Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 15, issue 12, 2023
- An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection pp. 1-29

- Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz
- Recent Advances in Information-Centric Networks (ICNs) pp. 1-5

- José Carlos López-Ardao, Miguel Rodríguez-Pérez and Sergio Herrería-Alonso
- Diff-SwinT: An Integrated Framework of Diffusion Model and Swin Transformer for Radar Jamming Recognition pp. 1-17

- Minghui Sha, Dewu Wang, Fei Meng, Wenyan Wang and Yu Han
- Addressing the Gaps of IoU Loss in 3D Object Detection with IIoU pp. 1-17

- Niranjan Ravi and Mohamed El-Sharkawy
- Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare pp. 1-16

- Zeeshan Ashraf, Zahid Mahmood and Muddesar Iqbal
- Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography pp. 1-16

- Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar
- IoT-Based Object-Detection System to Safeguard Endangered Animals and Bolster Agricultural Farm Security pp. 1-19

- Mohaimenul Azam Khan Raiaan, Nur Mohammad Fahad, Shovan Chowdhury, Debopom Sutradhar, Saadman Sakib Mihad and Md. Motaharul Islam
- The Multiband over Spatial Division Multiplexing Sliceable Transceiver for Future Optical Networks pp. 1-19

- Laia Nadal, Mumtaz Ali, Francisco Javier Vílchez, Josep Maria Fàbrega and Michela Svaluto Moreolo
- Envisioning Digital Practices in the Metaverse: A Methodological Perspective pp. 1-19

- Luca Sabatucci, Agnese Augello, Giuseppe Caggianese and Luigi Gallo
- Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions pp. 1-54

- Jadil Alsamiri and Khalid Alsubhi
- Blockchain in Agriculture to Ensure Trust, Effectiveness, and Traceability from Farm Fields to Groceries pp. 1-28

- Arvind Panwar, Manju Khari, Sanjay Misra and Urvashi Sugandh
- HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference pp. 1-28

- Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow and The Anh Ta
- A Comprehensive Survey Exploring the Multifaceted Interplay between Mobile Edge Computing and Vehicular Networks pp. 1-45

- Ali Pashazadeh, Giovanni Nardini and Giovanni Stea
- Review of Blockchain Tokens Creation and Valuation pp. 1-27

- Oana Marin, Tudor Cioara, Liana Toderean, Dan Mitrea and Ionut Anghel
- A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues pp. 1-27

- Panagiotis Gkonis, Anastasios Giannopoulos, Panagiotis Trakadas, Xavi Masip-Bruin and Francesco D’Andria
- Protecting Hybrid ITS Networks: A Comprehensive Security Approach pp. 1-26

- Ricardo Severino, José Simão, Nuno Datia and António Serrador
- Statistical Model Checking in Process Mining: A Comprehensive Approach to Analyse Stochastic Processes pp. 1-21

- Fawad Ali Mangi, Guoxin Su and Minjie Zhang
- A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation pp. 1-21

- Zuopeng Li, Hengshuai Ju and Zepeng Ren
- Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution pp. 1-13

- Evangelos D. Spyrou, Ioannis Tsoulos and Chrysostomos Stylios
- Enhancements in BlenderBot 3: Expanding Beyond a Singular Model Governance and Boosting Generational Performance pp. 1-15

- Ondrej Kobza, David Herel, Jan Cuhel, Tommaso Gargiani, Jan Pichl, Petr Marek, Jakub Konrad and Jan Sedivy
- Knowledge Distillation-Based GPS Spoofing Detection for Small UAV pp. 1-15

- Yingying Ren, Ryan D. Restivo, Wenkai Tan, Jian Wang, Yongxin Liu, Bin Jiang, Huihui Wang and Houbing Song
- User Association Performance Trade-Offs in Integrated RF/mmWave/THz Communications pp. 1-20

- Noha Hassan, Xavier Fernando, Isaac Woungang and Alagan Anpalagan
- Extended Reality (XR) Engines for Developing Gamified Apps and Serious Games: A Scoping Review pp. 1-20

- Humberto Marín-Vega, Giner Alor-Hernández, Maritza Bustos-López, Ignacio López-Martínez and Norma Leticia Hernández-Chaparro
- A Transmission Rate Control Method for Active Congestion Reduction Based on Network Node Bandwidth Allocation pp. 1-20

- Hongyu Liu, Hong Ni and Rui Han
- Decentralized Storage with Access Control and Data Persistence for e-Book Stores pp. 1-20

- Keigo Ogata and Satoshi Fujita
- Empowering Digital Twin for Future Networks with Graph Neural Networks: Overview, Enabling Technologies, Challenges, and Opportunities pp. 1-33

- Duc-Thinh Ngo, Ons Aouedi, Kandaraj Piamrat, Thomas Hassan and Philippe Raipin-Parvédy
- Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks pp. 1-31

- Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Manuel Perez-Meana, Jose Portillo-Portillo and Jesus Olivares-Mercado
- Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions pp. 1-25

- Abubakar Ahmad Musa, Adamu Hussaini, Cheng Qian, Yifan Guo and Wei Yu
- Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions pp. 1-43

- Shrouk A. Ali, Shaimaa Ahmed Elsaid, Abdelhamied A. Ateya, Mohammed ElAffendi and Ahmed A. Abd El-Latif
- A Structured Narrative Prompt for Prompting Narratives from Large Language Models: Sentiment Assessment of ChatGPT-Generated Narratives and Real Tweets pp. 1-36

- Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O’Brien, Erika Frydenlund and Ross Gore
- Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research pp. 1-36

- Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, Ligiane Cristina Braga de Oliveira Friaes, Rodrigo Cleiton Paiva de Oliveira and Ciro José Jardim Figueiredo
- ICN-Based Enhanced Content Delivery for CDN pp. 1-22

- Lei Gao and Xiaoyong Zhu
- PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc pp. 1-22

- Javier Gomez, Jose Jaime Camacho-Escoto, Luis Orozco-Barbosa and Diego Rodriguez-Torres
- A Survey on Blockchain-Based Federated Learning pp. 1-22

- Lang Wu, Weijian Ruan, Jinhui Hu and Yaobin He
- Energy Consumption Reduction in Wireless Sensor Network-Based Water Pipeline Monitoring Systems via Energy Conservation Techniques pp. 1-22

- Valery Nkemeni, Fabien Mieyeville and Pierre Tsafack
- Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables pp. 1-22

- James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu and Hafsat Muhammad Bashir
Volume 15, issue 11, 2023
- Improving the Efficiency of Modern Warehouses Using Smart Battery Placement pp. 1-12

- Nikolaos Baras, Antonios Chatzisavvas, Dimitris Ziouzios, Ioannis Vanidis and Minas Dasygenis
- Generating Synthetic Resume Data with Large Language Models for Enhanced Job Description Classification pp. 1-12

- Panagiotis Skondras, Panagiotis Zervas and Giannis Tzimas
- Latency-Aware Semi-Synchronous Client Selection and Model Aggregation for Wireless Federated Learning pp. 1-15

- Liangkun Yu, Xiang Sun, Rana Albelaihi and Chen Yi
- An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts pp. 1-20

- Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
- Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing pp. 1-20

- Afzal Badshah, Ghani Ur Rehman, Haleem Farman, Anwar Ghani, Shahid Sultan, Muhammad Zubair and Moustafa M. Nasralla
- Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications pp. 1-25

- Sapdo Utomo, Adarsh Rouniyar, Hsiu-Chun Hsu and Pao-Ann Hsiung
- Reinforcement Learning vs. Computational Intelligence: Comparing Service Management Approaches for the Cloud Continuum pp. 1-30

- Filippo Poltronieri, Cesare Stefanelli, Mauro Tortonesi and Mattia Zaccarini
- An Overview of Current Challenges and Emerging Technologies to Facilitate Increased Energy Efficiency, Safety, and Sustainability of Railway Transport pp. 1-44

- Zdenko Kljaić, Danijel Pavković, Mihael Cipek, Maja Trstenjak, Tomislav Josip Mlinarić and Mladen Nikšić
- A Finite State Automaton for Green Data Validation in a Real-World Smart Manufacturing Environment with Special Regard to Time-Outs and Overtaking pp. 1-23

- Simon Paasche and Sven Groppe
- Managing Access to Confidential Documents: A Case Study of an Email Security Tool pp. 1-23

- Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab
- Task Scheduling for Federated Learning in Edge Cloud Computing Environments by Using Adaptive-Greedy Dingo Optimization Algorithm and Binary Salp Swarm Algorithm pp. 1-23

- Weihong Cai and Fengxi Duan
- Implementation and Evaluation of a Federated Learning Framework on Raspberry PI Platforms for IoT 6G Applications pp. 1-23

- Lorenzo Ridolfi, David Naseh, Swapnil Sadashiv Shinde and Daniele Tarchi
- Assessing Interactive Web-Based Systems Using Behavioral Measurement Techniques pp. 1-35

- Thanaa Saad AlSalem and Majed Aadi AlShamari
- Business Intelligence through Machine Learning from Satellite Remote Sensing Data pp. 1-29

