Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 12, issue 12, 2020
- Pat-in-the-Loop: Declarative Knowledge for Controlling Neural Networks pp. 1-12

- Dario Onorati, Pierfrancesco Tommasino, Leonardo Ranaldi, Francesca Fallucchi and Fabio Massimo Zanzotto
- Complex Cognitive Systems and Their Unconscious. Related Inspired Conjectures for Artificial Intelligence pp. 1-24

- Gianfranco Minati
- Role of Artificial Intelligence in Shaping Consumer Demand in E-Commerce pp. 1-14

- Laith T. Khrais
- An Analysis Method for Interpretability of CNN Text Classification Model pp. 1-14

- Peng Ce and Bao Tie
- Citizen Science on Twitter: Using Data Analytics to Understand Conversations and Networks pp. 1-22

- Suvodeep Mazumdar and Dhavalkumar Thakker
- Performance Analysis of Cache Based on Popularity and Class in Named Data Network pp. 1-22

- Leanna Vidya Yovita, Nana Rachmana Syambas, Ian Joseph Matheus Edward and Noriaki Kamiyama
- A Bayesian Approach Based on Bayes Minimum Risk Decision for Reliability Assessment of Web Service Composition pp. 1-20

- Yang Song, Yawen Wang and Dahai Jin
- Challenges and Possibilities of ICT-Mediated Assessment in Virtual Teaching and Learning Processes pp. 1-20

- Esperanza Milena Torres-Madroñero, Maria C. Torres-Madroñero and Luz Dary Ruiz Botero
- An Extended Car-Following Model Considering Generalized Preceding Vehicles in V2X Environment pp. 1-15

- Junyan Han, Jinglei Zhang, Xiaoyuan Wang, Yaqi Liu, Quanzheng Wang and Fusheng Zhong
- Before and after the Quarantine: An Approximate Study on the Psychological Impact of COVID-19 on the Italian Population during the Lockdown Period pp. 1-15

- Lorena Marotta, Andrea Pesce and Andrea Guazzini
- Interactions between Virtual Spaces and Schools: A Collective Case Study pp. 1-10

- Juan Miguel Martínez Martínez and Antonio Tudela Sancho
- Predictive Maintenance (PdM) Structure Using Internet of Things (IoT) for Mechanical Equipment Used into Hospitals in Rwanda pp. 1-23

- Irene Niyonambaza, Marco Zennaro and Alfred Uwitonze
- A Model for Creating Interactive eBooks for eLearning pp. 1-11

- Antonio Sarasa-Cabezuelo
- IgA Nephropathy Prediction in Children with Machine Learning Algorithms pp. 1-11

- Ping Zhang, Rongqin Wang and Nianfeng Shi
- About Rule-Based Systems: Single Database Queries for Decision Making pp. 1-13

- Piotr Artiemjew, Lada Rudikova and Oleg Myslivets
- Predicting Activities of Daily Living with Spatio-Temporal Information pp. 1-13

- Sook-Ling Chua, Lee Kien Foo and Hans W. Guesgen
- Keeping Models Consistent between Pretraining and Translation for Low-Resource Neural Machine Translation pp. 1-13

- Wenbo Zhang, Xiao Li, Yating Yang, Rui Dong and Gongxu Luo
- Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process pp. 1-21

- Muhammad Atiq Ur Rehman Tariq, Cheuk Yin Wai and Nitin Muttil
- Jointly Optimize the Residual Energy of Multiple Mobile Devices in the MEC–WPT System pp. 1-18

- Long Li, Gaochao Xu, Peng Liu, Yang Li and Jiaqi Ge
- EmuCD: An Emulator for Content Dissemination Protocols in Vehicular Networks pp. 1-18

- Ricardo Chaves, Carlos Senna, Miguel Luís, Susana Sargento, André Moreira, Diogo Recharte and Ricardo Matos
- A Review on Blockchain for the Internet of Medical Things: Definitions, Challenges, Applications, and Vision pp. 1-16

- Gioele Bigini, Valerio Freschi and Emanuele Lattanzi
- Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias pp. 1-16

- David Harborth and Sebastian Pape
- User Acceptance of Information Feed Advertising: A Hybrid Method Based on SEM and QCA pp. 1-17

- Jie Zhao and Can Yan
- Malware Classification Based on Shallow Neural Network pp. 1-17

- Pin Yang, Huiyu Zhou, Yue Zhu, Liang Liu and Lei Zhang
- Comparing Blockchain Standards and Recommendations pp. 1-17

- Lukas König, Yuliia Korobeinikova, Simon Tjoa and Peter Kieseberg
- Smart Site Diversity for a High Throughput Satellite System with Software-Defined Networking and a Virtual Network Function pp. 1-17

- Gandhimathi Velusamy and Ricardo Lent
- Proposal for a System Model for Offline Seismic Event Detection in Colombia pp. 1-17

- Julián Miranda, Angélica Flórez, Gustavo Ospina, Ciro Gamboa, Carlos Flórez and Miguel Altuve
- Risk Perceptions on Social Media Use in Norway pp. 1-40

- Philip Nyblom, Gaute Wangen and Vasileios Gkioulos
Volume 12, issue 11, 2020
- High Throughput Data Relay in UAV Wireless Networks pp. 1-14

- Fenyu Jiang and Chris Phillips
- Homogeneous Data Normalization and Deep Learning: A Case Study in Human Activity Classification pp. 1-14

