Content
September 2025, Volume 17, Issue 10
- 1-18 Deep Reinforcement Learning for Adaptive Robotic Grasping and Post-Grasp Manipulation in Simulated Dynamic Environments
by Henrique C. Ferreira & Ramiro S. Barbosa - 1-18 Trustworthy Face Recognition as a Service: A Multi-Layered Approach for Mitigating Spoofing and Ensuring System Integrity
by Mostafa Kira & Zeyad Alajamy & Ahmed Soliman & Yusuf Mesbah & Manuel Mazzara - 1-18 TwinP2G: A Software Application for Optimal Power-to-Gas Planning
by Eugenia Skepetari & Sotiris Pelekis & Hercules Koutalidis & Alexandros Menelaos Tzortzis & Georgios Kormpakis & Christos Ntanos & Dimitris Askounis - 1-19 Evaluation Study of Pavement Condition Using Digital Twins and Deep Learning on IMU Signals
by Luis-Dagoberto Gurrola-Mijares & José-Manuel Mejía-Muñoz & Oliverio Cruz-Mejía & Abraham-Leonel López-León & Leticia Ortega-Máynez - 1-19 Research on a Dense Pedestrian-Detection Algorithm Based on an Improved YOLO11
by Liang Wu & Xiang Li & Ping Ma & Yicheng Cai - 1-19 Enhanced Position Estimation via RSSI Offset Correction in BLE Fingerprinting-Based Indoor Positioning
by Jingshi Qian & Nobuyoshi Komuro & Won-Suk Kim & Younghwan Yoo - 1-20 Deep Learning-Based Approach to Automated Monitoring of Defects and Soiling on Solar Panels
by Ahmed Hamdi & Hassan N. Noura & Joseph Azar - 1-21 Minimal Overhead Modelling of Slow DoS Attack Detection for Resource-Constrained IoT Networks
by Andy Reed & Laurence S. Dooley & Soraya Kouadri Mostefaoui - 1-21 Legal Judgment Prediction in the Saudi Arabian Commercial Court
by Ashwaq Almalki & Safa Alsafari & Noura M. Alotaibi - 1-23 Sentiment Analysis in Mexican Spanish: A Comparison Between Fine-Tuning and In-Context Learning with Large Language Models
by Tomás Bernal-Beltrán & Mario Andrés Paredes-Valverde & María del Pilar Salas-Zárate & José Antonio García-Díaz & Rafael Valencia-García - 1-24 Intellectual Property Protection Through Blockchain: Introducing the Novel SmartRegistry-IP for Secure Digital Ownership
by Abeer S. Al-Humaimeedy - 1-26 NL-COMM: Enabling High-Performing Next-Generation Networks via Advanced Non-Linear Processing
by Chathura Jayawardena & George Ntavazlis Katsaros & Konstantinos Nikitopoulos - 1-27 Opportunities for Adapting Data Write Latency in Geo-Distributed Replicas of Multicloud Systems
by Olha Kozina & José Machado & Maksym Volk & Hennadii Heiko & Volodymyr Panchenko & Mykyta Kozin & Maryna Ivanova - 1-29 A Review of Automatic Fake News Detection: From Traditional Methods to Large Language Models
by Repede Ștefan Emil & Brad Remus - 1-29 Commercial Off-the-Shelf IoT-Based Infant Car Seat Application for Preventing the Forgotten Baby Syndrome
by Apostolos Panagiotopoulos & Vasileios Karyotis - 1-31 An Overview on the Landscape of Self-Adaptive Cloud Design and Operation Patterns: Goals, Strategies, Tooling, Evaluation, and Dataset Perspectives
by Apostolos Angelis & George Kousiouris - 1-33 A Dependency-Aware Task Stealing Framework for Mobile Crowd Computing
by Sanjay Segu Nagesh & Niroshinie Fernando & Seng W. Loke & Azadeh Ghari Neiat & Pubudu N. Pathirana - 1-35 Evaluating Learning Success, Engagement, and Usability of Moalemy: An Arabic Rule-Based Chatbot
by Dalal Al Faia & Khalid Alomar - 1-36 Self-Sovereign Identities and Content Provenance: VeriTrust—A Blockchain-Based Framework for Fake News Detection
by Maruf Farhan & Usman Butt & Rejwan Bin Sulaiman & Mansour Alraja - 1-46 Healing Intelligence: A Bio-Inspired Metaheuristic Optimization Method Using Recovery Dynamics
by Vasileios Charilogis & Ioannis G. Tsoulos
October 2025, Volume 17, Issue 10
- 1-13 Lattice-Based Identity Authentication Protocol with Enhanced Privacy and Scalability for Vehicular Ad Hoc Networks
by Kuo-Yu Tsai & Ying-Hsuan Yang - 1-13 MambaNet0: Mamba-Based Sustainable Cloud Resource Prediction Framework Towards Net Zero Goals
by Thananont Chevaphatrakul & Han Wang & Sukhpal Singh Gill - 1-14 Performance Modeling of Cloud Systems by an Infinite-Server Queue Operating in Rarely Changing Random Environment
by Svetlana Moiseeva & Evgeny Polin & Alexander Moiseev & Janos Sztrik - 1-15 Enhancing Two-Step Random Access in LEO Satellite Internet an Attack-Aware Adaptive Backoff Indicator (AA-BI)