- Christos Kyriakos and Manolis Vavalis
- New RFI Model for Behavioral Audience Segmentation in Wi-Fi Advertising System pp. 1-16

- Shueh-Ting Lim, Lee-Yeng Ong and Meng-Chew Leow
- A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications pp. 1-16

- Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi and Brahim El Bhiri
- Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks pp. 1-17

- Rao Muzamal Liaqat, Philip Branch and Jason But
- Edge AI for Early Detection of Chronic Diseases and the Spread of Infectious Diseases: Opportunities, Challenges, and Future Directions pp. 1-34

- Elarbi Badidi
- Implementation of In-Band Full-Duplex Using Software Defined Radio with Adaptive Filter-Based Self-Interference Cancellation pp. 1-19

- Wei-Shun Liao, Ou Zhao, Keren Li, Hikaru Kawasaki and Takeshi Matsumura
- Sentiment Analysis of Chinese Product Reviews Based on Fusion of DUAL-Channel BiLSTM and Self-Attention pp. 1-19

- Ye Yuan, Wang Wang, Guangze Wen, Zikun Zheng and Zhemin Zhuang
- GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs pp. 1-19

- Giacomo Gori, Lorenzo Rinieri, Amir Al Sadi, Andrea Melis, Franco Callegati and Marco Prandini
- Maximizing UAV Coverage in Maritime Wireless Networks: A Multiagent Reinforcement Learning Approach pp. 1-19

- Qianqian Wu, Qiang Liu, Zefan Wu and Jiye Zhang
- Digital Management of Competencies in Web 3.0: The C-Box ® Approach pp. 1-28

- Alberto Francia, Stefano Mariani, Giuseppe Adduce, Sandro Vecchiarelli and Franco Zambonelli
- The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges pp. 1-32

- Carlos Serôdio, José Cunha, Guillermo Candela, Santiago Rodriguez, Xosé Ramón Sousa and Frederico Branco
- Performance of Path Loss Models over Mid-Band and High-Band Channels for 5G Communication Networks: A Review pp. 1-32

- Farouq E. Shaibu, Elizabeth N. Onwuka, Nathaniel Salawu, Stephen S. Oyewobi, Karim Djouani and Adnan M. Abu-Mahfouz
Volume 15, issue 10, 2023
- Evaluating MPTCP Congestion Control Algorithms: Implications for Streaming in Open Internet pp. 1-17

- Łukasz Piotr Łuczak, Przemysław Ignaciuk and Michał Morawski
- An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction pp. 1-18

- Mazen Gazzan and Frederick T. Sheldon
- Investigating IPTV Malware in the Wild pp. 1-18

- Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos
- Data-Driven Safe Deliveries: The Synergy of IoT and Machine Learning in Shared Mobility pp. 1-18

- Fatema Elwy, Raafat Aburukba, A. R. Al-Ali, Ahmad Al Nabulsi, Alaa Tarek, Ameen Ayub and Mariam Elsayeh
- Comparison of Supervised Learning Algorithms on a 5G Dataset Reduced via Principal Component Analysis (PCA) pp. 1-16

- Joan D. Gonzalez-Franco, Jorge E. Preciado-Velasco, Jose E. Lozano-Rizk, Raul Rivera-Rodriguez, Jorge Torres-Rodriguez and Miguel A. Alonso-Arevalo
- Machine Learning: Models, Challenges, and Research Directions pp. 1-29

- Tala Talaei Khoei and Naima Kaabouch
- Oceania’s 5G Multi-Tier Fixed Wireless Access Link’s Long-Term Resilience and Feasibility Analysis pp. 1-29

- Satyanand Singh, Joanna Rosak-Szyrocka, István Drotár and Xavier Fernando
- A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection pp. 1-27

- Zoltán Szabó and Vilmos Bilicki
- A Graph DB-Based Solution for Semantic Technologies in the Future Internet pp. 1-28

- Stefano Ferilli, Eleonora Bernasconi, Davide Di Pierro and Domenico Redavid
- Application of an Effective Hierarchical Deep-Learning-Based Object Detection Model Integrated with Image-Processing Techniques for Detecting Speed Limit Signs, Rockfalls, Potholes, and Car Crashes pp. 1-26

- Yao-Liang Chung
- Fluent but Not Factual: A Comparative Analysis of ChatGPT and Other AI Chatbots’ Proficiency and Originality in Scientific Writing for Humanities pp. 1-26

- Edisa Lozić and Benjamin Štular
- Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks pp. 1-19

- Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang and Shuai Zhang
- End-to-End Service Availability in Heterogeneous Multi-Tier Cloud–Fog–Edge Networks pp. 1-23

- Igor Kabashkin
- Modeling 3D NAND Flash with Nonparametric Inference on Regression Coefficients for Reliable Solid-State Storage pp. 1-13

- Michela Borghesi, Cristian Zambelli, Rino Micheloni and Stefano Bonnini
- Temporal-Guided Knowledge Graph-Enhanced Graph Convolutional Network for Personalized Movie Recommendation Systems pp. 1-13

- Chin-Yi Chen and Jih-Jeng Huang
- A Personalized Ontology Recommendation System to Effectively Support Ontology Development by Reuse pp. 1-21

- Marwa Abdelreheim, Taysir Hassan A. Soliman and Friederike Klan
- Edge-Computing-Based People-Counting System for Elevators Using MobileNet–Single-Stage Object Detection pp. 1-21

- Tsu-Chuan Shen and Edward T.-H. Chu
- MSEN: A Multi-Scale Evolutionary Network for Modeling the Evolution of Temporal Knowledge Graphs pp. 1-15

- Yong Yu, Shudong Chen, Rong Du, Da Tong, Hao Xu and Shuai Chen
- Financial Data Quality Evaluation Method Based on Multiple Linear Regression pp. 1-15

- Meng Li, Jiqiang Liu and Yeping Yang
- Reinforcement Learning Approach for Adaptive C-V2X Resource Management pp. 1-15

- Teguh Indra Bayu, Yung-Fa Huang and Jeang-Kuo Chen
- Flying Watchdog-Based Guard Patrol with Check Point Data Verification pp. 1-20

- Endrowednes Kuantama, Avishkar Seth, Alice James and Yihao Zhang
- Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities pp. 1-31

- Salman Ali AlQahtani
- Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review pp. 1-25

- Pavlos Cheimonidis and Konstantinos Rantos
- A Comprehensive Analysis and Investigation of the Public Discourse on Twitter about Exoskeletons from 2017 to 2023 pp. 1-46

- Nirmalya Thakur, Kesha A. Patel, Audrey Poon, Rishika Shah, Nazif Azizi and Changhee Han
- Challenges of Network Forensic Investigation in Fog and Edge Computing pp. 1-12

- Daniel Spiekermann and Jörg Keller
- Exploring the Factors Affecting Countries’ Adoption of Blockchain-Enabled Central Bank Digital Currencies pp. 1-14

- Medina Ayta Mohammed, Carmen De-Pablos-Heredero and José Luis Montes Botella
- Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks pp. 1-37

- Šarūnas Grigaliūnas, Michael Schmidt, Rasa Brūzgienė, Panayiota Smyrli and Vladislav Bidikov
- kClusterHub: An AutoML-Driven Tool for Effortless Partition-Based Clustering over Varied Data Types pp. 1-22

- Konstantinos Gratsos, Stefanos Ougiaroglou and Dionisis Margaris
- Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms pp. 1-22

- Athanasios Koulianos and Antonios Litke
Volume 15, issue 9, 2023
- Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges pp. 1-15

- Peng Zhang and Maged N. Kamel Boulos
- Short-Term Mobile Network Traffic Forecasting Using Seasonal ARIMA and Holt-Winters Models pp. 1-15

- Irina Kochetkova, Anna Kushchazli, Sofia Burtseva and Andrey Gorshenin
- Intelligent Unsupervised Network Traffic Classification Method Using Adversarial Training and Deep Clustering for Secure Internet of Things pp. 1-20

- Weijie Zhang, Lanping Zhang, Xixi Zhang, Yu Wang, Pengfei Liu and Guan Gui
- Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm pp. 1-25

- Rezak Aziz, Soumya Banerjee, Samia Bouzefrane and Thinh Le Vinh
- Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security pp. 1-31

- Carolina Del-Valle-Soto, Ramon A. Briseño, Leonardo J. Valdivia, Ramiro Velázquez and Juan Arturo Nolazco-Flores
- A Novel SDWSN-Based Testbed for IoT Smart Applications pp. 1-24

- Duaa Zuhair Al-Hamid, Pejman A. Karegar and Peter Han Joo Chong
- Wireless Energy Harvesting for Internet-of-Things Devices Using Directional Antennas pp. 1-24

- Hsiao-Ching Chang, Hsing-Tsung Lin and Pi-Chung Wang
- FLAME-VQA: A Fuzzy Logic-Based Model for High Frame Rate Video Quality Assessment pp. 1-22

- Štefica Mrvelj and Marko Matulin
- Prototyping a Hyperledger Fabric-Based Security Architecture for IoMT-Based Health Monitoring Systems pp. 1-22