- Ivan Miguel Pires, Faisal Hussain, Nuno M. Garcia, Petre Lameski and Eftim Zdravevski
- AT-Text: Assembling Text Components for Efficient Dense Scene Text Detection pp. 1-14

- Haiyan Li and Hongtao Lu
- Paranoid Transformer: Reading Narrative of Madness as Computational Approach to Creativity pp. 1-12

- Yana Agafonova, Alexey Tikhonov and Ivan P. Yamshchikov
- A Knowledge-Driven Multimedia Retrieval System Based on Semantics and Deep Features pp. 1-20

- Antonio Maria Rinaldi, Cristiano Russo and Cristian Tommasino
- A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter pp. 1-20

- Amgad Muneer and Suliman Mohamed Fati
- An Interoperable UMLS Terminology Service Using FHIR pp. 1-20

- Rishi Saripalle, Mehdi Sookhak and Mahboobeh Haghparast
- An Organized Repository of Ethereum Smart Contracts’ Source Codes and Metrics pp. 1-15

- Giuseppe Antonio Pierro, Roberto Tonelli and Michele Marchesi
- Digital Competence and Gender: Teachers in Training. A Case Study pp. 1-15

- Mario Grande- de-Prado, Ruth Cañón, Sheila García-Martín and Isabel Cantón
- ndnIoT-FC: IoT Devices as First-Class Traffic in Name Data Networks pp. 1-21

- Luís Gameiro, Carlos Senna and Miguel Luís
- Proposal and Investigation of an Artificial Intelligence (AI)-Based Cloud Resource Allocation Algorithm in Network Function Virtualization Architectures pp. 1-13

- Vincenzo Eramo, Francesco Giacinto Lavacca, Tiziana Catena and Paul Jaime Perez Salazar
- Geospatial Assessment of the Territorial Road Network by Fractal Method pp. 1-13

- Mikolaj Karpinski, Svitlana Kuznichenko, Nadiia Kazakova, Oleksii Fraze-Frazenko and Daniel Jancarczyk
- Portfolio Learning Based on Deep Learning pp. 1-13

- Wei Pan, Jide Li and Xiaoqiang Li
- Password Managers—It’s All about Trust and Transparency pp. 1-50

- Fahad Alodhyani, George Theodorakopoulos and Philipp Reinecke
- Learning a Hierarchical Global Attention for Image Classification pp. 1-11

- Kerang Cao, Jingyu Gao, Kwang-nam Choi and Lini Duan
- An Internet of Things (IoT) Acceptance Model. Assessing Consumer’s Behavior toward IoT Products and Applications pp. 1-23

- Maria Tsourela and Dafni-Maria Nerantzaki
- E-Marketplace as a Tool for the Revitalization of Portuguese Craft Industry: The Design Process in the Development of an Online Platform pp. 1-23

- Nuno Martins, Daniel Brandão, Heitor Alvelos and Sara Silva
- Monitoring and Support for Elderly People Using LoRa Communication Technologies: IoT Concepts and Applications pp. 1-30

- José Paulo Lousado and Sandra Antunes
- Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset pp. 1-19

- Ahmed Mahfouz, Abdullah Abuhussein, Deepak Venugopal and Sajjan Shiva
- Fog Computing for Smart Cities’ Big Data Management and Analytics: A Review pp. 1-28

- Elarbi Badidi, Zineb Mahrez and Essaid Sabir
- Pulverization in Cyber-Physical Systems: Engineering the Self-Organizing Logic Separated from Deployment pp. 1-28

- Roberto Casadei, Danilo Pianini, Andrea Placuzzi, Mirko Viroli and Danny Weyns
- From Mirrors to Free-Space Optical Communication—Historical Aspects in Data Transmission pp. 1-18

- Magdalena Garlinska, Agnieszka Pregowska, Karol Masztalerz and Magdalena Osial
- A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus pp. 1-18

- Vitor Nazário Coelho, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang and Igor Machado Coelho
- An Analysis of the Supply of Open Government Data pp. 1-18

- Alan Ponce and Raul Ponce Rodriguez
- An Improved Deep Belief Network Prediction Model Based on Knowledge Transfer pp. 1-18

- Yue Zhang and Fangai Liu
- A Probabilistic VDTN Routing Scheme Based on Hybrid Swarm-Based Approach pp. 1-18

- Youcef Azzoug, Abdelmadjid Boukra and Vasco N. G. J. Soares
- Failure Mode and Effect Analysis for Cyber-Physical Systems pp. 1-18

- João Oliveira, Gonçalo Carvalho, Bruno Cabral and Jorge Bernardino
- Digital Irrigated Agriculture: Towards a Framework for Comprehensive Analysis of Decision Processes under Uncertainty pp. 1-16

- Francesco Cavazza, Francesco Galioto, Meri Raggi and Davide Viaggi
- Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage pp. 1-17

- Furkan Paligu and Cihan Varol
- On the Modeling of Automotive Security: A Survey of Methods and Perspectives pp. 1-17

- Jingjing Hao and Guangsheng Han
Volume 12, issue 10, 2020
- NFV-Enabled Efficient Renewable and Non-Renewable Energy Management: Requirements and Algorithms pp. 1-31

