Content
March 2025, Volume 17, Issue 4
- 1-15 On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective
by Fragkiskos Ninos & Konstantinos Karalas & Dimitrios Dechouniotis & Michael Polemis - 1-20 Explainable Identification of Similarities Between Entities for Discovery in Large Text
by Akhil Joshi & Sai Teja Erukude & Lior Shamir - 1-21 Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions
by Oladele Afolalu & Mohohlo Samuel Tsoeu - 1-25 Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan
by Tenzin Norbu & Joo Yeon Park & Kok Wai Wong & Hui Cui - 1-25 Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
by Ali Zaman & Salman A. Khan & Nazeeruddin Mohammad & Abdelhamied A. Ateya & Sadique Ahmad & Mohammed A. ElAffendi
February 2025, Volume 17, Issue 3
- 1-5 Edge Intelligence: Edge Computing for 5G and the Internet of Things
by Yuezhi Zhou & Xu Chen - 1-15 Blockchain-Based Decentralised Authentication in Closed Environments
by Wata Kanjanapruthipong & Sirapat Boonkrong - 1-15 Gamitest: A Game-like Online Student Assessment System
by Jakub Swacha & Artur Kulpa - 1-15 Assessing Browser Security: A Detailed Study Based on CVE Metrics
by Oleksii Chalyi & Kęstutis Driaunys & Vytautas Rudžionis - 1-19 Optimizing Electric Vehicle Routing Efficiency Using K-Means Clustering and Genetic Algorithms
by Tal Gaon & Yovel Gabay & Miri Weiss Cohen - 1-19 Metastable Substructure Embedding and Robust Classification of Multichannel EEG Data Using Spectral Graph Kernels
by Rashmi N. Muralinath & Vishwambhar Pathak & Prabhat K. Mahanti - 1-20 User-Generated Content and Its Impact on Purchase Intent for Tourism Products: A Comparative Analysis of Millennials and Centennials on TikTok
by Eva Correia Ramos & Célia M. Q. Ramos - 1-23 IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System
by Nicoletta González-Cancelas & Javier Vaca-Cabrero & Alberto Camarero-Orive - 1-28 An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design
by J. de Curtò & I. de Zarzà & Leandro Sebastián Fervier & Victoria Sanagustín-Fons & Carlos T. Calafate - 1-32 Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network
by Mario Martínez-Morfa & Carlos Ruiz de Mendoza & Cristina Cervelló-Pastor & Sebastia Sallent-Ribes - 1-34 Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks
by Jinying Li & Ananda Maiti
March 2025, Volume 17, Issue 3
- 1-15 Deep Neural Network-Based Modeling of Multimodal Human–Computer Interaction in Aircraft Cockpits
by Li Wang & Heming Zhang & Changyuan Wang - 1-15 Resource-Aware ECG Classification with Heterogeneous Models in Federated Learning
by Mohammad Munzurul Islam & Mohammed Alawad - 1-16 GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning
by Yulin Kang & Wuzheng Tan & Linlin Fan & Yinuo Chen & Xinbin Lai & Jian Weng - 1-18 Frame Aggregation with Simple Block Acknowledgement Mechanism to Provide Strict Quality of Service Guarantee to Emergency Traffic in Wireless Networks
by Shuaib K. Memon & Md Akbar Hossain & Nurul I. Sarkar - 1-19 Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events
by J. D. Morillo Reina & T. J. Mateo Sanguino - 1-19 A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios
by Fabrizio Messina & Domenico Rosaci & Giuseppe M. L. Sarnè - 1-20 Mobility Prediction and Resource-Aware Client Selection for Federated Learning in IoT
by Rana Albelaihi - 1-20 SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features
by Tieqi Xi & Qiuhua Zheng & Chuanhui Cheng & Ting Wu & Guojie Xie & Xuebiao Qian & Haochen Ye & Zhenyu Sun - 1-20 A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping
by Amanda Thomson & Leandros Maglaras & Naghmeh Moradpoor - 1-20 CommC: A Multi-Purpose COMModity Hardware Cluster
by Agorakis Bompotas & Nikitas-Rigas Kalogeropoulos & Christos Makris - 1-20 Enabling Tactile Internet via 6G: Application Characteristics, Requirements, and Design Considerations
