Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 16, issue 12, 2024
- Using Multimodal Foundation Models for Detecting Fake Images on the Internet with Explanations pp. 1-16

- Vishnu S. Pendyala and Ashwin Chintalapati
- Customer Churn Prediction Approach Based on LLM Embeddings and Logistic Regression pp. 1-16

- Meryem Chajia and El Habib Nfaoui
- Evaluating DL Model Scaling Trade-Offs During Inference via an Empirical Benchmark Analysis pp. 1-16

- Demetris Trihinas, Panagiotis Michael and Moysis Symeonides
- Detailed Image Captioning and Hashtag Generation pp. 1-18

- Nikshep Shetty and Yongmin Li
- Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection pp. 1-18

- Anthony Kenyon, Lipika Deka and David Elizondo
- A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks pp. 1-18

- Mahmoud AlJamal, Rabee Alquran, Ayoub Alsarhan, Mohammad Aljaidi, Mohammad Alhmmad, Wafa’ Q. Al-Jamal and Nasser Albalawi
- A Transfer Reinforcement Learning Approach for Capacity Sharing in Beyond 5G Networks pp. 1-17

- Irene Vilà, Jordi Pérez-Romero and Oriol Sallent
- QRLIT: Quantum Reinforcement Learning for Database Index Tuning pp. 1-17

- Diogo Barbosa, Le Gruenwald, Laurent D’Orazio and Jorge Bernardino
- Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks pp. 1-17

- Muzun Althunayyan, Amir Javed, Omer Rana and Theodoros Spyridopoulos
- A Self-Sovereign Identity–Blockchain-Based Model Proposal for Deep Digital Transformation in the Healthcare Sector pp. 1-17

- Luisanna Cocco and Roberto Tonelli
- A Survey of Scenario Generation for Automated Vehicle Testing and Validation pp. 1-17

- Ziyu Wang, Jing Ma and Edmund M-K Lai
- SIGNIFY: Leveraging Machine Learning and Gesture Recognition for Sign Language Teaching Through a Serious Game pp. 1-19

- Luca Ulrich, Giulio Carmassi, Paolo Garelli, Gianluca Lo Presti, Gioele Ramondetti, Giorgia Marullo, Chiara Innocente and Enrico Vezzetti
- Rethinking Blockchain Technologies for the Maritime Industry: An Overview of the Current Landscape pp. 1-19

- Heejoo Kim, Zhe Xiao, Xiaocai Zhang, Xiuju Fu and Zheng Qin
- Thermoelectric Generator-Powered Long-Range Wireless Real-Time Steam Leak Detection in Steam Traps pp. 1-19

- Raúl Aragonés, Joan Oliver and Carles Ferrer
- Pattern Recognition in Older Adults’ Activities of Daily Living pp. 1-27

- Gonçalo Augusto, Rui Duarte, Carlos Cunha and Ana Matos
- Architectural Trends in Collaborative Computing: Approaches in the Internet of Everything Era pp. 1-28

- Débora Souza, Gabriele Iwashima, Viviane Cunha Farias da Costa, Carlos Eduardo Barbosa, Jano Moreira de Souza and Geraldo Zimbrão
- Machine Learning Based Localization of LoRa Mobile Wireless Nodes Using a Novel Sectorization Method pp. 1-28

- Madiyar Nurgaliyev, Askhat Bolatbek, Batyrbek Zholamanov, Ahmet Saymbetov, Kymbat Kopbay, Evan Yershov, Sayat Orynbassar, Gulbakhar Dosymbetova, Ainur Kapparova, Nurzhigit Kuttybay and Nursultan Koshkarbay
- A Reordering Buffer Management Method at Edge Gateway in Hybrid IP-ICN Multipath Transmission System pp. 1-28

- Yuqi Liu, Rui Han and Xu Wang
- Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases pp. 1-26

- Markus Hornsteiner, Michael Kreussel, Christoph Steindl, Fabian Ebner, Philip Empl and Stefan Schönig
- Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection pp. 1-26

- Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami and Faisal S. Alsubaei
- IoT-Based LPG Level Sensor for Domestic Stationary Tanks with Data Sharing to a Filling Plant to Optimize Distribution Routes pp. 1-26

- Roberto Morales-Caporal, Rodolfo Eleazar Pérez-Loaiza, Edmundo Bonilla-Huerta, Julio Hernández-Pérez and José de Jesús Rangel-Magdaleno
- Implementation and Evaluation of a Low-Cost Measurement Platform over LoRa and Applicability for Soil Monitoring pp. 1-30

- Dimitrios Loukatos, Athanasios Fragkos, George Kargas and Konstantinos G. Arvanitis
- Nonlinear Dynamics and Machine Learning for Robotic Control Systems in IoT Applications pp. 1-23

- Vesna Antoska Knights, Olivera Petrovska and Jasenka Gajdoš Kljusurić
- Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model pp. 1-23

- Amna AlMutawa, Richard Adeyemi Ikuesan and Huwida Said
- MEC Server Status Optimization Framework for Energy Efficient MEC Systems by Taking a Deep-Learning Approach pp. 1-21

- Minseok Koo and Jaesung Park
- A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios pp. 1-21

- Nick Bray, Matthew Boeding, Michael Hempel, Hamid Sharif, Tapio Heikkilä, Markku Suomalainen and Tuomas Seppälä
- Generative AI in Medicine and Healthcare: Moving Beyond the ‘Peak of Inflated Expectations’ pp. 1-21

- Peng Zhang, Jiayu Shi and Maged N. Kamel Boulos
- Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications pp. 1-21

- Bennet Gerlach, Hannes Hesse, Stefan Fischer and Martin Leucker
- Cloud Computing and High Performance Computing (HPC) Advances for Next Generation Internet pp. 1-4

- Jerry Chou and Wu-Chun Chung
- WiFi Fingerprint Indoor Localization Employing Adaboost and Probability-One Access Point Selection for Multi-Floor Campus Buildings pp. 1-13

- Shanyu Jin and Dongwoo Kim
- TasksZE: A Task-Based and Challenge-Based Math Serious Game Using Facial Emotion Recognition pp. 1-20

- Humberto Marín-Vega, Giner Alor-Hernández, Maritza Bustos-López, Jonathan Hernández-Capistran, Norma Leticia Hernández-Chaparro and Sergio David Ixmatlahua-Diaz
- Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems pp. 1-20

- Kon Papazis and Naveen Chilamkurti
- Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method pp. 1-20

- Xinyang Yuan, Jiarong Wang, Haozhi Zhao, Tian Yan and Fazhi Qi
- Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments pp. 1-20

- Jesús Vegas and César Llamas
- Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems pp. 1-20

- Stefan Iordache, Catalina Camelia Patilea and Ciprian Paduraru
- Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring pp. 1-20

- Eugenia Tîrziu, Ana-Mihaela Vasilevschi, Adriana Alexandru and Eleonora Tudora
- Advancing Healthcare Through the Integration of Digital Twins Technology: Personalized Medicine’s Next Frontier pp. 1-20

- Sharmin Attaran and Mohsen Attaran
- Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques pp. 1-74

- Hesham Kamal and Maggie Mashaly
- Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources pp. 1-25

- Faycal Bouhafs, Alessandro Raschella, Michael Mackay, Max Hashem Eiza and Frank den Hartog
- Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement pp. 1-25

- Patrizia Marti, Giulia Teverini, Cecilia Goracci and Lorenzo Franchi
- A Survey on MLLMs in Education: Application and Future Directions pp. 1-31

- Weicheng Xing, Tianqing Zhu, Jenny Wang and Bo Liu
- An Ensemble Deep CNN Approach for Power Quality Disturbance Classification: A Technological Route Towards Smart Cities Using Image-Based Transfer pp. 1-24

- Mirza Ateeq Ahmed Baig, Naeem Iqbal Ratyal, Adil Amin, Umar Jamil, Sheroze Liaquat, Haris M. Khalid and Muhammad Fahad Zia
- Policy-Based Smart Contracts Management for IoT Privacy Preservation pp. 1-24

- Mohsen Rouached, Aymen Akremi, Mouna Macherki and Naoufel Kraiem
- A Systematic Comparison Between Open- and Closed-Source Large Language Models in the Context of Generating GDPR-Compliant Data Categories for Processing Activity Records pp. 1-24

- Magdalena von Schwerin and Manfred Reichert
- A Novel Six-Dimensional Chimp Optimization Algorithm—Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batteryless IoT Networks pp. 1-24

- Mehrdad Shoeibi, Anita Ershadi Oskouei and Masoud Kaveh
- Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications pp. 1-43

- Mohsen Eskandari and Andrey V. Savkin
- Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration pp. 1-43

- Emmanuel Ekene Okere and Vipin Balyan
- Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks pp. 1-22

- Ernesto Cadena Muñoz, Gustavo Chica Pedraza and Alexander Aponte Moreno
- Analyzing the Features, Usability, and Performance of Deploying a Containerized Mobile Web Application on Serverless Cloud Platforms pp. 1-22

- Jeong Yang and Anoop Abraham
- Assessing the Value of Information in an Augmented Reality City Experience pp. 1-14

- Yonit Rusho, Ganit Richter and Daphne Ruth Raban
- A Comparative Study of the User Interaction Behavior and Experience in a Home-Oriented Multi-User Interface (MUI) During Family Collaborative Cooking pp. 1-14

- Mengcai Zhou, Minglun Li, Kenta Ono and Makoto Watanabe
Volume 16, issue 11, 2024
- Key Enabling Technologies for Beyond 5G Networks pp. 1-2

- Dania Marabissi and Lorenzo Mucchi
- Health IoT Threats: Survey of Risks and Vulnerabilities pp. 1-33

- Samaneh Madanian, Tserendorj Chinbat, Maduka Subasinghage, David Airehrour, Farkhondeh Hassandoust and Sira Yongchareon
- Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum pp. 1-33

- J. de Curtò, I. de Zarzà, Juan-Carlos Cano and Carlos T. Calafate
- A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks pp. 1-23

- Xinyun Liu, Ronghua Xu and Yu Chen
- Uncertainty-Aware Time Series Anomaly Detection pp. 1-23