by Jiajie Dong & Yong Wang & Qingsong Zhao & Ruiqian Ma & Jiaxiong Yang - 1-16 Measuring Inter-Bias Effects and Fairness-Accuracy Trade-Offs in GNN-Based Recommender Systems
by Nikzad Chizari & Keywan Tajfar & María N. Moreno-García - 1-17 Adaptive Cyber Defense Through Hybrid Learning: From Specialization to Generalization
by Muhammad Omer Farooq - 1-19 Robust Optimization for IRS-Assisted SAGIN Under Channel Uncertainty
by Xu Zhu & Litian Kang & Ming Zhao - 1-19 An IoT Architecture for Sustainable Urban Mobility: Towards Energy-Aware and Low-Emission Smart Cities
by Manuel J. C. S. Reis & Frederico Branco & Nishu Gupta & Carlos Serôdio - 1-19 Quantifying Website Privacy Posture Through Technical and Policy-Based Assessment
by Ioannis Fragkiadakis & Stefanos Gritzalis & Costas Lambrinoudakis - 1-22 Adversarial Robustness Evaluation for Multi-View Deep Learning Cybersecurity Anomaly Detection
by Min Li & Yuansong Qiao & Brian Lee - 1-23 Intelligent Control Approaches for Warehouse Performance Optimisation in Industry 4.0 Using Machine Learning
by Ádám Francuz & Tamás Bányai - 1-23 Multifractality and Its Sources in the Digital Currency Market
by Stanisław Drożdż & Robert Kluszczyński & Jarosław Kwapień & Marcin Wątorek - 1-23 QL-AODV: Q-Learning-Enhanced Multi-Path Routing Protocol for 6G-Enabled Autonomous Aerial Vehicle Networks
by Abdelhamied A. Ateya & Nguyen Duc Tu & Ammar Muthanna & Andrey Koucheryavy & Dmitry Kozyrev & János Sztrik - 1-24 Future Internet Applications in Healthcare: Big Data-Driven Fraud Detection with Machine Learning
by Konstantinos P. Fourkiotis & Athanasios Tsadiras - 1-25 Continual Learning for Intrusion Detection Under Evolving Network Threats
by Chaoqun Guo & Xihan Li & Jubao Cheng & Shunjie Yang & Huiquan Gong - 1-25 Explainable AI-Based Semantic Retrieval from an Expert-Curated Oncology Knowledge Graph for Clinical Decision Support
by Sameer Mushtaq & Marcello Trovati & Nik Bessis - 1-25 Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication
by Mani Rajendran & Dharminder Chaudhary & S. A. Lakshmanan & Cheng-Chi Lee - 1-25 Integrating Large Language Models into Automated Software Testing
by Yanet Sáez Iznaga & Luís Rato & Pedro Salgueiro & Javier Lamar León - 1-26 Modular Microservices Architecture for Generative Music Integration in Digital Audio Workstations via VST Plugin
by Adriano N. Raposo & Vasco N. G. J. Soares - 1-26 Bi-Scale Mahalanobis Detection for Reactive Jamming in UAV OFDM Links
by Nassim Aich & Zakarya Oubrahim & Hachem Ait Talount & Ahmed Abbou - 1-27 Toward the Theoretical Foundations of Industry 6.0: A Framework for AI-Driven Decentralized Manufacturing Control
by Andrés Fernández-Miguel & Susana Ortíz-Marcos & Mariano Jiménez-Calzado & Alfonso P. Fernández del Hoyo & Fernando E. García-Muiña & Davide Settembre-Blundo - 1-27 Towards Proactive Domain Name Security: An Adaptive System for .ro domains Reputation Analysis
by Carmen Ionela Rotună & Ioan Ștefan Sacală & Adriana Alexandru - 1-28 OptoBrain: A Wireless Sensory Interface for Optogenetics
by Rodrigo de Albuquerque Pacheco Andrade & Helder Eiki Oshiro & Gabriel Augusto Ginja & Eduardo Colombari & Maria Celeste Dias & José A. Afonso & João Paulo Pereira do Carmo - 1-30 Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design
by Mohammed Asiri & Maher A. Khemakhem & Reemah M. Alhebshi & Bassma S. Alsulami & Fathy E. Eassa - 1-33 The Paradox of AI Knowledge: A Blockchain-Based Approach to Decentralized Governance in Chinese New Media Industry
by Jing Wu & Yaoyi Cai - 1-35 Uncensored AI in the Wild: Tracking Publicly Available and Locally Deployable LLMs
by Bahrad A. Sokhansanj - 1-37 Assessing Student Engagement: A Machine Learning Approach to Qualitative Analysis of Institutional Effectiveness
by Abbirah Ahmed & Martin J. Hayes & Arash Joorabchi - 1-37 Beyond Accuracy: Benchmarking Machine Learning Models for Efficient and Sustainable SaaS Decision Support
by Efthimia Mavridou & Eleni Vrochidou & Michail Selvesakis & George A. Papakostas - 1-45 Building Trust in Autonomous Aerial Systems: A Review of Hardware-Rooted Trust Mechanisms
