Content
January 2025, Volume 17, Issue 1
- 1-15 A Reference Architecture for Virtual Human Integration in the Metaverse: Enhancing the Galleries, Libraries, Archives, and Museums (GLAM) Sector with AI-Driven Experiences
by Orestis Spyrou & William Hurst & Caspar Krampe - 1-16 Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0
by Italo Cesidio Fantozzi & Annalisa Santolamazza & Giancarlo Loy & Massimiliano Maria Schiraldi - 1-17 Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment
by Francesco Morgan Bono & Alessio Polinelli & Luca Radicioni & Lorenzo Benedetti & Francesco Castelli-Dezza & Simone Cinquemani & Marco Belloli - 1-17 Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers
by Daniela Gifu & Covaci Silviu-Vasile - 1-19 Ventinel : Automated Detection of Android Vishing Apps Using Optical Character Recognition
by Daegyeom Kim & Sehwan O & Younghoon Ban & Jungsoo Park & Kyungho Joo & Haehyun Cho - 1-20 A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT
by Innocent Boakye Ababio & Jan Bieniek & Mohamed Rahouti & Thaier Hayajneh & Mohammed Aledhari & Dinesh C. Verma & Abdellah Chehri - 1-20 IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
by Wei Zhou & Shandian Shen & Peng Liu - 1-20 End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
by Matthew Boeding & Michael Hempel & Hamid Sharif - 1-21 Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention
by Salvador López-Barajas & Pedro J. Sanz & Raúl Marín-Prades & Juan Echagüe & Sebastian Realpe - 1-23 A Lightweight AI-Based Approach for Drone Jamming Detection
by Sergio Cibecchini & Francesco Chiti & Laura Pierucci - 1-23 A Hierarchical Cache Architecture-Oriented Cache Management Scheme for Information-Centric Networking
by Yichao Chao & Rui Han - 1-23 Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss
by Aryan Sharma & Haoming Wang & Deepak Mishra & Aruna Seneviratne - 1-23 Collaboration in a Virtual Reality Serious Escape Room in the Metaverse Improves Academic Performance and Learners’ Experiences
by Antonia-Maria Pazakou & Stylianos Mystakidis & Ioannis Kazanidis - 1-23 On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture
by Niroshinie Fernando & Samir Shrestha & Seng W. Loke & Kevin Lee - 1-23 High-Risk AI Systems—Lie Detection Application
by Konstantinos Kalodanis & Panagiotis Rizomiliotis & Georgios Feretzakis & Charalampos Papapavlou & Dimosthenis Anagnostopoulos - 1-23 Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things
by Sumaiah Algarni & Fathi E. Abd El-Samie - 1-24 Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT)
by Nemat Hazrati & Sajjad Pirahesh & Bahman Arasteh & Seyed Salar Sefati & Octavian Fratu & Simona Halunga - 1-24 FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model
by Xiaozheng Du & Shijing Hu & Feng Zhou & Cheng Wang & Binh Minh Nguyen - 1-24 Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
by Zhiyuan Wang & Yuezhi Zhou - 1-25 Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency
by Chen Qiu & Ziang Wu & Haoda Wang & Qinglin Yang & Yu Wang & Chunhua Su - 1-26 Impact of Weather Factors on Unmanned Aerial Vehicles’ Wireless Communications
by Lalan Mishra & Naima Kaabouch - 1-27 Explainable Security Requirements Classification Through Transformer Models
by Luca Petrillo & Fabio Martinelli & Antonella Santone & Francesco Mercaldo - 1-27 Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading
by Giuseppe Baruffa & Luca Rugini - 1-28 XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
