Future Internet
2009 - 2026
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 18, issue 1, 2026
- DRL-TinyEdge: Energy- and Latency-Aware Deep Reinforcement Learning for Adaptive TinyML at the 6G Edge pp. 1-42

- Saad Alaklabi and Saleh Alharbi
- Leveraging the DAO for Edge-to-Cloud Data Sharing and Availability pp. 1-42

- Adnan Imeri, Uwe Roth, Michail Alexandros Kourtis, Andreas Oikonomakis, Achilleas Economopoulos, Lorenzo Fogli, Antonella Cadeddu, Alessandro Bianchini, Daniel Iglesias and Wouter Tavernier
- Linearization Strategies for Energy-Aware Optimization of Single-Truck, Multiple-Drone Last-Mile Delivery Systems pp. 1-44

- Ornela Gordani, Eglantina Kalluci and Fatos Xhafa
- Dynamic Evolution and Relation Perception for Temporal Knowledge Graph Reasoning pp. 1-21

- Yuan Huang, Pengwei Shi, Xiaozheng Zhou and Ruizhi Yin
- A Dual-Attention CNN–GCN–BiLSTM Framework for Intelligent Intrusion Detection in Wireless Sensor Networks pp. 1-21

- Laith H. Baniata, Ashraf ALDabbas, Jaffar M. Atwan, Hussein Alahmer, Basil Elmasri and Chayut Bunterngchit
- Design of Wireless Powered Communication Systems for Low-Altitude Economy pp. 1-21

- Huajun Chen, Zhengguo Xiao, Ming Dai and Lina Yuan
- Cyber Approach for DDoS Attack Detection Using Hybrid CNN-LSTM Model in IoT-Based Healthcare pp. 1-21

- Mbarka Belhaj Mohamed, Dalenda Bouzidi, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi and Ahmed Fakhfakh
- ICU-Transformer: Multi-Head Attention Expert System for ICU Resource Allocation Robust to Data Poisoning Attacks pp. 1-31

- Manal Alghieth
- Intrusion Detection for Internet of Vehicles CAN Bus Communications Using Machine Learning: An Empirical Study on the CICIoV2024 Dataset pp. 1-14

- Hop Le and Izzat Alsmadi
- Adaptive Privacy-Preserving Insider Threat Detection Using Generative Sequence Models pp. 1-13

- Fatmah Bamashmoos
- Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers pp. 1-64

- Phil Steadman, Paul Jenkins, Rajkumar Singh Rathore and Chaminda Hewage
- Performance Assessment of DL for Network Intrusion Detection on a Constrained IoT Device pp. 1-39

- Armin Mazinani, Daniele Antonucci, Luca Davoli and Gianluigi Ferrari
- CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic pp. 1-29

- Jinsha Zhang, Xiaoying Wang, Chunhui Li, Qingjie Zhang, Guoqing Yang, Xinyu Li, Fangfang Cui, Ruize Gu, Panpan Qi and Shuai Liu
- Benchmarking SQL and NoSQL Persistence in Microservices Under Variable Workloads pp. 1-29

- Nenad Pantelic, Ljiljana Matic, Lazar Jakovljevic, Stefan Eric, Milan Eric, Miladin Stefanović and Aleksandar Djordjevic
- LECITE: LoRA-Enhanced and Consistency-Guided Iterative Knowledge Graph Construction pp. 1-17

- Donghao Xiao and Quan Qian
- Unsupervised Detection of SOC Spoofing in OCPP 2.0.1 EV Charging Communication Protocol Using One-Class SVM pp. 1-17

- Aisha B. Rahman, Md Sadman Siraj, Eirini Eleni Tsiropoulou, Georgios Fragkos, Ryan Sullivant, Yung Ryn Choe, Jhaell Jimenez, Junghwan Rhee and Kyu Hyung Lee
- Adaptive and Sustainable Smart Environments Using Predictive Reasoning and Context-Aware Reinforcement Learning pp. 1-28

- Abderrahim Lakehal, Boubakeur Annane, Adel Alti, Philippe Roose and Soliman Aljarboa
- WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication pp. 1-36

- Rafał Skowroński
- Semantic Communication Unlearning: A Variational Information Bottleneck Approach for Backdoor Defense in Wireless Systems pp. 1-36

- Sümeye Nur Karahan, Merve Güllü, Mustafa Serdar Osmanca and Necaattin Barışçı
- Seamless Vital Signs-Based Continuous Authentication Using Machine Learning pp. 1-26

- Reem Alrawili, Evelyn Sowells-Boone and Saif Al-Dean Qawasmeh
- A Two-Stage Multi-Objective Cooperative Optimization Strategy for Computation Offloading in Space–Air–Ground Integrated Networks pp. 1-26

- He Ren and Yinghua Tong
- An Unsupervised Cloud-Centric Intrusion Diagnosis Framework Using Autoencoder and Density-Based Learning pp. 1-26