by Sagir Muhammad Ahmad & Mohammad Samie & Barmak Honarvar Shakibaei Asli - 1-46 A Review on Blockchain Sharding for Improving Scalability
by Mahran Morsidi & Sharul Tajuddin & S. H. Shah Newaz & Ravi Kumar Patchmuthu & Gyu Myoung Lee
August 2025, Volume 17, Issue 9
- 1-3 IoT Security: Threat Detection, Analysis, and Defense
by Olivier Markowitch & Jean-Michel Dricot - 1-17 Design and Implementation of an Autonomous Mobile Robot for Object Delivery via Homography-Based Visual Servoing
by Jung-Shan Lin & Yen-Che Hsiao & Jeih-Weih Hung - 1-20 RS-MADDPG: Routing Strategy Based on Multi-Agent Deep Deterministic Policy Gradient for Differentiated QoS Services
by Shi Kuang & Jinyu Zheng & Shilin Liang & Yingying Li & Siyuan Liang & Wanwei Huang - 1-21 A Framework for Data Lifecycle Model Selection
by Mauro Iacono & Michele Mastroianni & Christian Riccio & Bruna Viscardi - 1-21 SwiftKV: A Metadata Indexing Scheme Integrating LSM-Tree and Learned Index for Distributed KV Stores
by Zhenfei Wang & Jianxun Feng & Longxiang Dun & Ziliang Bao & Chunfeng Du - 1-23 Ensemble Learning for Software Requirement-Risk Assessment: A Comparative Study of Bagging and Boosting Approaches
by Chandan Kumar & Pathan Shaheen Khan & Medandrao Srinivas & Sudhanshu Kumar Jha & Shiv Prakash & Rajkumar Singh Rathore - 1-23 From CSI to Coordinates: An IoT-Driven Testbed for Individual Indoor Localization
by Diana Macedo & Miguel Loureiro & Óscar G. Martins & Joana Coutinho Sousa & David Belo & Marco Gomes - 1-24 Modelling Large-Scale Group Decision-Making Through Grouping with Large Language Models
by Juan Carlos González-Quesada & José Ramón Trillo & Carlos Porcel & Ignacio Javier Pérez & Francisco Javier Cabrerizo - 1-24 Safeguarding Brand and Platform Credibility Through AI-Based Multi-Model Fake Profile Detection
by Vishwas Chakranarayan & Fadheela Hussain & Fayzeh Abdulkareem Jaber & Redha J. Shaker & Ali Rizwan - 1-25 Benchmarking IoT Simulation Frameworks for Edge–Fog–Cloud Architectures: A Comparative and Experimental Study
by Fatima Bendaouch & Hayat Zaydi & Safae Merzouk & Saliha Assoul - 1-27 Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks
by Akashdeep Bhardwaj & Luxmi Sapra & Shawon Rahman - 1-28 Technical Review: Architecting an AI-Driven Decision Support System for Enhanced Online Learning and Assessment
by Saipunidzam Mahamad & Yi Han Chin & Nur Izzah Nasuha Zulmuksah & Md Mominul Haque & Muhammad Shaheen & Kanwal Nisar - 1-28 Hybrid B5G-DTN Architecture with Federated Learning for Contextual Communication Offloading
by Manuel Jesús-Azabal & Meichun Zheng & Vasco N. G. J. Soares - 1-28 Reinforcement Learning in Medical Imaging: Taxonomy, LLMs, and Clinical Challenges
by A. B. M. Kamrul Islam Riad & Md. Abdul Barek & Hossain Shahriar & Guillermo Francia & Sheikh Iqbal Ahamed - 1-28 Identifying Literary Microgenres and Writing Style Differences in Romanian Novels with ReaderBench and Large Language Models
by Aura Cristina Udrea & Stefan Ruseti & Vlad Pojoga & Stefan Baghiu & Andrei Terian & Mihai Dascalu - 1-29 Is the Healthcare Industry Ready for Digital Twins? Examining the Opportunities and Challenges
by Srinivasini Sasitharasarma & Noor H. S. Alani & Zazli Lily Wisker - 1-30 A Multi-Scene Automatic Classification and Grading Method for Structured Sensitive Data Based on Privacy Preferences
by Yong Li & Zhongcheng Wu & Jinwei Li & Liyang Xie - 1-32 Novel Encoder–Decoder Architecture with Attention Mechanisms for Satellite-Based Environmental Forecasting in Smart City Applications
by Kalsoom Panhwar & Bushra Naz Soomro & Sania Bhatti & Fawwad Hassan Jaskani - 1-33 A Comparative Study of PEGASUS, BART, and T5 for Text Summarization Across Diverse Datasets
by Eman Daraghmi & Lour Atwe & Areej Jaber - 1-34 Design and Implementation of a Scalable LoRaWAN-Based Air Quality Monitoring Infrastructure for the Kurdistan Region of Iraq
by Nasih Abdulkarim Muhammed & Bakhtiar Ibrahim Saeed - 1-35 Blockchain for Security in Digital Twins
by Rahanatu Suleiman & Akshita Maradapu Vera Venkata Sai & Wei Yu & Chenyu Wang
September 2025, Volume 17, Issue 9
- 1-3 Special Issue: Intrusion Detection and Resiliency in Cyber-Physical Systems and Networks
by Olusola T. Odeyomi & Temitayo O. Olowu - 1-13 Collaborative Fusion Attention Mechanism for Vehicle Fault Prediction