by Bharat S. Chaudhari - 1-20 How Does Digital Capability Shape Resilient Supply Chains?—Evidence from China’s Electric Vehicle Manufacturing Industry
by Yanxuan Li & Vatcharapol Sukhotu - 1-21 A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles
by Hani Alnami & Imad Mahgoub & Hamzah Al-Najada & Easa Alalwany - 1-22 University Students’ Subjective Well-Being in Japan Between 2021 and 2023: Its Relationship with Social Media Use
by Shaoyu Ye & Kevin K. W. Ho - 1-23 FedRecI2C: A Novel Federated Recommendation Framework Integrating Communication and Computation to Accelerate Convergence Under Communication Constraints
by Qizhong Zheng & Xiujie Huang - 1-24 Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk
by Vincenzo Barrile & Emanuela Genovese & Clemente Maesano & Sonia Calluso & Maurizio Pasquale Manti - 1-25 Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects’ Stigmergic Communication
by Ojilvie Avila-Cortés & Saúl E. Pomares Hernández & Julio César Pérez-Sansalvador & Lil María Xibai Rodríguez-Henríquez - 1-27 Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms
by Andri Santoso & Samsul Huda & Yuta Kodera & Yasuyuki Nogami - 1-28 A Regional Multi-Agent Air Monitoring Platform
by Stanimir Stoyanov & Emil Doychev & Asya Stoyanova-Doycheva & Veneta Tabakova-Komsalova & Ivan Stoyanov & Iliya Nedelchev - 1-28 A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models
by Nicholas Jones & Md Whaiduzzaman & Tony Jan & Amr Adel & Ammar Alazab & Afnan Alkreisat - 1-30 Advanced Trajectory Analysis of NASA’s Juno Mission Using Unsupervised Machine Learning: Insights into Jupiter’s Orbital Dynamics
by Ashraf ALDabbas & Zaid Mustafa & Zoltan Gal - 1-36 CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality
by Daneesha Ranasinghe & Nayomi Kankanamge & Chathura De Silva & Nuwani Kangana & Rifat Mahamood & Tan Yigitcanlar - 1-39 Dynamic Workload Management System in the Public Sector: A Comparative Analysis
by Konstantinos C. Giotopoulos & Dimitrios Michalopoulos & Gerasimos Vonitsanos & Dimitris Papadopoulos & Ioanna Giannoukou & Spyros Sioutas - 1-41 Edge and Cloud Computing in Smart Cities
by Maria Trigka & Elias Dritsas - 1-48 Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things
by John Mulo & Hengshuo Liang & Mian Qian & Milon Biswas & Bharat Rawal & Yifan Guo & Wei Yu - 1-50 Health Misinformation in Social Networks: A Survey of Information Technology Approaches
by Vasiliki Papanikou & Panagiotis Papadakos & Theodora Karamanidou & Thanos G. Stavropoulos & Evaggelia Pitoura & Panayiotis Tsaparas
January 2025, Volume 17, Issue 2
- 1-15 Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing
by David Ortiz-Perez & Pablo Ruiz-Ponce & David Mulero-Pérez & Manuel Benavent-Lledo & Javier Rodriguez-Juan & Hugo Hernandez-Lopez & Anatoli Iarovikov & Srdjan Krco & Daliborka Nedic & Dejan Vukobratovic & Jose Garcia-Rodriguez - 1-18 Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality
by Ana Cassia Cruz & Rogério Luís de C. Costa & Leonel Santos & Carlos Rabadão & Anabela Marto & Alexandrino Gonçalves - 1-21 Enhancing Human–Agent Interaction via Artificial Agents That Speculate About the Future
by Casey C. Bennett & Young-Ho Bae & Jun-Hyung Yoon & Say Young Kim & Benjamin Weiss - 1-23 IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model
by Huu Dang Quoc & Loc Nguyen The & Truong Bui Quang & Phuong Han Minh - 1-29 Survey on Secure Scientific Workflow Scheduling in Cloud Environments
by Hadeel Amjed Saeed & Sufyan T. Faraj Al-Janabi & Esam Taha Yassen & Omar A. Aldhaibani - 1-32 BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups
by Brahim Benaissa & Filip Hendrichovsky & Mansur As & Kaori Yoshida - 1-44 Sixth Generation Enabling Technologies and Machine Learning Intersection: A Performance Optimization Perspective
by Emmanuel Ekene Okere & Vipin Balyan
February 2025, Volume 17, Issue 2
- 1-1 Correction: Marti et al. Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. Future Internet 2024, 16 , 446