- Paul Wiessner, Grigor Bezirganyan, Sana Sellami, Richard Chbeir and Hans-Joachim Bungartz
- An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks pp. 1-23

- Sherine Nagy Saleh, Mazen Nabil Elagamy, Yasmine N. M. Saleh and Radwa Ahmed Osman
- Towards a Decentralized Collaborative Framework for Scalable Edge AI pp. 1-13

- Ahmed M. Abdelmoniem, Mona Jaber, Ali Anwar, Yuchao Zhang and Mingliang Gao
- Editorial for the Special Issue on Moving Towards 6G Wireless Technologies pp. 1-3

- Alessandro Raschella and Michael Mackay
- Lightweight Digit Recognition in Smart Metering System Using Narrowband Internet of Things and Federated Learning pp. 1-24

- Vladimir Nikić, Dušan Bortnik, Milan Lukić, Dejan Vukobratović and Ivan Mezei
- An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form pp. 1-24

- Zaher Salah, Hamza Abu Owida, Esraa Abu Elsoud, Esraa Alhenawi, Suhaila Abuowaida and Nawaf Alshdaifat
- Enhanced Long-Range Network Performance of an Oil Pipeline Monitoring System Using a Hybrid Deep Extreme Learning Machine Model pp. 1-24

- Abbas Kubba, Hafedh Trabelsi and Faouzi Derbel
- Flexible Hyper-Distributed IoT–Edge–Cloud Platform for Real-Time Digital Twin Applications on 6G-Intended Testbeds for Logistics and Industry pp. 1-24

- Maria Crespo-Aguado, Raul Lozano, Fernando Hernandez-Gobertti, Nuria Molner and David Gomez-Barquero
- Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology pp. 1-22

- Jian Peng and Kai Zhong
- Connection-Aware Digital Twin for Mobile Adhoc Networks in the 5G Era pp. 1-22

- Manuel Jesús-Azabal, Zheng Zhang, Bingxia Gao, Jing Yang and Vasco N. G. J. Soares
- Resilience in the Internet of Medical Things: A Review and Case Study pp. 1-22

- Vikas Tomer, Sachin Sharma and Mark Davis
- Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends pp. 1-41

- Christos Papadopoulos, Konstantinos-Filippos Kollias and George F. Fragulis
- Empowering Healthcare: TinyML for Precise Lung Disease Classification pp. 1-14

- Youssef Abadade, Nabil Benamar, Miloud Bagaa and Habiba Chaoui
- Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units pp. 1-14

- Yves Adou, Ekaterina Markova and Yuliya Gaidamaka
- Deep Reinforcement Learning for UAV-Based SDWSN Data Collection pp. 1-14

- Pejman A. Karegar, Duaa Zuhair Al-Hamid and Peter Han Joo Chong
- SBNNR: Small-Size Bat-Optimized KNN Regression pp. 1-20

- Rasool Seyghaly, Jordi Garcia, Xavi Masip-Bruin and Jovana Kuljanin
- Three-Dimensional Drone Cell Placement: Drone Placement for Optimal Coverage pp. 1-25

- Aniket Basu, Hooman Oroojeni, Georgios Samakovitis and Mohammad Majid Al-Rifaie
- Visualisation Design Ideation with AI: A New Framework, Vocabulary, and Tool pp. 1-30

- Aron E. Owen and Jonathan C. Roberts
- Privacy-Preserving Data Analytics in Internet of Medical Things pp. 1-30

- Bakhtawar Mudassar, Shahzaib Tahir, Fawad Khan, Syed Aziz Shah, Syed Ikram Shah and Qammer Hussain Abbasi
- Real-Time Evaluation of the Improved Eagle Strategy Model in the Internet of Things pp. 1-30

- Venushini Rajendran and R Kanesaraj Ramasamy
- Advancing Additive Manufacturing Through Machine Learning Techniques: A State-of-the-Art Review pp. 1-30

- Shaoping Xiao, Junchao Li, Zhaoan Wang, Yingbin Chen and Soheyla Tofighi
- AI-Driven Neuro-Monitoring: Advancing Schizophrenia Detection and Management Through Deep Learning and EEG Analysis pp. 1-21

- Elena-Anca Paraschiv, Lidia Băjenaru, Cristian Petrache, Ovidiu Bica and Dragoș-Nicolae Nicolau
- Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review pp. 1-42

- Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, Ramiro Velázquez, Donato Cafagna and Roberto De Fazio
- 6G Use Cases and Scenarios: A Comparison Analysis Between ITU and Other Initiatives pp. 1-35

- Alessandro Vizzarri and Franco Mazzenga
- On Exploiting and Implementing Collaborative Virtual and Augmented Reality in a Cloud Continuum Scenario pp. 1-18

- Beniamino Di Martino, Gennaro Junior Pezzullo, Vincenzo Bombace, Ling-Huey Li and Kuan-Ching Li
- A Secure Auditable Remote Registry Pattern for IoT Systems pp. 1-18

- Antonio Maña, Francisco J. Jaime and Lucía Gutiérrez
- A Modified TCP BBR to Enable High Fairness in High-Speed Wireless Networks pp. 1-16

- Jinlin Xu, Wansu Pan, Haibo Tan, Longle Cheng, Xiru Li and Xiaofeng Li
- Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio pp. 1-16

- Markus Walter and Jörg Keller
- Automatically Injecting Robustness Statements into Distributed Applications pp. 1-16

- Daniele Marletta, Alessandro Midolo and Emiliano Tramontana
- Eye Tracking and Human Influence Factors’ Impact on Quality of Experience of Mobile Gaming pp. 1-16

- Omer Nawaz, Siamak Khatibi, Muhammad Nauman Sheikh and Markus Fiedler
- Virtualization vs. Containerization, a Comparative Approach for Application Deployment in the Computing Continuum Focused on the Edge pp. 1-16

- Hamish Sturley, Augustin Fournier, Andoni Salcedo-Navarro, Miguel Garcia-Pineda and Jaume Segura-Garcia
- Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques pp. 1-27

- As’ad Mahmoud As’ad Alnaser, Said S. Saloum, Ahmed A. M. Sharadqh and Hazem (Moh’d Said) Hatamleh
- Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine pp. 1-27

- Eman Daraghmi, Ahmed Hamoudi and Mamoun Abu Helou
- Approaches to Identifying Emotions and Affections During the Museum Learning Experience in the Context of the Future Internet pp. 1-27

- Iana Fominska, Stefano Di Tore, Michele Nappi, Gerardo Iovane, Maurizio Sibilio and Angela Gelo
- Machine Learning-Based Resource Allocation Algorithm to Mitigate Interference in D2D-Enabled Cellular Networks pp. 1-26

- Md Kamruzzaman, Nurul I. Sarkar and Jairo Gutierrez
- Capacity and Coverage Dimensioning for 5G Standalone Mixed-Cell Architecture: An Impact of Using Existing 4G Infrastructure pp. 1-26

- Naba Raj Khatiwoda, Babu Ram Dawadi and Sashidhar Ram Joshi
- Fault Prediction and Reconfiguration Optimization in Smart Grids: AI-Driven Approach pp. 1-26

- David Carrascal, Paula Bartolomé, Elisa Rojas, Diego Lopez-Pajares, Nicolas Manso and Javier Diaz-Fuentes
- Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach pp. 1-32

- Ignacio Fernandez de Arroyabe, Tim Watson and Iain Phillips
- A Joint Survey in Decentralized Federated Learning and TinyML: A Brief Introduction to Swarm Learning pp. 1-28

- Evangelia Fragkou and Dimitrios Katsaros
- Predicting the Duration of Forest Fires Using Machine Learning Methods pp. 1-19

- Constantina Kopitsa, Ioannis G. Tsoulos, Vasileios Charilogis and Athanassios Stavrakoudis
- A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures pp. 1-19

- Antonello Calabrò, Enrico Cambiaso, Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Agostino Forestiero, Flavio Lombardi, Giuseppe Manco, Eda Marchetti, Albina Orlando and Giuseppe Papuzzo
- Identifying Persons of Interest in Digital Forensics Using NLP-Based AI pp. 1-19

- Jonathan Adkins, Ali Al Bataineh and Majd Khalaf
- Fully Open-Source Meeting Minutes Generation Tool pp. 1-19

- Amma Liesvarastranta Haz, Yohanes Yohanie Fridelin Panduman, Nobuo Funabiki, Evianita Dewi Fajrianti and Sritrusta Sukaridhoto
Volume 16, issue 10, 2024
- An Intelligent System for Determining Driver Anxiety Level: A Comparison Study of Two Fuzzy-Based Models pp. 1-13

- Yi Liu and Leonard Barolli
- Correction: Vasilas et al. Beat the Heat: Syscall Attack Detection via Thermal Side Channel. Future Internet 2024, 16, 301 pp. 1-4

- Teodora Vasilas, Claudiu Bacila and Remus Brad
- Generating Process Models by Interacting with Chatbots—A Literature Review pp. 1-23

- Luca Franziska Hörner and Manfred Reichert
- Multi-User Optimal Load Scheduling of Different Objectives Combined with Multi-Criteria Decision Making for Smart Grid pp. 1-23

- Yaarob Al-Nidawi, Haider Tarish Haider, Dhiaa Halboot Muhsen and Ghadeer Ghazi Shayea
- Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy pp. 1-23

- Kyungmin Sim, Honyeong Heo and Haehyun Cho
- A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy pp. 1-37

- Habib Ullah Manzoor, Attia Shabbir, Ao Chen, David Flynn and Ahmed Zoha
- Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices pp. 1-38

- Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, Aisha Ajmal and Simon Jigwan Park
- An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology pp. 1-22

- Nanavath Kiran Singh Nayak and Budhaditya Bhattacharyya
- Countering Social Media Cybercrime Using Deep Learning: Instagram Fake Accounts Detection pp. 1-22

- Najla Alharbi, Bashayer Alkalifah, Ghaida Alqarawi and Murad A. Rassam
- A Performance Benchmark for the PostgreSQL and MySQL Databases pp. 1-22

