EconPapers    
Economics at your fingertips  
 

Future Internet

2009 - 2026

Current editor(s): Ms. Grace You

From MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 18, issue 3, 2026

Machine Learning and IoT as Enablers of Intelligent Industrial Transformation pp. 1-4 Downloads
Paulina Ayala and Marcelo V. Garcia
Federated Intrusion Detection via Unidirectional Serialization and Multi-Scale 1D Convolutions with Attention Reweighting pp. 1-19 Downloads
Wenqing Li, Di Gao and Tianrong Zhang
Earthquake Magnitude Detection Utilizing a Novel Hybrid Earth–Transformer–LSTM Architecture pp. 1-19 Downloads
Amir A. Ghavifekr, Elman Ghazaei, Mohsen Mirzajani and Paolo Visconti
An Exploratory Study on the Feasibility of Conducting Deliberative Polling ® in the Metaverse pp. 1-18 Downloads
Pablo López Guardiola, Manuel Pardo Ríos, Pablo Salvador Blesa Aledo and Alice Siu
Multi-Criteria Selection of Network Security Configuration Using NSGA-II pp. 1-18 Downloads
Bagdat Yagaliyeva, Valery Lakhno, Myroslav Lakhno, Boris Gusev, Kaiyrbek Makulov and Tomiris Sundet
GEMS: Gas-Enhanced Marine Search for Optimizing Fusion Mamba-Attention Networks for Fake Review Classification pp. 1-42 Downloads
Sharon Roji Priya C., Deepalakshmi Perumalsamy and Rajermani Thinakaran
Attention-Based Transformer Encoder for Secure Wireless Sensor Operations pp. 1-17 Downloads
Mohammad H. Baniata, Chayut Bunterngchit, Laith H. Baniata, Malek A. Almomani and Muhannad Tahboush
Low-Latency Holographic Video Transmission in Indoor VLC Networks Assisted by Rotatable Photodetectors pp. 1-21 Downloads
Wenzhe Wang and Long Zhang
An Efficient Internet-Wide Port Scan Algorithm Based on Deep Reinforcement Learning pp. 1-15 Downloads
Lu Yu, Huimin Ma, Pengfei Xue, Miao Hu and Hao Hao
A Software Defined Radio Implementation of Non-Orthogonal Multiple Access with Reliable Decoding via Error Correction pp. 1-15 Downloads
Dipanjan Adhikary and Eirini Eleni Tsiropoulou
Implementation and Evaluation of an Open-Source Chatbot for Patient Information Leaflets pp. 1-16 Downloads
Lisa Heiler, Katharina Kirchsteiger, Sten Hanke and Markus Bödenler
Lightweight AI-Based Attack Detection for LED VLC in Multi-Channel Airborne Radar Systems pp. 1-32 Downloads
Vadim A. Nenashev, Vladimir P. Kuzmenko, Svetlana S. Dymkova and Oleg V. Varlamov
MAPE-ZT: A Multi-Layer Access Policy Encryption System for Zero Trust Architectures pp. 1-32 Downloads
Ashutosh Soni, Surendra Kumar Nanda, Jayanti Rout, Mrutyunjaya Sathua, Ganapati Panda and Manob Jyoti Saikia
A Survey of Multimodal Learning Analytics: Data, Methods, Systems, and Responsible Deployment pp. 1-24 Downloads
Georgios Kostopoulos, Sotiris Kotsiantis, Theodor Panagiotakopoulos and Achilles Kameas
Multi-Modal Artificial Intelligence for Smart Cities: Experimental Integration of Textual and Sensor Data pp. 1-24 Downloads
Nouf Alkhater
Cybersecurity in the IoT pp. 1-3 Downloads
Christos Tryfonopoulos and Nicholas Kolokotronis
Deep Learning in Recommender Systems pp. 1-3 Downloads
María N. Moreno-García and Fernando de la Prieta
A Comprehensive Survey on 5G RedCap: Technologies, Security Vulnerabilities, and Attack Vectors pp. 1-35 Downloads
Pavan Raja I, Kurunandan Jain, Hari N. N, Sethu Subramanian N and Prabhakar Krishnan
Sentiment Classification of Amazon Product Reviews Based on Machine and Deep Learning Techniques: A Comparative Study pp. 1-35 Downloads
Eman Daraghmi and Noora Zyadeh
