Future Internet
2009 - 2026
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 18, issue 5, 2026
- Hybrid Energy-Aware Ranking and Optimization pp. 1-24

- Zhiling Zeng, Yuxuan Jiang and Na Niu
- Resource Allocation for D2D Communications in Multi-Slice NOMA-Based Cellular Networks pp. 1-24

- Lijun Dong, Jingjing Wu and Yitong Yang
- Securing the Internet of Things, Lightweight Mutual Authentication Based on Quantum Key Distribution pp. 1-26

- Muhammad Nawaz Khan, Inam Ullah, Sokjoon Lee and Mohsin Shah
- SV-GEN: Synergizing LLM-Empowered Variable Semantics and Graph Transformers for Vulnerability Detection pp. 1-26

- Zhaohui Liu, Haocheng Yang and Wenjie Xie
- Navigating the Path to AI and Virtual Immersion: An Exploratory Study of Educational Escape Rooms with the ED-SCALE Model pp. 1-26

- Ionuț Petre, Ella Magdalena Ciupercă, Ion Alexandru Marinescu, Dragoș Daniel Iordache and Alin Zamfiroiu
- The Trustworthy Model Context Protocol (MCP) Registry: An Architectural Blueprint for Cryptographic Provenance and Runtime Integrity pp. 1-26

- Lluis Mas, Jordi Vilaplana, Josep Rius, Radu Spaimoc and Jordi Mateo
- Scalable and Distributed Cloud Continuum Orchestration for Next-Generation IoT Applications: Latest Advances and Prospects—2nd Edition pp. 1-3

- Dimitrios Dechouniotis and Ioannis Dimolitsas
- Enhanced Machine Learning-Based SDM-QAM Transmission Using Low-Cost Fast-OFDM pp. 1-16

- Mutsam A. Jarajreh
- Enhancing Network Intrusion Detection with Quantum Machine Learning: A Comprehensive Survey of Methods, Metrics, and Applications pp. 1-27

- Antanios Kaissar, Ali Bou Nassif and Ahmed Bouridane
- Scheduling Jamming Resources in Complex Terrain: A Multi-Objective Air—Ground Collaborative Optimization Approach pp. 1-44

- Haiyang You, Zhenhua Wei, Wenpeng Wu, Chenxi Li, Jianwei Zhan and Zhaoguang Zhang
- Extending MISP Taxonomies for Drug-Related Forum Classification on the Dark Web: A Human-in-the-Loop and LLM-Based Approach pp. 1-36

- José-Amelio Medina-Merodio, Mikel Ferrer-Oliva, Alejandro Ruiz-Zambrano, José Fernández-López and Luis De-Marcos
- Smart Pricing for Smart Charging: A Deep Reinforcement Learning Framework for Residential EV Infrastructure pp. 1-21

- Christos Pergamalis, Eleftherios Tsampasis, Panagiotis K. Gkonis and Charalambos N. Elias
- Intelligent Threat Defense Mechanisms for 5G APIs pp. 1-28

- Asif Yasin, Seyed Ebrahim Hosseini, Muhammad Nadeem and Shahbaz Pervez
- A Classification Framework and Research Progress on Adaptation Methods for Concept Drift in Malicious Code Detection Models pp. 1-28

- Qi Wang, Longjuan Wang and Weiwei Zhao
- EKG-NSGA-III: An Expert Knowledge-Guided Improved NSGA-III for Large-Scale Frequency Assignment in Ultra-Dense Heterogeneous Networks pp. 1-15

- Xiang Sun, Bin Wang, Shaoying Shi, Luda Zhao and Jun Sun
- AutoBoost-IoT: A Hybrid Model for Intrusion Detection in IoT Networks pp. 1-22

- Mehdi Moucharraf, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
- A Security-Aware Ambient Intelligence Framework for Detecting Violent Language in Airline Customer Reviews pp. 1-20

- Fahad Alanazi and Osama Rabie
- Unveiling the Risk of Unsafe Image Generation in Stable Diffusion Through a Cross-Attention Mechanism pp. 1-20

- Yong Zhuang, Yiheng Jing, Wenzhe Yi, Xiaoyang Xu and Juan Wang
- SLEVA-AV: An Edge-Centric IoT Security Architecture Using Multi-Stage Lightweight Encryption for Autonomous Vehicle Applications pp. 1-18

- Lordwin Cecil Prabhaker Micheal, Xavier Fernando, Mathan Kumar Arumugasamy, Neelamegam Devarasu and Daisy Merina Rathinarajan
- Healthcare AI as Critical Digital Health Infrastructure: A Public Health Preparedness Framework for Systemic Risk pp. 1-25

- Nikolay Lipskiy and Stephen V. Flowerday
- Co-Adaptive Attacker–Defender Learning over Attack Graphs: A Stochastic Game Approach to Dynamic Network Defense pp. 1-25

- Mohammed A. Makarem, Muneef A. Razaz and Zead Saleh
- Deriving Architectural Pillars for Internet-Enabled Smart Systems: An Activity-Mediated Socio-Technical Architecture pp. 1-35

- Ary Setijadi Prihatmanto, Agus Sukoco, Rahadian Yusuf, Dewi Tresnawati and Azizah Zakiah
- Explaining Seasonal 5G Path Loss in a Vineyard: From Empirical Models to Interpretable Machine Learning pp. 1-30

- Daniel Schneider, Ali Imran Jehangiri, Daniel Müller, Hannes Frey and Maria Anna Wimmer
- Protecting Digital Identities: Deepfake Face Detection Using Dual-Decoder U-Net Semantic Segmentation pp. 1-19

- Rodrigo Eduardo Arevalo-Ancona, Manuel Cedillo-Hernandez, Antonio Cedillo-Hernandez and Francisco Javier Garcia-Ugalde
- Integrating Unsupervised Learning for the Factual Consistency of Generative Models pp. 1-19

- Sindhu Nair and Y. S. Rao
- Seamless Inter-Domain Mobility with Hybrid SDN-LISP pp. 1-23

- Kuljaree Tantayakul, Adisak Intana, Aung Aung and Riadh Dhaou
- A Task Scheduling and Management Platform for Multi-Workload Smart Elderly Care on Pure-Edge CPU-TPU Heterogeneous Nodes pp. 1-23

- Tuo Nie, Dajiang Yang, Xin Guo, Wenxuan Zhu and Bochao Su
Volume 18, issue 4, 2026
- Joint Design and Integration in Smart IoT Systems pp. 1-3

- Wei Yu and Guobin Xu
- Industrial Internet of Things (IIoT): Trends and Technologies—2nd Edition pp. 1-3

- Zhihao Liu, Franco Davoli and Davide Borsatti
- IoT, Edge, and Cloud Computing in Smart Cities pp. 1-3

- Stefano Rinaldi and Alan Oliveira De Sá
- A Multicriteria Framework for Evaluation and Selection of Conversational AI Assistants in Mental Health pp. 1-36

- Constanta Zoie Radulescu, Marius Radulescu and Alexandra Ioana Mihailescu
- Virtual Museums and Active Learning: Evidence from a Technology-Mediated Intervention pp. 1-21