- Sanket Vilas Salunke and Abdelkader Ouda
- SPDepth: Enhancing Self-Supervised Indoor Monocular Depth Estimation via Self-Propagation pp. 1-14

- Xiaotong Guo, Huijie Zhao, Shuwei Shao, Xudong Li, Baochang Zhang and Na Li
- Automated Detection of Misinformation: A Hybrid Approach for Fake News Detection pp. 1-24

- Fadi Mohsen, Bedir Chaushi, Hamed Abdelhaq, Dimka Karastoyanova and Kevin Wang
- A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment pp. 1-25

- Ali Peivandizadeh, Haitham Y. Adarbah, Behzad Molavi, Amirhossein Mohajerzadeh and Ali H. Al-Badi
- Advanced Optimization Techniques for Federated Learning on Non-IID Data pp. 1-31

- Filippos Efthymiadis, Aristeidis Karras, Christos Karras and Spyros Sioutas
- Employing Huber and TAP Losses to Improve Inter-SubNet in Speech Enhancement pp. 1-15

- Jeih-Weih Hung, Pin-Chen Huang and Li-Yin Li
- Healthiness and Safety of Smart Environments through Edge Intelligence and Internet of Things Technologies pp. 1-15

- Rafiq Ul Islam, Pasquale Mazzei and Claudio Savaglio
- An IoT-Enhanced Traffic Light Control System with Arduino and IR Sensors for Optimized Traffic Patterns pp. 1-20

- Kian Raheem Qasim, Noor M. Naser and Ahmed J. Jabur
- Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks pp. 1-20

- Sennanur Srinivasan Abinayaa, Prakash Arumugam, Divya Bhavani Mohan, Anand Rajendran, Abderezak Lashab, Baoze Wei and Josep M. Guerrero
- A Systematic Review and Multifaceted Analysis of the Integration of Artificial Intelligence and Blockchain: Shaping the Future of Australian Higher Education pp. 1-21

- Mahmoud Elkhodr, Ketmanto Wangsa, Ergun Gide and Shakir Karim
- Mobility–Multihoming Duality pp. 1-42

- Ryo Yanagida and Saleem Noel Bhatti
- Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies pp. 1-35

- Abraham Romero and Roberto Hernandez
- Decoding Urban Intelligence: Clustering and Feature Importance in Smart Cities pp. 1-30

- Enrico Barbierato and Alice Gatti
- Predicting Missing Values in Survey Data Using Prompt Engineering for Addressing Item Non-Response pp. 1-19

- Junyung Ji, Jiwoo Kim and Younghoon Kim
- AI Governance in Higher Education: Case Studies of Guidance at Big Ten Universities pp. 1-19

- Chuhao Wu, He Zhang and John M. Carroll
- Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN pp. 1-19

- Rachel Kufakunesu, Gerhard P. Hancke and Adnan M. Abu-Mahfouz
- Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain pp. 1-28

- Godlove Suila Kuaban, Valery Nkemeni, Onyeka J. Nwobodo, Piotr Czekalski and Fabien Mieyeville
- Digital Transformation in Maritime Ports: Defining Smart Gates through Process Improvement in a Portuguese Container Terminal pp. 1-27

- Juliana Basulo-Ribeiro, Carina Pimentel and Leonor Teixeira
- New Model for Defining and Implementing Performance Tests pp. 1-27

- Marek Bolanowski, Michał Ćmil and Adrian Starzec
- Internet of Things and Distributed Computing Systems in Business Models pp. 1-27

- Albérico Travassos Rosário and Ricardo Raimundo
- Decentralized Web3 Reshaping Internet Governance: Towards the Emergence of New Forms of Nation-Statehood? pp. 1-29

- Igor Calzada
- Large Language Models Meet Next-Generation Networking Technologies: A Review pp. 1-29

- Ching-Nam Hang, Pei-Duo Yu, Roberto Morabito and Chee-Wei Tan
- Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach pp. 1-29

- Nsikak Owoh, John Adejoh, Salaheddin Hosseinzadeh, Moses Ashawa, Jude Osamor and Ayyaz Qureshi
- Multi-Source Data Fusion for Vehicle Maintenance Project Prediction pp. 1-18

- Fanghua Chen, Deguang Shang, Gang Zhou, Ke Ye and Guofang Wu
- Stance Detection in the Context of Fake News—A New Approach pp. 1-16

- Izzat Alsmadi, Iyad Alazzam, Mohammad Al-Ramahi and Mohammad Zarour
- Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios pp. 1-17

- Nandan Banerji, Chayan Paul, Bikash Debnath, Biplab Das, Gurpreet Singh Chhabra, Bhabendu Kumar Mohanta and Ali Ismail Awad
- Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration pp. 1-17

- Yazan Otoum, Chaosheng Hu, Eyad Haj Said and Amiya Nayak
- A Survey of the Real-Time Metaverse: Challenges and Opportunities pp. 1-52

- Mohsen Hatami, Qian Qu, Yu Chen, Hisham Kholidy, Erik Blasch and Erika Ardiles-Cruz
Volume 16, issue 9, 2024
- Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks pp. 1-24

- Mounib Khanafer, Mouhcine Guennoun, Mohammed El-Abd and Hussein T. Mouftah
- Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities pp. 1-24

- Gayathri Karthick and Glenford Mapp
- A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology pp. 1-24

- Di Li, Zhibang Yang, Siyang Yu, Mingxing Duan and Shenghong Yang
- Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement pp. 1-24

- Carolina Del-Valle-Soto, Ramon A. Briseño, Ramiro Velázquez, Gabriel Guerra-Rosales, Santiago Perez-Ochoa, Isaac H. Preciado-Bazavilvazo, Paolo Visconti and José Varela-Aldás
- Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays pp. 1-22

- Marco Grossi, Fabrizio Alfonsi, Marco Prandini and Alessandro Gabrielli
- A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core pp. 1-22

- Oana-Mihaela Dumitru-Guzu, Vlădeanu Călin and Robert Kooij
- Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems pp. 1-22

- Kamal Shahid, Saleem Naseer Ahmad and Syed Tahir Hussain Rizvi
- AI Services-Oriented Dynamic Computing Resource Scheduling Algorithm Based on Distributed Data Parallelism in Edge Computing Network of Smart Grid pp. 1-14

- Jing Zou, Peizhe Xin, Chang Wang, Heli Zhang, Lei Wei and Ying Wang
- Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing pp. 1-20

- Sérgio N. Silva, Mateus A. S. de S. Goldbarg, Lucileide M. D. da Silva and Marcelo A. C. Fernandes
- A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs pp. 1-20

- Haitham Y. Adarbah, Mehmet Sabir Kiraz, Suleyman Kardas, Ali H. Al-Bayatti and Hilal M. Y. Al-Bayatti
- Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications pp. 1-20

- Wataru Takabatake, Yohei Shibata, Kenji Hoshino and Tomoaki Ohtsuki
- A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing pp. 1-20

- Guiwen Jiang, Rongxi Huang, Zhiming Bao and Gaocai Wang
- Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning pp. 1-20

- Yudai Yamamoto, Aoi Fukushima and Shingo Yamaguchi
- Personalized Visualization of the Gestures of Parkinson’s Disease Patients with Virtual Reality pp. 1-15

- Konstantinos Sakkas, Eirini Georgia Dimitriou, Niki Eleni Ntagka, Nikolaos Giannakeas, Konstantinos Kalafatakis, Alexandros T. Tzallas and Evripidis Glavas
- Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey pp. 1-15

- Elias Dritsas and Maria Trigka
- Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects pp. 1-25

- Michele Ruta, Floriano Scioscia, Giuseppe Loseto, Agnese Pinto, Corrado Fasciano, Giovanna Capurso and Eugenio Di Sciascio
- A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection pp. 1-25

- Abdallah Moubayed
- Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study pp. 1-25

- Roberto Vergallo and Luca Mainetti
- Parallel and Distributed Frugal Tracking of a Quantile pp. 1-25

- Italo Epicoco, Marco Pulimeno and Massimo Cafaro
- Efficient Data Exchange between WebAssembly Modules pp. 1-31

- Lucas Silva, José Metrôlho and Fernando Ribeiro
- An Improved Routing Protocol for Optimum Quality of Service in Device-to-Device and Energy Efficiency in 5G/B5G pp. 1-31

- Sanusi Mohammad Bunu, Omar Younis Alani and Mohammad Saraee
- Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning pp. 1-35

- Raed M. Bani-Hani, Ahmed S. Shatnawi and Lana Al-Yahya
- User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks pp. 1-29

- Farid Yessoufou, Salma Sassi, Elie Chicha, Richard Chbeir and Jules Degila
- Privacy-Preserving Authentication Based on PUF for VANETs pp. 1-17

- Lihui Li, Hanwen Deng, Zhongyi Zhai and Sheng-Lung Peng
- Traffic Classification in Software-Defined Networking Using Genetic Programming Tools pp. 1-17

- Spiridoula V. Margariti, Ioannis G. Tsoulos, Evangelia Kiousi and Eleftherios Stergiou
- Evaluation of a New-Concept Secure File Server Solution pp. 1-18

- Gábor Arányi, Ágnes Vathy-Fogarassy and Veronika Szücs
- Predictive Maintenance Based on Identity Resolution and Transformers in IIoT pp. 1-18

- Zhibo Qi, Lei Du, Ru Huo and Tao Huang
- A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements pp. 1-16

- Muhammad Bin Saif, Sara Migliorini and Fausto Spoto
- A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems pp. 1-40

- Waleed Shahjehan, Rajkumar Singh Rathore, Syed Waqar Shah, Mohammad Aljaidi, Ali Safaa Sadiq and Omprakash Kaiwartya
- Graph Attention Networks: A Comprehensive Review of Methods and Applications pp. 1-34

- Aristidis G. Vrahatis, Konstantinos Lazaros and Sotiris Kotsiantis
- PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA pp. 1-19

- Parisa Mashreghi-Moghadam, Tarek Ould-Bachir and Yvon Savaria
- Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification pp. 1-19

- Guoxin Su and Li Liu
- Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises pp. 1-19

- Abdullah Khanfor
- Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing pp. 1-19