BigchainDB for Precision Agriculture Data Sharing: A Feasibility Study pp. 1-20 Downloads
Željko Džafić, Branko Milosavljević, Mladen Čučak and Slobodanka Pavlović
Cybersecurity of Cyber-Physical Systems in the Quantum Era: A Systematic Literature Review-Based Approach pp. 1-20 Downloads
Siler Amador, César Pardo and Raúl Mazo
A Framework to Measure Maturity of Industrial IoT Technology for Agricultural Regulatory Compliance Activities and Decentralization pp. 1-26 Downloads
Jinying Li, Ananda Maiti and Stephen Cahoon
Analyzing Characteristics of Public Transport Complex Networks Based on Multi-Source Big Data Fusion: A Case Study of Cangzhou, China pp. 1-26 Downloads
Linfang Zhou, Yongsheng Chen, Dongpu Ren and Qing Lan
A Stage-Wise Framework Using Class-Incremental Learning for Unknown DoS Attack Detection pp. 1-26 Downloads
Juncheng Ge, Yaokai Feng and Kouichi Sakurai
Perceived Learning vs. Engagement in AI-Assisted Homework: A Comparative Study of ChatGPT Use Across High School, University, and Teachers in Sonora, Mexico (2024–2025) pp. 1-25 Downloads
Raquel Torres-Peralta, Federico Cirett-Galán, María del Carmen Heras-Sanchez, Karla Lerma-Molina and Ilse Espinoza-Flores
Lightweight LSTM-Based Homogeneous Transfer Learning for Efficient On-Device IoT Intrusion Detection pp. 1-25 Downloads
Amjad Gamlo, Sanaa Sharaf and Rania Molla
Digital Twins at the Edge: A High-Availability Framework for Resilient Data Processing in IoT Sensor Networks pp. 1-27 Downloads
Madalin Neagu, Codruta Maria Serban, Anca Hangan and Gheorghe Sebestyen
Towards a Protocol-Aware Intrusion Detection System for LoRaWAN Networks pp. 1-27 Downloads
Zsolt Bringye, Rita Fleiner and Eszter Kail
Survey on Biometric Authentication for Decentralized Identity Management: Trends, Challenges, and Future Directions pp. 1-31 Downloads
Imen Rjab and Layth Sliman
An Edge–Fog–Cloud IoT Framework for Real-Time Cardiac Monitoring and Rapid Clinical Alerts in Hospital Wards pp. 1-31 Downloads
Tehseen Baig, Nauman Riaz Chaudhry, Reema Choudhary, Pankaj Yadav, Younus Ahamad Shaik and Ayesha Rashid
Conditional Counter-Inspection with Curriculum-Biased Experts for Lightweight 5G Intrusion Detection pp. 1-23 Downloads
Khaoula Tahori, Imade Fahd Eddine Fatani and Mohamed Moughit

Volume 18, issue 2, 2026

FedAWR: Aggregation Optimization in Federated Learning with Adaptive Weights and Learning Rates pp. 1-16 Downloads
Tong Yao, Jianqi Li and Jianhua Liu
A Hybrid LoRa/ZigBee IoT Mesh Architecture for Real-Time Performance Monitoring in Orienteering Sport Competitions: A Measurement Campaign on Different Environments pp. 1-35 Downloads
Romeo Giuliano, Stefano Alessandro Ignazio Mocci De Martis, Antonello Tomeo, Francesco Terlizzi, Marco Gerardi, Francesca Fallucchi, Lorenzo Felli and Nicola Dall’Ora
DACCA: Distributed Adaptive Cloud Continuum Architecture pp. 1-35 Downloads
Nektarios Deligiannakis, Vassilis Papataxiarhis, Michalis Loukeris, Stathes Hadjiefthymiades, Marios Touloupou, Syed Mafooq Ul Hassan, Herodotos Herodotou, Thanasis Moustakas, Emmanouil Bampis, Konstantinos Ioannidis, Iakovos T. Michailidis, Stefanos Vrochidis, Elias Kosmatopoulos, Francisco Javier Romero Martínez, Rafael Marín Pérez, Amr Mousa, Jacopo Castellini and Pablo Strasser
Special Issue on Security and Privacy in Blockchains and the IoT—3rd Edition pp. 1-8 Downloads
Christoph Stach, Clémentine Gritti and Iouliana Litou