- Filippos Pelekoudas-Oikonomou, José C. Ribeiro, Georgios Mantas, Georgia Sakellari and Jonathan Gonzalez
- Advances Techniques in Computer Vision and Multimedia pp. 1-2

- Yang Wang
- Editorial for the Special Issue on “Software Engineering and Data Science”, Volume II pp. 1-2

- Davide Tosi
- Digital Twin Applications in Manufacturing Industry: A Case Study from a German Multi-National pp. 1-16

- Martin Wynn and Jose Irizar
- 3D Visualization in Digital Medicine Using XR Technology pp. 1-16

- Miklos Vincze, Bela Molnar and Miklos Kozlovszky
- Enhancing E-Learning with Blockchain: Characteristics, Projects, and Emerging Trends pp. 1-16

- Mahmoud Bidry, Abdellah Ouaguid and Mohamed Hanine
- FREDY: Federated Resilience Enhanced with Differential Privacy pp. 1-16

- Zacharias Anastasakis, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Stavroula Bourou, Konstantinos Psychogyios, Dimitrios Skias and Theodore Zahariadis
- Precoding for RIS-Assisted Multi-User MIMO-DQSM Transmission Systems pp. 1-18

- Francisco R. Castillo-Soria, J. Alberto Del Puerto-Flores, Cesar A. Azurdia-Meza, Vinoth Babu Kumaravelu, Jorge Simón and Carlos A. Gutierrez
- Application of ChatGPT-Based Digital Human in Animation Creation pp. 1-18

- Chong Lan, Yongsheng Wang, Chengze Wang, Shirong Song and Zheng Gong
- E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios pp. 1-17

- Lijun Zu, Hongyi Li, Liang Zhang, Zhihui Lu, Jiawei Ye, Xiaoxia Zhao and Shijing Hu
- Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing pp. 1-17

- Vyas O’Neill and Ben Soh
- Entering the Metaverse from the JVM: The State of the Art, Challenges, and Research Areas of JVM-Based Web 3.0 Tools and Libraries pp. 1-17

- Vlad Bucur and Liviu-Cristian Miclea
- On Evaluating IoT Data Trust via Machine Learning pp. 1-17

- Timothy Tadj, Reza Arablouei and Volkan Dedeoglu
- Autism Screening in Toddlers and Adults Using Deep Learning and Fair AI Techniques pp. 1-19

- Ishaani Priyadarshini
- Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection pp. 1-19

- Furkat Safarov, Mainak Basak, Rashid Nasimov, Akmalbek Abdusalomov and Young Im Cho
- A Hybrid Neural Ordinary Differential Equation Based Digital Twin Modeling and Online Diagnosis for an Industrial Cooling Fan pp. 1-19

- Chao-Chung Peng and Yi-Ho Chen
- Internet of Robotic Things (IoRT) and Metaheuristic Optimization Techniques Applied for Wheel-Legged Robot pp. 1-19

- Mateusz Malarczyk, Grzegorz Kaczmarczyk, Jaroslaw Szrek and Marcin Kaminski
- An Automatic Transformer from Sequential to Parallel Java Code pp. 1-19

- Alessandro Midolo and Emiliano Tramontana
- Force-Based Self-Organizing MANET/FANET with a UAV Swarm pp. 1-19

- Fabrice Saffre, Hanno Hildmann and Antti Anttonen
- FL-LoRaMAC: A Novel Framework for Enabling On-Device Learning for LoRa-Based IoT Applications pp. 1-27

- Shobhit Aggarwal and Asis Nasipuri
- Automatic Short Text Summarization Techniques in Social Media Platforms pp. 1-27

- Fahd A. Ghanem, M. C. Padma and Ramez Alkhatib
- Analysis of Program Representations Based on Abstract Syntax Trees and Higher-Order Markov Chains for Source Code Classification Task pp. 1-28

- Artyom V. Gorchakov, Liliya A. Demidova and Peter N. Sovietov
- Proof of Flow: A Design Pattern for the Green Energy Market pp. 1-23

- Valerio Mandarino, Giuseppe Pappalardo and Emiliano Tramontana
- Evaluation of Blockchain Networks’ Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks pp. 1-23

- Kithmini Godewatte Arachchige, Philip Branch and Jason But
- Prospects of Cybersecurity in Smart Cities pp. 1-21

- Fernando Almeida
- Hospital Readmission and Length-of-Stay Prediction Using an Optimized Hybrid Deep Model pp. 1-21

- Alireza Tavakolian, Alireza Rezaee, Farshid Hajati and Shahadat Uddin
- Technical, Qualitative and Energy Analysis of Wireless Control Modules for Distributed Smart Home Systems pp. 1-21

- Andrzej Ożadowicz
- 3D Path Planning Algorithms in UAV-Enabled Communications Systems: A Mapping Study pp. 1-35

- Jorge Carvajal-Rodriguez, Marco Morales and Christian Tipantuña
Volume 15, issue 8, 2023
- A Survey on Pump and Dump Detection in the Cryptocurrency Market Using Machine Learning pp. 1-17

- Mohammad Javad Rajaei and Qusay H. Mahmoud
- An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks pp. 1-16

- Asad Iqbal, Muhammad Zubair, Muhammad Asghar Khan, Insaf Ullah, Ghani Ur-Rehman, Alexey V. Shvetsov and Fazal Noor
- LoRa Communication Using TVWS Frequencies: Range and Data Rate pp. 1-16

- Anjali R. Askhedkar, Bharat S. Chaudhari, Maha Abdelhaq, Raed Alsaqour, Rashid Saeed and Marco Zennaro
- An Efficient Adaptive Data-Link-Layer Architecture for LoRa Networks pp. 1-16

- Micael Coutinho, Jose A. Afonso and Sérgio F. Lopes
- An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network pp. 1-16

- Amthal K. Mousa and Mohammed Najm Abdullah
- RIS-Assisted Fixed NOMA: Outage Probability Analysis and Transmit Power Optimization pp. 1-18

- Vinoth Babu Kumaravelu, Agbotiname Lucky Imoize, Francisco R. Castillo Soria, Periyakarupan Gurusamy Sivabalan Velmurugan, Sundarrajan Jayaraman Thiruvengadam, Dinh-Thuan Do and Arthi Murugadass
- A Novel Approach for Fraud Detection in Blockchain-Based Healthcare Networks Using Machine Learning pp. 1-18

- Mohammed A. Mohammed, Manel Boujelben and Mohamed Abid
- A Comparative Analysis of High Availability for Linux Container Infrastructures pp. 1-19

- Marek Šimon, Ladislav Huraj and Nicolas Búčik
- Applying Machine Learning in Cloud Service Price Prediction: The Case of Amazon IaaS pp. 1-19

- George Fragiadakis, Evangelia Filiopoulou, Christos Michalakelis, Thomas Kamalakis and Mara Nikolaidou
- Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms pp. 1-19

- Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma
- Intelligent Transmit Antenna Selection Schemes for High-Rate Fully Generalized Spatial Modulation pp. 1-19

- Hindavi Kishor Jadhav, Vinoth Babu Kumaravelu, Arthi Murugadass, Agbotiname Lucky Imoize, Poongundran Selvaprabhu and Arunkumar Chandrasekhar
- Efficient Integration of Heterogeneous Mobility-Pollution Big Data for Joint Analytics at Scale with QoS Guarantees pp. 1-28

- Isam Mashhour Al Jawarneh, Luca Foschini and Paolo Bellavista
- A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M pp. 1-28

- Luis F. Gonzalez, Ivan Vidal, Francisco Valera, Raul Martin and Dulce Artalejo
- Towards Efficient Resource Allocation for Federated Learning in Virtualized Managed Environments pp. 1-26

- Fotis Nikolaidis, Moysis Symeonides and Demetris Trihinas
- Features and Scope of Regulatory Technologies: Challenges and Opportunities with Industrial Internet of Things pp. 1-27

- Jinying Li, Ananda Maiti and Jiangang Fei
- Task Allocation Methods and Optimization Techniques in Edge Computing: A Systematic Review of the Literature pp. 1-30

- Vasilios Patsias, Petros Amanatidis, Dimitris Karampatzakis, Thomas Lagkas, Kalliopi Michalakopoulou and Alexandros Nikitas
- An Overview of WebAssembly for IoT: Background, Tools, State-of-the-Art, Challenges, and Future Directions pp. 1-77

- Partha Pratim Ray
- Enhancing Network Security: A Machine Learning-Based Approach for Detecting and Mitigating Krack and Kr00k Attacks in IEEE 802.11 pp. 1-21

- Zaher Salah and Esraa Abu Elsoud
- Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT) pp. 1-21

- Anand Singh Rajawat, S. B. Goyal, Pradeep Bedi, Tony Jan, Md Whaiduzzaman and Mukesh Prasad
- Virtual Grid-Based Routing for Query-Driven Wireless Sensor Networks pp. 1-13

- Shushant Kumar Jain, Rinkoo Bhatia, Neeraj Shrivastava, Sharad Salunke, Mohammad Farukh Hashmi and Neeraj Dhanraj Bokde
- Intelligent Caching with Graph Neural Network-Based Deep Reinforcement Learning on SDN-Based ICN pp. 1-20