by Hong Jia & Dalin Qian & Fanghua Chen & Wei Zhou - 1-16 A Digital Twin Architecture for Forest Restoration: Integrating AI, IoT, and Blockchain for Smart Ecosystem Management
by Nophea Sasaki & Issei Abe - 1-18 A Behavior-Aware Caching Architecture for Web Applications Using Static, Dynamic, and Burst Segmentation
by Carlos Gómez-Pantoja & Daniela Baeza-Rocha & Alonso Inostrosa-Psijas - 1-19 UAV Deployment Design Under Incomplete Information with a Connectivity Constraint for UAV-Assisted Networks
by Takumi Sakamoto & Tomotaka Kimura & Kouji Hirata - 1-19 Improved Generation of Drawing Sequences Using Variational and Skip-Connected Deep Networks for a Drawing Support System
by Atomu Nakamura & Homari Matsumoto & Koharu Chiba & Shun Nishide - 1-19 Prompt-Driven and Kubernetes Error Report-Aware Container Orchestration
by Niklas Beuter & André Drews & Nane Kratzke - 1-20 From Divergence to Alignment: Evaluating the Role of Large Language Models in Facilitating Agreement Through Adaptive Strategies
by Loukas Triantafyllopoulos & Dimitris Kalles - 1-20 Deep Learning Approaches for Automatic Livestock Detection in UAV Imagery: State-of-the-Art and Future Directions
by Muhammad Adam & Jianchao Song & Wei Yu & Qingqing Li - 1-21 Dynamic Resource Management in 5G-Enabled Smart Elderly Care Using Deep Reinforcement Learning
by Krishnapriya V. Shaji & Srilakshmi S. Rethy & Simi Surendran & Livya George & Namita Suresh & Hrishika Dayan - 1-21 3D Spatial Path Planning Based on Improved Particle Swarm Optimization
by Junxia Ma & Zixu Yang & Ming Chen - 1-22 GraphRAG-Enhanced Dialogue Engine for Domain-Specific Question Answering: A Case Study on the Civil IoT Taiwan Platform
by Hui-Hung Yu & Wei-Tsun Lin & Chih-Wei Kuan & Chao-Chi Yang & Kuan-Min Liao - 1-22 Dynamic Channel Selection for Rendezvous in Cognitive Radio Networks
by Mohammed Hawa & Ramzi Saifan & Talal A. Edwan & Oswa M. Amro - 1-22 AI-Driven Transformations in Manufacturing: Bridging Industry 4.0, 5.0, and 6.0 in Sustainable Value Chains
by Andrés Fernández-Miguel & Fernando Enrique García-Muiña & Susana Ortíz-Marcos & Mariano Jiménez-Calzado & Alfonso P. Fernández del Hoyo & Davide Settembre-Blundo - 1-23 Fuzzy-Based MEC-Assisted Video Adaptation Framework for HTTP Adaptive Streaming
by Waqas ur Rahman - 1-24 A Game Theoretic Approach for D2D Assisted Uncoded Caching in IoT Networks
by Jiajie Ren & Chang Guo - 1-25 Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models
by Abin Kumbalapalliyil Tom & Ansam Khraisat & Tony Jan & Md Whaiduzzaman & Thien D. Nguyen & Ammar Alazab - 1-25 Detection and Mitigation in IoT Ecosystems Using oneM2M Architecture and Edge-Based Machine Learning
by Yu-Yong Luo & Yu-Hsun Chiu & Chia-Hsin Cheng - 1-26 Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks
by Ran Xin & Yapeng Wang & Xiaohong Huang & Xu Yang & Sio Kei Im - 1-27 Refactoring Loops in the Era of LLMs: A Comprehensive Study
by Alessandro Midolo & Emiliano Tramontana - 1-28 1D-CNN-Based Performance Prediction in IRS-Enabled IoT Networks for 6G Autonomous Vehicle Applications
by Radwa Ahmed Osman - 1-28 GPT-4.1 Sets the Standard in Automated Experiment Design Using Novel Python Libraries
by Nuno Fachada & Daniel Fernandes & Carlos M. Fernandes & Bruno D. Ferreira-Saraiva & João P. Matos-Carvalho - 1-28 Toward Secure SDN Infrastructure in Smart Cities: Kafka-Enabled Machine Learning Framework for Anomaly Detection
by Gayathri Karthick & Glenford Mapp & Jon Crowcroft - 1-29 A Platform-Agnostic Publish–Subscribe Architecture with Dynamic Optimization
by Ahmed Twabi & Yepeng Ding & Tohru Kondo - 1-29 Exploring the Evolution of Big Data Technologies: A Systematic Literature Review of Trends, Challenges, and Future Directions
by Tahani Ali Hakami & Yasser M. Alginahi & Omar Sabri - 1-30 SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring
by Qian Qu & Yu Chen & Erik Blasch - 1-32 Real-Time Detection and Mitigation Strategies Newly Appearing for DDoS Profiles
by Peter Orosz & Balazs Nagy & Pal Varga - 1-32 Intercepting and Monitoring Potentially Malicious Payloads with Web Honeypots