Research on Intelligent Resource Management Solutions for Green Cloud Computing pp. 1-39 Downloads
Amirmohammad Parhizkar, Ehsan Arianyan and Pejman Goudarzi
Next-Gen Explainable AI (XAI) for Federated and Distributed Internet of Things Systems: A State-of-the-Art Survey pp. 1-69 Downloads
Aristeidis Karras, Anastasios Giannaros, Natalia Amasiadi and Christos Karras
Differential Privacy Data Publication Based on Scoring Function pp. 1-21 Downloads
Ke Yuan, Quan Zhang, Yinghao Lin, Yuye Wang and Chunfu Jia
Assuring Brokerage Quality in the Cloud–Edge Continuum pp. 1-21 Downloads
Evangelos Barmpas, Simeon Veloudis, Yiannis Verginadis and Iraklis Paraskakis
Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems pp. 1-21 Downloads
Guanyu Chen, Hiroki Watanabe, Kohei Matsumura and Yoshinari Takegawa
Location-Aware SDN-IDPS Framework for Real-Time DoS Mitigation in Vehicular Networks pp. 1-21 Downloads
Aung Aung, Kuljaree Tantayakul and Adisak Intana
Aris-RPL: A Multi-Objective Reinforcement Learning Framework for Adaptive and Load-Balanced Routing in IoT Networks pp. 1-38 Downloads
Najim Halloum, Ali Ahmadi and Yousef Darmani
Socially Grounded IoT Protocol for Reliable Computer Vision in Industrial Applications pp. 1-42 Downloads
Gokulnath Chidambaram, Shreyanka Subbarayappa and Sai Baba Magapu
Cross Layer Optimization Using AI/ML-Assisted Federated Edge Learning in 6G Networks pp. 1-42 Downloads
Spyridon Louvros, AnupKumar Pandey, Brijesh Shah and Yashesh Buch
Payment Rails in Smart Contract as a Service (SCaaS) Solutions from BPMN Models pp. 1-33 Downloads
Christian Gang Liu, Peter Bodorik and Dawn Jutla
User Perceptions of Virtual Consultations and Artificial Intelligence Assistance: A Mixed Methods Study pp. 1-27 Downloads
Pranavsingh Dhunnoo, Karen McGuigan, Vicky O’Rourke, Bertalan Meskó and Michael McCann
A Review of Research on the Applications of Large Models in Each Functional Module of the Entire Rehabilitation Process pp. 1-27 Downloads
Tingting Bai, Kaiwen Jiang, Yixuan Yu, Shuyan Qie, Congxiao Wang, Boyuan Wang and Wenli Zhang
Image-Based Malware Classification Using DCGAN-Augmented Data and a CNN–Transformer Hybrid Model pp. 1-23 Downloads
Manya Dhingra, Achin Jain, Niharika Thakur, Anurag Choubey, Massimo Donelli, Arun Kumar Dubey and Arvind Panwar
TLOA: A Power-Adaptive Algorithm Based on Air–Ground Cooperative Jamming pp. 1-23 Downloads
Wenpeng Wu, Zhenhua Wei, Haiyang You, Zhaoguang Zhang, Chenxi Li, Jianwei Zhan and Shan Zhao
Building a Regional Platform for Monitoring Air Quality pp. 1-29 Downloads
Stanimir Nedyalkov Stoyanov, Boyan Lyubomirov Belichev, Veneta Veselinova Tabakova-Komsalova, Yordan Georgiev Todorov, Angel Atanasov Golev, Georgi Kostadinov Maglizhanov, Ivan Stanimirov Stoyanov and Asya Georgieva Stoyanova-Doycheva
Analysis of GitHub Advanced Security: Security Integration in GitHub and Azure DevOps pp. 1-29 Downloads
Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
A Systematic Review of Machine-Learning-Based Detection of DDoS Attacks in Software-Defined Networks pp. 1-31 Downloads
Surendren Ganeshan and R Kanesaraj Ramasamy
Deep Learning-Based Video Watermarking: A Robust Framework for Spatial–Temporal Embedding and Retrieval pp. 1-28 Downloads
Antonio Cedillo-Hernandez, Lydia Velazquez-Garcia, Francisco Javier Garcia-Ugalde and Manuel Cedillo-Hernandez
A Comparative Analysis of Self-Aware Reinforcement Learning Models for Real-Time Intrusion Detection in Fog Networks pp. 1-25 Downloads