- Chenglin Yang, Shujing Jiang, Guangyuan Yao, Chi-kin Lam, Tao Tan and Yue Sun
- A Lightweight Multi-Classification Model for Identifying Network Application Traffic Using Knowledge Distillation pp. 1-21

- Zhiyuan Li and Yonghao Feng
- A Tiered Classification Framework for Detecting and Diagnosing Man-in-the-Middle Attacks in Smart Grid Protocols pp. 1-21

- Hassan N. Noura, Zaid Allal, Ola Salman and Khaled Chahine
- Assessing Hierarchical Temporal Memory Against an LSTM Baseline for Short-Term Smart-Meter Load Forecasting pp. 1-21

- Antón Román-Portabales and Martín López-Nores
- A Hybrid CNN–LSTM–Attention Framework for Intrusion Detection in Smart Mobility Networks pp. 1-28

- Otuekong Ekpo, Valentina Casola, Alessandra De Benedictis, Philip Asuquo and Bright Agbor
- Dual-Factor Adaptive Robust Aggregation for Secure Federated Learning in IoT Networks pp. 1-18

- Zuan Song, Wuzheng Tan, Hailong Wang, Guilong Zhang and Jian Weng
- One-Way Ranging for LoRa: A Chirp-Based Estimation Approach pp. 1-18

- Luz E. Marquez, Maria Calle and John E. Candelo-Becerra
- Classification Model of Emotional Tone in Hate Speech and Its Relationship with Inequality and Gender Stereotypes, Using NLP and Machine Learning Algorithms pp. 1-43

- Aymé Escobar Díaz, Ricardo Rivadeneira, Walter Fuertes and Washington Loza
- A Context-Aware Cybersecurity Readiness Assessment Framework for Organisations in Developing and Emerging Environments pp. 1-30

- Raymond Agyemang, Steven Furnell and Tim Muller
- A Review of Honeypots: Fingerprinting Techniques, Detection, and Evasion Mechanisms pp. 1-30

- Arooj Chaudhry, Casper Andersen, Gaurav Choudhary and Nicola Dragoni
- AI Risk Governance for Advancing Digital Sovereignty in Data-Driven Systems: An Integrated Multi-Layer Framework pp. 1-30

- Segun Odion and Santosh Reddy Addula
- Improving Information Communication in Emerging 6G Scenarios: A Review of Semantic Communications for the Future Internet pp. 1-32

- Evelio Astaiza Hoyos, Héctor Fabio Bermúdez-Orozco and Nasly Cristina Rodriguez-Idrobo
- A Distributed Energy Trading Framework Based on All-Optical Multicast Communication pp. 1-32

- Xuxun Ye and Anliang Cai
- Learning Italian Hand Gesture Culture Through an Automatic Gesture Recognition Approach pp. 1-23

- Chiara Innocente, Giorgio Di Pisa, Irene Lionetti, Andrea Mamoli, Manuela Vitulano, Giorgia Marullo, Simone Maffei, Enrico Vezzetti and Luca Ulrich
- Towards Quantum-Safe O-RAN: Experimental Evaluation of ML-KEM-Based IPsec on the E2 Interface pp. 1-23

- Mario Perera, Michael Mackay, Max Hashem Eiza, Alessandro Raschella, Nathan Shone and Mukesh Kumar Maheshwari
- Reddit Depression Communities as Spaces of Emotion Regulation: A Data-Informed Analysis of Coping and Engagement pp. 1-23

- Virginia Morini, Salvatore Citraro, Elena Sajno, Maria Sansoni, Giuseppe Riva, Massimo Stella and Giulio Rossetti
- 3D Digital Twin-Driven LoRaWAN Gateway Placement Using Memetic Optimization and K-Coverage Network Health Metrics pp. 1-24

- Santiago Acurio-Maldonado, Erwin J. Sacoto-Cabrera, Edison Meneses-Torres, Monica Karel Huerta and Esteban Ordóñez-Morales
- EGGA: An Error-Guided Generative Augmentation and Optimized ML-Based IDS for EV Charging Network Security pp. 1-24

- Li Yang and G. Kirubavathi
- A Wearable System for Real-Time Fall Detection on Resource-Constrained Devices pp. 1-24

- Timothy Malche, Govind Murari Upadhyay, Sumegh Tharewal, Vipin Balyan, Vikash Kumar Mishra, Gunjan Gupta and Pramod Kumar Soni
- Community-Aware Network Dismantling via Gateways: Large-Scale Evaluation on LFR Benchmarks pp. 1-24

- Jan Sawicki, Maria Ganzha, Marcin Paprzycki, Jihui Han and Subhajit Sahu
- Intelligent Optimization Methods for Cloud–Edge Collaborative Vehicular Networks via the Integration of Bayesian Decision-Making and Reinforcement Learning pp. 1-24

- Youjian Yu, Zhaowei Song, Sifeng Zhu and Qinghua Zhang
- Hybrid Deep Neural Network-Based Modeling of Multimodal Emotion Recognition for Novice Drivers pp. 1-24

- Jianzhuo Li, Ye Yu, Zhao Dai and Panyu Dai
- Impact of Generative AI on Author’s Metrics and Copyright Ownership: Digital Labour, Ethical Attribution, and Traceability Frameworks for Future Internet Systems pp. 1-31

- Chukwuebuka Joseph Ejiyi, Sandra Chukwudumebi Obiora, Ijuolachi Obiora, Gladys Wauk, Maryjane Ejiako, Temitope Omotayo and Olusola Bamisile
- Heterogeneity-Aware Dynamic Federated Split Learning with Adaptive Compression (HADFL-AC) Edge–Cloud Inference in IoT Environments pp. 1-31

- Norah Alrusayni and Asma A. Al-Shargabi
- Hardware-Anchored ES-SPA: A Dynamic Zero-Trust Architecture for Secure eSIM Provisioning in 6G IoT via Moving Target Defense pp. 1-26

- Hari N. N., Kurunandan Jain, Prabu P and Prabhakar Krishnan
- A Physically Aware Residual Learning Framework for Outdoor Localization in LoRaWAN Networks pp. 1-26

- Askhat Bolatbek, Ömer Faruk Beyca, Batyrbek Zholamanov, Madiyar Nurgaliyev, Gulbakhar Dosymbetova, Dinara Almen, Ahmet Saymbetov, Botakoz Yertaikyzy, Sayat Orynbassar and Ainur Kapparova
- Recent Advances in Internet of Things and Cyber-Physical Systems pp. 1-2

- Iwona Grobelna
- 2024 and 2025 Feature Papers from Future Internet’s Editorial Board Members pp. 1-5

- Gianluigi Ferrari
- Editorial for the Special Issue “Artificial Intelligence: Innovation, Applications and Transformative Experiences” pp. 1-5

- Diego Vergara and Pablo Fernández-Arias
- Class-Specific GAN Augmentation for Imbalanced Intrusion Detection: A Comparative Study Using the UWF-ZeekData22 Dataset pp. 1-37

- Asfaw Debelie, Sikha S. Bagui, Dustin Mink and Subhash C. Bagui
- IoT Architecture for Smart Environments: Mechanisms, Approaches, and Applications pp. 1-4