- Christian Tipantuña and Xavier Hesselbach
- An Approach to Changing Competence Assessment for Human Resources in Expert Networks pp. 1-10

- Mikhail Petrov
- Digital Twin Conceptual Model within the Context of Internet of Things pp. 1-15

- A. R. Al-Ali, Ragini Gupta, Tasneem Zaman Batool, Taha Landolsi, Fadi Aloul and Ahmad Al Nabulsi
- An Efficient Resource Scheduling Strategy for V2X Microservice Deployment in Edge Servers pp. 1-15

- Yanjun Shi, Yijia Guo, Lingling Lv and Keshuai Zhang
- Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments with Eavesdropping Avoidance pp. 1-14

- Hailong Huang and Andrey V. Savkin
- Immigration as a Divisive Topic: Clusters and Content Diffusion in the Italian Twitter Debate pp. 1-22

- Salvatore Vilella, Mirko Lai, Daniela Paolotti and Giancarlo Ruffo
- Phishing Attacks Survey: Types, Vectors, and Technical Approaches pp. 1-37

- Rana Alabdan
- Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures pp. 1-27

- Guma Ali, Mussa Ally Dida and Anael Elikana Sam
- Policy-Engineering Optimization with Visual Representation and Separation-of-Duty Constraints in Attribute-Based Access Control pp. 1-28

- Wei Sun, Hui Su and Huacheng Xie
- The Value of Simple Heuristics for Virtualized Network Function Placement pp. 1-16

- Zahra Jahedi and Thomas Kunz
- An Internet of Things Model for Improving Process Management on University Campus pp. 1-16

- William Villegas-Ch, Xavier Palacios-Pacheco and Milton Román-Cañizares
- Tourist Behaviour Analysis Based on Digital Pattern of Life—An Approach and Case Study pp. 1-16

- Sergei Mikhailov and Alexey Kashevnik
- Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems pp. 1-16

- Niraj Thapa, Zhipeng Liu, Dukka B. Kc, Balakrishna Gokaraju and Kaushik Roy
- Visualization, Interaction and Analysis of Heterogeneous Textbook Resources pp. 1-16

- Christian Scheel, Francesca Fallucchi and Ernesto William De Luca
- A Survey of Defensive Measures for Digital Persecution in the Global South pp. 1-17

- Louis Edward Papa and Thaier Hayajneh
- Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User pp. 1-13

- Xin Song, Lin Xia, Siyang Xu and Yue Wang
- Research Trend on the Use of IT in Digital Addiction: An Investigation Using a Systematic Literature Review pp. 1-23

- Flourensia Sapty Rahayu, Lukito Edi Nugroho, Ridi Ferdiana and Djoko Budiyanto Setyohadi
- A Local Feature Engineering Strategy to Improve Network Anomaly Detection pp. 1-30

- Salvatore Carta, Alessandro Sebastian Podda, Diego Reforgiato Recupero and Roberto Saia
Volume 12, issue 9, 2020
- Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation pp. 1-12

- Max Ismailov, Michail Tsikerdekis and Sherali Zeadally
- Social Media, Quo Vadis? Prospective Development and Implications pp. 1-22

- Laura Studen and Victor Tiberius
- Design and Validation of a Questionnaire to Measure Future Spanish Teachers’ Perceptions of Cinema in Pre-School and Primary Education: Towards Active and Technological Learning pp. 1-15

- Alejandro Lorenzo-Lledó
- Expectations and limitations of Cyber-Physical Systems (CPS) for Advanced Manufacturing: A View from the Grinding Industry pp. 1-15

- Iñigo Pombo, Leire Godino, Jose Antonio Sánchez and Rafael Lizarralde
- An Empirical Recommendation Framework to Support Location-Based Services pp. 1-20

- Animesh Chandra Roy, Mohammad Shamsul Arefin, A. S. M. Kayes, Mohammad Hammoudeh and Khandakar Ahmed
- On Frequency Estimation and Detection of Heavy Hitters in Data Streams pp. 1-20

- Federica Ventruto, Marco Pulimeno, Massimo Cafaro and Italo Epicoco
- Intransitiveness: From Games to Random Walks pp. 1-10

- Alberto Baldi and Franco Bagnoli
- From Symptom Tracking to Contact Tracing: A Framework to Explore and Assess COVID-19 Apps pp. 1-9

- Abinaya Megan Ramakrishnan, Aparna Nicole Ramakrishnan, Sarah Lagan and John Torous
- Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey pp. 1-30

- Babangida Isyaku, Mohd Soperi Mohd Zahid, Maznah Bte Kamat, Kamalrulnizam Abu Bakar and Fuad A. Ghaleb
- Integrating IP Mobility Management Protocols and MANET: A Survey pp. 1-23

- Mohammad Al Mojamed
- Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management pp. 1-21

- In Lee
- A Distributed Architecture for Smart Recycling Using Machine Learning pp. 1-13

- Dimitris Ziouzios, Dimitris Tsiktsiris, Nikolaos Baras and Minas Dasygenis
- Online Group Student Peer-Communication as an Element of Open Education pp. 1-13

- Daria Bylieva, Zafer Bekirogullari, Dmitry Kuznetsov, Nadezhda Almazova, Victoria Lobatyuk and Anna Rubtsova
- Topic Detection Based on Sentence Embeddings and Agglomerative Clustering with Markov Moment pp. 1-17