Nyashadzashe Tamuka, Topside Ehleketani Mathonsi, Thomas Otieno Olwal, Solly Maswikaneng, Tonderai Muchenje and Tshimangadzo Mavin Tshilongamulenzhe
Machine Learning-Driven Intrusion Detection for Securing IoT-Based Wireless Sensor Networks pp. 1-25 Downloads
Yirga Yayeh Munaye, Abebaw Demelash Gebeyehu, Li-Chia Tai, Zemenu Alem Abebe, Aeneas Bekele Workneh, Robel Berie Tarekegn, Yenework Belayneh Chekol and Getaneh Berie Tarekegn
Utilizing AIoT to Achieve Sustainable Agricultural Systems in a Climate-Change-Affected Environment pp. 1-32 Downloads
Mohamed Naeem, Mohamed A. El-Khoreby, Hussein M. ELAttar and Mohamed Aboul-Dahab
Towards Trustworthy AI Agents in Geriatric Medicine: A Secure and Assistive Architectural Blueprint pp. 1-32 Downloads
Elena-Anca Paraschiv, Adrian Victor Vevera, Carmen Elena Cîrnu, Lidia Băjenaru, Andreea Dinu and Gabriel Ioan Prada
A Large-Scale Empirical Study of LLM Orchestration and Ensemble Strategies for Sentiment Analysis in Recommender Systems pp. 1-43 Downloads
Konstantinos I. Roumeliotis, Dionisis Margaris, Dimitris Spiliotopoulos and Costas Vassilakis
Research on an On-Chain and Off-Chain Collaborative Storage Method Based on Blockchain and IPFS pp. 1-30 Downloads
Tianqi Zhu, Yuxiang Huang, Zhihong Liang, Mingming Qin, Ruicheng Niu, Yuanyuan Ma and Qi Feng
CEVD: Cluster-Based Ensemble Learning for Cross-Project Vulnerability Detection pp. 1-24 Downloads
Yang Cao, Yunwei Dong and Jie Liu
Video Deepfake Detection Based on Multimodality Semantic Consistency Fusion pp. 1-19 Downloads
Fang Sun, Xiaoxuan Guo, Tong Zhang, Yang Liu and Jing Zhang
AI-Driven Hybrid Architecture for Secure, Reconstruction-Resistant Multi-Cloud Storage pp. 1-19 Downloads
Munir Ahmed and Jiann-Shiun Yuan
Aerial Image Analysis: When LLMs Assist (And When Not) pp. 1-19 Downloads
Salvatore Calcagno, Erika Scaletta, Emiliano Tramontana and Gabriella Verga
The Generative AI Paradox: GenAI and the Erosion of Trust, the Corrosion of Information Verification, and the Demise of Truth pp. 1-18 Downloads
Emilio Ferrara
Beyond Centralized AI: Blockchain-Enabled Decentralized Learning pp. 1-18 Downloads
Daren Wang, Tengfei Ma, Juntao Zhu and Haihan Duan
Rethinking the Security Assurances of MTD: A Gap Analysis for Network Defense pp. 1-13 Downloads
Łukasz Jalowski, Marek Zmuda, Mariusz Rawski and Paulina Rekosz
SPARTA: Sparse Parallel Architecture for Real-Time Threat Analysis for Lightweight Edge Network Defense pp. 1-17 Downloads
Shi Li, Xiyun Mi, Lin Zhang and Ye Lu
Novel Video Understanding Approach for Embodied Learning of Robotics Technology pp. 1-20 Downloads
Hongbo Zhang, Benjamin Li and Gregory Rushton
Semantic Search for System Dynamics Models Using Vector Embeddings in a Cloud Microservices Environment pp. 1-20 Downloads
Pavel Kyurkchiev, Anton Iliev and Nikolay Kyurkchiev
Network Instability as a Signal of Systemic Financial Stress: An Explainable Machine-Learning Framework pp. 1-20 Downloads
Livia Valentina Moretti, Enrico Barbierato and Alice Gatti
Benchmarking Large Language Models for Embedded Systems Programming in Microcontroller-Driven IoT Applications pp. 1-20 Downloads
Marek Babiuch and Pavel Smutný
Interference-Resilient Concurrent Sensing in Dense Environments: A Review of OFDM and OTFS Waveforms for JRC pp. 1-20 Downloads
Mehmet Yazgan, Buldan Karahan, Hüseyin Arslan and Stavros Vakalis