- Jiacheng Hou, Tianhao Tao, Haoye Lu and Amiya Nayak
- Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps pp. 1-20

- Mishall Al-Zubaidie and Ghanima Sabr Shyaa
- Special Issue on Security and Privacy in Blockchains and the IoT Volume II pp. 1-7

- Christoph Stach and Clémentine Gritti
- The mPOC Framework: An Autonomous Outbreak Prediction and Monitoring Platform Based on Wearable IoMT Approach pp. 1-25

- Sasan Adibi
- The Meta-Metaverse: Ideation and Future Directions pp. 1-31

- Mohammad (Behdad) Jamshidi, Arash Dehghaniyan Serej, Alireza Jamshidi and Omid Moztarzadeh
- A Review of ARIMA vs. Machine Learning Approaches for Time Series Forecasting in Data Driven Networks pp. 1-31

- Vaia I. Kontopoulou, Athanasios D. Panagopoulos, Ioannis Kakkos and George K. Matsopoulos
- Cluster-Based Data Aggregation in Flying Sensor Networks Enabled Internet of Things pp. 1-24

- Abdu Salam, Qaisar Javaid, Masood Ahmad, Ishtiaq Wahid and Muhammad Yeasir Arafat
- SEDIA: A Platform for Semantically Enriched IoT Data Integration and Development of Smart City Applications pp. 1-38

- Dimitrios Lymperis and Christos Goumopoulos
- Real-World Implementation and Integration of an Automatic Scoring System for Workplace Safety Courses in Italian pp. 1-22

- Nicola Arici, Alfonso Emilio Gerevini, Matteo Olivato, Luca Putelli, Luca Sigalini and Ivan Serina
- The Power of Generative AI: A Review of Requirements, Models, Input–Output Formats, Evaluation Metrics, and Challenges pp. 1-60

- Ajay Bandi, Pydi Venkata Satya Ramesh Adapa and Yudu Eswar Vinay Pratap Kumar Kuchi
- An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things pp. 1-14

- Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz and Nisreen Innab
- Mapping EEG Alpha Activity: Assessing Concentration Levels during Player Experience in Virtual Reality Video Games pp. 1-14

- Jesus GomezRomero-Borquez, J. Alberto Del Puerto-Flores and Carolina Del-Valle-Soto
- Correlation Analysis Model of Environment Parameters Using IoT Framework in a Biogas Energy Generation Context pp. 1-14

- Angelique Mukasine, Louis Sibomana, Kayalvizhi Jayavel, Kizito Nkurikiyeyezu and Eric Hitimana
Volume 15, issue 7, 2023
- Secure Partitioning of Cloud Applications, with Cost Look-Ahead pp. 1-38

- Alessandro Bocci, Stefano Forti, Roberto Guanciale, Gian-Luigi Ferrari and Antonio Brogi
- Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects pp. 1-20

- Andrea Pinna, Maria Ilaria Lunesu, Stefano Orrù and Roberto Tonelli
- Acoustic TDOA Measurement and Accurate Indoor Positioning for Smartphone pp. 1-20

- Bingbing Cheng and Jiao Wu
- Hybridizing Fuzzy String Matching and Machine Learning for Improved Ontology Alignment pp. 1-31

- Mohammed Suleiman Mohammed Rudwan and Jean Vincent Fonou-Dombeu
- Cache-Enabled Adaptive Video Streaming: A QoE-Based Evaluation Study pp. 1-23

- Eirini Liotou, Dionysis Xenakis, Vasiliki Georgara, Georgios Kourouniotis and Lazaros Merakos
- Optimization of the Decision Criterion for Increasing the Bandwidth Utilization by Means of the Novel Effective DBA Algorithm in NG-PON2 Networks pp. 1-13

- Rastislav Róka
- Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis pp. 1-21

- Ikram Karabila, Nossayba Darraz, Anas El-Ansari, Nabil Alami and Mostafa El Mallahi
- Unveiling the Landscape of Operating System Vulnerabilities pp. 1-21

- Manish Bhurtel and Danda B. Rawat
- Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools pp. 1-42

- Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali
- Bus Travel Time Prediction Based on the Similarity in Drivers’ Driving Styles pp. 1-18

- Zhenzhong Yin and Bin Zhang
- Exploiting Misconfiguration Vulnerabilities in Microsoft’s Azure Active Directory for Privilege Escalation Attacks pp. 1-18

- Ibrahim Bu Haimed, Marwan Albahar and Ali Alzubaidi
- Synonyms, Antonyms and Factual Knowledge in BERT Heads pp. 1-18

- Lorenzo Serina, Luca Putelli, Alfonso Emilio Gerevini and Ivan Serina
- Intelligent Video Streaming at Network Edge: An Attention-Based Multiagent Reinforcement Learning Solution pp. 1-18

- Xiangdong Tang, Fei Chen and Yunlong He
- Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22 pp. 1-18

- Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Michael Plain, Jadarius Hill and Marshall Elam
- Analysis of ICS and SCADA Systems Attacks Using Honeypots pp. 1-17

- Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
- Machine Learning for Network Intrusion Detection—A Comparative Study pp. 1-17

- Mustafa Al Lail, Alejandro Garcia and Saul Olivo
- Heart DT: Monitoring and Preventing Cardiac Pathologies Using AI and IoT Sensors pp. 1-16

- Roberta Avanzato, Francesco Beritelli, Alfio Lombardo and Carmelo Ricci
- Assisting Drivers at Stop Signs in a Connected Vehicle Environment pp. 1-16

- Maram Bani Younes
- An IoT System and MODIS Images Enable Smart Environmental Management for Mekong Delta pp. 1-16

- Vu Hien Phan, Danh Phan Hong Pham, Tran Vu Pham, Kashif Naseer Qureshi and Cuong Pham-Quoc
- A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network pp. 1-16

- Yang Hu, Liangliang Gong, Xinyang Li, Hui Li, Ruoxin Zhang and Rentao Gu
- Artificial Intelligence in Virtual Telemedicine Triage: A Respiratory Infection Diagnosis Tool with Electronic Measuring Device pp. 1-29

- Naythan Villafuerte, Santiago Manzano, Paulina Ayala and Marcelo V. García
- An Ontology for Spatio-Temporal Media Management and an Interactive Application pp. 1-34

- Takuro Sone, Shin Kato, Ray Atarashi, Jin Nakazato, Manabu Tsukada and Hiroshi Esaki
- Developments of Computer Vision and Image Processing: Methodologies and Applications pp. 1-3

- Manuel J. C. S. Reis
- KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments pp. 1-26

- Giorgio Dell’Immagine, Jacopo Soldani and Antonio Brogi
- A New AI-Based Semantic Cyber Intelligence Agent pp. 1-27

- Fahim Sufi
- Beyond the Semantic Web: Towards an Implicit Pragmatic Web and a Web of Social Representations pp. 1-27

- Yannis Haralambous and Philippe Lenca
- A Cyber-Physical System for Wildfire Detection and Firefighting pp. 1-28

- Pietro Battistoni, Andrea Antonio Cantone, Gerardo Martino, Valerio Passamano, Marco Romano, Monica Sebillo and Giuliana Vitiello
- An Accurate Platform for Investigating TCP Performance in Wi-Fi Networks pp. 1-19

- Shunji Aoyagi, Yuki Horie, Do Thi Thu Hien, Thanh Duc Ngo, Duy-Dinh Le, Kien Nguyen and Hiroo Sekiya
Volume 15, issue 6, 2023
- Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches pp. 1-16

- Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
- Research on Blockchain Data Availability and Storage Scalability pp. 1-16

- Honghao Si and Baoning Niu
- PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks pp. 1-18

- Ernesto Cadena Muñoz, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno and Mónica Espinosa Buitrago
- Digital Art and the Metaverse: Benefits and Challenges pp. 1-17

- William Hurst, Orestis Spyrou, Bedir Tekinerdogan and Caspar Krampe
- In-Depth Co-Design of Mental Health Monitoring Technologies by People with Lived Experience pp. 1-17

- Bronwin Patrickson, Mike Musker, Dan Thorpe, Yasmin van Kasteren, Niranjan Bidargaddi and The Consumer and Carer Advisory Group (CCAG)
- RSSI and Device Pose Fusion for Fingerprinting-Based Indoor Smartphone Localization Systems pp. 1-17

- Imran Moez Khan, Andrew Thompson, Akram Al-Hourani, Kandeepan Sithamparanathan and Wayne S. T. Rowe
- Anomaly Detection for Hydraulic Power Units—A Case Study pp. 1-29

- Paweł Fic, Adam Czornik and Piotr Rosikowski
- Searching Online for Art and Culture: User Behavior Analysis pp. 1-29

- Minas Pergantis, Iraklis Varlamis, Nikolaos Grigorios Kanellopoulos and Andreas Giannakoulopoulos
- Synchronizing Many Filesystems in Near Linear Time pp. 1-26

- Elod P. Csirmaz and Laszlo Csirmaz
- Methods of Annotating and Identifying Metaphors in the Field of Natural Language Processing pp. 1-28

- Martina Ptiček and Jasminka Dobša
- S2NetM: A Semantic Social Network of Things Middleware for Developing Smart and Collaborative IoT-Based Solutions pp. 1-27

