni, Lorenzo Benedetti, Francesco Castelli-Dezza, Simone Cinquemani and Marco Belloli
- Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers pp. 1-17

- Daniela Gifu and Covaci Silviu-Vasile
- A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things pp. 1-54

- Yang Yang, Min Lin, Yangfei Lin, Chen Zhang and Celimuge Wu
- Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites pp. 1-30

- Georgios Fevgas, Thomas Lagkas, Panagiotis Sarigiannidis and Vasileios Argyriou
- Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning pp. 1-30

- Muhammad Dilshad, Madiha Haider Syed and Semeen Rehman
| |