- Suresh K. S, Thenmozhi Elumalai, Radhakrishnan Rajamani, Anubhav Kumar, Balamurugan Balusamy, Sumendra Yogarayan and Kaliyaperumal Prabu
- Performance Evaluation of MongoDB and RavenDB in IIoT-Inspired Data-Intensive Mobile and Web Applications pp. 1-26

- Mădălina Ciumac, Cornelia Aurora Győrödi, Robert Ștefan Győrödi and Felicia Mirabela Costea
- Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation pp. 1-25

- Chen-Yu Li
- Decentralized Dynamic Heterogeneous Redundancy Architecture Based on Raft Consensus Algorithm pp. 1-25

- Ke Chen and Leyi Shi
- Capacity Planning for Software Applications in Natural Disaster Scenarios pp. 1-25

- Juan Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa and Mauricio Marin
- A Hybrid AI-Driven Knowledge-Based Expert System for Optimizing Gear Design: A Case Study for Education pp. 1-25

- Boris Aberšek, Samo Kralj and Andrej Flogie
- Machine Learning for Assessing Vital Signs in Humans in Smart Cities Based on a Multi-Agent System pp. 1-25

- Nejood Faisal Abdulsattar, Hassan Khotanlou and Hatam Abdoli
- Architecting Multi-Cluster Layer-2 Connectivity for Cloud-Native Network Slicing pp. 1-25

- Alex T. de Cock Buning, Ivan Vidal and Francisco Valera
- Using Traffic Management Approaches to Assess Digital Infrastructure Disruptions: Insights from a Signal Tampering Case Study pp. 1-25

- Chrysostomos Mylonas, Apostolos Vouitsis, Evangelos Mitsakis and Konstantinos Kepaptsoglou
- Resilience-by-Design: Extracting Resilience Requirements Using the Resilience Graph in the Automotive Concept Phase pp. 1-25

- Isaac Mpidi Bita, Elif Ugur, Aschot Hovemann and Roman Dumitrescu
- Edge-Enhanced YOLOV8 for Spacecraft Instance Segmentation in Cloud-Edge IoT Environments pp. 1-25

- Ming Chen, Wenjie Chen, Yanfei Niu, Ping Qi and Fucheng Wang
- Evaluating Digital Marketing, Innovation, and Entrepreneurial Impact in AI-Built vs. Professionally Developed DeFi Websites pp. 1-35

- Nikolaos T. Giannakopoulos, Damianos P. Sakas and Nikos Kanellos
- Wangiri Fraud Detection: A Comprehensive Approach to Unlabeled Telecom Data pp. 1-46

- Amirreza Balouchi, Meisam Abdollahi, Ali Eskandarian, Kianoush Karimi Pour Kerman, Elham Majd, Neda Azouji and Amirali Baniasadi
- A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation pp. 1-46

- Evangelos Chaskos, Nicholas Kolokotronis and Stavros Shiaeles
- MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data pp. 1-30

- Lihua Zhang, Jiali Luo, Yi Yang and Wenbiao Wang
- Guarded Swarms: Building Trusted Autonomy Through Digital Intelligence and Physical Safeguards pp. 1-30

- Uwe M. Borghoff, Paolo Bottoni and Remo Pareschi
- An Intelligent Software Architecture for Digital Library Systems in Sustainable Education pp. 1-23

- Ana M. Gonzalez de Miguel and Antonio Sarasa-Cabezuelo
- A Lightweight LSTM Model for Flight Trajectory Prediction in Autonomous UAVs pp. 1-23

- Disen Jia, Jonathan Kua and Xiao Liu
- A Physics-Aware Latent Diffusion Framework for Mitigating Adversarial Perturbations in Manufacturing Quality Control pp. 1-23

- Nikolaos Nikolakis and Paolo Catti
- Lightweight Frame Format for Interoperability in Wireless Sensor Networks of IoT-Based Smart Systems pp. 1-23

- Samer Jaloudi
- Heterogeneous Federated Learning via Knowledge Transfer Guided by Global Pseudo Proxy Data pp. 1-23

- Wenhao Sun, Xiaoxuan Guo, Wenjun Liu and Fang Sun
- A Multi-Objective Optimization-Based Container Cloud Resource Scheduling Method pp. 1-23

- Danping Zhang, Xiaolan Xie and Yuhui Song
- Synergistic Phishing Intrusion Detection: Integrating Behavioral and Structural Indicators with Hybrid Ensembles and XAI Validation pp. 1-33

- Isaac Kofi Nti, Murat Ozer and Chengcheng Li
- Digital Learning Hubs: Evaluating Their Role in Fostering Complex and Computational Thinking pp. 1-33

- Inés Alvarez-Icaza, Luis Magdiel Oliva-Córdova, Rasikh Tariq and José Luis Martín-Núñez
- A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption pp. 1-32

- Xin Li, Minsheng Tan and Wenlong Tian
- Adaptive Assistive Technologies for Learning Mexican Sign Language: Design of a Mobile Application with Computer Vision and Personalized Educational Interaction pp. 1-32