- Svetlana S. Bodrunova, Andrey V. Orekhov, Ivan S. Blekanov, Nikolay S. Lyudkevich and Nikita A. Tarasov
- A Hybrid SWIM Data Naming Scheme Based on TLC Structure pp. 1-18

- Zhijun Wu and Bohua Cui
- Improving Human Activity Monitoring by Imputation of Missing Sensory Data: Experimental Study pp. 1-18

- Ivan Miguel Pires, Faisal Hussain, Nuno M. Garcia and Eftim Zdravevski
- Generic Tasks for Algorithms pp. 1-16

- Gregor Milicic, Sina Wetzel and Matthias Ludwig
- A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages pp. 1-16

- Abdallah Ghourabi, Mahmood A. Mahmood and Qusay M. Alzubi
- Systematic Evaluation of LibreSocial—A Peer-to-Peer Framework for Online Social Networks pp. 1-27

- Newton Masinde, Liat Khitman, Iakov Dlikman and Kalman Graffi
- CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews pp. 1-27

- Franklin Tchakounté, Athanase Esdras Yera Pagor, Jean Claude Kamgang and Marcellin Atemkeng
Volume 12, issue 8, 2020
- Considerations on the Implications of the Internet of Things in Spanish Universities: The Usefulness Perceived by Professors pp. 1-13

- José-María Romero-Rodríguez, Santiago Alonso-García, José-Antonio Marín-Marín and Gerardo Gómez-García
- Multimodal Deep Learning for Group Activity Recognition in Smart Office Environments pp. 1-13

- George Albert Florea and Radu-Casian Mihailescu
- Coping Strategies and Anxiety and Depressive Symptoms in Young Adult Victims of Cyberstalking: A Questionnaire Survey in an Italian Sample pp. 1-13

- Tatiana Begotti, Martina Bollo and Daniela Acquadro Maran
- Hybrid Consensus Algorithm Based on Modified Proof-of-Probability and DPoS pp. 1-16

- Baocheng Wang, Zetao Li and Haibin Li
- Data Lake Governance: Towards a Systemic and Natural Ecosystem Analogy pp. 1-16

- Marzieh Derakhshannia, Carmen Gervet, Hicham Hajj-Hassan, Anne Laurent and Arnaud Martin
- The Role of the CFO of an Industrial Company: An Analysis of the Impact of Blockchain Technology pp. 1-16

- Philipp Sandner, Anna Lange and Philipp Schulden
- Consortium Blockchain Smart Contracts for Musical Rights Governance in a Collective Management Organizations (CMOs) Use Case pp. 1-16

- Nikolaos Kapsoulis, Alexandros Psychas, Georgios Palaiokrassas, Achilleas Marinakis, Antonios Litke, Theodora Varvarigou, Charalampos Bouchlis, Amaryllis Raouzaiou, Gonçal Calvo and Jordi Escudero Subirana
- How Reputation Systems Change the Psychological Antecedents of Fairness in Virtual Environments pp. 1-17

- Stefania Collodi, Maria Fiorenza, Andrea Guazzini and Mirko Duradoni
- Understanding the Determinants and Future Challenges of Cloud Computing Adoption for High Performance Computing pp. 1-17

- Theo Lynn, Grace Fox, Anna Gourinovitch and Pierangelo Rosati
- Scientific Development of Educational Artificial Intelligence in Web of Science pp. 1-18

- Antonio-José Moreno-Guerrero, Jesús López-Belmonte, José-Antonio Marín-Marín and Rebeca Soler-Costa
- Improving Transaction Speed and Scalability of Blockchain Systems via Parallel Proof of Work pp. 1-19

- Shihab Shahriar Hazari and Qusay H. Mahmoud
- From Color-Avoiding to Color-Favored Percolation in Diluted Lattices pp. 1-12

- Michele Giusfredi and Franco Bagnoli
- Adaptive Allocation Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks pp. 1-14

- Walaa Hassan and Tamer Farag
- A PEKS-Based NDN Strategy for Name Privacy pp. 1-22

- Kyi Thar Ko, Htet Htet Hlaing and Masahiro Mambo
- Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT pp. 1-20

- Igor M. Coelho, Vitor N. Coelho, Rodolfo P. Araujo, Wang Yong Qiang and Brett D. Rhodes
- The Impact of English Learning Motivation and Attitude on Well-Being: Cram School Students in Taiwan pp. 1-15

- Chih-Fong Lo and Chin-Huang Lin
- Progressive Teaching Improvement For Small Scale Learning: A Case Study in China pp. 1-15

- Bo Jiang, Yanbai He, Rui Chen, Chuanyan Hao, Sijiang Liu and Gangyao Zhang
- Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP) pp. 1-15

- Andrew John Poulter, Steven J. Ossont and Simon J. Cox
Volume 12, issue 7, 2020
- Human Psychophysiological Activity Estimation Based on Smartphone Camera and Wearable Electronics pp. 1-27

- Alexey Kashevnik, Mikhail Kruglov, Igor Lashkov, Nikolay Teslya, Polina Mikhailova, Evgeny Ripachev, Vladislav Malutin, Nikita Saveliev and Igor Ryabchikov
- A Study on Design Requirement Development and Satisfaction for Future Virtual World Systems pp. 1-28

- Bingqing Shen, Weiming Tan, Jingzhi Guo, Hongming Cai, Bin Wang and Shuaihe Zhuo
- 5G-V2X Communications and Networking for Connected and Autonomous Vehicles pp. 1-3