- Antonios Pliatsios, Dimitrios Lymperis and Christos Goumopoulos
- Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review pp. 1-45

- Shereen Ismail, Diana W. Dawoud and Hassan Reza
- Elastic Stack and GRAPHYP Knowledge Graph of Web Usage: A Win–Win Workflow for Semantic Interoperability in Decision Making pp. 1-19

- Otmane Azeroual, Renaud Fabre, Uta Störl and Ruidong Qi
- Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions pp. 1-19

- Muneerah Al Asqah and Tarek Moulahi
- A DQN-Based Multi-Objective Participant Selection for Efficient Federated Learning pp. 1-19

- Tongyang Xu, Yuan Liu, Zhaotai Ma, Yiqiang Huang and Peng Liu
- BERT4Loc: BERT for Location—POI Recommender System pp. 1-19

- Syed Raza Bashir, Shaina Raza and Vojislav B. Misic
- Dual-Channel Feature Enhanced Collaborative Filtering Recommendation Algorithm pp. 1-19

- Yuanyou Ou and Baoning Niu
- Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow pp. 1-19

- Kai Lehniger and Peter Langendörfer
- Optimal Meshing Degree Performance Analysis in a mmWave FWA 5G Network Deployment pp. 1-19

- Iffat Gheyas, Alessandro Raschella and Michael Mackay
- From NFT 1.0 to NFT 2.0: A Review of the Evolution of Non-Fungible Tokens pp. 1-23

- Barbara Guidi and Andrea Michienzi
- Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms pp. 1-30

- Ashish Koirala, Rabindra Bista and Joao C. Ferreira
- 2D Semantic Segmentation: Recent Developments and Future Directions pp. 1-35

- Yu Guo, Guigen Nie, Wenliang Gao and Mi Liao
- Feature Construction Using Persistence Landscapes for Clustering Noisy IoT Time Series pp. 1-13

- Renjie Chen and Nalini Ravishanker
- How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations? pp. 1-21

- Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang
- Neural Network Exploration for Keyword Spotting on Edge Devices pp. 1-21

- Jacob Bushur and Chao Chen
- Mitigating Technological Anxiety through the Application of Natural Interaction in Mixed Reality Systems pp. 1-15

- Yiming Sun and Tatsuo Nakajima
- Task Automation Intelligent Agents: A Review pp. 1-20

- Abdul Wali, Saipunidzam Mahamad and Suziah Sulaiman
- A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards pp. 1-25

- Khaled A. M. Ahmed, Sabry F. Saraya, John F. Wanis and Amr M. T. Ali-Eldin
- ChatGPT and Open-AI Models: A Preliminary Review pp. 1-24

- Konstantinos I. Roumeliotis and Nikolaos D. Tselikas
- Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey pp. 1-24

- Abubakar Ahmad Musa, Adamu Hussaini, Weixian Liao, Fan Liang and Wei Yu
- Avoiding Detection by Hostile Nodes in Airborne Tactical Networks pp. 1-24

- Dragos Ilie, Håkan Grahn, Lars Lundberg, Alexander Westerhagen, Bo Granbom and Anders Höök
- Research and Design of a Decentralized Edge-Computing-Assisted LoRa Gateway pp. 1-14

- Han Gao, Zhangqin Huang, Xiaobo Zhang and Huapeng Yang
- Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware pp. 1-22

- Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters and Seyit Camtepe
Volume 15, issue 5, 2023
- Watermarking Protocols: A Short Guide for Beginners pp. 1-15

- Franco Frattolillo
- Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks pp. 1-15

- Fahad M. Alotaibi and Vassilios G. Vassilakis
- Chinese Short-Text Sentiment Prediction: A Study of Progressive Prediction Techniques and Attentional Fine-Tuning pp. 1-20

- Jinlong Wang, Dong Cui and Qiang Zhang
- Mobile Application for Real-Time Food Plan Management for Alzheimer Patients through Design-Based Research pp. 1-20

- Rui P. Duarte, Carlos A. S. Cunha and Valter N. N. Alves
- Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA pp. 1-20

- Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang
- Theory and Applications of Web 3.0 in the Media Sector pp. 1-10

- Charalampos A. Dimoulas and Andreas Veglis
- The Future of the Human–Machine Interface (HMI) in Society 5.0 pp. 1-25

- Dimitris Mourtzis, John Angelopoulos and Nikos Panopoulos
- A Review on Deep-Learning-Based Cyberbullying Detection pp. 1-47

- Md. Tarek Hasan, Md. Al Emran Hossain, Md. Saddam Hossain Mukta, Arifa Akter, Mohiuddin Ahmed and Salekul Islam
- Online Privacy Fatigue: A Scoping Review and Research Agenda pp. 1-31

- Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday
- Blockchain-Based Loyalty Management System pp. 1-24

- André F. Santos, José Marinho and Jorge Bernardino
- Distributed Average Consensus Algorithms in d-Regular Bipartite Graphs: Comparative Study pp. 1-24

- Martin Kenyeres and Jozef Kenyeres
- Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload pp. 1-14

- Raman Singh, Zeeshan Pervez and Hitesh Tewari
- Securing UAV Flying Base Station for Mobile Networking: A Review pp. 1-14

- Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim and Jinoh Kim
- A Hybrid Text Generation-Based Query Expansion Method for Open-Domain Question Answering pp. 1-14

- Wenhao Zhu, Xiaoyu Zhang, Qiuhong Zhai and Chenyun Liu
- Predicting Football Team Performance with Explainable AI: Leveraging SHAP to Identify Key Team-Level Performance Metrics pp. 1-18

- Serafeim Moustakidis, Spyridon Plakias, Christos Kokkotis, Themistoklis Tsatalas and Dimitrios Tsaopoulos
- A Context-Aware Edge Computing Framework for Smart Internet of Things pp. 1-16

- Abdelkarim Ben Sada, Abdenacer Naouri, Amar Khelloufi, Sahraoui Dhelim and Huansheng Ning
- Domain Adaptation Speech-to-Text for Low-Resource European Portuguese Using Deep Learning pp. 1-16

- Eduardo Medeiros, Leonel Corado, Luís Rato, Paulo Quaresma and Pedro Salgueiro
- Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs pp. 1-16

- Yufeng Li, Mengxiao Liu, Chenhong Cao and Jiangtao Li
- A Reverse Shortest Path Tree-Based Multicast Joining Node Selection Method pp. 1-17

- Zhenyu Tian, Jiali You and Linlin Hu
- NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data Networking pp. 1-17

- Ahmed Benmoussa, Chaker Abdelaziz Kerrache, Carlos T. Calafate and Nasreddine Lagraa
- Benchmarking Change Detector Algorithms from Different Concept Drift Perspectives pp. 1-17

- Guilherme Yukio Sakurai, Jessica Fernandes Lopes, Bruno Bogaz Zarpelão and Sylvio Barbon Junior
- A Distributed Sensor System Based on Cloud-Edge-End Network for Industrial Internet of Things pp. 1-17

- Mian Wang, Cong’an Xu, Yun Lin, Zhiyi Lu, Jinlong Sun and Guan Gui
- Blockchain Solution for Buildings’ Multi-Energy Flexibility Trading Using Multi-Token Standards pp. 1-17

- Oana Marin, Tudor Cioara and Ionut Anghel
- Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs pp. 1-17

- Anas Abu Taleb, Qasem Abu Al-Haija and Ammar Odeh
- 5G-MEC Testbeds for V2X Applications pp. 1-32

- Prachi V. Wadatkar, Rosario G. Garroppo and Gianfranco Nencioni
- Machine Failure Prediction Using Survival Analysis pp. 1-26

- Dimitris Papathanasiou, Konstantinos Demertzis and Nikos Tziritas
- Extending Learning and Collaboration in Quantum Information with Internet Support: A Future Perspective on Research Education beyond Boundaries, Limitations, and Frontiers pp. 1-27

- Francisco Delgado
- Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection pp. 1-27

- Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
- Future Internet Architectures on an Emerging Scale—A Systematic Review pp. 1-28

- Sarfaraz Ahmed Mohammed and Anca L. Ralescu
- Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology pp. 1-28

- Ayodeji Falayi, Qianlong Wang, Weixian Liao and Wei Yu
- Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems pp. 1-19

- Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage, Eckhard Pfluegel and Christos Politis
- Deep Reinforcement Learning-Based Video Offloading and Resource Allocation in NOMA-Enabled Networks pp. 1-19

- Siyu Gao, Yuchen Wang, Nan Feng, Zhongcheng Wei and Jijun Zhao
- Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques pp. 1-23

- Luis Alberto Martínez Hernández, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
- System Performance Analysis of Sensor Networks for RF Energy Harvesting and Information Transmission pp. 1-13

- Kuncheng Lei and Zhenrong Zhang
- Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment pp. 1-35

- Agbotiname Lucky Imoize, Friday Udeji, Joseph Isabona and Cheng-Chi Lee
Volume 15, issue 4, 2023
- Future of Drug Discovery: The Synergy of Edge Computing, Internet of Medical Things, and Deep Learning pp. 1-15