- Manuel J. C. S. Reis and Carlos Serôdio
- CAMS F Edge DTN: Context-Aware Offline-First Synchronization and Local Reasoning Using CRDTs and MQTT-SN pp. 1-15

- Nelson Iván Herrera, Estevan Ricardo Gómez-Torres, Edgar E. González, Renato M. Toasa and Paúl Baldeón
- Detecting Objects in Aerial Imagery Using Drones and a YOLO-C3 Hybrid Approach pp. 1-22

- Salvatore Calcagno, Alessandro Midolo, Erika Scaletta, Emiliano Tramontana and Gabriella Verga
- Intrusion Detection in the Structure of Signal-Code Design in Cyber-Physical Systems of Swarm Small Aerial Vehicles Group Interaction pp. 1-20

- Vadim A. Nenashev, Renata I. Chembarisova, Svetlana S. Dymkova and Oleg V. Varlamov
- Enhancing Handball Analytics with Computer Vision and Machine Learning: An Exploratory Experiment pp. 1-20

- Mostafa Farahat, Hassan Soubra, Donatien Koulla Moulla and Alain Abran
- eMQTT Traffic Generator for IoT Intrusion Detection Systems pp. 1-20

- Jorge Ortega-Moody, Cesar Isaza, Kouroush Jenab, Karina Anaya, Adrian Leon and Cristian Felipe Ramirez-Gutierrez
- CNN-LSTM-POT-Based Anomaly Detection for Smart Greenhouse Sensor Data: A Real-Time Edge Deployment Approach pp. 1-20

- Jun Shu and Dengke Yang
- A Comparative Benchmark of Face Detection Models for Noisy and Dynamic Online Class Environments pp. 1-20

- Cesar Isaza, Pamela Rocío Ibarra Tapia, Cristian Felipe Ramirez-Gutierrez, Jonny Paul Zavala de Paz, Jose Amilcar Rizzo Sierra and Karina Anaya
- Workload-Aware Edge Node Orchestration and Dynamic Resource Scaling in MEC pp. 1-25

- Efthymios Oikonomou and Angelos Rouskas
- Accelerating the Uptake of 5G for Automotive: Real-World Trials from the TARGET-X Project pp. 1-25

- Jad Nasreddine, Paul Salvati and Miguel Fuentes
- Cross-Dataset Temporal and Semantic Generalization of Intrusion Detection Models for the Future Internet pp. 1-29

- Rajesh Elangovan, Durga Devi Parthasarathy, M. Jawahar, Prabu Kaliyaperumal, Balamurugan Balusamy, Sumendra Yogarayan and Vivek Venkatesan
- Transfer Learning Strategies for Comic Character Recognition in Low-Data Regimes: A Comparative Study pp. 1-38

- Marco Parrillo, Luigi Laura and Alessandro Manna
Volume 18, issue 3, 2026
- Machine Learning and IoT as Enablers of Intelligent Industrial Transformation pp. 1-4

- Paulina Ayala and Marcelo V. Garcia
- DFedForest++: A Novel Privacy-Enhanced Framework for Integrating Cyber Threat Intelligence in IDS Using Federated Learning pp. 1-37

- Md. Moradul Siddique, Syed Md. Galib, Md. Nasim Adnan and Mohammad Nowsin Amin Sheikh
- Implementation and Evaluation of an Open-Source Chatbot for Patient Information Leaflets pp. 1-16

- Lisa Heiler, Katharina Kirchsteiger, Sten Hanke and Markus Bödenler
- Differentially Private Federated Learning with Adaptive Clipping Thresholds pp. 1-16

- Jianhua Liu, Yanglin Zeng, Zhongmei Wang, Weiqing Zhang and Yao Tong
- Design of Network Traffic Analysis Models Based on Deep Neural Networks pp. 1-16

- Jiantao Cui and Yixiang Zhao
- A Survey of Multimodal Learning Analytics: Data, Methods, Systems, and Responsible Deployment pp. 1-24

- Georgios Kostopoulos, Sotiris Kotsiantis, Theodor Panagiotakopoulos and Achilles Kameas
- Multi-Modal Artificial Intelligence for Smart Cities: Experimental Integration of Textual and Sensor Data pp. 1-24

- Nouf Alkhater
- AI-Driven Network Optimization for the 5G-to-6G Transition: A Taxonomy-Based Survey and Reference Framework pp. 1-24

- Rexhep Mustafovski, Galia Marinova, Besnik Qehaja, Edmond Hajrizi, Shejnaze Gagica and Vassil Guliashki
- Augmented Reality Technologies for Radiation Safety Training: A Systematic Review of Sensor Integration and Visualization Approaches pp. 1-24

- Rajiv Khadka, Xingyue Yang, Jack Dunker and John Koudelka
- Survey on Biometric Authentication for Decentralized Identity Management: Trends, Challenges, and Future Directions pp. 1-31

- Imen Rjab and Layth Sliman
- An Edge–Fog–Cloud IoT Framework for Real-Time Cardiac Monitoring and Rapid Clinical Alerts in Hospital Wards pp. 1-31

- Tehseen Baig, Nauman Riaz Chaudhry, Reema Choudhary, Pankaj Yadav, Younus Ahamad Shaik and Ayesha Rashid
- Model Procurement for Industrial Cyber-Physical Systems Using Cryptographic Performance Attestation pp. 1-31

- Jay Bojič Burgos, Urban Sedlar and Matevž Pustišek
- DRT-PBFT: A Novel PBFT-Optimized Consensus Algorithm for Blockchain Based on Dynamic Reputation Tree pp. 1-31

- Xiaohong Deng, Lihui Liu, Zhigang Chen, Xinrong Lu and Juan Li
- A Decade of Horizontal Fragmentation Methods in OLAP from Data Warehouse to Data Lakehouse: A Scoping Review pp. 1-31

- Nidia Rodríguez-Mazahua, Lisbeth Rodríguez-Mazahua, Giner Alor-Hernández, Jair Cervantes and Felipe Castro-Medina
- A Framework to Measure Maturity of Industrial IoT Technology for Agricultural Regulatory Compliance Activities and Decentralization pp. 1-26

- Jinying Li, Ananda Maiti and Stephen Cahoon
- Analyzing Characteristics of Public Transport Complex Networks Based on Multi-Source Big Data Fusion: A Case Study of Cangzhou, China pp. 1-26

- Linfang Zhou, Yongsheng Chen, Dongpu Ren and Qing Lan
- A Stage-Wise Framework Using Class-Incremental Learning for Unknown DoS Attack Detection pp. 1-26

- Juncheng Ge, Yaokai Feng and Kouichi Sakurai
- ANRF: An Adaptive Network Reconstruction Framework for Community Detection in Bipartite Networks pp. 1-26

- Furong Chang, Songxian Wu, Yue Zhao and Farhan Ullah
- A Multi-Source Feedback-Driven Framework for Generating WAF Test Cases pp. 1-26

- Pengcheng Lu, Xiaofeng Zhong, Wenbo Xu and Yongjie Wang
- Federated Intrusion Detection via Unidirectional Serialization and Multi-Scale 1D Convolutions with Attention Reweighting pp. 1-19

- Wenqing Li, Di Gao and Tianrong Zhang
- Earthquake Magnitude Detection Utilizing a Novel Hybrid Earth–Transformer–LSTM Architecture pp. 1-19