- Antonella Molinaro, Claudia Campolo, Jérôme Härri, Christian Esteve Rothenberg and Alexey Vinel
- Multimedia Quality of Experience (QoE): Current Status and Future Direction pp. 1-3

- Chaminda Hewage and Erhan Ekmekcioglu
- Investigating the Relationship between Personality and Technology Acceptance with a Focus on the Smartphone from a Gender Perspective: Results of an Exploratory Survey Study pp. 1-17

- Cornelia Sindermann, René Riedl and Christian Montag
- An IoT-Based Framework for Smart Water Supply Systems Management pp. 1-17

- Rosiberto Gonçalves, Jesse J. M. Soares and Ricardo M. F. Lima
- Innovative Topologies and Algorithms for Neural Networks pp. 1-4

- Salvatore Graziani and Maria Gabriella Xibilia
- Science Cafés, Science Shops and the Lockdown Experience in Florence and Rome pp. 1-11

- Giovanna Pacini, Cinzia Belmonte and Franco Bagnoli
- A Decoding-Complexity and Rate-Controlled Video-Coding Algorithm for HEVC pp. 1-23

- Thanuja Mallikarachchi, Dumidu Talagala, Hemantha Kodikara Arachchi, Chaminda Hewage and Anil Fernando
- Collaborative Facilitation and Collaborative Inhibition in Virtual Environments pp. 1-20

- Andrea Guazzini, Elisa Guidi, Cristina Cecchini and Eiko Yoneki
- Employing a Chatbot for News Dissemination during Crisis: Design, Implementation and Evaluation pp. 1-14

- Theodora A. Maniou and Andreas Veglis
- An Updated Survey of Efficient Hardware Architectures for Accelerating Deep Convolutional Neural Networks pp. 1-22

- Maurizio Capra, Beatrice Bussolino, Alberto Marchisio, Muhammad Shafique, Guido Masera and Maurizio Martina
- Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach pp. 1-24

- Vita Santa Barletta, Danilo Caivano, Antonella Nannavecchia and Michele Scalera
Volume 12, issue 6, 2020
- Risk-Based Access Control Model: A Systematic Literature Review pp. 1-24

- Hany F. Atlam, Muhammad Ajmal Azad, Madini O. Alassafi, Abdulrahman A. Alshdadi and Ahmed Alenezi
- Input Selection Methods for Soft Sensor Design: A Survey pp. 1-24

- Francesco Curreri, Giacomo Fiumara and Maria Gabriella Xibilia
- Multi-Source Neural Model for Machine Translation of Agglutinative Language pp. 1-14

- Yirong Pan, Xiao Li, Yating Yang and Rui Dong
- CMS: A Continuous Machine-Learning and Serving Platform for Industrial Big Data pp. 1-15

- KeDi Li and Ning Gui
- Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking pp. 1-20

- William Hurst, Aaron Boddy, Madjid Merabti and Nathan Shone
- Collective Intelligence in Polish-Ukrainian Internet Projects. Debate Models and Research Methods pp. 1-20

- Rafał Olszowski and Marcin Chmielowski
- COVID-19 Epidemic as E-Learning Boost? Chronological Development and Effects at an Austrian University against the Background of the Concept of “E-Learning Readiness” pp. 1-20

- Martin Ebner, Sandra Schön, Clarissa Braun, Markus Ebner, Ypatios Grigoriadis, Maria Haas, Philipp Leitner and Behnam Taraghi
- Volunteer Down: How COVID-19 Created the Largest Idling Supercomputer on Earth pp. 1-20

- Nane Kratzke
- Simulating Resource Management across the Cloud-to-Thing Continuum: A Survey and Future Directions pp. 1-25

- Malika Bendechache, Sergej Svorobej, Patricia Takako Endo and Theo Lynn
- Improvements of the xAAL Home Automation System pp. 1-31

- Christophe Lohr and Jérôme Kerdreux
- SOLIOT—Decentralized Data Control and Interactions for IoT pp. 1-30

- Sebastian R. Bader and Maria Maleshkova
- A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence pp. 1-23

- Alessandra de Melo e Silva, João José Costa Gondim, Robson de Oliveira Albuquerque and Luis Javier García Villalba
- Performance Model for Video Service in 5G Networks pp. 1-21

- Jiao Wang, Jay Weitzen, Oguz Bayat, Volkan Sevindik and Mingzhe Li
- Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks pp. 1-17

- Gonzalo Olmedo, Román Lara-Cueva, Diego Martínez and Celso de Almeida
- Validating the Adoption of Heterogeneous Internet of Things with Blockchain pp. 1-17

- Lulwah AlSuwaidan and Nuha Almegren
Volume 12, issue 5, 2020
- Immersive Safe Oceans Technology: Developing Virtual Onboard Training Episodes for Maritime Safety pp. 1-12

- Evangelos Markopoulos and Mika Luimula
- RE-examining the Effect of Online Social Support on Subjective Well-Being: The Moderating Role of Experience pp. 1-15

- Meng-Hsiang Hsu, Chun-Ming Chang and Shing-Ling Wu
- Modeling and Simulation Tools for Fog Computing—A Comprehensive Survey from a Cost Perspective pp. 1-20