From IoT to AIoT: Evolving Agricultural Systems Through Intelligent Connectivity in Low-Income Countries pp. 1-22 Downloads
Selain K. Kasereka, Alidor M. Mbayandjambe, Ibsen G. Bazie, Heriol F. Zeufack, Okurwoth V. Ocama, Esteve Hassan, Kyandoghere Kyamakya and Tasho Tashev
LeapNP: A Modular Python Framework for Benchmarking Learned Heuristics in Numeric Planning pp. 1-22 Downloads
Valerio Borelli, Alfonso Emilio Gerevini, Enrico Scala and Ivan Serina
Evaluating Reconstruction-Based and Proximity-Based Methods: A Four-Way Comparison (AE, LSTM-AE, OCSVM, IF) in SCADA Anomaly Detection Under Inverted Imbalance pp. 1-22 Downloads
Lukasz Pawlik
A Temporally Dynamic Feature-Extraction Framework for Phishing Detection with LIME and SHAP Explanations pp. 1-26 Downloads
Chris Mayo, Michael Tchuindjang, Sarfraz Brohi and Nikolaos Ersotelos
Optimizing Collaborative Filtering for Accurate Rating Predictions in Very Sparse Datasets pp. 1-26 Downloads
Sofia-Anna Lapadaki, John Nanos, Dionisis Margaris, Costas Vassilakis and Dimitris Spiliotopoulos
Trajectory Planning for Autonomous Underwater Vehicles in Uneven Environments: A Survey of Coverage and Sensor Data Collection Methods pp. 1-26 Downloads
Talal S. Almuzaini and Andrey V. Savkin
LoRa/LoRaWAN Time Synchronization: A Comprehensive Analysis, Performance Evaluation, and Compensation of Frame Timestamping pp. 1-26 Downloads
Stefano Rinaldi, Elia Mondini, Paolo Ferrari, Alessandra Flammini and Emiliano Sisinni

Volume 18, issue 1, 2026

Adaptive Privacy-Preserving Insider Threat Detection Using Generative Sequence Models pp. 1-13 Downloads
Fatmah Bamashmoos
AnonymAI: An Approach with Differential Privacy and Intelligent Agents for the Automated Anonymization of Sensitive Data pp. 1-18 Downloads
Marcelo Nascimento Oliveira Soares, Leonardo Barbosa Oliveira, Antonio João Gonçalves Azambuja, Jean Phelipe de Oliveira Lima and Anderson Silva Soares
LECITE: LoRA-Enhanced and Consistency-Guided Iterative Knowledge Graph Construction pp. 1-17 Downloads
Donghao Xiao and Quan Qian
Unsupervised Detection of SOC Spoofing in OCPP 2.0.1 EV Charging Communication Protocol Using One-Class SVM pp. 1-17 Downloads
Aisha B. Rahman, Md Sadman Siraj, Eirini Eleni Tsiropoulou, Georgios Fragkos, Ryan Sullivant, Yung Ryn Choe, Jhaell Jimenez, Junghwan Rhee and Kyu Hyung Lee
A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption pp. 1-32 Downloads
Xin Li, Minsheng Tan and Wenlong Tian
Adaptive Assistive Technologies for Learning Mexican Sign Language: Design of a Mobile Application with Computer Vision and Personalized Educational Interaction pp. 1-32 Downloads
Carlos Hurtado-Sánchez, Ricardo Rosales Cisneros, José Ricardo Cárdenas-Valdez, Andrés Calvillo-Téllez and Everardo Inzunza-Gonzalez
MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data pp. 1-30 Downloads
Lihua Zhang, Jiali Luo, Yi Yang and Wenbiao Wang
Guarded Swarms: Building Trusted Autonomy Through Digital Intelligence and Physical Safeguards pp. 1-30 Downloads
Uwe M. Borghoff, Paolo Bottoni and Remo Pareschi
Distributed Cooperative Spectrum Sensing via Push–Sum Consensus for Full-Duplex Cognitive Aerial Base Stations pp. 1-24 Downloads
Andrea Tani and Dania Marabissi
Detecting TLS Protocol Anomalies Through Network Monitoring and Compliance Tools pp. 1-24 Downloads
Diana Gratiela Berbecaru and Marco De Santo
WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication pp. 1-36 Downloads
Rafał Skowroński