- Jobish John, Md. Noor-A-Rahim, Aswathi Vijayan, H. Vincent Poor and Dirk Pesch
- A Multiparty Quantum Private Equality Comparison Scheme Relying on | GHZ 3 〉 States pp. 1-27

- Theodore Andronikos and Alla Sirokofskich
- Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things pp. 1-26

- Abeer Almutairi, Xavier Carpent and Steven Furnell
- Artificial Intelligence Applications in Smart Healthcare: A Survey pp. 1-32

- Xian Gao, Peixiong He, Yi Zhou and Xiao Qin
- Are Strong Baselines Enough? False News Detection with Machine Learning pp. 1-32

- Lara Aslan, Michal Ptaszynski and Jukka Jauhiainen
- Edge Computing in Healthcare: Innovations, Opportunities, and Challenges pp. 1-28

- Alexandru Rancea, Ionut Anghel and Tudor Cioara
- Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations pp. 1-28

- Ondrej Kobza, David Herel, Jan Cuhel, Tommaso Gargiani, Petr Marek and Jan Sedivy
- CrossDeFi: A Novel Cross-Chain Communication Protocol pp. 1-33

- Shezon Saleem Mohammed Abdul, Anup Shrestha and Jianming Yong
- On the Fairness of Internet Congestion Control over WiFi with Deep Reinforcement Learning pp. 1-33

- Shyam Kumar Shrestha, Shiva Raj Pokhrel and Jonathan Kua
- Artificial Intelligence to Reshape the Healthcare Ecosystem pp. 1-33

- Gianluca Reali and Mauro Femminella
- The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications pp. 1-23

- Fabian Nunes, Patrício Domingues and Miguel Frade
- Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation pp. 1-13

- Jesus Calle-Cancho, Carlos Cañada, Rafael Pastor-Vargas, Mercedes E. Paoletti and Juan M. Haut
Volume 16, issue 8, 2024
- Beat the Heat: Syscall Attack Detection via Thermal Side Channel pp. 1-27

- Teodora Vasilas, Claudiu Bacila and Remus Brad
- FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation pp. 1-28

- Khaled Mahbub, Antonio Nehme, Mohammad Patwary, Marc Lacoste and Sylvain Allio
- Software-Defined Named Data Networking in Literature: A Review pp. 1-19

- Albatool Alhawas and Abdelfettah Belghith
- Energy Efficiency and Load Optimization in Heterogeneous Networks through Dynamic Sleep Strategies: A Constraint-Based Optimization Approach pp. 1-19

- Amna Shabbir, Muhammad Faizan Shirazi, Safdar Rizvi, Sadique Ahmad and Abdelhamied A. Ateya
- Ontology in Hybrid Intelligence: A Concise Literature Review pp. 1-19

- Salvatore Flavio Pileggi
- TRUST-ME: Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing pp. 1-19

- Sean Tsikteris, Aisha B Rahman, Md. Sadman Siraj and Eirini Eleni Tsiropoulou
- A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things pp. 1-19

- Yunus Kareem, Djamel Djenouri and Essam Ghadafi
- An Innovative Recompression Scheme for VQ Index Tables pp. 1-19

- Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang and Chin-Chen Chang
- Enhancing Recognition of Human–Object Interaction from Visual Data Using Egocentric Wearable Camera pp. 1-17

- Danish Hamid, Muhammad Ehatisham Ul Haq, Amanullah Yasin, Fiza Murtaza and Muhammad Awais Azam
- A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments pp. 1-17

- Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang and Stephen G. MacDonell
- Dynamic Graph Representation Learning for Passenger Behavior Prediction pp. 1-17

- Mingxuan Xie, Tao Zou, Junchen Ye, Bowen Du and Runhe Huang
- Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems pp. 1-18

- Chuanzhe Gao, Shidang Li, Yixuan Wu, Siyi Duan, Mingsheng Wei and Bencheng Yu
- Modeling Trust in IoT Systems for Drinking-Water Management pp. 1-18

- Aicha Aiche, Pierre-Martin Tardif and Mohammed Erritali
- Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways pp. 1-18

- Kieu Anh Nguyen, Yi-Jia Jiang, Chiao-Shin Huang, Meng-Hsun Kuo and Walter Chen
- Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar pp. 1-16

- Naonobu Okazaki, Shotaro Usuzaki, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba and Kentaro Aburada
- Leveraging Medical Knowledge Graphs and Large Language Models for Enhanced Mental Disorder Information Extraction pp. 1-16

- Chaelim Park, Hayoung Lee and Ok-ran Jeong
- Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text pp. 1-16

- Martin Baumgartner, Karl Kreiner, Fabian Wiesmüller, Dieter Hayn, Christian Puelacher and Günter Schreier
- Cross-Domain Fake News Detection Using a Prompt-Based Approach pp. 1-16

- Jawaher Alghamdi, Yuqing Lin and Suhuai Luo
- Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks pp. 1-16

- Janith K. Dassanayake, Minxiao Wang, Muhammad Z. Hameed and Ning Yang
- Development of a Novel Open Control System Implementation Method under Industrial IoT pp. 1-16

- Lisi Liu, Zijie Xu and Xiaobin Qu
- A Survey on the Use of Large Language Models (LLMs) in Fake News pp. 1-29

- Eleftheria Papageorgiou, Christos Chronis, Iraklis Varlamis and Yassine Himeur
- Dynamic Storage Optimization for Communication between AI Agents pp. 1-13

- Andrei Tara, Hjalmar K. Turesson and Nicolae Natea
- Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation pp. 1-21

- Alessio Luschi, Giovanni Luca Daino, Gianpaolo Ghisalberti, Vincenzo Mezzatesta and Ernesto Iadanza
- Dynamic Fashion Video Synthesis from Static Imagery pp. 1-21

- Tasin Islam, Alina Miron, Xiaohui Liu and Yongmin Li
- Towards Collaborative Edge Intelligence: Blockchain-Based Data Valuation and Scheduling for Improved Quality of Service pp. 1-23

- Yao Du, Zehua Wang, Cyril Leung and Victor C. M. Leung
- Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age pp. 1-23

- Diego Alejandro Albarracin-Acero, Fidel Alfonso Romero-Toledo, Claudia Esperanza Saavedra-Bautista and Edwan Anderson Ariza-Echeverri
- A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network pp. 1-31

- Khoa Dinh Nguyen Dang, Peppino Fazio and Miroslav Voznak
- Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment pp. 1-25

- Antonio Francesco Gentile, Davide Macrì, Emilio Greco and Peppino Fazio
- Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset pp. 1-25

- Shu-Ming Tseng, Yan-Qi Wang and Yung-Chung Wang
- Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor pp. 1-15

- Mohsin Khan, Håvard Dagenborg and Dag Johansen
- A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication pp. 1-15

- Santosh A. Janawade, Prabu Krishnan, Krishnamoorthy Kandasamy, Shashank S. Holla, Karthik Rao and Aditya Chandrasekar
- Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors pp. 1-15

- Minyechil Alehegn Tefera, Amare Mulatie Dehnaw, Yibeltal Chanie Manie, Cheng-Kai Yao, Shegaw Demessie Bogale and Peng-Chun Peng
- MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations pp. 1-20

- Yang Li, Shichao Yan, Fangtao Zhao, Yi Jiang, Shuai Chen, Lei Wang and Li Ma
- Explainable Artificial Intelligence Approach for Improving Head-Mounted Fault Display Systems pp. 1-20

- Abdelaziz Bouzidi, Lala Rajaoarisoa and Luka Claeys
- A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge pp. 1-20

- Jinpeng Miao, Dasari Rajasekhar, Shivakant Mishra, Sanjeet Kumar Nayak and Ramanarayan Yadav
- Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems pp. 1-33

- Igor Kabashkin and Leonid Shoshin
- Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator pp. 1-22

- Francesco Fiorini, Michele Pagano, Rosario Giuseppe Garroppo and Antonio Osele
- Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey pp. 1-22

- Giorgio Piccardo, Lorenzo Conti and Alessio Martino
- Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel pp. 1-22

- Daniel Christian Lawo, Rana Abu Bakar, Abraham Cano Aguilera, Filippo Cugini, José Luis Imaña, Idelfonso Tafur Monroy and Juan Jose Vegas Olmos
- A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT pp. 1-22

- Peng Wang and Yonghua Xiong
- Active Queue Management in L4S with Asynchronous Advantage Actor-Critic: A FreeBSD Networking Stack Perspective pp. 1-37

- Deol Satish, Jonathan Kua and Shiva Raj Pokhrel
- Early Ransomware Detection with Deep Learning Models pp. 1-37

- Matan Davidian, Michael Kiperberg and Natalia Vanetik
- Establishing a Model for the User Acceptance of Cybersecurity Training pp. 1-12

- Wesam Fallatah, Joakim Kävrestad and Steven Furnell
- Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation pp. 1-24

- Vincent Abella, Johnfil Initan, Jake Mark Perez, Philip Virgil Astillo, Luis Gerardo Cañete and Gaurav Choudhary
- Testing Stimulus Equivalence in Transformer-Based Agents pp. 1-24

- Alexis Carrillo and Moisés Betancort
Volume 16, issue 7, 2024
- Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis pp. 1-33

- Loukas Triantafyllopoulos, Evgenia Paxinou, Georgios Feretzakis, Dimitris Kalles and Vassilios S. Verykios
- A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok pp. 1-23

- Ketmanto Wangsa, Shakir Karim, Ergun Gide and Mahmoud Elkhodr
- Combining Advanced Feature-Selection Methods to Uncover Atypical Energy-Consumption Patterns pp. 1-23

- Lucas Henriques, Felipe Prata Lima and Cecilia Castro
- Smart Irrigation Systems from Cyber–Physical Perspective: State of Art and Future Directions pp. 1-23

- Mian Qian, Cheng Qian, Guobin Xu, Pu Tian and Wei Yu
- Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges pp. 1-23

- Amr Adel and Tony Jan
- Edge Cloud Computing and Federated–Split Learning in Internet of Things pp. 1-4

- Qiang Duan and Zhihui Lu
- Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System pp. 1-24