by Patrizia Marti & Giulia Teverini & Cecilia Goracci & Lorenzo Franchi - 1-5 Machine Learning for Blockchain and IoT Systems in Smart City
by Cheng-Chi Lee & Dinh-Thuan Do & Agbotiname Lucky Imoize - 1-14 Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN
by Azita Pourghasem & Raimund Kirner & Athanasios Tsokanos & Iosif Mporas & Alexios Mylonas - 1-15 Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems
by Manuel Cheminod & Ivan Cibrario Bertolotti & Adriano Valenzano & Luca Durante - 1-18 MAGIC: Multi-User Advanced Graphic Immersive Configurator for Sustainable Customization of Complex Design Products—A Sailing Yacht Case Study
by Saverio Piccininni & Mine Dastan & Fabio Vangi & Michele Fiorentino - 1-19 Transmission Power Control in Multi-Hop Communications of THz Communication Using a Potential Game Approach
by Evangelos D. Spyrou & Vassilios Kappatos & Chrysostomos Stylios - 1-19 Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures
by Peng Liu & Lili Jia & Yang Xiao - 1-19 Framework of Best Practices to Drive the Digital Transition: Towards a 4.0 Paradigm Based on Evidence from Case Studies
by Tiago Bastos & Cármen Guimarães & Leonor Teixeira - 1-20 Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification
by Oleksandr Kuznetsov & Emanuele Frontoni & Kateryna Kuznetsova & Marco Arnesano - 1-20 Hybrid Solution Through Systematic Electrical Impedance Tomography Data Reduction and CNN Compression for Efficient Hand Gesture Recognition on Resource-Constrained IoT Devices
by Salwa Sahnoun & Mahdi Mnif & Bilel Ghoul & Mohamed Jemal & Ahmed Fakhfakh & Olfa Kanoun - 1-21 Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach
by Alfredo Cuzzocrea & Mst Shapna Akter & Hossain Shahriar & Pablo García Bringas - 1-22 Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning
by Abimbola Efunogbon & Enjie Liu & Renxie Qiu & Taiwo Efunogbon - 1-22 Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System
by Hemin Sardar Abdulla & Aso M. Aladdin - 1-23 On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification
by Gianmarco Baldini - 1-23 Security and Privacy in Physical–Digital Environments: Trends and Opportunities
by Carolina Pereira & Anabela Marto & Roberto Ribeiro & Alexandrino Gonçalves & Nuno Rodrigues & Carlos Rabadão & Rogério Luís de Carvalho Costa & Leonel Santos - 1-24 DTL-GNN: Digital Twin Lightweight Method Based on Graph Neural Network
by Chengjun Li & Liguo Yao & Yao Lu & Songsong Zhang & Taihua Zhang - 1-24 A Review and Experimental Evaluation on Split Learning
by Zhanyi Hu & Tianchen Zhou & Bingzhe Wu & Cen Chen & Yanhao Wang - 1-25 Intelligent Virtual Reality and Augmented Reality Technologies: An Overview
by Georgios Lampropoulos - 1-25 Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms
by Jannatul Ferdush & Joarder Kamruzzaman & Gour Karmakar & Iqbal Gondal & Rajkumar Das - 1-25 Investigation of Smart Machines with DNAs in SpiderNet
by Mo Adda & Nancy Scheidt - 1-26 A Methodological Framework for AI-Driven Textual Data Analysis in Digital Media
by Douglas Cordeiro & Carlos Lopezosa & Javier Guallar - 1-26 Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling
by Saif Al-Dean Qawasmeh & Ali Abdullah S. AlQahtani - 1-27 Secure Tiny Machine Learning on Edge Devices: A Lightweight Dual Attestation Mechanism for Machine Learning
by Vlad-Eusebiu Baciu & An Braeken & Laurent Segers & Bruno da Silva - 1-28 ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks
by Rodrigo Asensio-Garriga & Alejandro Molina Zarca & Jordi Ortiz & Ana Hermosilla & Hugo Ramón Pascual & Antonio Pastor & Antonio Skarmeta - 1-29 Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks
by Abdulrahman A. Alshdadi & Abdulwahab Ali Almazroi & Nasir Ayub & Miltiadis D. Lytras & Eesa Alsolami & Faisal S. Alsubaei & Riad Alharbey - 1-30 AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-Agents