- Amir A. Ghavifekr, Elman Ghazaei, Mohsen Mirzajani and Paolo Visconti
- A Mobility-Aware Zone-Based Key Management Scheme with Dynamic Key Refinement for Large-Scale Mobile Wireless Sensor Networks pp. 1-38

- Abdelbassette Chenna, Djallel Eddine Boubiche, Abderrezak Benyahia, Homero Toral-Cruz, Rafael Martínez-Peláez and Pablo Velarde-Alvarado
- Context-Aware Software-Defined Wireless Networks: An AI-Based Approach to Deal with QoS pp. 1-29

- Dainier González Romero, Sergio F. Ochoa and Rodrigo M. Santos
- BigchainDB for Precision Agriculture Data Sharing: A Feasibility Study pp. 1-20

- Željko Džafić, Branko Milosavljević, Mladen Čučak and Slobodanka Pavlović
- Cybersecurity of Cyber-Physical Systems in the Quantum Era: A Systematic Literature Review-Based Approach pp. 1-20

- Siler Amador, César Pardo and Raúl Mazo
- Contra-KD: A Lightweight Transformer Model for Malicious URL Detection with Contrastive Representation and Model Distillation pp. 1-20

- Zheng You Lim, Ying Han Pang, Edwin Chan Kah Jun, Shih Yin Ooi and Goh Fan Ling
- GEMS: Gas-Enhanced Marine Search for Optimizing Fusion Mamba-Attention Networks for Fake Review Classification pp. 1-42

- C. Sharon Roji Priya, Deepalakshmi Perumalsamy and Rajermani Thinakaran
- Perceived Learning vs. Engagement in AI-Assisted Homework: A Comparative Study of ChatGPT Use Across High School, University, and Teachers in Sonora, Mexico (2024–2025) pp. 1-25

- Raquel Torres-Peralta, Federico Cirett-Galán, María del Carmen Heras-Sanchez, Karla Lerma-Molina and Ilse Espinoza-Flores
- Lightweight LSTM-Based Homogeneous Transfer Learning for Efficient On-Device IoT Intrusion Detection pp. 1-25

- Amjad Gamlo, Sanaa Sharaf and Rania Molla
- An Efficient Internet-Wide Port Scan Algorithm Based on Deep Reinforcement Learning pp. 1-15

- Lu Yu, Huimin Ma, Pengfei Xue, Miao Hu and Hao Hao
- A Software Defined Radio Implementation of Non-Orthogonal Multiple Access with Reliable Decoding via Error Correction pp. 1-15

- Dipanjan Adhikary and Eirini Eleni Tsiropoulou
- FPGA-Based Time Synchronization over Ethernet Networks for the DTT Control and Data Acquisition System pp. 1-15

- Aamir Ali Patoli, Luca Boncagni, Gabriele Manduchi and Giancarlo Fortino
- Predictive Network Slicing Resource Orchestration: A VNF Approach pp. 1-33

- Andrés Cárdenas, Luis Sigcha and Mohammadreza Mosahebfard
- Energy-Efficient Wireless Sensor Networks Through Coverage Hole Detection and Mitigation Using a Hybrid Raccoon–Hermit Crab Optimization Algorithm pp. 1-33

- Sean Laurel Rex Bashyam and Renuga Devi Subramanian
- A Multidimensional Maturity Model for the Metaverse: Stages, Dimensions and Architectural Alignment pp. 1-22

- Joan-Marc Garcés Sabaté and Eloi Coloma Picó
- Low-Latency Holographic Video Transmission in Indoor VLC Networks Assisted by Rotatable Photodetectors pp. 1-21

- Wenzhe Wang and Long Zhang
- Two-Stage Distributed Robust Air-Ground Cooperative Mission Planning: An Emergency Communication Solution for Addressing Probabilistic Uncertainty in Road Interruption pp. 1-21

- Miao Miao, Wei Wang and Xiaokai Lian
- AE 3 GIS—An Agile Emulated Educational Environment for Guided Industrial Security Training pp. 1-41

- Tollan Berhanu, Hunter Squires, Braxton Marlatt, Scott Anderson, Benton Wilson, Robert A. Borrelli and Constantinos Kolias
- Cybersecurity in the IoT pp. 1-3

- Christos Tryfonopoulos and Nicholas Kolokotronis
- Deep Learning in Recommender Systems pp. 1-3

- María N. Moreno-García and Fernando de la Prieta
- Digital Twins at the Edge: A High-Availability Framework for Resilient Data Processing in IoT Sensor Networks pp. 1-27

- Madalin Neagu, Codruta Maria Serban, Anca Hangan and Gheorghe Sebestyen
- Towards a Protocol-Aware Intrusion Detection System for LoRaWAN Networks pp. 1-27

- Zsolt Bringye, Rita Fleiner and Eszter Kail
- A Hybrid Federated–Incremental Learning Framework for Continuous Authentication in Zero-Trust Networks pp. 1-27

- Jie Ji, Shi Qiu, Shengpeng Ye and Xin Liu
- Machine Unlearning: A Perspective, Taxonomy, and Benchmark Evaluation pp. 1-27

- Cristian Cosentino, Simone Gatto, Pietro Liò and Fabrizio Marozzo
- Attention-Based Transformer Encoder for Secure Wireless Sensor Operations pp. 1-17

- Mohammad H. Baniata, Chayut Bunterngchit, Laith H. Baniata, Malek A. Almomani and Muhannad Tahboush
- ChatGPT-Assisted Task Analysis for Special Education Teachers: An Exploratory Study of Alignment, Readability, Efficiency, and Acceptability pp. 1-17

- Serife Balikci, Nesime Kubra Terzioglu and Salih Rakap
- Lightweight AI-Based Attack Detection for LED VLC in Multi-Channel Airborne Radar Systems pp. 1-32

- Vadim A. Nenashev, Vladimir P. Kuzmenko, Svetlana S. Dymkova and Oleg V. Varlamov
- MAPE-ZT: A Multi-Layer Access Policy Encryption System for Zero Trust Architectures pp. 1-32

- Ashutosh Soni, Surendra Kumar Nanda, Jayanti Rout, Mrutyunjaya Sathua, Ganapati Panda and Manob Jyoti Saikia
- Conditional Counter-Inspection with Curriculum-Biased Experts for Lightweight 5G Intrusion Detection pp. 1-23

- Khaoula Tahori, Imade Fahd Eddine Fatani and Mohamed Moughit
- Adaptive Healthcare Monitoring Through Drift-Aware Edge-Cloud Intelligence pp. 1-23

- Aleksandra Stojnev Ilic, Milos Ilic, Natalija Stojanovic and Dragan Stojanovic
- The Age of Generative AI Model for Fresh Industrial AIGC Services: A Hybrid-Action Multi-Agent DRL Approach pp. 1-23

- Wenjing Li, Ni Tian and Long Zhang
- A Comprehensive Survey on 5G RedCap: Technologies, Security Vulnerabilities, and Attack Vectors pp. 1-35