Semantic Communication Unlearning: A Variational Information Bottleneck Approach for Backdoor Defense in Wireless Systems pp. 1-36 Downloads
Sümeye Nur Karahan, Merve Güllü, Mustafa Serdar Osmanca and Necaattin Barışçı
IRDS4C–CTIB: A Blockchain-Driven Deception Architecture for Ransomware Detection and Intelligence Sharing pp. 1-36 Downloads
Ahmed El-Kosairy, Heba Aslan and Nashwa AbdelBaki
A Dynamic Offloading Strategy Based on Optimal Stopping Theory in Vehicle-to-Vehicle Communication Scenarios pp. 1-22 Downloads
An Li, Jiaxuan Ling, Yeqiang Zheng, Mingliang Chen and Gaocai Wang
A Deterministic, Rule-Based Framework for Detecting Anomalous IP Packet Fragmentation pp. 1-22 Downloads
Maksim Iavich, Vladimer Svanadze and Oksana Kovalchuk
The Design and Implementation of a Graph-Based P2P Data Storage Service pp. 1-22 Downloads
Lunodzo J. Mwinuka, Massimo Cafaro, Lucas Pereira and Hugo Morais
Predicting Demand in Supply Chain Management: A Decision Support System Using Graph Convolutional Networks pp. 1-22 Downloads
Stefani Sifuentes-Domínguez, Jose-Manuel Mejia-Muñoz, Oliverio Cruz-Mejia, Rubén Pizarro-Gurrola, Aracelí-Soledad Domínguez-Flores and Leticia Ortega-Máynez
Edge–Cloud Platform for Monitoring Sustainability Metrics in Organizational Contexts pp. 1-22 Downloads
Maurizio Cellura, Ylenia Galluzzo, Domenico Garlisi, Fabrizio Giuliano, Domenico Panno and Simona E. Rombo
A Multiclass Machine Learning Framework for Detecting Routing Attacks in RPL-Based IoT Networks Using a Novel Simulation-Driven Dataset pp. 1-22 Downloads
Niharika Panda and Supriya Muthuraman
Multi-Attribute Physical-Layer Authentication Against Jamming and Battery-Depletion Attacks in LoRaWAN pp. 1-22 Downloads
Azita Pourghasem, Raimund Kirner, Athanasios Tsokanos, Iosif Mporas and Alexios Mylonas
A Multi-Objective Optimization-Based Container Cloud Resource Scheduling Method pp. 1-22 Downloads
Danping Zhang, Xiaolan Xie and Yuhui Song
RBCrowd: A Reliable Blockchain-Based Reputation Management Framework for Privacy Preservation in Mobile Crowdsensing pp. 1-22 Downloads
Zaina Maqour, Hanan El Bakkali, Driss Benhaddou and Houda Benbrahim
Seamless Vital Signs-Based Continuous Authentication Using Machine Learning pp. 1-26 Downloads
Reem Alrawili, Evelyn Sowells-Boone and Saif Al-Dean Qawasmeh
A Two-Stage Multi-Objective Cooperative Optimization Strategy for Computation Offloading in Space–Air–Ground Integrated Networks pp. 1-26 Downloads
He Ren and Yinghua Tong
An Unsupervised Cloud-Centric Intrusion Diagnosis Framework Using Autoencoder and Density-Based Learning pp. 1-26 Downloads
Suresh K. S, Thenmozhi Elumalai, Radhakrishnan Rajamani, Anubhav Kumar, Balamurugan Balusamy, Sumendra Yogarayan and Kaliyaperumal Prabu
Performance Evaluation of MongoDB and RavenDB in IIoT-Inspired Data-Intensive Mobile and Web Applications pp. 1-26 Downloads
Mădălina Ciumac, Cornelia Aurora Győrödi, Robert Ștefan Győrödi and Felicia Mirabela Costea
Research and Application of a Model Selection Forecasting System for Wind Speed and Theoretical Power Generation pp. 1-34 Downloads
Ming Zeng, Qianqian Jia, Zhenming Wen, Fang Mao, Haotao Huang and Jingyuan Pan
Correction: Sokhansanj, B.A. Uncensored AI in the Wild: Tracking Publicly Available and Locally Deployable LLMs. Future Internet 2025, 17, 477 pp. 1-2 Downloads
Bahrad A. Sokhansanj
Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers pp. 1-64 Downloads