by Maiada M. Mahmoud & Yasser Omar Youssef & Ayman A. Abdel-Hamid - 1-29 Fake News Detection and Classification: A Comparative Study of Convolutional Neural Networks, Large Language Models, and Natural Language Processing Models
by Konstantinos I. Roumeliotis & Nikolaos D. Tselikas & Dimitrios K. Nasiopoulos - 1-29 Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
by Alessio Ferone & Stefano Verrilli - 1-30 Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
by Muhammad Dilshad & Madiha Haider Syed & Semeen Rehman - 1-30 Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites
by Georgios Fevgas & Thomas Lagkas & Panagiotis Sarigiannidis & Vasileios Argyriou - 1-32 A Survey on Cybersecurity in IoT
by Elias Dritsas & Maria Trigka - 1-32 Survey of Artificial Intelligence Model Marketplace
by Mian Qian & Abubakar Ahmad Musa & Milon Biswas & Yifan Guo & Weixian Liao & Wei Yu - 1-39 Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
by Pablo Corona-Fraga & Aldo Hernandez-Suarez & Gabriel Sanchez-Perez & Linda Karina Toscano-Medina & Hector Perez-Meana & Jose Portillo-Portillo & Jesus Olivares-Mercado & Luis Javier García Villalba - 1-41 Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution
by Elmin Marevac & Esad Kadušić & Nataša Živić & Nevzudin Buzađija & Samir Lemeš - 1-54 A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
by Yang Yang & Min Lin & Yangfei Lin & Chen Zhang & Celimuge Wu
December 2024, Volume 17, Issue 1
- 1-19 Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
by Yimika Erinle & Yebo Feng & Jiahua Xu & Nikhil Vadgama & Paolo Tasca - 1-20 WebTrackingScore: A Combined Web Tracking Risk Score System for Websites
by Álvaro D. Guillén Cava & Antonio Ruiz-Martínez - 1-21 EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
by Sakshi Patni & Joohyung Lee - 1-22 Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering
by M. Baqer - 1-23 A Blockchain-Based Protocol for Fair Delivery for Receipts
by M. Francisca Hinarejos & Josep-Lluis Ferrer-Gomila & Andreu-Pere Isern-Deyà & Gerardo-Francisco Chévez-Alvarado - 1-27 A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints
by Antonio Pinizzotto & Raffaele Bruno - 1-27 GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks
by Vahid Babaey & Arun Ravindran - 1-29 A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
by Aviral Goel & Yogachandran Rahulamathavan
December 2024, Volume 16, Issue 12
- 1-4 Cloud Computing and High Performance Computing (HPC) Advances for Next Generation Internet
by Jerry Chou & Wu-Chun Chung - 1-13 WiFi Fingerprint Indoor Localization Employing Adaboost and Probability-One Access Point Selection for Multi-Floor Campus Buildings
by Shanyu Jin & Dongwoo Kim - 1-14 Assessing the Value of Information in an Augmented Reality City Experience
by Yonit Rusho & Ganit Richter & Daphne Ruth Raban - 1-16 Customer Churn Prediction Approach Based on LLM Embeddings and Logistic Regression
by Meryem Chajia & El Habib Nfaoui - 1-16 Evaluating DL Model Scaling Trade-Offs During Inference via an Empirical Benchmark Analysis
by Demetris Trihinas & Panagiotis Michael & Moysis Symeonides - 1-16 A Comparative Study of the User Interaction Behavior and Experience in a Home-Oriented Multi-User Interface (MUI) During Family Collaborative Cooking
by Mengcai Zhou & Minglun Li & Kenta Ono & Makoto Watanabe - 1-17 Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
by Muzun Althunayyan & Amir Javed & Omer Rana & Theodoros Spyridopoulos - 1-17 A Self-Sovereign Identity–Blockchain-Based Model Proposal for Deep Digital Transformation in the Healthcare Sector