- Sara Lazzaro and Francesco Buccafurri
- Digital Transformation in the Construction Sector: Blockchain, BIM and SSI for a More Sustainable and Transparent System pp. 1-14

- Luisanna Cocco and Roberto Tonelli
- Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies pp. 1-36

- José Cunha, Pedro Ferreira, Eva M. Castro, Paula Cristina Oliveira, Maria João Nicolau, Iván Núñez, Xosé Ramon Sousa and Carlos Serôdio
- Blockchain Financial Statements: Innovating Financial Reporting, Accounting, and Liquidity Management pp. 1-36

- Natalia Dashkevich, Steve Counsell and Giuseppe Destefanis
- Behind the Code: Identifying Zero-Day Exploits in WordPress pp. 1-22

- Mohamed Azarudheen Mohamed Mohideen, Muhammad Shahroz Nadeem, James Hardy, Haider Ali, Umair Ullah Tariq, Fariza Sabrina, Muhammad Waqar and Salman Ahmed
- Explainable Artificial Intelligence Methods to Enhance Transparency and Trust in Digital Deliberation Settings pp. 1-15

- Ilias Siachos and Nikos Karacapilidis
- Intrusion Detection in IoT Using Deep Residual Networks with Attention Mechanisms pp. 1-15

- Bo Cui, Yachao Chai, Zhen Yang and Keqin Li
- Differential Private Federated Learning in Geographically Distributed Public Administration Processes pp. 1-20

- Mirwais Ahmadzai and Giang Nguyen
- Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling pp. 1-20

- Marcus Pieska, Andreas Kassler, Anna Brunstrom, Veselin Rakocevic and Markus Amend
- Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities pp. 1-20

- Darya Ostrikova, Elizaveta Golos, Vitalii Beschastnyi, Egor Machnev, Yuliya Gaidamaka and Konstantin Samouylov
- Multi-Agent Dynamic Fog Service Placement Approach pp. 1-25

- Nerijus Šatkauskas and Algimantas Venčkauskas
- NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization pp. 1-44

- Oleksandr Kuznetsov, Emanuele Frontoni, Kateryna Kuznetsova, Ruslan Shevchuk and Mikolaj Karpinski
- TWIN-ADAPT: Continuous Learning for Digital Twin-Enabled Online Anomaly Classification in IoT-Driven Smart Labs pp. 1-35

- Ragini Gupta, Beitong Tian, Yaohui Wang and Klara Nahrstedt
- Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility pp. 1-21

- Aris Cahyadi Risdianto, Muhammad Usman and Muhammad Ahmad Rathore
- Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System pp. 1-21

- Imen Ahmed, Mariem Turki, Mouna Baklouti, Bouthaina Dammak and Amnah Alshahrani
- Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles pp. 1-34

- Mira M. Zarie, Abdelhamied A. Ateya, Mohammed S. Sayed, Mohammed ElAffendi and Mohammad Mahmoud Abdellatif
- A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT pp. 1-29

- Prabu Kaliyaperumal, Sudhakar Periyasamy, Manikandan Thirumalaisamy, Balamurugan Balusamy and Francesco Benedetto
- Trusted Composition of Internet of Medical Things over Imperfect Networks pp. 1-18

- Ehsan Ahmad, Brian Larson and Abdulbasid Banga
- A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model pp. 1-18

- Enbo Sun, Jiaxuan Han, Yiquan Li and Cheng Huang
- Optimizing Drone Energy Use for Emergency Communications in Disasters via Deep Reinforcement Learning pp. 1-18

- Wen Qiu, Xun Shao, Hiroshi Masui and William Liu
- Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation pp. 1-17

- Bhavani Malisetty and Alfredo J. Perez
- Evaluating Convolutional Neural Networks and Vision Transformers for Baby Cry Sound Analysis pp. 1-17

- Samir A. Younis, Dalia Sobhy and Noha S. Tawfik
- Emotion Recognition from Videos Using Multimodal Large Language Models pp. 1-17

- Lorenzo Vaiani, Luca Cagliero and Paolo Garza
- SD-GPSR: A Software-Defined Greedy Perimeter Stateless Routing Method Based on Geographic Location Information pp. 1-17

- Shaopei Gao, Qiang Liu, Junjie Zeng and Li Li
- INFLUTRUST: Trust-Based Influencer Marketing Campaigns in Online Social Networks pp. 1-16

- Adedamola Adesokan, Aisha B Rahman and Eirini Eleni Tsiropoulou
- Exploring the Architectural Composition of Cyber Ranges: A Systematic Review pp. 1-16

- Dionysios Stamatopoulos, Menelaos Katsantonis, Panagiotis Fouliras and Ioannis Mavridis
- Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios pp. 1-16

- Simon D. Duque Anton
- Enhancing Autonomous Driving Navigation Using Soft Actor-Critic pp. 1-16

- Badr Ben Elallid, Nabil Benamar, Miloud Bagaa and Yassine Hadjadj-Aoul
- The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI) pp. 1-16

- Álvaro Antón-Sancho, Pablo Fernández-Arias, Edwan Anderson Ariza and Diego Vergara
- Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics pp. 1-19

- Pietro Ruiu, Salvatore Saiu and Enrico Grosso
- Building Information Modeling and Digital Twins for Functional and Technical Design of Smart Buildings with Distributed IoT Networks—Review and New Challenges Discussion pp. 1-27

- Gabriela Walczyk and Andrzej Ożadowicz
- Does Anyone Care about the Opinion of People on Participating in a “Social” Metaverse? A Review and a Draft Proposal for a Surveying Tool pp. 1-27

- Stefano Mottura
- Human–AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era pp. 1-32

- Rui Yu, Sooyeon Lee, Jingyi Xie, Syed Masum Billah and John M. Carroll
Volume 16, issue 6, 2024
- Object and Event Detection Pipeline for Rink Hockey Games pp. 1-14

- Jorge Miguel Lopes, Luis Paulo Mota, Samuel Marques Mota, José Manuel Torres, Rui Silva Moreira, Christophe Soares, Ivo Pereira, Feliz Ribeiro Gouveia and Pedro Sobral
- Research on Multi-Modal Pedestrian Detection and Tracking Algorithm Based on Deep Learning pp. 1-14

- Rui Zhao, Jutao Hao and Huan Huo
- Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction pp. 1-14

- Xu Wang, Jui-Chuan Liu, Ching-Chun Chang and Chin-Chen Chang
- Improved Particle Filter in Machine Learning-Based BLE Fingerprinting Method to Reduce Indoor Location Estimation Errors pp. 1-14

- Jingshi Qian, Jiahe Li, Nobuyoshi Komuro, Won-Suk Kim and Younghwan Yoo
- Discovery of Cloud Applications from Logs pp. 1-14

- Ashot Harutyunyan, Arnak Poghosyan, Tigran Bunarjyan, Andranik Haroyan, Marine Harutyunyan, Lilit Harutyunyan and Nelson Baloian
- Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring pp. 1-22

- Mohammad Imran Ali, Shahi Dost, Khurram Shehzad Khattak, Muhammad Imran Khan and Riaz Muhammad
- Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems pp. 1-22

- Tahani Baabdullah, Amani Alzahrani, Danda B. Rawat and Chunmei Liu
- Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes pp. 1-22

- Abbas Javed, Amna Ehtsham, Muhammad Jawad, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi and Hadi Larijani
- Adapting Self-Regulated Learning in an Age of Generative Artificial Intelligence Chatbots pp. 1-12

- Joel Weijia Lai
- Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction pp. 1-25

- Wala Bagunaid, Naveen Chilamkurti, Ahmad Salehi Shahraki and Saeed Bamashmos
- MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing pp. 1-20

- Yuchen Wang, Zishan Huang, Zhongcheng Wei and Jijun Zhao
- Dynamic Spatial–Temporal Self-Attention Network for Traffic Flow Prediction pp. 1-20

- Dong Wang, Hongji Yang and Hua Zhou
- Tracing Student Activity Patterns in E-Learning Environments: Insights into Academic Performance pp. 1-15

- Evgenia Paxinou, Georgios Feretzakis, Rozita Tsoni, Dimitrios Karapiperis, Dimitrios Kalles and Vassilios S. Verykios
- Metaverse and Fashion: An Analysis of Consumer Online Interest pp. 1-15

- Carmen Ruiz Viñals, Marta Gil Ibáñez and José Luis Del Olmo Arriaga
- IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets pp. 1-13

- Umang Garg, Santosh Kumar and Aniket Mahanti
- Using ChatGPT in Software Requirements Engineering: A Comprehensive Review pp. 1-21

- Nuno Marques, Rodrigo Rocha Silva and Jorge Bernardino
- Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks pp. 1-21

- Ayman Khalil and Besma Zeddini
- HP-LSTM: Hawkes Process–LSTM-Based Detection of DDoS Attack for In-Vehicle Network pp. 1-21

- Xingyu Li, Ruifeng Li and Yanchen Liu
- Usability Evaluation of Wearable Smartwatches Using Customized Heuristics and System Usability Scale Score pp. 1-23

- Majed A. Alshamari and Maha M. Althobaiti
- Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies pp. 1-32

- Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Guilherme Fay Vergara, Robson de Oliveira Albuquerque and Georges Daniel Amvame Nze
- Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0) pp. 1-32

- Vitor Hugo dos Santos Filho, Luis Maurício Martins de Resende and Joseane Pontes
- Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids pp. 1-19

- Fouzi Harrou, Benamar Bouyeddou, Abdelkader Dairi and Ying Sun
- Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor pp. 1-19

- Josué I. Rojo-García, Sergio A. Vera-Chavarría, Yair Lozano-Hernández, Victor G. Sánchez-Meza, Jaime González-Sierra and Luz N. Oliva-Moreno
- Studying the Quality of Source Code Generated by Different AI Generative Engines: An Empirical Evaluation pp. 1-19

- Davide Tosi
- GreenLab, an IoT-Based Small-Scale Smart Greenhouse pp. 1-19

- Cristian Volosciuc, Răzvan Bogdan, Bianca Blajovan, Cristina Stângaciu and Marius Marcu
- Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models pp. 1-19