- Mohammad (Behdad) Jamshidi, Omid Moztarzadeh, Alireza Jamshidi, Ahmed Abdelgawad, Ayman S. El-Baz and Lukas Hauer
- A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm pp. 1-20

- Jiaqi Zhao, Ming Xu, Yunzhi Chen and Guoliang Xu
- A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure pp. 1-20

- Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
- A Highly Interactive Honeypot-Based Approach to Network Threat Management pp. 1-31

- Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao
- Emerging Technologies and Their Link to Digital Competence in Teaching pp. 1-12

- Miguel Ángel García-Delgado, Sonia Rodríguez-Cano, Vanesa Delgado-Benito and María Lozano-Álvarez
- Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks pp. 1-24

- Sikha Bagui, Dustin Mink, Subhash Bagui, Sakthivel Subramaniam and Daniel Wallace
- A Multiverse Graph to Help Scientific Reasoning from Web Usage: Interpretable Patterns of Assessor Shifts in GRAPHYP pp. 1-24

- Renaud Fabre, Otmane Azeroual, Joachim Schöpfel, Patrice Bellot and Daniel Egret
- A Novel Multi-Cell Interference-Aware Cooperative QoS-Based NOMA Group D2D System pp. 1-14

- Muhammad Amish Hasan, Tanveer Ahmad, Asim Anwar, Salman Siddiq, Abdul Malik, Waseem Nazar and Imran Razzaq
- A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part pp. 1-14

- Kongpei Wu, Huiqin Qu and Conggui Huang
- Effective IoT Congestion Control Algorithm pp. 1-14

- Husam H. Hasan and Zainab T. Alisa
- Contrastive Refinement for Dense Retrieval Inference in the Open-Domain Question Answering Task pp. 1-14

- Qiuhong Zhai, Wenhao Zhu, Xiaoyu Zhang and Chenyun Liu
- Distributed Systems for Emerging Computing: Platform and Application pp. 1-2

- Xu Wang, Bin Shi and Yili Fang
- Post-Digital Learning for Rural Development: A Case Study of Open Biotec MOOCs in Colombia pp. 1-29

- Carlos Ocampo-López, Oscar Muñoz-Blandón, Leidy Rendón-Castrillón and Margarita Ramírez-Carmona
- A Replica-Selection Algorithm Based on Transmission Completion Time Estimation in ICN pp. 1-18

- Zhiyuan Wang, Hong Ni and Rui Han
- Insights into How Vietnamese Retailers Utilize Social Media to Facilitate Knowledge Creation through the Process of Value Co-Creation pp. 1-18

- Peter R. J. Trim, Yang-Im Lee and An Vu
- Influential Factors in the Design and Development of a Sustainable Web3/Metaverse and Its Applications pp. 1-18

- Reza Aria, Norm Archer, Moein Khanlari and Bharat Shah
- Study of Coded ALOHA with Multi-User Detection under Heavy-Tailed and Correlated Arrivals pp. 1-18

- María E. Sousa-Vieira and Manuel Fernández-Veiga
- SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning pp. 1-18

- Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma
- Performance Evaluation of a Lane Correction Module Stress Test: A Field Test of Tesla Model 3 pp. 1-18

- Jonathan Lancelot, Bhaskar P. Rimal and Edward M. Dennis
- Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems pp. 1-18

- Mazen Gazzan and Frederick T. Sheldon
- A Multipath Data-Scheduling Strategy Based on Path Correlation for Information-Centric Networking pp. 1-18

- Yong Xu, Hong Ni and Xiaoyong Zhu
- A Deep Learning Approach to Detect Failures in Bridges Based on the Coherence of Signals pp. 1-16

- Francesco Morgan Bono, Luca Radicioni, Simone Cinquemani, Lorenzo Benedetti, Gabriele Cazzulani, Claudio Somaschini and Marco Belloli
- Banging Interaction: A Ubimus-Design Strategy for the Musical Internet pp. 1-17

- Damián Keller, Azeema Yaseen, Joseph Timoney, Sutirtha Chakraborty and Victor Lazzarini
- A Comparative Study of Single and Multi-Stage Forecasting Algorithms for the Prediction of Electricity Consumption Using a UK-National Health Service (NHS) Hospital Dataset pp. 1-17

- Ahmad Taha, Basel Barakat, Mohammad M. A. Taha, Mahmoud A. Shawky, Chun Sing Lai, Sajjad Hussain, Muhammad Zainul Abideen and Qammer H. Abbasi
- Implementing GDPR-Compliant Surveys Using Blockchain pp. 1-17

- Ricardo Martins Gonçalves, Miguel Mira da Silva and Paulo Rupino da Cunha
- Consumer’s Attitude towards Display Google Ads pp. 1-19

- Mohammad Al Khasawneh, Abdel-Aziz Ahmad Sharabati, Shafig Al-Haddad, Rania Al-Daher, Sarah Hammouri and Sima Shaqman
- Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions pp. 1-19

- Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang
- PVPBC: Privacy and Verifiability Preserving E-Voting Based on Permissioned Blockchain pp. 1-27

- Muntadher Sallal, Ruairí de Fréin and Ali Malik
- Towards a Reference Architecture for Cargo Ports pp. 1-32

- Virginia M. Romero and Eduardo B. Fernandez
- Developing a Virtual World for an Open-House Event: A Metaverse Approach pp. 1-23

- Keattikorn Samarnggoon, Supara Grudpan, Noppon Wongta and Konlawat Klaynak
- Transforming IoT Events to Meaningful Business Events on the Edge: Implementation for Smart Farming Application pp. 1-23

- Dimitris Gkoulis, Cleopatra Bardaki, George Kousiouris and Mara Nikolaidou
- Addressing ZSM Security Issues with Blockchain Technology pp. 1-21

- Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou
- Target-Oriented Data Annotation for Emotion and Sentiment Analysis in Tourism Related Social Media Data pp. 1-21

- Alireza Alaei, Ying Wang, Vinh Bui and Bela Stantic
- View Synthesis with Scene Recognition for Cross-View Image Localization pp. 1-13

- Uddom Lee, Peng Jiang, Hongyi Wu and Chunsheng Xin
- Applying Patient Segmentation Using Primary Care Electronic Medical Records to Develop a Virtual Peer-to-Peer Intervention for Patients with Type 2 Diabetes pp. 1-13

- Alessia Paglialonga, Rebecca Theal, Bruce Knox, Robert Kyba, David Barber, Aziz Guergachi and Karim Keshavjee
Volume 15, issue 3, 2023
- Creation, Analysis and Evaluation of AnnoMI, a Dataset of Expert-Annotated Counselling Dialogues pp. 1-26

- Zixiu Wu, Simone Balloccu, Vivek Kumar, Rim Helaoui, Diego Reforgiato Recupero and Daniele Riboni
- A Petri Net Model for Cognitive Radio Internet of Things Networks Exploiting GSM Bands pp. 1-26

- Salvatore Serrano and Marco Scarpa
- BPMNE4IoT: A Framework for Modeling, Executing and Monitoring IoT-Driven Processes pp. 1-34

- Yusuf Kirikkayis, Florian Gallik, Michael Winter and Manfred Reichert
- IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning pp. 1-18

- Juan Wang, Jing Zhong and Jiangqi Li
- Artificial-Intelligence-Based Charger Deployment in Wireless Rechargeable Sensor Networks pp. 1-18

- Hsin-Hung Cho, Wei-Che Chien, Fan-Hsun Tseng and Han-Chieh Chao
- Relational Action Bank with Semantic–Visual Attention for Few-Shot Action Recognition pp. 1-16

- Haoming Liang, Jinze Du, Hongchen Zhang, Bing Han and Yan Ma
- Utilizing Random Forest with iForest-Based Outlier Detection and SMOTE to Detect Movement and Direction of RFID Tags pp. 1-16

- Ganjar Alfian, Muhammad Syafrudin, Norma Latif Fitriyani, Sahirul Alam, Dinar Nugroho Pratomo, Lukman Subekti, Muhammad Qois Huzyan Octava, Ninis Dyah Yulianingsih, Fransiskus Tatas Dwi Atmaji and Filip Benes
- When Operation Technology Meets Information Technology: Challenges and Opportunities pp. 1-16

- Davide Berardi, Franco Callegati, Andrea Giovine, Andrea Melis, Marco Prandini and Lorenzo Rinieri
- Research on Spaceborne Target Detection Based on Yolov5 and Image Compression pp. 1-17

- Qi Shi, Daheng Wang, Wen Chen, Jinpei Yu, Weiting Zhou, Jun Zou and Guangzu Liu
- Machine Learning for Data Center Optimizations: Feature Selection Using Shapley Additive exPlanation (SHAP) pp. 1-17

- Yibrah Gebreyesus, Damian Dalton, Sebastian Nixon, Davide De Chiara and Marta Chinnici
- Scope and Accuracy of Analytic and Approximate Results for FIFO, Clock-Based and LRU Caching Performance pp. 1-17

- Gerhard Hasslinger, Konstantinos Ntougias, Frank Hasslinger and Oliver Hohlfeld
- A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks pp. 1-17

- Jingsha He, Yue Li and Nafei Zhu
- A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework pp. 1-13