by Rareș-Mihail Visalom & Maria-Elena Mihăilescu & Răzvan Rughiniș & Dinu Țurcanu - 1-32 Design and Evaluation of a Research-Oriented Open-Source Platform for Smart Grid Metering: A Comprehensive Review and Experimental Intercomparison of Smart Meter Technologies
by Nikolaos S. Korakianitis & Panagiotis Papageorgas & Georgios A. Vokas & Dimitrios D. Piromalis & Stavros D. Kaminaris & George Ch. Ioannidis & Ander Ochoa de Zuazola - 1-38 A GHZ-Based Protocol for the Dining Information Brokers Problem
by Theodore Andronikos & Constantinos Bitsakos & Konstantinos Nikas & Georgios I. Goumas & Nectarios Koziris - 1-40 Intelligent Edge Computing and Machine Learning: A Survey of Optimization and Applications
by Sebastián A. Cajas Ordóñez & Jaydeep Samanta & Andrés L. Suárez-Cetrulo & Ricardo Simón Carbajo - 1-50 The Rise of Agentic AI: A Review of Definitions, Frameworks, Architectures, Applications, Evaluation Metrics, and Challenges
by Ajay Bandi & Bhavani Kongari & Roshini Naguru & Sahitya Pasnoor & Sri Vidya Vilipala
July 2025, Volume 17, Issue 8
- 1-14 Edge-FLGuard+: A Federated and Lightweight Anomaly Detection Framework for Securing 5G-Enabled IoT in Smart Homes
by Manuel J. C. S. Reis - 1-15 DigiHortiRobot: An AI-Driven Digital Twin Architecture for Hydroponic Greenhouse Horticulture with Dual-Arm Robotic Automation
by Roemi Fernández & Eduardo Navas & Daniel Rodríguez-Nieto & Alain Antonio Rodríguez-González & Luis Emmi - 1-15 A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics
by Rajganesh Nagarajan & Vinothiyalakshmi Palanichamy & Ramkumar Thirunavukarasu & J. Arun Pandian - 1-16 ETM: Modern Insights into Perspective on Text-to-SQL Evaluation in the Age of Large Language Models
by Benjamin G. Ascoli & Yasoda Sai Ram Kandikonda & Jinho D. Choi - 1-16 An Efficient Internet-Wide Scan Approach Based on Location Awareness
by Wenqi Shi & Huiling Shi & Hao Hao & Qiuyu Guan - 1-17 Harmonized Autonomous–Human Vehicles via Simulation for Emissions Reduction in Riyadh City
by Ali Louati & Hassen Louati & Elham Kariri - 1-18 Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT)
by Abdullah Mohammed Alharthi & Fahad S. Altuwaijri & Mohammed Alsaadi & Mourad Elloumi & Ali A. M. Al-Kubati - 1-19 Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks
by Saif Safaa Shakir & Leyli Mohammad Khanli & Hojjat Emami - 1-20 Impact of Audio Delay and Quality in Network Music Performance
by Konstantinos Tsioutas & George Xylomenos & Ioannis Doumanis - 1-22 MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT
by Jian Tang & Zhao Huang & Chunqiang Li - 1-22 Neural Network-Informed Lotka–Volterra Dynamics for Cryptocurrency Market Analysis
by Dimitris Kastoris & Dimitris Papadopoulos & Konstantinos Giotopoulos - 1-22 A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains
by John Byrd & Kritagya Upadhyay & Samir Poudel & Himanshu Sharma & Yi Gu - 1-23 Model Retraining upon Concept Drift Detection in Network Traffic Big Data
by Sikha S. Bagui & Mohammad Pale Khan & Chedlyne Valmyr & Subhash C. Bagui & Dustin Mink - 1-23 SARAC4N: Socially and Resource-Aware Caching in Clustered Content-Centric Networks
by Amir Raza Khan & Umar Shoaib & Hannan Bin Liaqat - 1-24 Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation
by Jatinder Pal Singh & Aqsa Aqsa & Imran Ghani & Raj Sonani & Vijay Govindarajan - 1-25 Scalable and Efficient GCL Scheduling for Time-Aware Shaping in Autonomous and Cyber-Physical Systems
by Chengwei Zhang & Yun Wang - 1-26 Real-Time Fall Monitoring for Seniors via YOLO and Voice Interaction
by Eugenia Tîrziu & Ana-Mihaela Vasilevschi & Adriana Alexandru & Eleonora Tudora - 1-27 A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps
by Zhonghao Zhai & Junyi Liu & Xinying Liu & Yanqin Mao & Xinjun Zhang & Jialin Ma & Chunhua Jin - 1-30 Augmented Reality and Virtual Reality in Exergaming
by Georgios Lampropoulos & Theofylaktos Anastasiadis & Juan Garzón - 1-31 An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention
by Ndukwe Ukeje & Jairo A. Gutierrez & Krassie Petrova & Ugochukwu Chinonso Okolie - 1-32 Privacy-Preserving Federated Unlearning with Ontology-Guided Relevance Modeling for Secure Distributed Systems