- Pavan Raja I, Kurunandan Jain, Hari N. N, Sethu Subramanian N and Prabhakar Krishnan
- Sentiment Classification of Amazon Product Reviews Based on Machine and Deep Learning Techniques: A Comparative Study pp. 1-35

- Eman Daraghmi and Noora Zyadeh
- AI Agent Communications in the Future Internet—Paving a Path Toward the Agentic Web pp. 1-35

- Qiang Duan and Zhihui Lu
- A Post-Quantum Secure Architecture for 6G-Enabled Smart Hospitals: A Multi-Layered Cryptographic Framework pp. 1-39

- Poojitha Devaraj, Syed Abrar Chaman Basha, Nithesh Nair Panarkuzhiyil Santhosh and Niharika Panda
- An Exploratory Study on the Feasibility of Conducting Deliberative Polling ® in the Metaverse pp. 1-18

- Pablo López Guardiola, Manuel Pardo Ríos, Pablo Salvador Blesa Aledo and Alice Siu
- Multi-Criteria Selection of Network Security Configuration Using NSGA-II pp. 1-18

- Bagdat Yagaliyeva, Valery Lakhno, Myroslav Lakhno, Boris Gusev, Kaiyrbek Makulov and Tomiris Sundet
- Multi-Layer Traffic Analysis Framework for DDoS Attacks in Software-Defined IoT Networks pp. 1-18

- Keerthana Balaji and Mamatha Balachandra
- Heterogeneous Computing Resources Scheduling Based on Time-Varying Graphs and Multi-Agent Reinforcement Learning pp. 1-18

- Jinshan Yuan, Xuncai Zhang and Kexin Gong
- Does Appearance Matter? A Technology Acceptance Study of Mixed Reality Avatars in Citizen Services pp. 1-18

- Tamara Lauser and Markus Weinberger
- CCBA: Dynamic Scheduling Algorithm for Jammer Resources in Strong Electromagnetic Interference Environment pp. 1-28

- Zhenhua Wei, Wenpeng Wu, Haiyang You, Zhaoguang Zhang, Chenxi Li, Jianwei Zhan and Shan Zhao
- Usability and User Experience in an Industrial Metaverse: A Mixed-Methods Study of the Necoverse Point Cloud Inspection System for Shipbuilding pp. 1-28

- Aung Pyae, Juha Saarinen, Jaakko Haavisto, Jaro Virta, Matti Gröhn and Mika Luimula
Volume 18, issue 2, 2026
- A Temporally Dynamic Feature-Extraction Framework for Phishing Detection with LIME and SHAP Explanations pp. 1-26

- Chris Mayo, Michael Tchuindjang, Sarfraz Brohi and Nikolaos Ersotelos
- Optimizing Collaborative Filtering for Accurate Rating Predictions in Very Sparse Datasets pp. 1-26

- Sofia-Anna Lapadaki, John Nanos, Dionisis Margaris, Costas Vassilakis and Dimitris Spiliotopoulos
- Trajectory Planning for Autonomous Underwater Vehicles in Uneven Environments: A Survey of Coverage and Sensor Data Collection Methods pp. 1-26

- Talal S. Almuzaini and Andrey V. Savkin
- LoRa/LoRaWAN Time Synchronization: A Comprehensive Analysis, Performance Evaluation, and Compensation of Frame Timestamping pp. 1-26

- Stefano Rinaldi, Elia Mondini, Paolo Ferrari, Alessandra Flammini and Emiliano Sisinni
- A Systematic Review of Machine-Learning-Based Detection of DDoS Attacks in Software-Defined Networks pp. 1-31

- Surendren Ganeshan and R Kanesaraj Ramasamy
- CEVD: Cluster-Based Ensemble Learning for Cross-Project Vulnerability Detection pp. 1-24

- Yang Cao, Yunwei Dong and Jie Liu
- FedAWR: Aggregation Optimization in Federated Learning with Adaptive Weights and Learning Rates pp. 1-16

- Tong Yao, Jianqi Li and Jianhua Liu
- From IoT to AIoT: Evolving Agricultural Systems Through Intelligent Connectivity in Low-Income Countries pp. 1-22

- Selain K. Kasereka, Alidor M. Mbayandjambe, Ibsen G. Bazie, Heriol F. Zeufack, Okurwoth V. Ocama, Esteve Hassan, Kyandoghere Kyamakya and Tasho Tashev
- LeapNP: A Modular Python Framework for Benchmarking Learned Heuristics in Numeric Planning pp. 1-22

- Valerio Borelli, Alfonso Emilio Gerevini, Enrico Scala and Ivan Serina
- Evaluating Reconstruction-Based and Proximity-Based Methods: A Four-Way Comparison (AE, LSTM-AE, OCSVM, IF) in SCADA Anomaly Detection Under Inverted Imbalance pp. 1-22

- Lukasz Pawlik
- Payment Rails in Smart Contract as a Service (SCaaS) Solutions from BPMN Models pp. 1-33

- Christian Gang Liu, Peter Bodorik and Dawn Jutla
- A Comparative Analysis of Self-Aware Reinforcement Learning Models for Real-Time Intrusion Detection in Fog Networks pp. 1-25

- Nyashadzashe Tamuka, Topside Ehleketani Mathonsi, Thomas Otieno Olwal, Solly Maswikaneng, Tonderai Muchenje and Tshimangadzo Mavin Tshilongamulenzhe
- Machine Learning-Driven Intrusion Detection for Securing IoT-Based Wireless Sensor Networks pp. 1-25

- Yirga Yayeh Munaye, Abebaw Demelash Gebeyehu, Li-Chia Tai, Zemenu Alem Abebe, Aeneas Bekele Workneh, Robel Berie Tarekegn, Yenework Belayneh Chekol and Getaneh Berie Tarekegn
- Novel Video Understanding Approach for Embodied Learning of Robotics Technology pp. 1-20

- Hongbo Zhang, Benjamin Li and Gregory Rushton
- Semantic Search for System Dynamics Models Using Vector Embeddings in a Cloud Microservices Environment pp. 1-20

- Pavel Kyurkchiev, Anton Iliev and Nikolay Kyurkchiev
- Network Instability as a Signal of Systemic Financial Stress: An Explainable Machine-Learning Framework pp. 1-20

- Livia Valentina Moretti, Enrico Barbierato and Alice Gatti
- Benchmarking Large Language Models for Embedded Systems Programming in Microcontroller-Driven IoT Applications pp. 1-20

- Marek Babiuch and Pavel Smutný
- Interference-Resilient Concurrent Sensing in Dense Environments: A Review of OFDM and OTFS Waveforms for JRC pp. 1-20

- Mehmet Yazgan, Buldan Karahan, Hüseyin Arslan and Stavros Vakalis
- Socially Grounded IoT Protocol for Reliable Computer Vision in Industrial Applications pp. 1-42

- Gokulnath Chidambaram, Shreyanka Subbarayappa and Sai Baba Magapu
- Cross Layer Optimization Using AI/ML-Assisted Federated Edge Learning in 6G Networks pp. 1-42

- Spyridon Louvros, AnupKumar Pandey, Brijesh Shah and Yashesh Buch
- Building a Regional Platform for Monitoring Air Quality pp. 1-29