- Karen Schnell, Kaushik Roy and Madhuri Siddula
- Data Protection and Multi-Database Data-Driven Models pp. 1-13

- Lili Jiang and Vicenç Torra
- DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs pp. 1-21

- Juergen Mangler, Joscha Grüger, Lukas Malburg, Matthias Ehrendorfer, Yannis Bertrand, Janik-Vasily Benzin, Stefanie Rinderle-Ma, Estefania Serral Asensio and Ralph Bergmann
- Integrating a Blockchain-Based Governance Framework for Responsible AI pp. 1-21

- Rameez Asif, Syed Raheel Hassan and Gerard Parr
- A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber–Physical Attacks pp. 1-23

- Konstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor and Daniel P. McCrum
- A Mobile-Based System for Detecting Ginger Leaf Disorders Using Deep Learning pp. 1-23

- Hamna Waheed, Waseem Akram, Saif ul Islam, Abdul Hadi, Jalil Boudjadar and Noureen Zafar
- HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain pp. 1-23

- Leina Abdelgalil and Mohamed Mejri
- Dealing with Deadlocks in Industrial Multi Agent Systems pp. 1-25

- František Čapkovič
- Beamforming Based on a SSS Angle Estimation Algorithm for 5G NR Networks pp. 1-15

- Daniel Andrade, Roberto Magueta, Adão Silva and Paulo Marques
- Co-Design, Development, and Evaluation of a Health Monitoring Tool Using Smartwatch Data: A Proof-of-Concept Study pp. 1-15

- Ruhi Kiran Bajaj, Rebecca Mary Meiring and Fernando Beltran
- Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network pp. 1-15

- Raman Singh, Sean Sturley and Hitesh Tewari
- Complex Queries for Querying Linked Data pp. 1-20

- Hasna Boumechaal and Zizette Boufaida
- Indoor Occupancy Sensing via Networked Nodes (2012–2022): A Review pp. 1-20

- Muhammad Emad-Ud-Din and Ya Wang
- Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms pp. 1-20

- Denis Rangelov, Philipp Lämmel, Lisa Brunzel, Stephan Borgert, Paul Darius, Nikolay Tcholtchev and Michell Boerger
- Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme pp. 1-33

- Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee and Chun-Ta Li
- Optimizing Task Execution: The Impact of Dynamic Time Quantum and Priorities on Round Robin Scheduling pp. 1-14

- Mansoor Iqbal, Zahid Ullah, Izaz Ahmad Khan, Sheraz Aslam, Haris Shaheer, Mujtaba Humayon, Muhammad Asjad Salahuddin and Adeel Mehmood
- Quantum Computing for Healthcare: A Review pp. 1-36

- Raihan Ur Rasool, Hafiz Farooq Ahmad, Wajid Rafique, Adnan Qayyum, Junaid Qadir and Zahid Anwar
- A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method pp. 1-22

- Habiba Sultana, A. H. M. Kamal, Gahangir Hossain and Muhammad Ashad Kabir
- CvAMoS—Event Abstraction Using Contextual Information pp. 1-22

- Gemma Di Federico and Andrea Burattin
- Fast Way to Predict Parking Lots Availability: For Shared Parking Lots Based on Dynamic Parking Fee System pp. 1-22

- Sheng-Ming Wang and Wei-Min Cheng
Volume 15, issue 2, 2023
- An Optimized Planning Tool for Microwave Terrestrial and Satellite Link Design pp. 1-21

- Eduardo Ferreira, Pedro Sebastião, Francisco Cercas, Carlos Sá Costa and Américo Correia
- Disruptive Technologies for Parliaments: A Literature Review pp. 1-21

- Dimitris Koryzis, Dionisis Margaris, Costas Vassilakis, Konstantinos Kotis and Dimitris Spiliotopoulos
- Im2Graph: A Weakly Supervised Approach for Generating Holistic Scene Graphs from Regional Dependencies pp. 1-21

- Swarnendu Ghosh, Teresa Gonçalves and Nibaran Das
- The Cloud-to-Edge-to-IoT Continuum as an Enabler for Search and Rescue Operations pp. 1-18

- Leonardo Militano, Adriana Arteaga, Giovanni Toffetti and Nathalie Mitton
- Redundancy Mitigation Mechanism for Collective Perception in Connected and Autonomous Vehicles pp. 1-17

- Wellington Lobato, Paulo Mendes, Denis Rosário, Eduardo Cerqueira and Leandro A. Villas
- Digitalization of Distribution Transformer Failure Probability Using Weibull Approach towards Digital Transformation of Power Distribution Systems pp. 1-17

- A. M. Sakura R. H. Attanayake and R. M. Chandima Ratnayake
- Smart Embedded System for Skin Cancer Classification pp. 1-17

- Pedro F. Durães and Mário P. Véstias
- Collaborative Storage and Resolution Method between Layers in Hierarchical ICN Name Resolution Systems pp. 1-17

- Yanxia Li and Yang Li
- Research Trends of the Internet of Things in Relation to Business Model Innovation: Results from Co-Word and Content Analyses pp. 1-17

- Atik Kulakli and Cenk Lacin Arikan
- Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence pp. 1-17

- Shadi AlZu’bi, Mohammad Elbes, Ala Mughaid, Noor Bdair, Laith Abualigah, Agostino Forestiero and Raed Abu Zitar
- The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process pp. 1-16

- Yonghong Chen, Lei Xun and Shibing Zhang
- Designing for the Metaverse: A Multidisciplinary Laboratory in the Industrial Design Program pp. 1-16

- Marina Ricci, Alessandra Scarcelli and Michele Fiorentino
- A Novel Multipath Transmission Scheme for Information-Centric Networking pp. 1-16

- Yong Xu, Hong Ni and Xiaoyong Zhu
- Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform pp. 1-29

- Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah
- Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense pp. 1-34

- Afnan Alotaibi and Murad A. Rassam
- An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs pp. 1-27

- Soukaina Bouarourou, Abderrahim Zannou, El Habib Nfaoui and Abdelhak Boulaalam
- On the Use of Knowledge Transfer Techniques for Biomedical Named Entity Recognition pp. 1-27

- Tahir Mehmood, Ivan Serina, Alberto Lavelli, Luca Putelli and Alfonso Gerevini
- From Service Composition to Mashup Editor: A Multiperspective Taxonomy pp. 1-32

- Abderrahmane Maaradji, Hakim Hacid and Assia Soukane
- A Model Based Framework for IoT-Aware Business Process Management pp. 1-28

- Paolo Bocciarelli, Andrea D’Ambrogio and Tommaso Panetti
- Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments pp. 1-19

- Paolo Bellavista, Mattia Fogli, Carlo Giannelli and Cesare Stefanelli
- Multi-Scale Audio Spectrogram Transformer for Classroom Teaching Interaction Recognition pp. 1-19

- Fan Liu and Jiandong Fang
- Development of a Vision-Based Unmanned Ground Vehicle for Mapping and Tennis Ball Collection: A Fuzzy Logic Approach pp. 1-19

- Masoud Latifinavid and Aydin Azizi
- A TOSCA-Based Conceptual Architecture to Support the Federation of Heterogeneous MSaaS Infrastructures pp. 1-24

- Paolo Bocciarelli and Andrea D’Ambrogio
- Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron pp. 1-24

- Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam
- Performance Assessment and Comparison of Deployment Options for 5G Millimeter Wave Systems pp. 1-12

- Evgeni Mokrov and Konstantin Samouylov
- Engineering Resource-Efficient Data Management for Smart Cities with Apache Kafka pp. 1-22

- Theofanis P. Raptis, Claudio Cicconetti, Manolis Falelakis, Grigorios Kalogiannis, Tassos Kanellos and Tomás Pariente Lobo
- Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods pp. 1-37

- Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal and Habib Hamam
- Attention-Enriched Mini-BERT Fake News Analyzer Using the Arabic Language pp. 1-14

- Husam M. Alawadh, Amerah Alabrah, Talha Meraj and Hafiz Tayyab Rauf
- A Simple Model of Knowledge Scaffolding Applied to Wikipedia Growth pp. 1-14

- Franco Bagnoli and Guido de Bonfioli Cavalcabo’
- Prediction of Energy Production Level in Large PV Plants through AUTO-Encoder Based Neural-Network (AUTO-NN) with Restricted Boltzmann Feature Extraction pp. 1-20

- Ganapathy Ramesh, Jaganathan Logeshwaran, Thangavel Kiruthiga and Jaime Lloret
- Optimal Mobility-Aware Wireless Edge Cloud Support for the Metaverse pp. 1-20

- Zhaohui Huang and Vasilis Friderikos
- Electric Drive with an Adaptive Controller and Wireless Communication System pp. 1-20

- Mateusz Malarczyk, Mateusz Zychlewicz, Radoslaw Stanislawski and Marcin Kaminski
- A Digital Twin Framework Embedded with POD and Neural Network for Flow Field Monitoring of Push-Plate Kiln pp. 1-20

- Pin Wu, Lulu Ji, Wenyan Yuan, Zhitao Liu and Tiantian Tang
- Envisioning Architecture of Metaverse Intensive Learning Experience (MiLEx): Career Readiness in the 21st Century and Collective Intelligence Development Scenario pp. 1-20