by Md Monjurul Karim & Dong Hoang Van & Sangeen Khan & Qiang Qu & Yaroslav Kholodov - 1-30 When Cybersecurity Meets Accessibility: A Holistic Development Architecture for Inclusive Cyber-Secure Web Applications and Websites
by George Alex Stelea & Livia Sangeorzan & Nicoleta Enache-David - 1-30 Ubunye: An MEC Orchestration Service Based on QoE, QoS, and Service Classification Using Machine Learning
by Kilbert Amorim Maciel & David Martins Leite & Guilherme Alves de Araújo & Flavia C. Delicato & Atslands R. Rocha - 1-30 Task-Driven Virtual Machine Optimization Placement Model and Algorithm
by Ran Yang & Zhaonan Li & Junhao Qian & Zhihua Li - 1-31 CORES: Context-Aware Emotion-Driven Recommendation System-Based LLM to Improve Virtual Shopping Experiences
by Abderrahim Lakehal & Adel Alti & Boubakeur Annane - 1-31 Robust Synthetic Data Generation for Sequential Financial Models Using Hybrid Variational Autoencoder–Markov Chain Monte Carlo Architectures
by Francesco Bruni Prenestino & Enrico Barbierato & Alice Gatti - 1-32 Trends, Challenges, and Applications of Large Language Models in Healthcare: A Bibliometric and Scoping Review
by Vincenza Carchiolo & Michele Malgeri - 1-35 A Weighted Composite Metric for Evaluating User Experience in Educational Chatbots: Balancing Usability, Engagement, and Effectiveness
by Abeer Alabbas & Khalid Alomar - 1-40 Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review
by Navdeep Bohra & Ashish Kumari & Vikash Kumar Mishra & Pramod Kumar Soni & Vipin Balyan - 1-43 Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection
by Tahesin Samira Delwar & Sayak Mukhopadhyay & Akshay Kumar & Mangal Singh & Yang-won Lee & Jee-Youl Ryu & A. S. M. Sanwar Hosen - 1-50 Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm
by Gaetanino Paolone & Romolo Paesani & Francesco Pilotti & Jacopo Camplone & Andrea Piazza & Paolino Di Felice - 1-55 The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning
by Leyli Nouraei Yeganeh & Nicole Scarlett Fenty & Yu Chen & Amber Simpson & Mohsen Hatami - 1-57 From Bottom of Sea to Space: Quo Vadis IoT? So What About Security?
by Behrouz Zolfaghari & Jacob Krzciok & Khodakhast Bibak - 1-61 Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes
by Henrich C. Pöhls & Fabian Kügler & Emiliia Geloczi & Felix Klement
January 2025, Volume 17, Issue 1
- 1-2 Blockchain and Artificial Intelligence for Decentralized Edge Environments
by Yuansong Qiao - 1-15 A Reference Architecture for Virtual Human Integration in the Metaverse: Enhancing the Galleries, Libraries, Archives, and Museums (GLAM) Sector with AI-Driven Experiences
by Orestis Spyrou & William Hurst & Caspar Krampe - 1-15 The Time Machine: Future Scenario Generation Through Generative AI Tools
by Jan Ferrer i Picó & Michelle Catta-Preta & Alex Trejo Omeñaca & Marc Vidal & Josep Maria Monguet i Fierro - 1-16 Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0
by Italo Cesidio Fantozzi & Annalisa Santolamazza & Giancarlo Loy & Massimiliano Maria Schiraldi - 1-17 Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment
by Francesco Morgan Bono & Alessio Polinelli & Luca Radicioni & Lorenzo Benedetti & Francesco Castelli-Dezza & Simone Cinquemani & Marco Belloli - 1-17 Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers
by Daniela Gifu & Covaci Silviu-Vasile - 1-19 Ventinel : Automated Detection of Android Vishing Apps Using Optical Character Recognition
by Daegyeom Kim & Sehwan O & Younghoon Ban & Jungsoo Park & Kyungho Joo & Haehyun Cho - 1-19 Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications
by Teguh Indra Bayu & Yung-Fa Huang & Jeang-Kuo Chen & Cheng-Hsiung Hsieh & Budhi Kristianto & Erwien Christianto & Suharyadi Suharyadi - 1-20 A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT
by Innocent Boakye Ababio & Jan Bieniek & Mohamed Rahouti & Thaier Hayajneh & Mohammed Aledhari & Dinesh C. Verma & Abdellah Chehri - 1-20 IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