by Naglaa E. Ghannam & Esraa A. Mahareek - 1-32 EsCorpiusBias: The Contextual Annotation and Transformer-Based Detection of Racism and Sexism in Spanish Dialogue
by Ksenia Kharitonova & David Pérez-Fernández & Javier Gutiérrez-Hernando & Asier Gutiérrez-Fandiño & Zoraida Callejas & David Griol - 1-34 A Verilog Programming Learning Assistant System Focused on Basic Verilog with a Guided Learning Method
by Pin-Chieh Hsieh & Tzu-Lun Fang & Shaobo Jin & Yuyan Wang & Nobuo Funabiki & Yu-Cheng Fan - 1-34 Lightweight Anomaly Detection in Digit Recognition Using Federated Learning
by Anja Tanović & Ivan Mezei - 1-36 Privacy Framework for the Development of IoT-Based Systems
by Yaqin Y. Shaheen & Miguel J. Hornos & Carlos Rodríguez-Domínguez - 1-36 RestRho: A JSON-Based Domain-Specific Language for Designing and Developing RESTful APIs to Validate RhoArchitecture
by Enrique Chavarriaga & Luis Rojas & Francy D. Rodríguez & Kat Sorbello & Francisco Jurado - 1-37 Efficient Machine Learning-Based Prediction of Solar Irradiance Using Multi-Site Data
by Hassan N. Noura & Zaid Allal & Ola Salman & Khaled Chahine - 1-42 A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems
by Mohamed Sayed Farghaly & Heba Kamal Aslan & Islam Tharwat Abdel Halim
August 2025, Volume 17, Issue 8
- 1-3 Editorial for the Special Issue “Virtual Reality and Metaverse: Impact on the Digital Transformation of Society—2nd Edition”
by Diego Vergara - 1-13 Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations
by Yonit Rusho & Daphne Ruth Raban & Michal Chalamish & Vered Pnueli - 1-17 An Energy-Efficient Scheme for Waking Co-Channel TDMA in LoRa Networks via the Integration of Bidirectional Timestamp Correction and Address Recognition
by Zongliang Xu & Guicai Yu & Yingcong Luo & Hao Jiang - 1-17 Adaptive and User-Friendly Framework for Image Classification with Transfer Learning Models
by Manan Khatri & Manmita Sahoo & Sameer Sayyad & Javed Sayyad - 1-21 Rethinking Modbus-UDP for Real-Time IIoT Systems
by Ivan Cibrario Bertolotti - 1-21 Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges
by Simeon Ogunbunmi & Yu Chen & Qi Zhao & Deeraj Nagothu & Sixiao Wei & Genshe Chen & Erik Blasch - 1-21 A Novel Framework Leveraging Large Language Models to Enhance Cold-Start Advertising Systems
by Albin Uruqi & Iosif Viktoratos & Athanasios Tsadiras - 1-21 Enabling Horizontal Collaboration in Logistics Through Secure Multi-Party Computation
by Gabriele Spini & Stephan Krenn & Erich Teppan & Christina Petschnigg & Elena Wiegelmann - 1-21 A High-Capacity Reversible Data Hiding Scheme for Encrypted Hyperspectral Images Using Multi-Layer MSB Block Labeling and ERLE Compression
by Yijie Lin & Chia-Chen Lin & Zhe-Min Yeh & Ching-Chun Chang & Chin-Chen Chang - 1-22 The Future of Education: A Systematic Literature Review of Self-Directed Learning with AI
by Carmen del Rosario Navas Bonilla & Luis Miguel Viñan Carrasco & Jhoanna Carolina Gaibor Pupiales & Daniel Eduardo Murillo Noriega - 1-23 AI-Supported EUD for Data Visualization: An Exploratory Case Study
by Sara Beschi & Daniela Fogli & Luigi Gargioni & Angela Locoro - 1-24 Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo - 1-24 Unsupervised Person Re-Identification via Deep Attribute Learning
by Shun Zhang & Yaohui Xu & Xuebin Zhang & Boyang Cheng & Ke Wang - 1-26 Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments
by Daniel Sernández-Iglesias & Llanos Tobarra & Rafael Pastor-Vargas & Antonio Robles-Gómez & Pedro Vidal-Balboa & João Sarraipa - 1-26 Parallel Algorithm for NP-Hard Problem of Channel Resource Allocation Optimization in Ad Hoc and Sensor Networks
by Valeriy Ivanov & Maxim Tereshonok - 1-27 Beyond Prompt Chaining: The TB-CSPN Architecture for Agentic AI
by Uwe M. Borghoff & Paolo Bottoni & Remo Pareschi - 1-28 Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen & Mien L. Trinh & Minh T. Nguyen & Thang C. Vu & Tao V. Nguyen & Long Q. Dinh & Mui D. Nguyen - 1-29 DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
by Shengmin Peng & Jialin Tian & Xiangyu Zheng & Shuwu Chen & Zhaogang Shu - 1-29 Internet of Things Driven Digital Twin for Intelligent Manufacturing in Shipbuilding Workshops
by Caiping Liang & Xiang Li & Wenxu Niu & Yansong Zhang - 1-29 A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks
by Max Hashem Eiza & Brian Akwirry & Alessandro Raschella & Michael Mackay & Mukesh Kumar Maheshwari - 1-30 A Multi-Layer Secure Sharing Framework for Aviation Big Data Based on Blockchain
by Qing Wang & Zhijun Wu & Yanrong Lu - 1-30 A High-Acceptance-Rate VxWorks Fuzzing Framework Based on Protocol Feature Fusion and Memory Extraction
by Yichuan Wang & Jiazhao Han & Xi Deng & Xinhong Hei - 1-31 TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs
by Soundes Oumaima Boufaida & Abdelmadjid Benmachiche & Makhlouf Derdour & Majda Maatallah & Moustafa Sadek Kahil & Mohamed Chahine Ghanem - 1-33 Patient-Oriented Smart Applications to Support the Diagnosis, Rehabilitation, and Care of Patients with Parkinson’s: An Umbrella Review
by Rute Bastardo & João Pavão & Ana Isabel Martins & Anabela G. Silva & Nelson Pacheco Rocha - 1-34 Federated Learning for Anomaly Detection: A Systematic Review on Scalability, Adaptability, and Benchmarking Framework
by Le-Hang Lim & Lee-Yeng Ong & Meng-Chew Leow - 1-38 Transforming Data Annotation with AI Agents: A Review of Architectures, Reasoning, Applications, and Impact
by Md Monjurul Karim & Sangeen Khan & Dong Hoang Van & Xinyue Liu & Chunhui Wang & Qiang Qu - 1-38 Enhancing Industrial Processes Through Augmented Reality: A Scoping Review
by Alba Miranda & Aracely M. Vallejo & Paulina Ayala & Marcelo V. Garcia & Jose E. Naranjo - 1-39 Efficient Charging Station Selection for Minimizing Total Travel Time of Electric Vehicles
by Yaqoob Al-Zuhairi & Prashanth Kannan & Alberto Bazán Guillén & Luis J. de la Cruz Llopis & Mónica Aguilar Igartua - 1-41 The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses
by Leandro Antonio Pazmiño Ortiz & Ivonne Fernanda Maldonado Soliz & Vanessa Katherine Guevara Balarezo - 1-44 Creating Automated Microsoft Bicep Application Infrastructure from GitHub in the Azure Cloud
by Vladislav Manolov & Daniela Gotseva & Nikolay Hinov
June 2025, Volume 17, Issue 7
- 1-16 IoT-Edge Hybrid Architecture with Cross-Modal Transformer and Federated Manifold Learning for Safety-Critical Gesture Control in Adaptive Mobility Platforms
by Xinmin Jin & Jian Teng & Jiaji Chen - 1-18 Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks
by Matthew Boeding & Paul Scalise & Michael Hempel & Hamid Sharif & Juan Lopez - 1-20 ERA-MADDPG: An Elastic Routing Algorithm Based on Multi-Agent Deep Deterministic Policy Gradient in SDN
by Wanwei Huang & Hongchang Liu & Yingying Li & Linlin Ma - 1-21 Optimizing Trajectories for Rechargeable Agricultural Robots in Greenhouse Climatic Sensing Using Deep Reinforcement Learning with Proximal Policy Optimization Algorithm
by Ashraf Sharifi & Sara Migliorini & Davide Quaglia - 1-22 AI-Based Learning Recommendations: Use in Higher Education
by Prabin Dahal & Saptadi Nugroho & Claudia Schmidt & Volker Sänger - 1-22 AUV Trajectory Planning for Optimized Sensor Data Collection in Internet of Underwater Things
by Talal S. Almuzaini & Andrey V. Savkin - 1-22 FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments
by Bruno Ramos-Cruz & Francisco J. Quesada-Real & Javier Andreu-Pérez & Jessica Zaqueros-Martinez - 1-23 SatScope: A Data-Driven Simulator for Low-Earth-Orbit Satellite Internet
by Qichen Wang & Guozheng Yang & Yongyu Liang & Chiyu Chen & Qingsong Zhao & Sugai Chen - 1-23 The Internet of Things, Fog, and Cloud Continuum: Integration Challenges and Opportunities for Smart Cities
by Rodger Lea & Toni Adame & Alexandre Berne & Selma Azaiez - 1-24 Responsible Resilience in Cyber–Physical–Social Systems: A New Paradigm for Emergent Cyber Risk Modeling
by Theresa Sobb & Nour Moustafa & Benjamin Turnbull - 1-24 Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review
by Juan Ochoa-Aldeán & Carlos Silva-Cárdenas & Renato Torres & Jorge Ivan Gonzalez & Sergio Fortes - 1-24 ICRSSD: Identification and Classification for Railway Structured Sensitive Data
by Yage Jin & Hongming Chen & Rui Ma & Yanhua Wu & Qingxin Li - 1-24 HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications
by Saud Alharbi & Wasan Awad & David Bell - 1-25 Lower-Latency Screen Updates over QUIC with Forward Error Correction