- Carlos Hurtado-Sánchez, Ricardo Rosales Cisneros, José Ricardo Cárdenas-Valdez, Andrés Calvillo-Téllez and Everardo Inzunza-Gonzalez
- Distributed Cooperative Spectrum Sensing via Push–Sum Consensus for Full-Duplex Cognitive Aerial Base Stations pp. 1-24

- Andrea Tani and Dania Marabissi
- Detecting TLS Protocol Anomalies Through Network Monitoring and Compliance Tools pp. 1-24

- Diana Gratiela Berbecaru and Marco De Santo
- Research and Application of a Model Selection Forecasting System for Wind Speed and Theoretical Power Generation pp. 1-34

- Ming Zeng, Qianqian Jia, Zhenming Wen, Fang Mao, Haotao Huang and Jingyuan Pan
- A Dynamic Offloading Strategy Based on Optimal Stopping Theory in Vehicle-to-Vehicle Communication Scenarios pp. 1-22

- An Li, Jiaxuan Ling, Yeqiang Zheng, Mingliang Chen and Gaocai Wang
- A Deterministic, Rule-Based Framework for Detecting Anomalous IP Packet Fragmentation pp. 1-22

- Maksim Iavich, Vladimer Svanadze and Oksana Kovalchuk
- The Design and Implementation of a Graph-Based P2P Data Storage Service pp. 1-22

- Lunodzo J. Mwinuka, Massimo Cafaro, Lucas Pereira and Hugo Morais
- Predicting Demand in Supply Chain Management: A Decision Support System Using Graph Convolutional Networks pp. 1-22

- Stefani Sifuentes-Domínguez, Jose-Manuel Mejia-Muñoz, Oliverio Cruz-Mejia, Rubén Pizarro-Gurrola, Aracelí-Soledad Domínguez-Flores and Leticia Ortega-Máynez
- Edge–Cloud Platform for Monitoring Sustainability Metrics in Organizational Contexts pp. 1-22

- Maurizio Cellura, Ylenia Galluzzo, Domenico Garlisi, Fabrizio Giuliano, Domenico Panno and Simona E. Rombo
- A Multiclass Machine Learning Framework for Detecting Routing Attacks in RPL-Based IoT Networks Using a Novel Simulation-Driven Dataset pp. 1-22

- Niharika Panda and Supriya Muthuraman
- Multi-Attribute Physical-Layer Authentication Against Jamming and Battery-Depletion Attacks in LoRaWAN pp. 1-22

- Azita Pourghasem, Raimund Kirner, Athanasios Tsokanos, Iosif Mporas and Alexios Mylonas
- RBCrowd: A Reliable Blockchain-Based Reputation Management Framework for Privacy Preservation in Mobile Crowdsensing pp. 1-22

- Zaina Maqour, Hanan El Bakkali, Driss Benhaddou and Houda Benbrahim
- Correction: Sokhansanj, B.A. Uncensored AI in the Wild: Tracking Publicly Available and Locally Deployable LLMs. Future Internet 2025, 17, 477 pp. 1-2

- Bahrad A. Sokhansanj
- Federated Learning-Based Intrusion Detection in Industrial IoT Networks pp. 1-16

- George Dominic Pecherle, Robert Ștefan Győrödi and Cornelia Aurora Győrödi
- AnonymAI: An Approach with Differential Privacy and Intelligent Agents for the Automated Anonymization of Sensitive Data pp. 1-18

- Marcelo Nascimento Oliveira Soares, Leonardo Barbosa Oliveira, Antonio João Gonçalves Azambuja, Jean Phelipe de Oliveira Lima and Anderson Silva Soares
- A Versatile and Low-Cost IoT Solution for Bioclimatic Monitoring in Precision Viticulture pp. 1-27

- António Vieira, Nuno Silva, David Pascoal and Raul Morais
- LEO Satellite and UAV-Assisted Maritime Internet of Things: Modeling and Performance Analysis for Data Acquisition pp. 1-27

- Xu Hu, Bin Lin, Ping Wang and Xiao Lu
- Highly Efficient Software Development Using DevOps and Microservices: A Comprehensive Framework pp. 1-37

- David Barbosa, Vítor Santos, Maria Clara Silveira, Arnaldo Santos and Henrique S. Mamede
- Synthetizing 6G KPIs for Diverse Future Use Cases: A Comprehensive Review of Emerging Standards, Technologies, and Societal Needs pp. 1-37

- Shujat Ali, Asma Abu-Samah, Mohammed H. Alsharif, Rosdiadee Nordin, Nauman Saqib, Mohammed Sani Adam, Umawathy Techanamurthy, Manzareen Mustafa and Nor Fadzilah Abdullah
- IRDS4C–CTIB: A Blockchain-Driven Deception Architecture for Ransomware Detection and Intelligence Sharing pp. 1-37

- Ahmed El-Kosairy, Heba Aslan and Nashwa AbdelBaki
| |