by Wei Zhou & Shandian Shen & Peng Liu - 1-20 Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss
by Aryan Sharma & Haoming Wang & Deepak Mishra & Aruna Seneviratne - 1-20 End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
by Matthew Boeding & Michael Hempel & Hamid Sharif - 1-21 Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention
by Salvador López-Barajas & Pedro J. Sanz & Raúl Marín-Prades & Juan Echagüe & Sebastian Realpe - 1-23 A Lightweight AI-Based Approach for Drone Jamming Detection
by Sergio Cibecchini & Francesco Chiti & Laura Pierucci - 1-23 A Hierarchical Cache Architecture-Oriented Cache Management Scheme for Information-Centric Networking
by Yichao Chao & Rui Han - 1-23 Collaboration in a Virtual Reality Serious Escape Room in the Metaverse Improves Academic Performance and Learners’ Experiences
by Antonia-Maria Pazakou & Stylianos Mystakidis & Ioannis Kazanidis - 1-23 On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture
by Niroshinie Fernando & Samir Shrestha & Seng W. Loke & Kevin Lee - 1-23 High-Risk AI Systems—Lie Detection Application
by Konstantinos Kalodanis & Panagiotis Rizomiliotis & Georgios Feretzakis & Charalampos Papapavlou & Dimosthenis Anagnostopoulos - 1-23 Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things
by Sumaiah Algarni & Fathi E. Abd El-Samie - 1-23 Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers
by Víctor Pérez-Cano & Francisco Jurado - 1-24 Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT)
by Nemat Hazrati & Sajjad Pirahesh & Bahman Arasteh & Seyed Salar Sefati & Octavian Fratu & Simona Halunga - 1-24 FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model
by Xiaozheng Du & Shijing Hu & Feng Zhou & Cheng Wang & Binh Minh Nguyen - 1-24 Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
by Zhiyuan Wang & Yuezhi Zhou - 1-24 Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
by Chung-Wei Kuo & Wei Wei & Chun-Chang Lin & Yu-Yi Hong & Jia-Ruei Liu & Kuo-Yu Tsai - 1-24 Deep Learning Framework for Advanced De-Identification of Protected Health Information
by Ahmad Aloqaily & Emad E. Abdallah & Rahaf Al-Zyoud & Esraa Abu Elsoud & Malak Al-Hassan & Alaa E. Abdallah - 1-25 Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency
by Chen Qiu & Ziang Wu & Haoda Wang & Qinglin Yang & Yu Wang & Chunhua Su - 1-26 Impact of Weather Factors on Unmanned Aerial Vehicles’ Wireless Communications
by Lalan Mishra & Naima Kaabouch - 1-27 Explainable Security Requirements Classification Through Transformer Models
by Luca Petrillo & Fabio Martinelli & Antonella Santone & Francesco Mercaldo - 1-27 Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading
by Giuseppe Baruffa & Luca Rugini - 1-28 XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
by Maiada M. Mahmoud & Yasser Omar Youssef & Ayman A. Abdel-Hamid - 1-28 Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
by Marica Amadeo & Giuseppe Ruggeri - 1-29 Fake News Detection and Classification: A Comparative Study of Convolutional Neural Networks, Large Language Models, and Natural Language Processing Models
by Konstantinos I. Roumeliotis & Nikolaos D. Tselikas & Dimitrios K. Nasiopoulos - 1-29 Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
by Alessio Ferone & Stefano Verrilli - 1-30 Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
by Muhammad Dilshad & Madiha Haider Syed & Semeen Rehman - 1-30 Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites
by Georgios Fevgas & Thomas Lagkas & Panagiotis Sarigiannidis & Vasileios Argyriou - 1-32 A Survey on Cybersecurity in IoT
by Elias Dritsas & Maria Trigka - 1-32 Survey of Artificial Intelligence Model Marketplace
by Mian Qian & Abubakar Ahmad Musa & Milon Biswas & Yifan Guo & Weixian Liao & Wei Yu - 1-35 Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology
by Tamai Ramírez-Gordillo & Antonio Maciá-Lillo & Francisco A. Pujol & Nahuel García-D’Urso & Jorge Azorín-López & Higinio Mora - 1-39 Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
by Pablo Corona-Fraga & Aldo Hernandez-Suarez & Gabriel Sanchez-Perez & Linda Karina Toscano-Medina & Hector Perez-Meana & Jose Portillo-Portillo & Jesus Olivares-Mercado & Luis Javier García Villalba - 1-41 Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution
by Elmin Marevac & Esad Kadušić & Nataša Živić & Nevzudin Buzađija & Samir Lemeš - 1-54 A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
by Yang Yang & Min Lin & Yangfei Lin & Chen Zhang & Celimuge Wu
December 2024, Volume 17, Issue 1
- 1-19 Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
by Yimika Erinle & Yebo Feng & Jiahua Xu & Nikhil Vadgama & Paolo Tasca - 1-20 WebTrackingScore: A Combined Web Tracking Risk Score System for Websites
by Álvaro D. Guillén Cava & Antonio Ruiz-Martínez - 1-21 EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
by Sakshi Patni & Joohyung Lee - 1-22 Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering
by M. Baqer - 1-23 A Blockchain-Based Protocol for Fair Delivery for Receipts
by M. Francisca Hinarejos & Josep-Lluis Ferrer-Gomila & Andreu-Pere Isern-Deyà & Gerardo-Francisco Chévez-Alvarado - 1-26 GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks
by Vahid Babaey & Arun Ravindran - 1-27 A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints
by Antonio Pinizzotto & Raffaele Bruno - 1-29 A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
by Aviral Goel & Yogachandran Rahulamathavan
December 2024, Volume 16, Issue 12
- 1-4 Cloud Computing and High Performance Computing (HPC) Advances for Next Generation Internet
by Jerry Chou & Wu-Chun Chung - 1-13 WiFi Fingerprint Indoor Localization Employing Adaboost and Probability-One Access Point Selection for Multi-Floor Campus Buildings
by Shanyu Jin & Dongwoo Kim - 1-14 Assessing the Value of Information in an Augmented Reality City Experience
by Yonit Rusho & Ganit Richter & Daphne Ruth Raban - 1-14 A Comparative Study of the User Interaction Behavior and Experience in a Home-Oriented Multi-User Interface (MUI) During Family Collaborative Cooking
by Mengcai Zhou & Minglun Li & Kenta Ono & Makoto Watanabe - 1-16 Customer Churn Prediction Approach Based on LLM Embeddings and Logistic Regression
by Meryem Chajia & El Habib Nfaoui - 1-16 Evaluating DL Model Scaling Trade-Offs During Inference via an Empirical Benchmark Analysis
by Demetris Trihinas & Panagiotis Michael & Moysis Symeonides - 1-17 Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
by Muzun Althunayyan & Amir Javed & Omer Rana & Theodoros Spyridopoulos - 1-17 A Self-Sovereign Identity–Blockchain-Based Model Proposal for Deep Digital Transformation in the Healthcare Sector
by Luisanna Cocco & Roberto Tonelli - 1-17 A Survey of Scenario Generation for Automated Vehicle Testing and Validation
by Ziyu Wang & Jing Ma & Edmund M-K Lai - 1-18 Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection
by Anthony Kenyon & Lipika Deka & David Elizondo - 1-18 A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks
by Mahmoud AlJamal & Rabee Alquran & Ayoub Alsarhan & Mohammad Aljaidi & Mohammad Alhmmad & Wafa’ Q. Al-Jamal & Nasser Albalawi - 1-19 SIGNIFY: Leveraging Machine Learning and Gesture Recognition for Sign Language Teaching Through a Serious Game
by Luca Ulrich & Giulio Carmassi & Paolo Garelli & Gianluca Lo Presti & Gioele Ramondetti & Giorgia Marullo & Chiara Innocente & Enrico Vezzetti - 1-19 Rethinking Blockchain Technologies for the Maritime Industry: An Overview of the Current Landscape
by Heejoo Kim & Zhe Xiao & Xiaocai Zhang & Xiuju Fu & Zheng Qin - 1-19 Thermoelectric Generator-Powered Long-Range Wireless Real-Time Steam Leak Detection in Steam Traps
by Raúl Aragonés & Joan Oliver & Carles Ferrer - 1-20 Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems
by Kon Papazis & Naveen Chilamkurti - 1-20 Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method
by Xinyang Yuan & Jiarong Wang & Haozhi Zhao & Tian Yan & Fazhi Qi - 1-20 Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments
by Jesús Vegas & César Llamas - 1-20 Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems
by Stefan Iordache & Catalina Camelia Patilea & Ciprian Paduraru - 1-20 Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
by Eugenia Tîrziu & Ana-Mihaela Vasilevschi & Adriana Alexandru & Eleonora Tudora - 1-20 Advancing Healthcare Through the Integration of Digital Twins Technology: Personalized Medicine’s Next Frontier
by Sharmin Attaran & Mohsen Attaran - 1-21 A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios
by Nick Bray & Matthew Boeding & Michael Hempel & Hamid Sharif & Tapio Heikkilä & Markku Suomalainen & Tuomas Seppälä - 1-21 Generative AI in Medicine and Healthcare: Moving Beyond the ‘Peak of Inflated Expectations’
by Peng Zhang & Jiayu Shi & Maged N. Kamel Boulos - 1-21 Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications
by Bennet Gerlach & Hannes Hesse & Stefan Fischer & Martin Leucker - 1-22 Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz & Gustavo Chica Pedraza & Alexander Aponte Moreno - 1-22 Analyzing the Features, Usability, and Performance of Deploying a Containerized Mobile Web Application on Serverless Cloud Platforms
by Jeong Yang & Anoop Abraham - 1-24 Policy-Based Smart Contracts Management for IoT Privacy Preservation
by Mohsen Rouached & Aymen Akremi & Mouna Macherki & Naoufel Kraiem - 1-24 A Systematic Comparison Between Open- and Closed-Source Large Language Models in the Context of Generating GDPR-Compliant Data Categories for Processing Activity Records
by Magdalena von Schwerin & Manfred Reichert - 1-24 A Novel Six-Dimensional Chimp Optimization Algorithm—Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batteryless IoT Networks
by Mehrdad Shoeibi & Anita Ershadi Oskouei & Masoud Kaveh - 1-26 Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection
by Abdulrahman A. Alshdadi & Abdulwahab Ali Almazroi & Nasir Ayub & Miltiadis D. Lytras & Eesa Alsolami & Faisal S. Alsubaei - 1-26 IoT-Based LPG Level Sensor for Domestic Stationary Tanks with Data Sharing to a Filling Plant to Optimize Distribution Routes
by Roberto Morales-Caporal & Rodolfo Eleazar Pérez-Loaiza & Edmundo Bonilla-Huerta & Julio Hernández-Pérez & José de Jesús Rangel-Magdaleno - 1-27 Pattern Recognition in Older Adults’ Activities of Daily Living
by Gonçalo Augusto & Rui Duarte & Carlos Cunha & Ana Matos - 1-28 Machine Learning Based Localization of LoRa Mobile Wireless Nodes Using a Novel Sectorization Method
by Madiyar Nurgaliyev & Askhat Bolatbek & Batyrbek Zholamanov & Ahmet Saymbetov & Kymbat Kopbay & Evan Yershov & Sayat Orynbassar & Gulbakhar Dosymbetova & Ainur Kapparova & Nurzhigit Kuttybay & Nursultan Koshkarbay - 1-28 A Reordering Buffer Management Method at Edge Gateway in Hybrid IP-ICN Multipath Transmission System
by Yuqi Liu & Rui Han & Xu Wang - 1-31 A Survey on MLLMs in Education: Application and Future Directions
by Weicheng Xing & Tianqing Zhu & Jenny Wang & Bo Liu - 1-43 Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration
by Emmanuel Ekene Okere & Vipin Balyan - 1-74 Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
by Hesham Kamal & Maggie Mashaly
November 2024, Volume 16, Issue 12
- 1-16 Using Multimodal Foundation Models for Detecting Fake Images on the Internet with Explanations
by Vishnu S. Pendyala & Ashwin Chintalapati - 1-17 A Transfer Reinforcement Learning Approach for Capacity Sharing in Beyond 5G Networks
by Irene Vilà & Jordi Pérez-Romero & Oriol Sallent - 1-17 QRLIT: Quantum Reinforcement Learning for Database Index Tuning
by Diogo Barbosa & Le Gruenwald & Laurent D’Orazio & Jorge Bernardino - 1-18 Detailed Image Captioning and Hashtag Generation