- Spiridoula V. Margariti, Vassilios V. Dimakopoulos and Georgios Tsoumanis
- Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks pp. 1-20

- Alexandros Fakis, Georgios Karopoulos and Georgios Kambourakis
- Suitability of Graph Database Technology for the Analysis of Spatio-Temporal Data pp. 1-31

- Sedick Baker Effendi, Brink van der Merwe and Wolf-Tilo Balke
- Artificial Intelligence Systems-Aided News and Copyright: Assessing Legal Implications for Journalism Practices pp. 1-10

- Javier Díaz-Noci
- Digital Cloud Environment: Present Challenges and Future Forecast pp. 1-11

- Serg Mescheryakov, Dmitry Shchemelinin, Konstantin Izrailov and Victor Pokussov
- Mobile Application to Provide Traffic Congestion Estimates and Tourism Spots to Promote Additional Stopovers pp. 1-11

- Saizo Aoyagi, Yiping Le, Tetsuo Shimizu and Kazuki Takahashi
- DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems pp. 1-23

- Jane Henriksen-Bulmer, Shamal Faily and Sheridan Jeary
- A Scalable and Semantic Data as a Service Marketplace for Enhancing Cloud-Based Applications pp. 1-21

- Evangelos Psomakelis, Anastasios Nikolakopoulos, Achilleas Marinakis, Alexandros Psychas, Vrettos Moulos, Theodora Varvarigou and Andreas Christou
- Implementation of a Topology Independent MAC (TiMAC) Policy on a Low-Cost IoT System pp. 1-13

- Georgios Tsoumanis, Asterios Papamichail, Vasileios Dragonas, George Koufoudakis, Constantinos T. Angelis and Konstantinos Oikonomou
- Human-Smart Environment Interactions in Smart Cities: Exploring Dimensionalities of Smartness pp. 1-18

- H. Patricia McKenna
- Language-Independent Fake News Detection: English, Portuguese, and Spanish Mutual Features pp. 1-18

- Hugo Queiroz Abonizio, Janaina Ignacio de Morais, Gabriel Marques Tavares and Sylvio Barbon Junior
- Multi-Blockchain Structure for a Crowdsensing-Based Smart Parking System pp. 1-18

- Mihui Kim and Youngmin Kim
- A Bibliometric Overview of Twitter-Related Studies Indexed in Web of Science pp. 1-18

- Jingyuan Yu and Juan Muñoz-Justicia
- Adolescent’s Collective Intelligence: Empirical Evidence in Real and Online Classmates Groups pp. 1-16

- Enrico Imbimbo, Federica Stefanelli and Andrea Guazzini
- A Time Bank System Design on the Basis of Hyperledger Fabric Blockchain pp. 1-16

- Yu-Tse Lee, Jhan-Jia Lin, Jane Yung-Jen Hsu and Ja-Ling Wu
Volume 12, issue 4, 2020
- Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives pp. 1-19

- Todor Tagarev
- PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting pp. 1-19

- Ajit Kumar, Vinti Agarwal, Shishir Kumar Shandilya, Andrii Shalaginov, Saket Upadhyay and Bhawna Yadav
- What Is an Open IoT Platform? Insights from a Systematic Mapping Study pp. 1-19

- Bahtijar Vogel, Yuji Dong, Blerim Emruli, Paul Davidsson and Romina Spalazzese
- DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities pp. 1-19

- Fayozbek Rustamov, Juhwan Kim and JooBeom Yun
- Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET pp. 1-18

- Nishu Gupta, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva and Ariel Teles
- Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey pp. 1-17

- Georgios Kavallieratos, Sokratis Katsikas and Vasileios Gkioulos
- A Design of a Parcel Delivery Systemfor Point to Point Delivery with IoT Technology pp. 1-13

- Ha Yoon Song and Hyochang Han
- Revisiting the High-Performance Reconfigurable Computing for Future Datacenters pp. 1-21

- Qaiser Ijaz, El-Bay Bourennane, Ali Kashif Bashir and Hira Asghar
- Publishing Anonymized Set-Valued Data via Disassociation towards Analysis pp. 1-21

- Nancy Awad, Jean-Francois Couchot, Bechara Al Bouna and Laurent Philippe
- Aggregated Indices in Website Quality Assessment pp. 1-23

- Karol Król and Dariusz Zdonek
- Semantic Search Enhanced with Rating Scores pp. 1-10

- Anna Formica, Elaheh Pourabbas and Francesco Taglino
- Improving Recommendation Accuracy Using Social Network of Owners in Social Internet of Vehicles pp. 1-15

- Kashif Zia, Muhammad Shafi and Umar Farooq
- Micro-Blog Sentiment Classification Method Based on the Personality and Bagging Algorithm pp. 1-14

- Wenzhong Yang, Tingting Yuan and Liejun Wang
- Exploring the Dominance of the English Language on the Websites of EU Countries pp. 1-43

- Andreas Giannakoulopoulos, Minas Pergantis, Nikos Konstantinou, Aristeidis Lamprogeorgos, Laida Limniati and Iraklis Varlamis
- Blockchain and Fog Based Architecture for Internet of Everything in Smart Cities pp. 1-12

- Parminder Singh, Anand Nayyar, Avinash Kaur and Uttam Ghosh
- Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security pp. 1-12