- Héctor Orrillo, André Sabino and Mário Marques da Silva
- Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature pp. 1-16

- Liyuan Liang, Like Gobeawan, Siu-Kit Lau, Ervine Shengwei Lin and Kai Keng Ang
- Prophet–CEEMDAN–ARBiLSTM-Based Model for Short-Term Load Forecasting pp. 1-16

- Jindong Yang, Xiran Zhang, Wenhao Chen and Fei Rong
- Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values pp. 1-16

- Muthana Al-Amidie, Laith Alzubaidi, Muhammad Aminul Islam and Derek T. Anderson
- Enabling End-User Development in Smart Homes: A Machine Learning-Powered Digital Twin for Energy Efficient Management pp. 1-16

- Luca Cotti, Davide Guizzardi, Barbara Rita Barricelli and Daniela Fogli
- In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System pp. 1-18

- Carol Maher, Kylie A. Dankiw, Ben Singh, Svetlana Bogomolova and Rachel G. Curtis
- Towards a New Business Model for Streaming Platforms Using Blockchain Technology pp. 1-18

- Rendrikson Soares and André Araújo
- Optimizing Data Parallelism for FM-Based Short-Read Alignment on the Heterogeneous Non-Uniform Memory Access Architectures pp. 1-18

- Shaolong Chen, Yunzi Dai, Liwei Liu and Xinting Yu
- Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks pp. 1-40

- Jiayi Zhang, Abdelkader Ouda and Raafat Abu-Rukba
- Enhanced Beacons Dynamic Transmission over TSCH pp. 1-17

- Erik Ortiz Guerra, Mario Martínez Morfa, Carlos Manuel García Algora, Hector Cruz-Enriquez, Kris Steenhaut and Samuel Montejo-Sánchez
- The Use of Artificial Intelligence in eParticipation: Mapping Current Research pp. 1-17

- Zisis Vasilakopoulos, Theocharis Tavantzis, Rafail Promikyridis and Efthimios Tambouris
- Learning Modality Consistency and Difference Information with Multitask Learning for Multimodal Sentiment Analysis pp. 1-17

- Cheng Fang, Feifei Liang, Tianchi Li and Fangheng Guan
- Adaptive Framework for Maintenance Scheduling Based on Dynamic Preventive Intervals and Remaining Useful Life Estimation pp. 1-17

- Pedro Nunes, Eugénio Rocha and José Santos
- Metric Space Indices for Dynamic Optimization in a Peer to Peer-Based Image Classification Crowdsourcing Platform pp. 1-29

- Fernando Loor, Veronica Gil-Costa and Mauricio Marin
- Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks pp. 1-29

- Wuzheng Tan, Shenglong Du and Jian Weng
Volume 16, issue 5, 2024
- Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection pp. 1-30

- Muhammad Imran, Annalisa Appice and Donato Malerba
- A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking pp. 1-23

- Daniel Nuñez-Agurto, Walter Fuertes, Luis Marrone, Eduardo Benavides-Astudillo, Christian Coronel-Guerrero and Franklin Perez
- Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface pp. 1-23

- Alireza Fath, Nicholas Hanna, Yi Liu, Scott Tanch, Tian Xia and Dryver Huston
- Novel Approach towards a Fully Deep Learning-Based IoT Receiver Architecture: From Estimation to Decoding pp. 1-13

- Matthew Boeding, Michael Hempel and Hamid Sharif
- Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization pp. 1-13

- Zhe Ma, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu and Mengjie Zhou
- TQU-SLAM Benchmark Dataset for Comparative Study to Build Visual Odometry Based on Extracted Features from Feature Descriptors and Deep Learning pp. 1-21

- Thi-Hao Nguyen, Le Van-Hung, Huu-Son Do, Trung-Hieu Te and Phan Van-Nam
- Median Absolute Deviation for BGP Anomaly Detection pp. 1-18

- Maria Andrea Romo-Chavero, Jose Antonio Cantoral-Ceballos, Jesus Arturo Pérez-Díaz and Carlos Martinez-Cagnazzo
- Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework pp. 1-18

- Sarah Kaleem, Muhammad Asim, Mohammed El-Affendi and Muhammad Babar
- pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework pp. 1-18

- Yu Zhang, Xiaowei Peng and Hequn Xian
- Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments pp. 1-18

- Sonali Patwe and Sunil B. Mane
- MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms pp. 1-18

- Faisal Fiaz, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf and Zia Muhammad
- Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications pp. 1-17

- Tuan-Kiet Dang, Khai-Duy Nguyen, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang and Cong-Kha Pham
- Effective Monoaural Speech Separation through Convolutional Top-Down Multi-View Network pp. 1-16

- Aye Nyein Aung, Che-Wei Liao and Jeih-Weih Hung
- Optimization of Wheelchair Control via Multi-Modal Integration: Combining Webcam and EEG pp. 1-16

- Lassaad Zaway, Nader Ben Amor, Jalel Ktari, Mohamed Jallouli, Larbi Chrifi Alaoui and Laurent Delahoche
- Blockchain and Smart Contracts for Digital Copyright Protection pp. 1-16

- Franco Frattolillo
- Machine Learning Strategies for Reconfigurable Intelligent Surface-Assisted Communication Systems—A Review pp. 1-29

- Roilhi F. Ibarra-Hernández, Francisco R. Castillo-Soria, Carlos A. Gutiérrez, Abel García-Barrientos, Luis Alberto Vásquez-Toledo and J. Alberto Del-Puerto-Flores
- A Method for the Rapid Propagation of Emergency Event Notifications in a Long Vehicle Convoy pp. 1-27

- John David Sprunger, Alvin Lim and David M. Bevly
- A Fair Crowd-Sourced Automotive Data Monetization Approach Using Substrate Hybrid Consensus Blockchain pp. 1-27

- Cyril Naves Samuel, François Verdier, Severine Glock and Patricia Guitton-Ouhamou
- Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform pp. 1-27

- Young Sook Kim, Seng-Phil Hong and Marko Majer
- Anticipating Job Market Demands—A Deep Learning Approach to Determining the Future Readiness of Professional Skills pp. 1-19

- Albert Weichselbraun, Norman Süsstrunk, Roger Waldvogel, André Glatzl, Adrian M. P. Braşoveanu and Arno Scharl
- BPET: A Unified Blockchain-Based Framework for Peer-to-Peer Energy Trading pp. 1-19

- Caixiang Fan, Hamzeh Khazaei and Petr Musilek
- Chatbots in Airport Customer Service—Exploring Use Cases and Technology Acceptance pp. 1-19

- Isabel Auer, Stephan Schlögl and Gundula Glowka
- Enhanced Multi-Task Traffic Forecasting in Beyond 5G Networks: Leveraging Transformer Technology and Multi-Source Data Fusion pp. 1-24

- Ibrahim Althamary, Rubbens Boisguene and Chih-Wei Huang
- Design and Implementation of a Low-Cost, Linear Robotic Camera System, Targeting Greenhouse Plant Growth Monitoring pp. 1-37

- Zacharias Kamarianakis, Spyros Perdikakis, Ioannis N. Daliakopoulos, Dimitrios M. Papadimitriou and Spyros Panagiotakis
- HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security pp. 1-22

- Yazan Aref and Abdelkader Ouda
- A Blockchain-Based Real-Time Power Balancing Service for Trustless Renewable Energy Grids pp. 1-22

- Andrea Calvagna, Giovanni Marotta, Giuseppe Pappalardo and Emiliano Tramontana
- A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis pp. 1-22

- Anjia Ye, Ananda Maiti, Matthew Schmidt and Scott J. Pedersen
- Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning pp. 1-20

- Yuzhu Zhang and Hao Xu
- Using Optimization Techniques in Grammatical Evolution pp. 1-20

- Ioannis G. Tsoulos, Alexandros Tzallas and Evangelos Karvounis
- Exploring Data Input Problems in Mixed Reality Environments: Proposal and Evaluation of Natural Interaction Techniques pp. 1-15

- Jingzhe Zhang, Tiange Chen, Wenjie Gong, Jiayue Liu and Jiangjie Chen
- A Hybrid Multi-Agent Reinforcement Learning Approach for Spectrum Sharing in Vehicular Networks pp. 1-15

- Mansoor Jamal, Zaib Ullah, Muddasar Naeem, Musarat Abbas and Antonio Coronato
- AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses pp. 1-15

- Jieli Chen, Kah Phooi Seng, Li Minn Ang, Jeremy Smith and Hanyue Xu
- SmartDED: A Blockchain- and Smart Contract-Based Digital Electronic Detonator Safety Supervision System pp. 1-15

- Na Liu and Wei-Tek Tsai
- A New Generation of Collaborative Immersive Analytics on the Web: Open-Source Services to Capture, Process and Inspect Users’ Sessions in 3D Environments pp. 1-25

- Bruno Fanini and Giorgio Gosti
- Teamwork Conflict Management Training and Conflict Resolution Practice via Large Language Models pp. 1-25

- Sakhi Aggrawal and Alejandra J. Magana
Volume 16, issue 4, 2024
- Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation pp. 1-13

- Bowen Liu and Qiang Tang
- Metaverse Meets Smart Cities—Applications, Benefits, and Challenges pp. 1-21

- Florian Maier and Markus Weinberger
- All about Delay-Tolerant Networking (DTN) Contributions to Future Internet pp. 1-21

- Georgios Koukis, Konstantina Safouri and Vassilis Tsaoussidis
- Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN pp. 1-21

- Bing Zhang, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu and Huan Wang
- A Survey on Energy-Aware Security Mechanisms for the Internet of Things pp. 1-30

- Peixiong He, Yi Zhou and Xiao Qin
- NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking pp. 1-23

- Priyank Kalgaonkar and Mohamed El-Sharkawy
- Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks pp. 1-23

- Premalatha Baskar and Prakasam Periasamy
- Edge Federated Optimization for Heterogeneous Data pp. 1-23

- Hsin-Tung Lin and Chih-Yu Wen
- Performance Evaluation of Graph Neural Network-Based RouteNet Model with Attention Mechanism pp. 1-19