- Stanimir Nedyalkov Stoyanov, Boyan Lyubomirov Belichev, Veneta Veselinova Tabakova-Komsalova, Yordan Georgiev Todorov, Angel Atanasov Golev, Georgi Kostadinov Maglizhanov, Ivan Stanimirov Stoyanov and Asya Georgieva Stoyanova-Doycheva
- Analysis of GitHub Advanced Security: Security Integration in GitHub and Azure DevOps pp. 1-29

- Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
- Aris-RPL: A Multi-Objective Reinforcement Learning Framework for Adaptive and Load-Balanced Routing in IoT Networks pp. 1-38

- Najim Halloum, Ali Ahmadi and Yousef Darmani
- Video Deepfake Detection Based on Multimodality Semantic Consistency Fusion pp. 1-19

- Fang Sun, Xiaoxuan Guo, Tong Zhang, Yang Liu and Jing Zhang
- AI-Driven Hybrid Architecture for Secure, Reconstruction-Resistant Multi-Cloud Storage pp. 1-19

- Munir Ahmed and Jiann-Shiun Yuan
- Aerial Image Analysis: When LLMs Assist (And When Not) pp. 1-19

- Salvatore Calcagno, Erika Scaletta, Emiliano Tramontana and Gabriella Verga
- Special Issue on Security and Privacy in Blockchains and the IoT—3rd Edition pp. 1-8

- Christoph Stach, Clémentine Gritti and Iouliana Litou
- SPARTA: Sparse Parallel Architecture for Real-Time Threat Analysis for Lightweight Edge Network Defense pp. 1-17

- Shi Li, Xiyun Mi, Lin Zhang and Ye Lu
- User Perceptions of Virtual Consultations and Artificial Intelligence Assistance: A Mixed Methods Study pp. 1-27

- Pranavsingh Dhunnoo, Karen McGuigan, Vicky O’Rourke, Bertalan Meskó and Michael McCann
- A Review of Research on the Applications of Large Models in Each Functional Module of the Entire Rehabilitation Process pp. 1-27

- Tingting Bai, Kaiwen Jiang, Yixuan Yu, Shuyan Qie, Congxiao Wang, Boyuan Wang and Wenli Zhang
- Differential Privacy Data Publication Based on Scoring Function pp. 1-21

- Ke Yuan, Quan Zhang, Yinghao Lin, Yuye Wang and Chunfu Jia
- Assuring Brokerage Quality in the Cloud–Edge Continuum pp. 1-21

- Evangelos Barmpas, Simeon Veloudis, Yiannis Verginadis and Iraklis Paraskakis
- Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems pp. 1-21

- Guanyu Chen, Hiroki Watanabe, Kohei Matsumura and Yoshinari Takegawa
- Location-Aware SDN-IDPS Framework for Real-Time DoS Mitigation in Vehicular Networks pp. 1-21

- Aung Aung, Kuljaree Tantayakul and Adisak Intana
- Deep Learning-Based Video Watermarking: A Robust Framework for Spatial–Temporal Embedding and Retrieval pp. 1-28

- Antonio Cedillo-Hernandez, Lydia Velazquez-Garcia, Francisco Javier Garcia-Ugalde and Manuel Cedillo-Hernandez
- The Generative AI Paradox: GenAI and the Erosion of Trust, the Corrosion of Information Verification, and the Demise of Truth pp. 1-18

- Emilio Ferrara
- Beyond Centralized AI: Blockchain-Enabled Decentralized Learning pp. 1-18

- Daren Wang, Tengfei Ma, Juntao Zhu and Haihan Duan
- Research on Intelligent Resource Management Solutions for Green Cloud Computing pp. 1-39

- Amirmohammad Parhizkar, Ehsan Arianyan and Pejman Goudarzi
- A Large-Scale Empirical Study of LLM Orchestration and Ensemble Strategies for Sentiment Analysis in Recommender Systems pp. 1-43

- Konstantinos I. Roumeliotis, Dionisis Margaris, Dimitris Spiliotopoulos and Costas Vassilakis
- Rethinking the Security Assurances of MTD: A Gap Analysis for Network Defense pp. 1-13

- Łukasz Jalowski, Marek Zmuda, Mariusz Rawski and Paulina Rekosz
- Research on an On-Chain and Off-Chain Collaborative Storage Method Based on Blockchain and IPFS pp. 1-30

- Tianqi Zhu, Yuxiang Huang, Zhihong Liang, Mingming Qin, Ruicheng Niu, Yuanyuan Ma and Qi Feng
- A Hybrid LoRa/ZigBee IoT Mesh Architecture for Real-Time Performance Monitoring in Orienteering Sport Competitions: A Measurement Campaign on Different Environments pp. 1-35

- Romeo Giuliano, Stefano Alessandro Ignazio Mocci De Martis, Antonello Tomeo, Francesco Terlizzi, Marco Gerardi, Francesca Fallucchi, Lorenzo Felli and Nicola Dall’Ora
- DACCA: Distributed Adaptive Cloud Continuum Architecture pp. 1-35

- Nektarios Deligiannakis, Vassilis Papataxiarhis, Michalis Loukeris, Stathes Hadjiefthymiades, Marios Touloupou, Syed Mafooq Ul Hassan, Herodotos Herodotou, Thanasis Moustakas, Emmanouil Bampis, Konstantinos Ioannidis, Iakovos T. Michailidis, Stefanos Vrochidis, Elias Kosmatopoulos, Francisco Javier Romero Martínez, Rafael Marín Pérez, Amr Mousa, Jacopo Castellini and Pablo Strasser
- Next-Gen Explainable AI (XAI) for Federated and Distributed Internet of Things Systems: A State-of-the-Art Survey pp. 1-69

- Aristeidis Karras, Anastasios Giannaros, Natalia Amasiadi and Christos Karras
- Image-Based Malware Classification Using DCGAN-Augmented Data and a CNN–Transformer Hybrid Model pp. 1-23

- Manya Dhingra, Achin Jain, Niharika Thakur, Anurag Choubey, Massimo Donelli, Arun Kumar Dubey and Arvind Panwar
- TLOA: A Power-Adaptive Algorithm Based on Air–Ground Cooperative Jamming pp. 1-23

- Wenpeng Wu, Zhenhua Wei, Haiyang You, Zhaoguang Zhang, Chenxi Li, Jianwei Zhan and Shan Zhao
- Utilizing AIoT to Achieve Sustainable Agricultural Systems in a Climate-Change-Affected Environment pp. 1-32

- Mohamed Naeem, Mohamed A. El-Khoreby, Hussein M. ELAttar and Mohamed Aboul-Dahab
- Towards Trustworthy AI Agents in Geriatric Medicine: A Secure and Assistive Architectural Blueprint pp. 1-32

- Elena-Anca Paraschiv, Adrian Victor Vevera, Carmen Elena Cîrnu, Lidia Băjenaru, Andreea Dinu and Gabriel Ioan Prada
Volume 18, issue 1, 2026
- WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication pp. 1-36

- Rafał Skowroński
- Semantic Communication Unlearning: A Variational Information Bottleneck Approach for Backdoor Defense in Wireless Systems pp. 1-36