- Vasiliy Elagin, Anastasia Spirkina, Andrei Levakov and Ilya Belozertsev
Volume 12, issue 3, 2020
- BASN—Learning Steganography with a Binary Attention Mechanism pp. 1-17

- Pin Wu, Xuting Chang, Yang Yang and Xiaoqiang Li
- Graph-based Method for App Usage Prediction with Attributed Heterogeneous Network Embedding pp. 1-16

- Yifei Zhou, Shaoyong Li and Yaping Liu
- Multi-formalism Models for Performance Engineering pp. 1-26

- Enrico Barbierato, Marco Gribaudo and Giuseppe Serazzi
- Development of User-Participatory Crowdsensing System for Improved Privacy Preservation pp. 1-19

- Mihui Kim and Junhyeok Yun
- Do Cryptocurrency Prices Camouflage Latent Economic Effects? A Bayesian Hidden Markov Approach pp. 1-19

- Constandina Koki, Stefanos Leonardos and Georgios Piliouras
- Introducing External Knowledge to Answer Questions with Implicit Temporal Constraints over Knowledge Base pp. 1-13

- Wenqing Wu, Zhenfang Zhu, Qiang Lu, Dianyuan Zhang and Qiangqiang Guo
- Security of IoT Application Layer Protocols: Challenges and Findings pp. 1-20

- Giuseppe Nebbione and Maria Carla Calzarossa
- A Review of the Control Plane Scalability Approaches in Software Defined Networking pp. 1-15

- Abdelrahman Abuarqoub
- A Systematic Review of Blockchain Literature in Logistics and Supply Chain Management: Identifying Research Questions and Future Directions pp. 1-15

- Sebastian Kummer, David M. Herold, Mario Dobrovnik, Jasmin Mikl and Nicole Schäfer
- LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations pp. 1-25

- Bharat S. Chaudhari, Marco Zennaro and Suresh Borkar
- Improved Proactive Routing Protocol Considering Node Density Using Game Theory in Dense Networks pp. 1-12

- Omuwa Oyakhire and Koichi Gyoda
- Smart Devices Security Enhancement via Power Supply Monitoring pp. 1-12

- Dimitrios Myridakis, Georgios Spathoulas, Athanasios Kakarountas and Dimitrios Schinianakis
- Consensus Crash Testing: Exploring Ripple’s Decentralization Degree in Adversarial Environments pp. 1-12

- Klitos Christodoulou, Elias Iosif, Antonios Inglezakis and Marinos Themistocleous
- The Internet of Things for Smart Environments pp. 1-2

- Giuseppe Ruggeri, Valeria Loscrí, Marica Amadeo and Carlos T. Calafate
- Language Cognition and Pronunciation Training Using Applications pp. 1-14

- Ming Sung Kan and Atsushi Ito
- RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks pp. 1-14

- Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour and Helge Janicke
- Emerging Trends and Innovation Modes of Internet Finance—Results from Co-Word and Co-Citation Networks pp. 1-14

- Xiaoyu Li, Jiahong Yuan, Yan Shi, Zilai Sun and Junhu Ruan
- Feature Selection Algorithms as One of the Python Data Analytical Tools pp. 1-14

- Nikita Pilnenskiy and Ivan Smetannikov
- Considered Factors of Online News Based on Respondents’ Eye Activity Using Eye-Tracker Analysis pp. 1-37

- Daniel Hadrian Yohandy, Djoko Budiyanto Setyohadi and Albertus Joko Santoso
Volume 12, issue 2, 2020
- A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures pp. 1-27

- Grigorios Kakkavas, Despoina Gkatzioura, Vasileios Karyotis and Symeon Papavassiliou
- Mobility, Citizens, Innovation and Technology in Digital and Smart Cities pp. 1-27

- Thays A. Oliveira, Yuri B. Gabrich, Helena Ramalhinho, Miquel Oliver, Miri W. Cohen, Luiz S. Ochi, Serigne Gueye, Fábio Protti, Alysson A. Pinto, Diógenes V. M. Ferreira, Igor M. Coelho and Vitor N. Coelho
- A Rule-Based Language and Verification Framework of Dynamic Service Composition pp. 1-27

- Willy Kengne Kungne, Georges-Edouard Kouamou and Claude Tangha
- Cognitive Training for the Treatment of Addictions Mediated by Information and Communication Technologies (ICT) pp. 1-19

- Sandra Restrepo, Dubis Rincón and Edwin Sepulveda
- Global Trends and Advances Towards a Smarter Grid and Smart Cities pp. 1-3

- Om P. Malik
- A Blockchain based PKI Validation System based on Rare Events Management pp. 1-16

- Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck
- MCCM: An Approach for Connectivity and Coverage Maximization pp. 1-17

- Alia Ghaddar, Monah Bou Hatoum, Ghassan Fadlallah and Hamid Mcheick
- Adaptive Pre/Post-Compensation of Cascade Filters in Coherent Optical Transponders pp. 1-18

- Ahmad Abdo and Claude D’Amours
- Intelligent Thermal Comfort Controlling System for Buildings Based on IoT and AI pp. 1-18

- Yafei Zhao, Paolo Vincenzo Genovese and Zhixing Li
- Unsteady Multi-Element Time Series Analysis and Prediction Based on Spatial-Temporal Attention and Error Forecast Fusion pp. 1-13

- Xiaofan Wang and Lingyu Xu
- Know Your Customer (KYC) Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture pp. 1-13