- Binita Kusum Dhamala, Babu R. Dawadi, Pietro Manzoni and Baikuntha Kumar Acharya
- Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks pp. 1-19

- Wei Li, Mengzhen Ren, Yazhi Liu, Chenyu Li, Hui Qian and Zhenyou Zhang
- Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems pp. 1-19

- Yuning Jiang, Wei Wang, Jianguo Ding, Xin Lu and Yanguo Jing
- MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks pp. 1-16

- Yihu Zhou, Haiming Chen and Zhibin Dou
- Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing pp. 1-16

- Maolin Tang and Wei Li
- A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud pp. 1-18

- Anderson Carvalho, Daniel Riordan and Joseph Walsh
- Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis pp. 1-18

- Stefanos Balaskas, Georgia Kotsari and Maria Rigou
- Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks pp. 1-18

- David Todoli-Ferrandis, Javier Silvestre-Blanes, Víctor Sempere-Payá and Salvador Santonja-Climent
- Implementing Federated Governance in Data Mesh Architecture pp. 1-17

- Anton Dolhopolov, Arnaud Castelltort and Anne Laurent
- Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking pp. 1-17

- Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla and Firdous Kausar
- Multi-Agent Deep Reinforcement Learning-Based Fine-Grained Traffic Scheduling in Data Center Networks pp. 1-17

- Huiting Wang, Yazhi Liu, Wei Li and Zhigang Yang
- SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios pp. 1-17

- Radheshyam Singh, Leo Mendiboure, José Soler, Michael Stübert Berger, Tidiane Sylla, Marion Berbineau and Lars Dittmann
- Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device pp. 1-17

- Zhongcheng Wei and Yanhu Dong
- SUDC: Synchronous Update with the Division and Combination of SRv6 Policy pp. 1-17

- Yuze Liu, Weihong Wu, Ying Wang, Jiang Liu and Fan Yang
- Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC pp. 1-29

- Ihtisham Khalid, Vasilis Maglogiannis, Dries Naudts, Adnan Shahid and Ingrid Moerman
- SRv6-Based Edge Service Continuity in 5G Mobile Networks pp. 1-29

- Laura Lemmi, Carlo Puliafito, Antonio Virdis and Enzo Mingozzi
- Cloud Security Using Fine-Grained Efficient Information Flow Tracking pp. 1-36

- Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
- A Microservices-Based Control Plane for Time-Sensitive Networking pp. 1-22

- Anna Agustí-Torra, Marc Ferré-Mancebo, Gabriel David Orozco-Urrutia, David Rincón-Rivera and David Remondo
- Research on Secure Community Opportunity Network Based on Trust Model pp. 1-22

- Bing Su and Jiwu Liang
- Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning pp. 1-14

- Véronique Georlette, Anne-Carole Honfoga, Michel Dossou and Véronique Moeyaert
- Correction: Li et al. A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation. Future Internet 2023, 15, 395 pp. 1-1

- Zuopeng Li, Hengshuai Ju and Zepeng Ren
- Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing pp. 1-24

- Yazhi Liu, Pengfei Zhong, Zhigang Yang, Wei Li and Siwei Li
- From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks pp. 1-31

- Vyron Kampourakis, Georgios Michail Makrakis and Constantinos Kolias
- A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions pp. 1-20

- Arpad Takacs and Tamas Haidegger
- Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning pp. 1-20

- Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
- Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm pp. 1-20

- Haibo Liu, Yang Liao, Changting Shi and Jing Shen
- SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain pp. 1-20

- Rohit Ahuja, Sahil Chugh and Raman Singh
- Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains pp. 1-20

- Stanly Wilson, Kwabena Adu-Duodu, Yinhao Li, Ringo Sham, Mohammed Almubarak, Yingli Wang, Ellis Solaiman, Charith Perera, Rajiv Ranjan and Omer Rana
- A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions pp. 1-20

- Md Motiur Rahman, Deepti Gupta, Smriti Bhatt, Shiva Shokouhmand and Miad Faezipour
Volume 16, issue 3, 2024
- UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment pp. 1-24

- Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
- SoK: Analysis Techniques for WebAssembly pp. 1-22

- Håkon Harnes and Donn Morrison
- A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas pp. 1-38

- Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
- Dragon_Pi: IoT Side-Channel Power Data Intrusion Detection Dataset and Unsupervised Convolutional Autoencoder for Intrusion Detection pp. 1-38

- Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
- A Lightweight Neural Network Model for Disease Risk Prediction in Edge Intelligent Computing Architecture pp. 1-15

- Feng Zhou, Shijing Hu, Xin Du, Xiaoli Wan and Jie Wu
- Advanced Techniques for Geospatial Referencing in Online Media Repositories pp. 1-15

- Dominik Warch, Patrick Stellbauer and Pascal Neis
- Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO pp. 1-20

- Emma Fitzgerald and Michał Pióro
- A Multi-Head LSTM Architecture for Bankruptcy Prediction with Time Series Accounting Data pp. 1-20

- Mattia Pellegrino, Gianfranco Lombardo, George Adosoglou, Stefano Cagnoni, Panos M. Pardalos and Agostino Poggi
- Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks pp. 1-20

- Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt
- Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments pp. 1-25

- Dimah Almani, Tim Muller, Xavier Carpent, Takahito Yoshizawa and Steven Furnell
- Towards a Hybrid Security Framework for Phishing Awareness Education and Defense pp. 1-25

- Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
- Intelligent Resource Orchestration for 5G Edge Infrastructures pp. 1-31

- Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo and Ignacio M. Llorente
- Linked Open Government Data: Still a Viable Option for Sharing and Integrating Public Data? pp. 1-30

- Alfonso Quarati and Riccardo Albertoni
- Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review pp. 1-21

- Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui
- User Experience, Functionality and Aesthetics Evaluation in an Academic Multi-Site Web Ecosystem pp. 1-21

- Andreas Giannakoulopoulos, Minas Pergantis and Aristeidis Lamprogeorgos
- A Review on Decentralized Finance Ecosystems pp. 1-29

- Andry Alamsyah, Gede Natha Wijaya Kusuma and Dian Puteri Ramadhani
- UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning pp. 1-18

- Shui Jiang, Yanning Ge, Xu Yang, Wencheng Yang and Hui Cui
- Analyzing GPU Performance in Virtualized Environments: A Case Study pp. 1-18

- Adel Belkhiri and Michel Dagenais
- A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection pp. 1-17

- Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim
- Edge-Enhanced TempoFuseNet: A Two-Stream Framework for Intelligent Multiclass Video Anomaly Recognition in 5G and IoT Environments pp. 1-17

- Gulshan Saleem, Usama Ijaz Bajwa, Rana Hammad Raza and Fan Zhang
- An Advanced Path Planning and UAV Relay System: Enhancing Connectivity in Rural Environments pp. 1-17

- Mostafa El Debeiki, Saba Al-Rubaye, Adolfo Perrusquía, Christopher Conrad and Juan Alejandro Flores-Campos
- Dynamic Industrial Optimization: A Framework Integrates Online Machine Learning for Processing Parameters Design pp. 1-17

- Yu Yao and Quan Qian
- Application Scenarios of Digital Twins for Smart Crop Farming through Cloud–Fog–Edge Infrastructure pp. 1-16

- Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier
- Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data pp. 1-16

- Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
- Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning pp. 1-19

- Mikael Sabuhi, Petr Musilek and Cor-Paul Bezemer
- Multi-Level Split Federated Learning for Large-Scale AIoT System Based on Smart Cities pp. 1-19

- Hanyue Xu, Kah Phooi Seng, Jeremy Smith and Li Minn Ang
- Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications pp. 1-19

- Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
- A Method for 5G–ICN Seamless Mobility Support Based on Router Buffered Data pp. 1-19

- Mengchi Xing, Haojiang Deng and Rui Han
- The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis pp. 1-26

- Juliana Basulo-Ribeiro and Leonor Teixeira
- Deterministic K-Identification for Future Communication Networks: The Binary Symmetric Channel Results pp. 1-45

- Mohammad Javad Salariseddigh, Ons Dabbabi, Christian Deppe and Holger Boche
- Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies pp. 1-27

- Mauro Femminella and Gianluca Reali
- Using Computer Vision to Collect Information on Cycling and Hiking Trails Users pp. 1-32

- Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, João M. L. P. Caldeira and Vasco N. G. J. Soares
- Edge and Fog Computing for the Internet of Things pp. 1-2

- Alessandro Pozzebon
- An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications pp. 1-23

- Davy Preuveneers and Wouter Joosen
- A Synergistic Elixir-EDA-MQTT Framework for Advanced Smart Transportation Systems pp. 1-23

- Yushan Li and Satoshi Fujita
- The Varieties of Agency in Human–Smart Device Relationships: The Four Agency Profiles pp. 1-23

- Heidi Toivonen and Francesco Lelli
- The Electronic Medical Record—A New Look at the Challenges and Opportunities pp. 1-4

- Reeva Lederman, Esther Brainin and Ofir Ben-Assuli
- IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks pp. 1-13

- Ziyad Almudayni, Ben Soh and Alice Li
- Personalized Federated Learning with Adaptive Feature Extraction and Category Prediction in Non-IID Datasets pp. 1-13

- Ying-Hsun Lai, Shin-Yeh Chen, Wen-Chi Chou, Hua-Yang Hsu and Han-Chieh Chao
- Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain pp. 1-13

- Muhammad Bin Saif, Sara Migliorini and Fausto Spoto
Volume 16, issue 2, 2024
- Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks pp. 1-28

- Azizah Assiri and Hassen Sallay
- Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs pp. 1-26

- Mohammed Bellaj, Najib Naja and Abdellah Jamali
- A New Dynamic Game-Based Pricing Model for Cloud Environment pp. 1-19

- Hamid Saadatfar, Hamid Gholampour Ahangar and Javad Hassannataj Joloudari
- Modern Trends in Multi-Agent Systems pp. 1-3

- Martin Kenyeres, Ivana Budinská, Ladislav Hluchý and Agostino Poggi
- CROWDMATCH: Optimizing Crowdsourcing Matching through the Integration of Matching Theory and Coalition Games pp. 1-16