Phil Steadman, Paul Jenkins, Rajkumar Singh Rathore and Chaminda Hewage
Highly Efficient Software Development Using DevOps and Microservices: A Comprehensive Framework pp. 1-37 Downloads
David Barbosa, Vítor Santos, Maria Clara Silveira, Arnaldo Santos and Henrique S. Mamede
Synthetizing 6G KPIs for Diverse Future Use Cases: A Comprehensive Review of Emerging Standards, Technologies, and Societal Needs pp. 1-37 Downloads
Shujat Ali, Asma Abu-Samah, Mohammed H. Alsharif, Rosdiadee Nordin, Nauman Saqib, Mohammed Sani Adam, Umawathy Techanamurthy, Manzareen Mustafa and Nor Fadzilah Abdullah
Wangiri Fraud Detection: A Comprehensive Approach to Unlabeled Telecom Data pp. 1-46 Downloads
Amirreza Balouchi, Meisam Abdollahi, Ali Eskandarian, Kianoush Karimi Pour Kerman, Elham Majd, Neda Azouji and Amirali Baniasadi
A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation pp. 1-46 Downloads
Evangelos Chaskos, Nicholas Kolokotronis and Stavros Shiaeles
Synergistic Phishing Intrusion Detection: Integrating Behavioral and Structural Indicators with Hybrid Ensembles and XAI Validation pp. 1-33 Downloads
Isaac Kofi Nti, Murat Ozer and Chengcheng Li
DRL-TinyEdge: Energy- and Latency-Aware Deep Reinforcement Learning for Adaptive TinyML at the 6G Edge pp. 1-42 Downloads
Saad Alaklabi and Saleh Alharbi
Leveraging the DAO for Edge-to-Cloud Data Sharing and Availability pp. 1-42 Downloads
Adnan Imeri, Uwe Roth, Michail Alexandros Kourtis, Andreas Oikonomakis, Achilleas Economopoulos, Lorenzo Fogli, Antonella Cadeddu, Alessandro Bianchini, Daniel Iglesias and Wouter Tavernier
Dynamic Evolution and Relation Perception for Temporal Knowledge Graph Reasoning pp. 1-21 Downloads
Yuan Huang, Pengwei Shi, Xiaozheng Zhou and Ruizhi Yin
A Dual-Attention CNN–GCN–BiLSTM Framework for Intelligent Intrusion Detection in Wireless Sensor Networks pp. 1-21 Downloads
Laith H. Baniata, Ashraf ALDabbas, Jaffar M. Atwan, Hussein Alahmer, Basil Elmasri and Chayut Bunterngchit
Design of Wireless Powered Communication Systems for Low-Altitude Economy pp. 1-21 Downloads
Huajun Chen, Zhengguo Xiao, Ming Dai and Lina Yuan
Cyber Approach for DDoS Attack Detection Using Hybrid CNN-LSTM Model in IoT-Based Healthcare pp. 1-21 Downloads
Mbarka Belhaj Mohamed, Dalenda Bouzidi, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi and Ahmed Fakhfakh
Performance Assessment of DL for Network Intrusion Detection on a Constrained IoT Device pp. 1-39 Downloads
Armin Mazinani, Daniele Antonucci, Luca Davoli and Gianluigi Ferrari
Federated Learning-Based Intrusion Detection in Industrial IoT Networks pp. 1-16 Downloads
George Dominic Pecherle, Robert Ștefan Győrödi and Cornelia Aurora Győrödi
Evaluating Digital Marketing, Innovation, and Entrepreneurial Impact in AI-Built vs. Professionally Developed DeFi Websites pp. 1-35 Downloads
Nikolaos T. Giannakopoulos, Damianos P. Sakas and Nikos Kanellos
Intrusion Detection for Internet of Vehicles CAN Bus Communications Using Machine Learning: An Empirical Study on the CICIoV2024 Dataset pp. 1-14 Downloads
Hop Le and Izzat Alsmadi
Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation pp. 1-25 Downloads
Chen-Yu Li
Decentralized Dynamic Heterogeneous Redundancy Architecture Based on Raft Consensus Algorithm pp. 1-25 Downloads
Ke Chen and Leyi Shi
Capacity Planning for Software Applications in Natural Disaster Scenarios pp. 1-25 Downloads
Juan Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa and Mauricio Marin