- Nikolaos Kapsoulis, Alexandros Psychas, Georgios Palaiokrassas, Achilleas Marinakis, Antonios Litke and Theodora Varvarigou
- A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices pp. 1-23

- Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi and Lin Jiang
- Strategies of Success for Social Networks: Mermaids and Temporal Evolution pp. 1-30

- Massimo Marchiori and Lino Possamai
- Latent Structure Matching for Knowledge Transfer in Reinforcement Learning pp. 1-15

- Yi Zhou and Fenglei Yang
- EAOA: Energy-Aware Grid-Based 3D-Obstacle Avoidance in Coverage Path Planning for UAVs pp. 1-20

- Alia Ghaddar and Ahmad Merei
- Information-Centric Networking (ICN) pp. 1-2

- Nikos Fotiou
- A Survey on Troll Detection pp. 1-14

- Michele Tomaiuolo, Gianfranco Lombardo, Monica Mordonini, Stefano Cagnoni and Agostino Poggi
- Data Exchange in Cluster Structure for Longevity of IoT pp. 1-14

- Soobin Jeon
- Hierarchical Gated Recurrent Unit with Semantic Attention for Event Prediction pp. 1-14

- Zichun Su and Jialin Jiang
- Well-Being and Social Media: A Systematic Review of Bergen Addiction Scales pp. 1-12

- Mirko Duradoni, Federico Innocenti and Andrea Guazzini
- A Novel Low-Complexity Fault Diagnosis Algorithm for Energy Internet in Smart Cities pp. 1-12

- Jiong Wang, Hua Zhang, Dongliang Lin, Huibin Feng, Tao Wang, Hongyan Zhang and Xiaoding Wang
- A Methodology Based on Computational Patterns for Offloading of Big Data Applications on Cloud-Edge Platforms pp. 1-12

- Beniamino Di Martino, Salvatore Venticinque, Antonio Esposito and Salvatore D’Angelo
- RFID RSS Fingerprinting System for Wearable Human Activity Recognition pp. 1-12

- Wafa Shuaieb, George Oguntala, Ali AlAbdullah, Huthaifa Obeidat, Rameez Asif, Raed A. Abd-Alhameed, Mohammed S. Bin-Melha and Chakib Kara-Zaïtri
Volume 12, issue 1, 2019
- Long-Range Wireless Radio Technologies: A Survey pp. 1-17

- Brandon Foubert and Nathalie Mitton
- Decoupling-Based Channel Access Mechanism for Improving Throughput and Fairness in Dense Multi-Rate WLANs pp. 1-16

- Jianjun Lei, Ying Wang and Hong Yun
- 5G Cross-Border Operation for Connected and Automated Mobility: Challenges and Solutions pp. 1-16

- Apostolos Kousaridas, Andreas Schimpe, Sebastian Euler, Xavier Vilajosana, Mikael Fallgren, Giada Landi, Francesca Moscatelli, Sokratis Barmpounakis, Francisco Vázquez-Gallego, Roshan Sedar, Rodrigo Silva, Laurent Dizambourg, Stefan Wendt, Maciej Muehleisen, Kurt Eckert, Jérôme Härri and Jesus Alonso-Zarate
- Mitigating Webshell Attacks through Machine Learning Techniques pp. 1-16

- You Guo, Hector Marco-Gisbert and Paul Keir
- Twitter-Based Safety Confirmation System for Disaster Situations pp. 1-16

- Keisuke Utsu, Mariko Abe, Shuji Nishikawa and Osamu Uchida
- An Architecture for Biometric Electronic Identification Document System Based on Blockchain † pp. 1-19

- Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel
- Software Defined Networking (SDN) and Network Function Virtualization (NFV) pp. 1-3

- Symeon Papavassiliou
- Geocentric Spherical Surfaces Emulating the Geostationary Orbit at Any Latitude with Zenith Links pp. 1-11

- Emilio Matricciani
- Acknowledgement to Reviewers of Future Internet in 2019 pp. 1-8

- Future Internet Editorial Office
- Coverage and Energy Efficiency Analysis for Two-Tier Heterogeneous Cellular Networks Based on Matérn Hard-Core Process pp. 1-13

- Jie Yang, Ziyu Pan and Lihong Guo
- An Adaptive Differential Protection and Fast Auto-Closing System for 10 kV Distribution Networks Based on 4G LTE Wireless Communication pp. 1-13

- Wen An, Jun Jie Ma, Hong Yang Zhou, Hong Shan Chen, Xu Jun and Xu Jian
- Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN pp. 1-13

- Zhijun Wu, Yun Zhang and Enzhong Xu
- WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications pp. 1-21

- Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed and Ali Kashif Bashir
- Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec pp. 1-15

- Zhijun Wu, Rong Li, Panpan Yin and Changliang Li
- Study on Bridge Displacement Monitoring Algorithms Based on Multi-Targets Tracking pp. 1-15

- Jiajia Wang and Guangming Li
- Search Engine Optimization pp. 1-2

- Andreas Veglis and Dimitrios Giomelakis
- Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems pp. 1-14

- Samuel Yankson and Mahdi Ghamkhari
- A Novel Resource Allocation Scheme in NOMA-Based Cellular Network with D2D Communications pp. 1-22

- Jingpu Wang, Xin Song and Yatao Ma
| |