- Adedamola Adesokan, Rowan Kinney and Eirini Eleni Tsiropoulou
- Digital-Twin-Based Monitoring System for Slab Production Process pp. 1-16

- Tianjie Fu, Peiyu Li, Chenke Shi and Youzhu Liu
- Merging Ontologies and Data from Electronic Health Records pp. 1-16

- Salvatore Calcagno, Andrea Calvagna, Emiliano Tramontana and Gabriella Verga
- A Spectral Gap-Based Topology Control Algorithm for Wireless Backhaul Networks pp. 1-17

- Sergio Jesús González-Ambriz, Rolando Menchaca-Méndez, Sergio Alejandro Pinacho-Castellanos and Mario Eduardo Rivero-Ángeles
- Automated Identification of Sensitive Financial Data Based on the Topic Analysis pp. 1-17

- Meng Li, Jiqiang Liu and Yeping Yang
- Context-Aware Behavioral Tips to Improve Sleep Quality via Machine Learning and Large Language Models pp. 1-18

- Erica Corda, Silvia M. Massa and Daniele Riboni
- The Microverse: A Task-Oriented Edge-Scale Metaverse pp. 1-18

- Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz and Genshe Chen
- IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings pp. 1-18

- Paolo Bellavista and Giuseppe Di Modica
- TinyML Algorithms for Big Data Management in Large-Scale IoT Systems pp. 1-29

- Aristeidis Karras, Anastasios Giannaros, Christos Karras, Leonidas Theodorakopoulos, Constantinos S. Mammassis, George A. Krimpas and Spyros Sioutas
- State-of-the-Art Future Internet Technology in Italy 2022–2023 pp. 1-4

- Massimo Cafaro, Italo Epicoco and Marco Pulimeno
- Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT pp. 1-21

- Muhammad Nafees Ulfat Khan, Weiping Cao, Zhiling Tang, Ata Ullah and Wanghua Pan
- Volumetric Techniques for Product Routing and Loading Optimisation in Industry 4.0: A Review pp. 1-23

- Ricardo Lopes, Marcello Trovati and Ella Pereira
- Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning pp. 1-23

- Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
- Enhancing Urban Resilience: Smart City Data Analyses, Forecasts, and Digital Twin Techniques at the Neighborhood Level pp. 1-44

- Andreas F. Gkontzis, Sotiris Kotsiantis, Georgios Feretzakis and Vassilios S. Verykios
- Beyond Lexical Boundaries: LLM-Generated Text Detection for Romanian Digital Libraries pp. 1-31

- Melania Nitu and Mihai Dascalu
- DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control pp. 1-15

- Shiva Raj Pokhrel, Jonathan Kua, Deol Satish, Sebnem Ozer, Jeff Howe and Anwar Walid
- Optimizing Session-Aware Recommenders: A Deep Dive into GRU-Based Latent Interaction Integration pp. 1-15

- Ming-Yen Lin, Ping-Chun Wu and Sue-Chen Hsueh
- Online Optimization of Pickup and Delivery Problem Considering Feasibility pp. 1-15

- Ryo Matsuoka, Koichi Kobayashi and Yuh Yamashita
- Speech Inpainting Based on Multi-Layer Long Short-Term Memory Networks pp. 1-20

- Haohan Shi, Xiyu Shi and Safak Dogan
- Refined Semi-Supervised Modulation Classification: Integrating Consistency Regularization and Pseudo-Labeling Techniques pp. 1-14

- Min Ma, Shanrong Liu, Shufei Wang and Shengnan Shi
- Computer Vision and Machine Learning-Based Predictive Analysis for Urban Agricultural Systems pp. 1-14

- Arturs Kempelis, Inese Polaka, Andrejs Romanovs and Antons Patlins
- Enhancing Smart City Safety and Utilizing AI Expert Systems for Violence Detection pp. 1-14

- Pradeep Kumar, Guo-Liang Shih, Bo-Lin Guo, Siva Kumar Nagi, Yibeltal Chanie Manie, Cheng-Kai Yao, Michael Augustine Arockiyadoss and Peng-Chun Peng
- Synchronization of Separate Sensors’ Data Transferred through a Local Wi-Fi Network: A Use Case of Human-Gait Monitoring pp. 1-22

- Viktor Masalskyi, Dominykas Čičiurėnas, Andrius Dzedzickis, Urtė Prentice, Gediminas Braziulis and Vytautas Bučinskas
- A QoS-Aware IoT Edge Network for Mobile Telemedicine Enabling In-Transit Monitoring of Emergency Patients pp. 1-22

- Adwitiya Mukhopadhyay, Aryadevi Remanidevi Devidas, Venkat P. Rangan and Maneesha Vinodini Ramesh
- A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives pp. 1-57

- Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
- A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability pp. 1-24

- Ayman Khalil and Besma Zeddini
- Enhancing Energy Efficiency in IoT-NDN via Parameter Optimization pp. 1-24

- Dennis Papenfuß, Bennet Gerlach, Stefan Fischer and Mohamed Ahmed Hail
Volume 16, issue 1, 2024
- A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness pp. 1-31

- Mahmoud Elkhodr, Samiya Khan and Ergun Gide
- Cross-Layer Methods for Ad Hoc Networks—Review and Classification pp. 1-31

- Valeriy Ivanov and Maxim Tereshonok
- TDLearning: Trusted Distributed Collaborative Learning Based on Blockchain Smart Contracts pp. 1-33

- Jing Liu, Xuesong Hai and Keqin Li
- Automotive Cybersecurity Application Based on CARDIAN pp. 1-15

- Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale
- Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures pp. 1-20

- Herve M. Kabamba, Matthew Khouzam and Michel R. Dagenais
- Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT pp. 1-20

- Lidong Liu, Shidang Li, Mingsheng Wei, Jinsong Xu and Bencheng Yu
- Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space–Air–Ground Integrated Network pp. 1-20

- Xu Feng, Mengyang He, Lei Zhuang, Yanrui Song and Rumeng Peng
- An Imbalanced Sequence Feature Extraction Approach for the Detection of LTE-R Cells with Degraded Communication Performance pp. 1-20

- Jiantao Qu, Chunyu Qi and He Meng
- An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering pp. 1-20

- Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
- An Analysis of Methods and Metrics for Task Scheduling in Fog Computing pp. 1-22

- Javid Misirli and Emiliano Casalicchio
- Design and Implementation of a Digital Twin System for Log Rotary Cutting Optimization pp. 1-14

- Yadi Zhao, Lei Yan, Jian Wu and Ximing Song
- Future Sustainable Internet Energy-Defined Networking pp. 1-14

- Alex Galis
- A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions pp. 1-24

- Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
- Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments pp. 1-24

- Mizuki Asano, Takumi Miyoshi and Taku Yamazaki
- Investigating the Key Aspects of a Smart City through Topic Modeling and Thematic Analysis pp. 1-39

- Anestis Kousis and Christos Tjortjis
- 1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing pp. 1-26

- Omar Serghini, Hayat Semlali, Asmaa Maali, Abdelilah Ghammaz and Salvatore Serrano
- Resource Indexing and Querying in Large Connected Environments pp. 1-27

- Fouad Achkouty, Richard Chbeir, Laurent Gallon, Elio Mansour and Antonio Corral
- Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures pp. 1-27

- Spyridon Daousis, Nikolaos Peladarinos, Vasileios Cheimaras, Panagiotis Papageorgas, Dimitrios D. Piromalis and Radu Adrian Munteanu
- The Future of Flying Base Stations: Empirical and Numerical Investigations of mmWave-Enabled UAVs pp. 1-28

- Ryunosuke Masaoka, Gia Khanh Tran, Jin Nakazato and Kei Sakaguchi
- Development of an Assessment Scale for Measurement of Usability and User Experience Characteristics of Bing Chat Conversational AI pp. 1-19

- Goran Bubaš, Antonela Čižmešija and Andreja Kovačić
- A Comprehensive Study and Analysis of the Third Generation Partnership Project’s 5G New Radio for Vehicle-to-Everything Communication pp. 1-19

- G. G. Md. Nawaz Ali, Mohammad Nazmus Sadat, Md Suruz Miah, Sameer Ahmed Sharief and Yun Wang
- Latent Autoregressive Student- t Prior Process Models to Assess Impact of Interventions in Time Series pp. 1-17

- Patrick Toman, Nalini Ravishanker, Nathan Lally and Sanguthevar Rajasekaran
- Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing pp. 1-17

- Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu
- Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism pp. 1-18

- Qiang Liu, Rui Han and Yang Li
- Integrating Knowledge Graphs into Distribution Grid Decision Support Systems pp. 1-18

- Yashar Kor, Liang Tan, Petr Musilek and Marek Z. Reformat
- Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol pp. 1-18

- Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour
- Digital Communication and Social Organizations: An Evaluation of the Communication Strategies of the Most-Valued NGOs Worldwide pp. 1-18

- Andrea Moreno-Cabanillas, Elizabet Castillero-Ostio and Antonio Castillo-Esparcia
- Investigation of Phishing Susceptibility with Explainable Artificial Intelligence pp. 1-18

- Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang
- A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things pp. 1-16

- Muhammad Sher Ramzan, Anees Asghar, Ata Ullah, Fawaz Alsolami and Iftikhar Ahmad
- Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security pp. 1-34

- Sana Rasheed and Soulla Louca
- Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection pp. 1-13

- Chinyang Henry Tseng, Woei-Jiunn Tsaur and Yueh-Mao Shen
- Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation pp. 1-21

- Xiu Li, Aron Henriksson, Martin Duneld, Jalal Nouri and Yongchao Wu
- A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks pp. 1-42

- Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
- Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing pp. 1-23

- Irina Kochetkova, Kseniia Leonteva, Ibram Ghebrial, Anastasiya Vlaskina, Sofia Burtseva, Anna Kushchazli and Konstantin Samouylov
- Clustering on the Chicago Array of Things: Spotting Anomalies in the Internet of Things Records pp. 1-23

- Kyle DeMedeiros, Chan Young Koh and Abdeltawab Hendawi
| |