by Nooshin Eghbal & Paul Lu - 1-26 The Role of Multi-Agent Systems in Realizing Asset Administration Shell Type 3
by Lucas Sakurada & Fernando De la Prieta & Paulo Leitao - 1-27 Cross-Lingual Cross-Domain Transfer Learning for Rumor Detection
by Eliana Providel & Marcelo Mendoza & Mauricio Solar - 1-27 Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications
by Haoming Wang & Aryan Sharma & Deepak Mishra & Aruna Seneviratne & Eliathamby Ambikairajah - 1-28 Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
by Seema G. Aarella & Venkata P. Yanambaka & Saraju P. Mohanty & Elias Kougianos - 1-28 Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users
by George Alex Stelea & Livia Sangeorzan & Nicoleta Enache-David - 1-28 Towards Automatic Detection of Pneumothorax in Emergency Care with Deep Learning Using Multi-Source Chest X-ray Data
by Santiago Ibañez Caturla & Juan de Dios Berná Mestre & Oscar Martinez Mozos - 1-30 Tourism Sentiment Chain Representation Model and Construction from Tourist Reviews
by Bosen Li & Rui Li & Junhao Wang & Aihong Song - 1-30 Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
by Germán Rodríguez-Galán & Eduardo Benavides-Astudillo & Daniel Nuñez-Agurto & Pablo Puente-Ponce & Sonia Cárdenas-Delgado & Mauricio Loachamín-Valencia - 1-31 Measurement of the Functional Size of Web Analytics Implementation: A COSMIC-Based Case Study Using Machine Learning
by Ammar Abdallah & Alain Abran & Munthir Qasaimeh & Malik Qasaimeh & Bashar Abdallah - 1-33 Metaverse Architectures: A Comprehensive Systematic Review of Definitions and Frameworks
by Cemile Boztas & Essam Ghadafi & Rasha Ibrahim - 1-33 TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing
by Hisham Ali & William J. Buchanan & Jawad Ahmad & Marwan Abubakar & Muhammad Shahbaz Khan & Isam Wadhaj - 1-34 An Experimental Tethered UAV-Based Communication System with Continuous Power Supply
by Veronica Rodriguez & Christian Tipantuña & Diego Reinoso & Jorge Carvajal-Rodriguez & Carlos Egas Acosta & Pablo Proaño & Xavier Hesselbach - 1-34 An Optimized Transformer–GAN–AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets
by Ahmad Salehiyan & Pardis Sadatian Moghaddam & Masoud Kaveh - 1-35 Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks
by Abdul Manan Sheikh & Md. Rafiqul Islam & Mohamed Hadi Habaebi & Suriza Ahmad Zabidi & Athaur Rahman Bin Najeeb & Adnan Kabbani - 1-35 Intelligent Transmission Control Scheme for 5G mmWave Networks Employing Hybrid Beamforming
by Hazem (Moh’d Said) Hatamleh & As’ad Mahmoud As’ad Alnaser & Roba Mahmoud Ali Aloglah & Tomader Jamil Bani Ata & Awad Mohamed Ramadan & Omar Radhi Aqeel Alzoubi
July 2025, Volume 17, Issue 7
- 1-14 Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City
by Gabriel Sepúlveda-Cervantes & Eduardo Vega-Alvarado & Edgar Alfredo Portilla-Flores & Eduardo Vivanco-Rodríguez - 1-17 A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks
by Sridhar Varadala & Hao Xu - 1-19 A UAV Trajectory Optimization and Task Offloading Strategy Based on Hybrid Metaheuristic Algorithm in Mobile Edge Computing
by Yeqiang Zheng & An Li & Yihu Wen & Gaocai Wang - 1-19 A Case Study on Monolith to Microservices Decomposition with Variational Autoencoder-Based Graph Neural Network
by Rokin Maharjan & Korn Sooksatra & Tomas Cerny & Yudeep Rajbhandari & Sakshi Shrestha - 1-19 Attack Surface Score for Software Systems
by Yudeep Rajbhandari & Rokin Maharjan & Sakshi Shrestha & Tomas Cerny - 1-20 Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks
by Kenan Honore Robacky Mbongo & Kanwal Ahmed & Orken Mamyrbayev & Guanghui Wang & Fang Zuo & Ainur Akhmediyarova & Nurzhan Mukazhanov & Assem Ayapbergenova - 1-21 Enhancing Security in 5G and Future 6G Networks: Machine Learning Approaches for Adaptive Intrusion Detection and Prevention
by Konstantinos Kalodanis & Charalampos Papapavlou & Georgios Feretzakis - 1-22 The Investigation of Queuing Models to Calculate Journey Times to Develop an Intelligent Transport System for Smart Cities
by Vatsal Mehta & Glenford Mapp & Vaibhav Gandhi - 1-23 An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network
by Vidhya Prakash Rajendran & Deepalakshmi Perumalsamy & Chinnasamy Ponnusamy & Ezhil Kalaimannan