- Sümeye Nur Karahan, Merve Güllü, Mustafa Serdar Osmanca and Necaattin Barışçı
- IRDS4C–CTIB: A Blockchain-Driven Deception Architecture for Ransomware Detection and Intelligence Sharing pp. 1-36

- Ahmed El-Kosairy, Heba Aslan and Nashwa AbdelBaki
- Dynamic Evolution and Relation Perception for Temporal Knowledge Graph Reasoning pp. 1-21

- Yuan Huang, Pengwei Shi, Xiaozheng Zhou and Ruizhi Yin
- A Dual-Attention CNN–GCN–BiLSTM Framework for Intelligent Intrusion Detection in Wireless Sensor Networks pp. 1-21

- Laith H. Baniata, Ashraf ALDabbas, Jaffar M. Atwan, Hussein Alahmer, Basil Elmasri and Chayut Bunterngchit
- Design of Wireless Powered Communication Systems for Low-Altitude Economy pp. 1-21

- Huajun Chen, Zhengguo Xiao, Ming Dai and Lina Yuan
- Cyber Approach for DDoS Attack Detection Using Hybrid CNN-LSTM Model in IoT-Based Healthcare pp. 1-21

- Mbarka Belhaj Mohamed, Dalenda Bouzidi, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi and Ahmed Fakhfakh
- Research and Application of a Model Selection Forecasting System for Wind Speed and Theoretical Power Generation pp. 1-34

- Ming Zeng, Qianqian Jia, Zhenming Wen, Fang Mao, Haotao Huang and Jingyuan Pan
- LECITE: LoRA-Enhanced and Consistency-Guided Iterative Knowledge Graph Construction pp. 1-17

- Donghao Xiao and Quan Qian
- Unsupervised Detection of SOC Spoofing in OCPP 2.0.1 EV Charging Communication Protocol Using One-Class SVM pp. 1-17

- Aisha B. Rahman, Md Sadman Siraj, Eirini Eleni Tsiropoulou, Georgios Fragkos, Ryan Sullivant, Yung Ryn Choe, Jhaell Jimenez, Junghwan Rhee and Kyu Hyung Lee
- A Versatile and Low-Cost IoT Solution for Bioclimatic Monitoring in Precision Viticulture pp. 1-27

- António Vieira, Nuno Silva, David Pascoal and Raul Morais
- LEO Satellite and UAV-Assisted Maritime Internet of Things: Modeling and Performance Analysis for Data Acquisition pp. 1-27

- Xu Hu, Bin Lin, Ping Wang and Xiao Lu
- Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers pp. 1-64

- Phil Steadman, Paul Jenkins, Rajkumar Singh Rathore and Chaminda Hewage
- Evaluating Digital Marketing, Innovation, and Entrepreneurial Impact in AI-Built vs. Professionally Developed DeFi Websites pp. 1-35

- Nikolaos T. Giannakopoulos, Damianos P. Sakas and Nikos Kanellos
- MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data pp. 1-30

- Lihua Zhang, Jiali Luo, Yi Yang and Wenbiao Wang
- Guarded Swarms: Building Trusted Autonomy Through Digital Intelligence and Physical Safeguards pp. 1-30

- Uwe M. Borghoff, Paolo Bottoni and Remo Pareschi
- Adaptive Privacy-Preserving Insider Threat Detection Using Generative Sequence Models pp. 1-13

- Fatmah Bamashmoos
- A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption pp. 1-32

- Xin Li, Minsheng Tan and Wenlong Tian
- Adaptive Assistive Technologies for Learning Mexican Sign Language: Design of a Mobile Application with Computer Vision and Personalized Educational Interaction pp. 1-32

- Carlos Hurtado-Sánchez, Ricardo Rosales Cisneros, José Ricardo Cárdenas-Valdez, Andrés Calvillo-Téllez and Everardo Inzunza-Gonzalez
- An Intelligent Software Architecture for Digital Library Systems in Sustainable Education pp. 1-23

- Ana M. Gonzalez de Miguel and Antonio Sarasa-Cabezuelo
- A Lightweight LSTM Model for Flight Trajectory Prediction in Autonomous UAVs pp. 1-23

- Disen Jia, Jonathan Kua and Xiao Liu
- A Physics-Aware Latent Diffusion Framework for Mitigating Adversarial Perturbations in Manufacturing Quality Control pp. 1-23

- Nikolaos Nikolakis and Paolo Catti
- Lightweight Frame Format for Interoperability in Wireless Sensor Networks of IoT-Based Smart Systems pp. 1-23

- Samer Jaloudi
- Heterogeneous Federated Learning via Knowledge Transfer Guided by Global Pseudo Proxy Data pp. 1-23

- Wenhao Sun, Xiaoxuan Guo, Wenjun Liu and Fang Sun
- Adaptive and Sustainable Smart Environments Using Predictive Reasoning and Context-Aware Reinforcement Learning pp. 1-28

- Abderrahim Lakehal, Boubakeur Annane, Adel Alti, Philippe Roose and Soliman Aljarboa
- Performance Assessment of DL for Network Intrusion Detection on a Constrained IoT Device pp. 1-39

- Armin Mazinani, Daniele Antonucci, Luca Davoli and Gianluigi Ferrari
- AnonymAI: An Approach with Differential Privacy and Intelligent Agents for the Automated Anonymization of Sensitive Data pp. 1-18

- Marcelo Nascimento Oliveira Soares, Leonardo Barbosa Oliveira, Antonio João Gonçalves Azambuja, Jean Phelipe de Oliveira Lima and Anderson Silva Soares
- Highly Efficient Software Development Using DevOps and Microservices: A Comprehensive Framework pp. 1-37

- David Barbosa, Vítor Santos, Maria Clara Silveira, Arnaldo Santos and Henrique S. Mamede
- Synthetizing 6G KPIs for Diverse Future Use Cases: A Comprehensive Review of Emerging Standards, Technologies, and Societal Needs pp. 1-37

- Shujat Ali, Asma Abu-Samah, Mohammed H. Alsharif, Rosdiadee Nordin, Nauman Saqib, Mohammed Sani Adam, Umawathy Techanamurthy, Manzareen Mustafa and Nor Fadzilah Abdullah
- Correction: Sokhansanj, B.A. Uncensored AI in the Wild: Tracking Publicly Available and Locally Deployable LLMs. Future Internet 2025, 17, 477 pp. 1-2

- Bahrad A. Sokhansanj
- Distributed Cooperative Spectrum Sensing via Push–Sum Consensus for Full-Duplex Cognitive Aerial Base Stations pp. 1-24

- Andrea Tani and Dania Marabissi
- Detecting TLS Protocol Anomalies Through Network Monitoring and Compliance Tools pp. 1-24

- Diana Gratiela Berbecaru and Marco De Santo
- ICU-Transformer: Multi-Head Attention Expert System for ICU Resource Allocation Robust to Data Poisoning Attacks pp. 1-31

- Manal Alghieth
- Digital Learning Hubs: Evaluating Their Role in Fostering Complex and Computational Thinking pp. 1-31

- Inés Alvarez-Icaza, Luis Magdiel Oliva-Córdova, Rasikh Tariq and José Luis Martín-Núñez
- Seamless Vital Signs-Based Continuous Authentication Using Machine Learning pp. 1-26