by Luisanna Cocco & Roberto Tonelli - 1-17 A Survey of Scenario Generation for Automated Vehicle Testing and Validation
by Ziyu Wang & Jing Ma & Edmund M-K Lai - 1-18 Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection
by Anthony Kenyon & Lipika Deka & David Elizondo - 1-18 A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks
by Mahmoud AlJamal & Rabee Alquran & Ayoub Alsarhan & Mohammad Aljaidi & Mohammad Alhmmad & Wafa’ Q. Al-Jamal & Nasser Albalawi - 1-19 SIGNIFY: Leveraging Machine Learning and Gesture Recognition for Sign Language Teaching Through a Serious Game
by Luca Ulrich & Giulio Carmassi & Paolo Garelli & Gianluca Lo Presti & Gioele Ramondetti & Giorgia Marullo & Chiara Innocente & Enrico Vezzetti - 1-19 Rethinking Blockchain Technologies for the Maritime Industry: An Overview of the Current Landscape
by Heejoo Kim & Zhe Xiao & Xiaocai Zhang & Xiuju Fu & Zheng Qin - 1-19 Thermoelectric Generator-Powered Long-Range Wireless Real-Time Steam Leak Detection in Steam Traps
by Raúl Aragonés & Joan Oliver & Carles Ferrer - 1-20 Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems
by Kon Papazis & Naveen Chilamkurti - 1-20 Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method
by Xinyang Yuan & Jiarong Wang & Haozhi Zhao & Tian Yan & Fazhi Qi - 1-20 Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments
by Jesús Vegas & César Llamas - 1-20 Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems
by Stefan Iordache & Catalina Camelia Patilea & Ciprian Paduraru - 1-20 Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
by Eugenia Tîrziu & Ana-Mihaela Vasilevschi & Adriana Alexandru & Eleonora Tudora - 1-20 Advancing Healthcare Through the Integration of Digital Twins Technology: Personalized Medicine’s Next Frontier
by Sharmin Attaran & Mohsen Attaran - 1-21 A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios
by Nick Bray & Matthew Boeding & Michael Hempel & Hamid Sharif & Tapio Heikkilä & Markku Suomalainen & Tuomas Seppälä - 1-21 Generative AI in Medicine and Healthcare: Moving Beyond the ‘Peak of Inflated Expectations’
by Peng Zhang & Jiayu Shi & Maged N. Kamel Boulos - 1-21 Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications
by Bennet Gerlach & Hannes Hesse & Stefan Fischer & Martin Leucker - 1-22 Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz & Gustavo Chica Pedraza & Alexander Aponte Moreno - 1-22 Analyzing the Features, Usability, and Performance of Deploying a Containerized Mobile Web Application on Serverless Cloud Platforms
by Jeong Yang & Anoop Abraham - 1-24 Policy-Based Smart Contracts Management for IoT Privacy Preservation
by Mohsen Rouached & Aymen Akremi & Mouna Macherki & Naoufel Kraiem - 1-24 A Systematic Comparison Between Open- and Closed-Source Large Language Models in the Context of Generating GDPR-Compliant Data Categories for Processing Activity Records
by Magdalena von Schwerin & Manfred Reichert - 1-24 A Novel Six-Dimensional Chimp Optimization Algorithm—Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batteryless IoT Networks
by Mehrdad Shoeibi & Anita Ershadi Oskouei & Masoud Kaveh - 1-26 Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection
by Abdulrahman A. Alshdadi & Abdulwahab Ali Almazroi & Nasir Ayub & Miltiadis D. Lytras & Eesa Alsolami & Faisal S. Alsubaei - 1-26 IoT-Based LPG Level Sensor for Domestic Stationary Tanks with Data Sharing to a Filling Plant to Optimize Distribution Routes