- Eman AbuKhousa, Mohamed Sami El-Tahawy and Yacine Atif
- Significance of Cross-Correlated QoS Configurations for Validating the Subjective and Objective QoE of Cloud Gaming Applications pp. 1-20

- Nafi Ahmad, Abdul Wahab, John Schormans and Ali Adib Arnab
- RingFFL: A Ring-Architecture-Based Fair Federated Learning Framework pp. 1-20

- Lu Han, Xiaohong Huang, Dandan Li and Yong Zhang
- I4.0I: A New Way to Rank How Involved a Company Is in the Industry 4.0 Era pp. 1-20

- Vitória Francesca Biasibetti Zilli, Cesar David Paredes Crovato, Rodrigo da Rosa Righi, Rodrigo Ivan Goytia Mejia, Giovani Pesenti and Dhananjay Singh
- Perception of the Use of Virtual Reality Didactic Tools among Faculty in Mexico pp. 1-15

- Álvaro Antón-Sancho, Pablo Fernández-Arias and Diego Vergara
- Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration pp. 1-49

- Christoph Stach
- Vision, Enabling Technologies, and Scenarios for a 6G-Enabled Internet of Verticals (6G-IoV) pp. 1-10

- Maziar Nekovee and Ferheen Ayaz
- Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations pp. 1-31

- Eddy Truyen, Hongjie Xie and Wouter Joosen
- An Interactive Method for Detection of Process Activity Executions from IoT Data pp. 1-31

- Ronny Seiger, Marco Franceschetti and Barbara Weber
- Optimal Pricing in a Rented 5G Infrastructure Scenario with Sticky Customers pp. 1-23

- Marta Flamini and Maurizio Naldi
- Forest Fire Detection and Notification Method Based on AI and IoT Approaches pp. 1-13

- Kuldoshbay Avazov, An Eui Hyun, Alabdulwahab Abrar Sami S, Azizbek Khaitov, Akmalbek Bobomirzaevich Abdusalomov and Young Im Cho
- Cognitive Software Defined Networking and Network Function Virtualization and Applications pp. 1-3

- Sachin Sharma and Avishek Nag
- Acknowledgment to the Reviewers of Future Internet in 2022 pp. 1-9

- Future Internet Editorial Office
Volume 15, issue 1, 2022
- Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain pp. 1-15

- Qian Yang, Suoping Li, Hongli Li and Weiru Chen
- Time Segmentation-Based Hybrid Caching in 5G-ICN Bearer Network pp. 1-15

- Ke Zhao, Rui Han and Xu Wang
- Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations pp. 1-15

- Leny Vinceslas, Safak Dogan, Srikumar Sundareshwar and Ahmet M. Kondoz
- A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network pp. 1-20

- Jiaxu Zhao, Binting Su, Xuli Rao and Zhide Chen
- A Novel NODE Approach Combined with LSTM for Short-Term Electricity Load Forecasting pp. 1-20

- Songtao Huang, Jun Shen, Qingquan Lv, Qingguo Zhou and Binbin Yong
- HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security pp. 1-20

- Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici
- Pedestrian Simulation with Reinforcement Learning: A Curriculum-Based Approach pp. 1-25

- Giuseppe Vizzari and Thomas Cecconello
- Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation pp. 1-25

- Teresa Gonçalves, Rute Veladas, Hua Yang, Renata Vieira, Paulo Quaresma, Paulo Infante, Cátia Sousa Pinto, João Oliveira, Maria Cortes Ferreira, Jéssica Morais, Ana Raquel Pereira, Nuno Fernandes and Carolina Gonçalves
- Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service pp. 1-24

- Jinze Du, Chengtai Gao and Tao Feng
- Evaluating the Perceived Quality of Mobile Banking Applications in Croatia: An Empirical Study pp. 1-24

- Tihomir Orehovački, Luka Blašković and Matej Kurevija
- Narrowband Internet-of-Things to Enhance the Vehicular Communications Performance pp. 1-12

- Qadri Hamarsheh, Omar Daoud, Mohammed Baniyounis and Ahlam Damati
- Adapting Recommendations on Environmental Education Programs pp. 1-12

- Katerina Kabassi, Anastasia Papadaki and Athanasios Botonis
- Blockchain, Quo Vadis? Recent Changes in Perspectives on the Application of Technology in Agribusiness pp. 1-14

- Geneci da Silva Ribeiro Rocha, Diego Durante Mühl, Hermenegildo Almeida Chingamba, Letícia de Oliveira and Edson Talamini
- Product Evaluation Prediction Model Based on Multi-Level Deep Feature Fusion pp. 1-16

- Qingyan Zhou, Hao Li, Youhua Zhang and Junhong Zheng
- Teachers’ Views on Integrating Augmented Reality in Education: Needs, Opportunities, Challenges and Recommendations pp. 1-18

- Maria Perifanou, Anastasios Economides and Stavros A. Nikou
- VR, AR, and 3-D User Interfaces for Measurement and Control pp. 1-3

- Annalisa Liccardo and Francesco Bonavolontà
- Drifting Streaming Peaks-Over-Threshold-Enhanced Self-Evolving Neural Networks for Short-Term Wind Farm Generation Forecast pp. 1-19

- Yunchuan Liu, Amir Ghasemkhani and Lei Yang
- A GIS-Based Hot and Cold Spots Detection Method by Extracting Emotions from Social Streams pp. 1-19

- Barbara Cardone, Ferdinando Di Martino and Vittorio Miraglia
- Ethereum-Based Information System for Digital Higher Education Registry and Verification of Student Achievement Documents pp. 1-19

- Yerlan Kistaubayev, Galimkair Mutanov, Madina Mansurova, Zhanna Saxenbayeva and Yassynzhan Shakan
- An Analysis of ML-Based Outlier Detection from Mobile Phone Trajectories pp. 1-19

- Francisco Melo Pereira and Rute C. Sofia
- Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks pp. 1-19

- Brent Pethers and Abubakar Bello
- Deep Reinforcement Learning Evolution Algorithm for Dynamic Antenna Control in Multi-Cell Configuration HAPS System pp. 1-19

- Siyuan Yang, Mondher Bouazizi, Tomoaki Ohtsuki, Yohei Shibata, Wataru Takabatake, Kenji Hoshino and Atsushi Nagate
- Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions pp. 1-27

- Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan
- A Multi-Agent Approach to Binary Classification Using Swarm Intelligence pp. 1-27

- Sean Grimes and David E. Breen
- Utility of Sharing Economy Principles in the Development of Applications Dedicated to Construction Cost Estimation pp. 1-26

- Adrian Sfichi, Eduard Zadobrischi, Narcisa Sfichi, Marian Bădeliță and Mihai Medrihan
- SmartGroup: A Tool for Small-Group Learning Activities pp. 1-26

- Haining Zhu, Na Li, Nitish Kumar Rai and John M. Carroll
- Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market pp. 1-11

- Bashar Igried, Atalla Fahed Al-Serhan, Ayoub Alsarhan, Mohammad Aljaidi and Amjad Aldweesh
- NewSQL Databases Assessment: CockroachDB, MariaDB Xpand, and VoltDB pp. 1-23

- Eduardo Pina, Filipe Sá and Jorge Bernardino
- Using Social Media & Sentiment Analysis to Make Investment Decisions pp. 1-23

- Ben Hasselgren, Christos Chrysoulas, Nikolaos Pitropakis and William J. Buchanan
- Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks pp. 1-21

- Sarantis Kalafatidis, Sotiris Skaperas, Vassilis Demiroglou, Lefteris Mamatas and Vassilis Tsaoussidis
- The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review pp. 1-21

- Khando Khando, M. Sirajul Islam and Shang Gao
- Transfer Functions and Linear Distortions in Ultra-Wideband Channels Faded by Rain in GeoSurf Satellite Constellations pp. 1-21

- Emilio Matricciani and Carlo Riva
- Image of a City through Big Data Analytics: Colombo from the Lens of Geo-Coded Social Media Data pp. 1-21

- Sandulika Abesinghe, Nayomi Kankanamge, Tan Yigitcanlar and Surabhi Pancholi
- Cost-Profiling Microservice Applications Using an APM Stack pp. 1-21

- Sjouke de Vries, Frank Blaauw and Vasilios Andrikopoulos
- Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking pp. 1-21

- Neamah S. Radam, Sufyan T. Faraj Al-Janabi and Khalid Sh. Jasim
- BART-IT: An Efficient Sequence-to-Sequence Model for Italian Text Summarization pp. 1-13

- Moreno La Quatra and Luca Cagliero
- A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph pp. 1-13

- Qiang Li
- Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things pp. 1-35

- Konstantinos Kotis, Stavros Stavrinos and Christos Kalloniatis
- Human–Machine Interaction through Advanced Haptic Sensors: A Piezoelectric Sensory Glove with Edge Machine Learning for Gesture and Object Recognition pp. 1-42

- Roberto De Fazio, Vincenzo Mariano Mastronardi, Matteo Petruzzi, Massimo De Vittorio and Paolo Visconti
| |