A Hybrid AI-Driven Knowledge-Based Expert System for Optimizing Gear Design: A Case Study for Education pp. 1-25 Downloads
Boris Aberšek, Samo Kralj and Andrej Flogie
Machine Learning for Assessing Vital Signs in Humans in Smart Cities Based on a Multi-Agent System pp. 1-25 Downloads
Nejood Faisal Abdulsattar, Hassan Khotanlou and Hatam Abdoli
Architecting Multi-Cluster Layer-2 Connectivity for Cloud-Native Network Slicing pp. 1-25 Downloads
Alex T. de Cock Buning, Ivan Vidal and Francisco Valera
Using Traffic Management Approaches to Assess Digital Infrastructure Disruptions: Insights from a Signal Tampering Case Study pp. 1-25 Downloads
Chrysostomos Mylonas, Apostolos Vouitsis, Evangelos Mitsakis and Konstantinos Kepaptsoglou
Resilience-by-Design: Extracting Resilience Requirements Using the Resilience Graph in the Automotive Concept Phase pp. 1-25 Downloads
Isaac Mpidi Bita, Elif Ugur, Aschot Hovemann and Roman Dumitrescu
Edge-Enhanced YOLOV8 for Spacecraft Instance Segmentation in Cloud-Edge IoT Environments pp. 1-25 Downloads
Ming Chen, Wenjie Chen, Yanfei Niu, Ping Qi and Fucheng Wang
Linearization Strategies for Energy-Aware Optimization of Single-Truck, Multiple-Drone Last-Mile Delivery Systems pp. 1-44 Downloads
Ornela Gordani, Eglantina Kalluci and Fatos Xhafa
A Versatile and Low-Cost IoT Solution for Bioclimatic Monitoring in Precision Viticulture pp. 1-27 Downloads
António Vieira, Nuno Silva, David Pascoal and Raul Morais
LEO Satellite and UAV-Assisted Maritime Internet of Things: Modeling and Performance Analysis for Data Acquisition pp. 1-27 Downloads
Xu Hu, Bin Lin, Ping Wang and Xiao Lu
ICU-Transformer: Multi-Head Attention Expert System for ICU Resource Allocation Robust to Data Poisoning Attacks pp. 1-31 Downloads
Manal Alghieth
Digital Learning Hubs: Evaluating Their Role in Fostering Complex and Computational Thinking pp. 1-31 Downloads
Inés Alvarez-Icaza, Luis Magdiel Oliva-Córdova, Rasikh Tariq and José Luis Martín-Núñez
CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic pp. 1-29 Downloads
Jinsha Zhang, Xiaoying Wang, Chunhui Li, Qingjie Zhang, Guoqing Yang, Xinyu Li, Fangfang Cui, Ruize Gu, Panpan Qi and Shuai Liu
Benchmarking SQL and NoSQL Persistence in Microservices Under Variable Workloads pp. 1-29 Downloads
Nenad Pantelic, Ljiljana Matic, Lazar Jakovljevic, Stefan Eric, Milan Eric, Miladin Stefanović and Aleksandar Djordjevic
Adaptive and Sustainable Smart Environments Using Predictive Reasoning and Context-Aware Reinforcement Learning pp. 1-28 Downloads
Abderrahim Lakehal, Boubakeur Annane, Adel Alti, Philippe Roose and Soliman Aljarboa
An Intelligent Software Architecture for Digital Library Systems in Sustainable Education pp. 1-23 Downloads
Ana M. Gonzalez de Miguel and Antonio Sarasa-Cabezuelo
A Lightweight LSTM Model for Flight Trajectory Prediction in Autonomous UAVs pp. 1-23 Downloads
Disen Jia, Jonathan Kua and Xiao Liu
A Physics-Aware Latent Diffusion Framework for Mitigating Adversarial Perturbations in Manufacturing Quality Control pp. 1-23 Downloads
Nikolaos Nikolakis and Paolo Catti
Lightweight Frame Format for Interoperability in Wireless Sensor Networks of IoT-Based Smart Systems pp. 1-23 Downloads
Samer Jaloudi
Heterogeneous Federated Learning via Knowledge Transfer Guided by Global Pseudo Proxy Data pp. 1-23 Downloads
Wenhao Sun, Xiaoxuan Guo, Wenjun Liu and Fang Sun
Page updated 2026-03-21