by Roberto Morales-Caporal & Rodolfo Eleazar Pérez-Loaiza & Edmundo Bonilla-Huerta & Julio Hernández-Pérez & José de Jesús Rangel-Magdaleno - 1-27 Pattern Recognition in Older Adults’ Activities of Daily Living
by Gonçalo Augusto & Rui Duarte & Carlos Cunha & Ana Matos - 1-28 Machine Learning Based Localization of LoRa Mobile Wireless Nodes Using a Novel Sectorization Method
by Madiyar Nurgaliyev & Askhat Bolatbek & Batyrbek Zholamanov & Ahmet Saymbetov & Kymbat Kopbay & Evan Yershov & Sayat Orynbassar & Gulbakhar Dosymbetova & Ainur Kapparova & Nurzhigit Kuttybay & Nursultan Koshkarbay - 1-28 A Reordering Buffer Management Method at Edge Gateway in Hybrid IP-ICN Multipath Transmission System
by Yuqi Liu & Rui Han & Xu Wang - 1-31 A Survey on MLLMs in Education: Application and Future Directions
by Weicheng Xing & Tianqing Zhu & Jenny Wang & Bo Liu - 1-43 Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration
by Emmanuel Ekene Okere & Vipin Balyan - 1-74 Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
by Hesham Kamal & Maggie Mashaly
November 2024, Volume 16, Issue 12
- 1-16 Using Multimodal Foundation Models for Detecting Fake Images on the Internet with Explanations
by Vishnu S. Pendyala & Ashwin Chintalapati - 1-17 A Transfer Reinforcement Learning Approach for Capacity Sharing in Beyond 5G Networks
by Irene Vilà & Jordi Pérez-Romero & Oriol Sallent - 1-17 QRLIT: Quantum Reinforcement Learning for Database Index Tuning
by Diogo Barbosa & Le Gruenwald & Laurent D’Orazio & Jorge Bernardino - 1-18 Detailed Image Captioning and Hashtag Generation
by Nikshep Shetty & Yongmin Li - 1-20 TasksZE: A Task-Based and Challenge-Based Math Serious Game Using Facial Emotion Recognition
by Humberto Marín-Vega & Giner Alor-Hernández & Maritza Bustos-López & Jonathan Hernández-Capistran & Norma Leticia Hernández-Chaparro & Sergio David Ixmatlahua-Diaz - 1-21 MEC Server Status Optimization Framework for Energy Efficient MEC Systems by Taking a Deep-Learning Approach
by Minseok Koo & Jaesung Park - 1-23 Nonlinear Dynamics and Machine Learning for Robotic Control Systems in IoT Applications
by Vesna Antoska Knights & Olivera Petrovska & Jasenka Gajdoš Kljusurić - 1-23 Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model
by Amna AlMutawa & Richard Adeyemi Ikuesan & Huwida Said - 1-24 An Ensemble Deep CNN Approach for Power Quality Disturbance Classification: A Technological Route Towards Smart Cities Using Image-Based Transfer
by Mirza Ateeq Ahmed Baig & Naeem Iqbal Ratyal & Adil Amin & Umar Jamil & Sheroze Liaquat & Haris M. Khalid & Muhammad Fahad Zia - 1-25 Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs & Alessandro Raschella & Michael Mackay & Max Hashem Eiza & Frank den Hartog - 1-25 Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement
by Patrizia Marti & Giulia Teverini & Cecilia Goracci & Lorenzo Franchi - 1-26 Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases
by Markus Hornsteiner & Michael Kreussel & Christoph Steindl & Fabian Ebner & Philip Empl & Stefan Schönig - 1-28 Architectural Trends in Collaborative Computing: Approaches in the Internet of Everything Era
by Débora Souza & Gabriele Iwashima & Viviane Cunha Farias da Costa & Carlos Eduardo Barbosa & Jano Moreira de Souza & Geraldo Zimbrão - 1-30 Implementation and Evaluation of a Low-Cost Measurement Platform over LoRa and Applicability for Soil Monitoring
by Dimitrios Loukatos & Athanasios Fragkos & George Kargas & Konstantinos G. Arvanitis - 1-43 Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications
by Mohsen Eskandari & Andrey V. Savkin