by Nikshep Shetty & Yongmin Li - 1-20 TasksZE: A Task-Based and Challenge-Based Math Serious Game Using Facial Emotion Recognition
by Humberto Marín-Vega & Giner Alor-Hernández & Maritza Bustos-López & Jonathan Hernández-Capistran & Norma Leticia Hernández-Chaparro & Sergio David Ixmatlahua-Diaz - 1-21 MEC Server Status Optimization Framework for Energy Efficient MEC Systems by Taking a Deep-Learning Approach
by Minseok Koo & Jaesung Park - 1-23 Nonlinear Dynamics and Machine Learning for Robotic Control Systems in IoT Applications
by Vesna Antoska Knights & Olivera Petrovska & Jasenka Gajdoš Kljusurić - 1-23 Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model
by Amna AlMutawa & Richard Adeyemi Ikuesan & Huwida Said - 1-24 An Ensemble Deep CNN Approach for Power Quality Disturbance Classification: A Technological Route Towards Smart Cities Using Image-Based Transfer
by Mirza Ateeq Ahmed Baig & Naeem Iqbal Ratyal & Adil Amin & Umar Jamil & Sheroze Liaquat & Haris M. Khalid & Muhammad Fahad Zia - 1-25 Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs & Alessandro Raschella & Michael Mackay & Max Hashem Eiza & Frank den Hartog - 1-25 Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement
by Patrizia Marti & Giulia Teverini & Cecilia Goracci & Lorenzo Franchi - 1-26 Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases
by Markus Hornsteiner & Michael Kreussel & Christoph Steindl & Fabian Ebner & Philip Empl & Stefan Schönig - 1-28 Architectural Trends in Collaborative Computing: Approaches in the Internet of Everything Era
by Débora Souza & Gabriele Iwashima & Viviane Cunha Farias da Costa & Carlos Eduardo Barbosa & Jano Moreira de Souza & Geraldo Zimbrão - 1-30 Implementation and Evaluation of a Low-Cost Measurement Platform over LoRa and Applicability for Soil Monitoring
by Dimitrios Loukatos & Athanasios Fragkos & George Kargas & Konstantinos G. Arvanitis - 1-43 Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications
by Mohsen Eskandari & Andrey V. Savkin
November 2024, Volume 16, Issue 11
- 1-13 Towards a Decentralized Collaborative Framework for Scalable Edge AI
by Ahmed M. Abdelmoniem & Mona Jaber & Ali Anwar & Yuchao Zhang & Mingliang Gao - 1-16 Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio
by Markus Walter & Jörg Keller - 1-16 Automatically Injecting Robustness Statements into Distributed Applications
by Daniele Marletta & Alessandro Midolo & Emiliano Tramontana - 1-16 Eye Tracking and Human Influence Factors’ Impact on Quality of Experience of Mobile Gaming
by Omer Nawaz & Siamak Khatibi & Muhammad Nauman Sheikh & Markus Fiedler - 1-16 Virtualization vs. Containerization, a Comparative Approach for Application Deployment in the Computing Continuum Focused on the Edge
by Hamish Sturley & Augustin Fournier & Andoni Salcedo-Navarro & Miguel Garcia-Pineda & Jaume Segura-Garcia - 1-18 A Secure Auditable Remote Registry Pattern for IoT Systems
by Antonio Maña & Francisco J. Jaime & Lucía Gutiérrez - 1-19 A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
by Antonello Calabrò & Enrico Cambiaso & Manuel Cheminod & Ivan Cibrario Bertolotti & Luca Durante & Agostino Forestiero & Flavio Lombardi & Giuseppe Manco & Eda Marchetti & Albina Orlando & Giuseppe Papuzzo - 1-19 Identifying Persons of Interest in Digital Forensics Using NLP-Based AI
by Jonathan Adkins & Ali Al Bataineh & Majd Khalaf - 1-19 Fully Open-Source Meeting Minutes Generation Tool
by Amma Liesvarastranta Haz & Yohanes Yohanie Fridelin Panduman & Nobuo Funabiki & Evianita Dewi Fajrianti & Sritrusta Sukaridhoto - 1-20 SBNNR: Small-Size Bat-Optimized KNN Regression
by Rasool Seyghaly & Jordi Garcia & Xavi Masip-Bruin & Jovana Kuljanin - 1-21 AI-Driven Neuro-Monitoring: Advancing Schizophrenia Detection and Management Through Deep Learning and EEG Analysis
by Elena-Anca Paraschiv & Lidia Băjenaru & Cristian Petrache & Ovidiu Bica & Dragoș-Nicolae Nicolau