- Reem Alrawili, Evelyn Sowells-Boone and Saif Al-Dean Qawasmeh
- A Two-Stage Multi-Objective Cooperative Optimization Strategy for Computation Offloading in Space–Air–Ground Integrated Networks pp. 1-26

- He Ren and Yinghua Tong
- An Unsupervised Cloud-Centric Intrusion Diagnosis Framework Using Autoencoder and Density-Based Learning pp. 1-26

- Suresh K. S, Thenmozhi Elumalai, Radhakrishnan Rajamani, Anubhav Kumar, Balamurugan Balusamy, Sumendra Yogarayan and Kaliyaperumal Prabu
- Performance Evaluation of MongoDB and RavenDB in IIoT-Inspired Data-Intensive Mobile and Web Applications pp. 1-26

- Mădălina Ciumac, Cornelia Aurora Győrödi, Robert Ștefan Győrödi and Felicia Mirabela Costea
- Federated Learning-Based Intrusion Detection in Industrial IoT Networks pp. 1-16

- George Dominic Pecherle, Robert Ștefan Győrödi and Cornelia Aurora Győrödi
- Wangiri Fraud Detection: A Comprehensive Approach to Unlabeled Telecom Data pp. 1-46

- Amirreza Balouchi, Meisam Abdollahi, Ali Eskandarian, Kianoush Karimi Pour Kerman, Elham Majd, Neda Azouji and Amirali Baniasadi
- A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation pp. 1-46

- Evangelos Chaskos, Nicholas Kolokotronis and Stavros Shiaeles
- Linearization Strategies for Energy-Aware Optimization of Single-Truck, Multiple-Drone Last-Mile Delivery Systems pp. 1-44

- Ornela Gordani, Eglantina Kalluci and Fatos Xhafa
- Intrusion Detection for Internet of Vehicles CAN Bus Communications Using Machine Learning: An Empirical Study on the CICIoV2024 Dataset pp. 1-14

- Hop Le and Izzat Alsmadi
- CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic pp. 1-29

- Jinsha Zhang, Xiaoying Wang, Chunhui Li, Qingjie Zhang, Guoqing Yang, Xinyu Li, Fangfang Cui, Ruize Gu, Panpan Qi and Shuai Liu
- Benchmarking SQL and NoSQL Persistence in Microservices Under Variable Workloads pp. 1-29

- Nenad Pantelic, Ljiljana Matic, Lazar Jakovljevic, Stefan Eric, Milan Eric, Miladin Stefanović and Aleksandar Djordjevic
- A Dynamic Offloading Strategy Based on Optimal Stopping Theory in Vehicle-to-Vehicle Communication Scenarios pp. 1-22

- An Li, Jiaxuan Ling, Yeqiang Zheng, Mingliang Chen and Gaocai Wang
- A Deterministic, Rule-Based Framework for Detecting Anomalous IP Packet Fragmentation pp. 1-22

- Maksim Iavich, Vladimer Svanadze and Oksana Kovalchuk
- The Design and Implementation of a Graph-Based P2P Data Storage Service pp. 1-22

- Lunodzo J. Mwinuka, Massimo Cafaro, Lucas Pereira and Hugo Morais
- Predicting Demand in Supply Chain Management: A Decision Support System Using Graph Convolutional Networks pp. 1-22

- Stefani Sifuentes-Domínguez, Jose-Manuel Mejia-Muñoz, Oliverio Cruz-Mejia, Rubén Pizarro-Gurrola, Aracelí-Soledad Domínguez-Flores and Leticia Ortega-Máynez
- Edge–Cloud Platform for Monitoring Sustainability Metrics in Organizational Contexts pp. 1-22

- Maurizio Cellura, Ylenia Galluzzo, Domenico Garlisi, Fabrizio Giuliano, Domenico Panno and Simona E. Rombo
- A Multiclass Machine Learning Framework for Detecting Routing Attacks in RPL-Based IoT Networks Using a Novel Simulation-Driven Dataset pp. 1-22

- Niharika Panda and Supriya Muthuraman
- Multi-Attribute Physical-Layer Authentication Against Jamming and Battery-Depletion Attacks in LoRaWAN pp. 1-22

- Azita Pourghasem, Raimund Kirner, Athanasios Tsokanos, Iosif Mporas and Alexios Mylonas
- A Multi-Objective Optimization-Based Container Cloud Resource Scheduling Method pp. 1-22

- Danping Zhang, Xiaolan Xie and Yuhui Song
- RBCrowd: A Reliable Blockchain-Based Reputation Management Framework for Privacy Preservation in Mobile Crowdsensing pp. 1-22

- Zaina Maqour, Hanan El Bakkali, Driss Benhaddou and Houda Benbrahim
- Synergistic Phishing Intrusion Detection: Integrating Behavioral and Structural Indicators with Hybrid Ensembles and XAI Validation pp. 1-33

- Isaac Kofi Nti, Murat Ozer and Chengcheng Li
- DRL-TinyEdge: Energy- and Latency-Aware Deep Reinforcement Learning for Adaptive TinyML at the 6G Edge pp. 1-42

- Saad Alaklabi and Saleh Alharbi
- Leveraging the DAO for Edge-to-Cloud Data Sharing and Availability pp. 1-42

- Adnan Imeri, Uwe Roth, Michail Alexandros Kourtis, Andreas Oikonomakis, Achilleas Economopoulos, Lorenzo Fogli, Antonella Cadeddu, Alessandro Bianchini, Daniel Iglesias and Wouter Tavernier
- Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation pp. 1-25

- Chen-Yu Li
- Decentralized Dynamic Heterogeneous Redundancy Architecture Based on Raft Consensus Algorithm pp. 1-25

- Ke Chen and Leyi Shi
- Capacity Planning for Software Applications in Natural Disaster Scenarios pp. 1-25

- Juan Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa and Mauricio Marin
- A Hybrid AI-Driven Knowledge-Based Expert System for Optimizing Gear Design: A Case Study for Education pp. 1-25

- Boris Aberšek, Samo Kralj and Andrej Flogie
- Machine Learning for Assessing Vital Signs in Humans in Smart Cities Based on a Multi-Agent System pp. 1-25

- Nejood Faisal Abdulsattar, Hassan Khotanlou and Hatam Abdoli
- Architecting Multi-Cluster Layer-2 Connectivity for Cloud-Native Network Slicing pp. 1-25

- Alex T. de Cock Buning, Ivan Vidal and Francisco Valera
- Using Traffic Management Approaches to Assess Digital Infrastructure Disruptions: Insights from a Signal Tampering Case Study pp. 1-25

- Chrysostomos Mylonas, Apostolos Vouitsis, Evangelos Mitsakis and Konstantinos Kepaptsoglou
- Resilience-by-Design: Extracting Resilience Requirements Using the Resilience Graph in the Automotive Concept Phase pp. 1-25

- Isaac Mpidi Bita, Elif Ugur, Aschot Hovemann and Roman Dumitrescu
- Edge-Enhanced YOLOV8 for Spacecraft Instance Segmentation in Cloud-Edge IoT Environments pp. 1-25

- Ming Chen, Wenjie Chen, Yanfei Niu, Ping Qi and Fucheng Wang
| |