November 2024, Volume 16, Issue 11
- 1-13 Towards a Decentralized Collaborative Framework for Scalable Edge AI
by Ahmed M. Abdelmoniem & Mona Jaber & Ali Anwar & Yuchao Zhang & Mingliang Gao - 1-16 Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio
by Markus Walter & Jörg Keller - 1-16 Automatically Injecting Robustness Statements into Distributed Applications
by Daniele Marletta & Alessandro Midolo & Emiliano Tramontana - 1-16 Eye Tracking and Human Influence Factors’ Impact on Quality of Experience of Mobile Gaming
by Omer Nawaz & Siamak Khatibi & Muhammad Nauman Sheikh & Markus Fiedler - 1-16 Virtualization vs. Containerization, a Comparative Approach for Application Deployment in the Computing Continuum Focused on the Edge
by Hamish Sturley & Augustin Fournier & Andoni Salcedo-Navarro & Miguel Garcia-Pineda & Jaume Segura-Garcia - 1-18 A Secure Auditable Remote Registry Pattern for IoT Systems
by Antonio Maña & Francisco J. Jaime & Lucía Gutiérrez - 1-19 A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
by Antonello Calabrò & Enrico Cambiaso & Manuel Cheminod & Ivan Cibrario Bertolotti & Luca Durante & Agostino Forestiero & Flavio Lombardi & Giuseppe Manco & Eda Marchetti & Albina Orlando & Giuseppe Papuzzo - 1-19 Identifying Persons of Interest in Digital Forensics Using NLP-Based AI
by Jonathan Adkins & Ali Al Bataineh & Majd Khalaf - 1-19 Fully Open-Source Meeting Minutes Generation Tool
by Amma Liesvarastranta Haz & Yohanes Yohanie Fridelin Panduman & Nobuo Funabiki & Evianita Dewi Fajrianti & Sritrusta Sukaridhoto - 1-20 SBNNR: Small-Size Bat-Optimized KNN Regression
by Rasool Seyghaly & Jordi Garcia & Xavi Masip-Bruin & Jovana Kuljanin - 1-21 AI-Driven Neuro-Monitoring: Advancing Schizophrenia Detection and Management Through Deep Learning and EEG Analysis
by Elena-Anca Paraschiv & Lidia Băjenaru & Cristian Petrache & Ovidiu Bica & Dragoș-Nicolae Nicolau - 1-22 Resilience in the Internet of Medical Things: A Review and Case Study
by Vikas Tomer & Sachin Sharma & Mark Davis - 1-23 An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks
by Sherine Nagy Saleh & Mazen Nabil Elagamy & Yasmine N. M. Saleh & Radwa Ahmed Osman - 1-24 An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form
by Zaher Salah & Hamza Abu Owida & Esraa Abu Elsoud & Esraa Alhenawi & Suhaila Abuowaida & Nawaf Alshdaifat - 1-24 Enhanced Long-Range Network Performance of an Oil Pipeline Monitoring System Using a Hybrid Deep Extreme Learning Machine Model
by Abbas Kubba & Hafedh Trabelsi & Faouzi Derbel - 1-24 Flexible Hyper-Distributed IoT–Edge–Cloud Platform for Real-Time Digital Twin Applications on 6G-Intended Testbeds for Logistics and Industry
by Maria Crespo-Aguado & Raul Lozano & Fernando Hernandez-Gobertti & Nuria Molner & David Gomez-Barquero - 1-26 Machine Learning-Based Resource Allocation Algorithm to Mitigate Interference in D2D-Enabled Cellular Networks
by Md Kamruzzaman & Nurul I. Sarkar & Jairo Gutierrez - 1-26 Capacity and Coverage Dimensioning for 5G Standalone Mixed-Cell Architecture: An Impact of Using Existing 4G Infrastructure
by Naba Raj Khatiwoda & Babu Ram Dawadi & Sashidhar Ram Joshi - 1-26 Fault Prediction and Reconfiguration Optimization in Smart Grids: AI-Driven Approach
by David Carrascal & Paula Bartolomé & Elisa Rojas & Diego Lopez-Pajares & Nicolas Manso & Javier Diaz-Fuentes - 1-27 Approaches to Identifying Emotions and Affections During the Museum Learning Experience in the Context of the Future Internet
by Iana Fominska & Stefano Di Tore & Michele Nappi & Gerardo Iovane & Maurizio Sibilio & Angela Gelo - 1-28 A Joint Survey in Decentralized Federated Learning and TinyML: A Brief Introduction to Swarm Learning
by Evangelia Fragkou & Dimitrios Katsaros - 1-30 Visualisation Design Ideation with AI: A New Framework, Vocabulary, and Tool
by Aron E. Owen & Jonathan C. Roberts - 1-30 Privacy-Preserving Data Analytics in Internet of Medical Things
by Bakhtawar Mudassar & Shahzaib Tahir & Fawad Khan & Syed Aziz Shah & Syed Ikram Shah & Qammer Hussain Abbasi - 1-30 Real-Time Evaluation of the Improved Eagle Strategy Model in the Internet of Things
by Venushini Rajendran & R Kanesaraj Ramasamy - 1-30 Advancing Additive Manufacturing Through Machine Learning Techniques: A State-of-the-Art Review
by Shaoping Xiao & Junchao Li & Zhaoan Wang & Yingbin Chen & Soheyla Tofighi - 1-33 Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum
by J. de Curtò & I. de Zarzà & Juan-Carlos Cano & Carlos T. Calafate - 1-35 6G Use Cases and Scenarios: A Comparison Analysis Between ITU and Other Initiatives
by Alessandro Vizzarri & Franco Mazzenga - 1-41 Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends
by Christos Papadopoulos & Konstantinos-Filippos Kollias & George F. Fragulis
October 2024, Volume 16, Issue 11
- 1-2 Key Enabling Technologies for Beyond 5G Networks
by Dania Marabissi & Lorenzo Mucchi - 1-3 Editorial for the Special Issue on Moving Towards 6G Wireless Technologies
by Alessandro Raschella & Michael Mackay - 1-14 Empowering Healthcare: TinyML for Precise Lung Disease Classification
by Youssef Abadade & Nabil Benamar & Miloud Bagaa & Habiba Chaoui - 1-14 Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units
by Yves Adou & Ekaterina Markova & Yuliya Gaidamaka - 1-14 Deep Reinforcement Learning for UAV-Based SDWSN Data Collection
by Pejman A. Karegar & Duaa Zuhair Al-Hamid & Peter Han Joo Chong - 1-16 A Modified TCP BBR to Enable High Fairness in High-Speed Wireless Networks
by Jinlin Xu & Wansu Pan & Haibo Tan & Longle Cheng & Xiru Li & Xiaofeng Li - 1-18 On Exploiting and Implementing Collaborative Virtual and Augmented Reality in a Cloud Continuum Scenario
by Beniamino Di Martino & Gennaro Junior Pezzullo & Vincenzo Bombace & Ling-Huey Li & Kuan-Ching Li - 1-19 Predicting the Duration of Forest Fires Using Machine Learning Methods
by Constantina Kopitsa & Ioannis G. Tsoulos & Vasileios Charilogis & Athanassios Stavrakoudis - 1-22 Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology
by Jian Peng & Kai Zhong - 1-22 Connection-Aware Digital Twin for Mobile Adhoc Networks in the 5G Era
by Manuel Jesús-Azabal & Zheng Zhang & Bingxia Gao & Jing Yang & Vasco N. G. J. Soares - 1-23 A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu & Ronghua Xu & Yu Chen - 1-23 Uncertainty-Aware Time Series Anomaly Detection
by Paul Wiessner & Grigor Bezirganyan & Sana Sellami & Richard Chbeir & Hans-Joachim Bungartz - 1-24 Lightweight Digit Recognition in Smart Metering System Using Narrowband Internet of Things and Federated Learning
by Vladimir Nikić & Dušan Bortnik & Milan Lukić & Dejan Vukobratović & Ivan Mezei - 1-25 Three-Dimensional Drone Cell Placement: Drone Placement for Optimal Coverage
by Aniket Basu & Hooman Oroojeni & Georgios Samakovitis & Mohammad Majid Al-Rifaie - 1-27 Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques
by As’ad Mahmoud As’ad Alnaser & Said S. Saloum & Ahmed A. M. Sharadqh & Hazem (Moh’d Said) Hatamleh - 1-27 Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine
by Eman Daraghmi & Ahmed Hamoudi & Mamoun Abu Helou - 1-32 Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach
by Ignacio Fernandez de Arroyabe & Tim Watson & Iain Phillips - 1-33 Health IoT Threats: Survey of Risks and Vulnerabilities
by Samaneh Madanian & Tserendorj Chinbat & Maduka Subasinghage & David Airehrour & Farkhondeh Hassandoust & Sira Yongchareon - 1-42 Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review
by Paolo Visconti & Giuseppe Rausa & Carolina Del-Valle-Soto & Ramiro Velázquez & Donato Cafagna & Roberto De Fazio
September 2024, Volume 16, Issue 10
- 1-13 An Intelligent System for Determining Driver Anxiety Level: A Comparison Study of Two Fuzzy-Based Models
by Yi Liu & Leonard Barolli - 1-17 Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios
by Nandan Banerji & Chayan Paul & Bikash Debnath & Biplab Das & Gurpreet Singh Chhabra & Bhabendu Kumar Mohanta & Ali Ismail Awad - 1-19 Predicting Missing Values in Survey Data Using Prompt Engineering for Addressing Item Non-Response
by Junyung Ji & Jiwoo Kim & Younghoon Kim - 1-19 AI Governance in Higher Education: Case Studies of Guidance at Big Ten Universities
by Chuhao Wu & He Zhang & John M. Carroll - 1-23 Generating Process Models by Interacting with Chatbots—A Literature Review
by Luca Franziska Hörner & Manfred Reichert - 1-23 Multi-User Optimal Load Scheduling of Different Objectives Combined with Multi-Criteria Decision Making for Smart Grid
by Yaarob Al-Nidawi & Haider Tarish Haider & Dhiaa Halboot Muhsen & Ghadeer Ghazi Shayea - 1-24 Automated Detection of Misinformation: A Hybrid Approach for Fake News Detection
by Fadi Mohsen & Bedir Chaushi & Hamed Abdelhaq & Dimka Karastoyanova & Kevin Wang - 1-25 A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
by Ali Peivandizadeh & Haitham Y. Adarbah & Behzad Molavi & Amirhossein Mohajerzadeh & Ali H. Al-Badi - 1-27 Digital Transformation in Maritime Ports: Defining Smart Gates through Process Improvement in a Portuguese Container Terminal
by Juliana Basulo-Ribeiro & Carina Pimentel & Leonor Teixeira - 1-35 Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
by Abraham Romero & Roberto Hernandez
October 2024, Volume 16, Issue 10
- 1-4 Correction: Vasilas et al. Beat the Heat: Syscall Attack Detection via Thermal Side Channel. Future Internet 2024, 16 , 301
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-14 SPDepth: Enhancing Self-Supervised Indoor Monocular Depth Estimation via Self-Propagation
by Xiaotong Guo & Huijie Zhao & Shuwei Shao & Xudong Li & Baochang Zhang & Na Li - 1-15 Employing Huber and TAP Losses to Improve Inter-SubNet in Speech Enhancement
by Jeih-Weih Hung & Pin-Chen Huang & Li-Yin Li - 1-15 Healthiness and Safety of Smart Environments through Edge Intelligence and Internet of Things Technologies
by Rafiq Ul Islam & Pasquale Mazzei & Claudio Savaglio - 1-16 Stance Detection in the Context of Fake News—A New Approach
by Izzat Alsmadi & Iyad Alazzam & Mohammad Al-Ramahi & Mohammad Zarour - 1-17 Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration
by Yazan Otoum & Chaosheng Hu & Eyad Haj Said & Amiya Nayak - 1-18 Multi-Source Data Fusion for Vehicle Maintenance Project Prediction
by Fanghua Chen & Deguang Shang & Gang Zhou & Ke Ye & Guofang Wu - 1-19 Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN
by Rachel Kufakunesu & Gerhard P. Hancke & Adnan M. Abu-Mahfouz - 1-20 An IoT-Enhanced Traffic Light Control System with Arduino and IR Sensors for Optimized Traffic Patterns
by Kian Raheem Qasim & Noor M. Naser & Ahmed J. Jabur - 1-20 Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks
by Sennanur Srinivasan Abinayaa & Prakash Arumugam & Divya Bhavani Mohan & Anand Rajendran & Abderezak Lashab & Baoze Wei & Josep M. Guerrero - 1-21 A Systematic Review and Multifaceted Analysis of the Integration of Artificial Intelligence and Blockchain: Shaping the Future of Australian Higher Education
by Mahmoud Elkhodr & Ketmanto Wangsa & Ergun Gide & Shakir Karim - 1-22 An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology
by Nanavath Kiran Singh Nayak & Budhaditya Bhattacharyya - 1-22 Countering Social Media Cybercrime Using Deep Learning: Instagram Fake Accounts Detection
by Najla Alharbi & Bashayer Alkalifah & Ghaida Alqarawi & Murad A. Rassam - 1-22 A Performance Benchmark for the PostgreSQL and MySQL Databases
by Sanket Vilas Salunke & Abdelkader Ouda - 1-23 Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy
by Kyungmin Sim & Honyeong Heo & Haehyun Cho - 1-27 New Model for Defining and Implementing Performance Tests
by Marek Bolanowski & Michał Ćmil & Adrian Starzec - 1-27 Internet of Things and Distributed Computing Systems in Business Models
by Albérico Travassos Rosário & Ricardo Raimundo - 1-28 Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain
by Godlove Suila Kuaban & Valery Nkemeni & Onyeka J. Nwobodo & Piotr Czekalski & Fabien Mieyeville - 1-29 Decentralized Web3 Reshaping Internet Governance: Towards the Emergence of New Forms of Nation-Statehood?
by Igor Calzada - 1-29 Large Language Models Meet Next-Generation Networking Technologies: A Review
by Ching-Nam Hang & Pei-Duo Yu & Roberto Morabito & Chee-Wei Tan - 1-29 Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach
by Nsikak Owoh & John Adejoh & Salaheddin Hosseinzadeh & Moses Ashawa & Jude Osamor & Ayyaz Qureshi - 1-30 Decoding Urban Intelligence: Clustering and Feature Importance in Smart Cities
by Enrico Barbierato & Alice Gatti - 1-31 Advanced Optimization Techniques for Federated Learning on Non-IID Data
by Filippos Efthymiadis & Aristeidis Karras & Christos Karras & Spyros Sioutas - 1-37 A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy
by Habib Ullah Manzoor & Attia Shabbir & Ao Chen & David Flynn & Ahmed Zoha - 1-38 Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
by Mahawish Fatima & Osama Rehman & Ibrahim M. H. Rahman & Aisha Ajmal & Simon Jigwan Park - 1-42 Mobility–Multihoming Duality
by Ryo Yanagida & Saleem Noel Bhatti - 1-52 A Survey of the Real-Time Metaverse: Challenges and Opportunities
by Mohsen Hatami & Qian Qu & Yu Chen & Hisham Kholidy & Erik Blasch & Erika Ardiles-Cruz
September 2024, Volume 16, Issue 9
- 1-13 Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation
by Jesus Calle-Cancho & Carlos Cañada & Rafael Pastor-Vargas & Mercedes E. Paoletti & Juan M. Haut - 1-15 Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey
by Elias Dritsas & Maria Trigka - 1-17 Privacy-Preserving Authentication Based on PUF for VANETs
by Lihui Li & Hanwen Deng & Zhongyi Zhai & Sheng-Lung Peng - 1-17 Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
by Spiridoula V. Margariti & Ioannis G. Tsoulos & Evangelia Kiousi & Eleftherios Stergiou - 1-19 Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification
by Guoxin Su & Li Liu - 1-19 Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises
by Abdullah Khanfor - 1-19 Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing
by Jobish John & Md. Noor-A-Rahim & Aswathi Vijayan & H. Vincent Poor & Dirk Pesch - 1-20 Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing
by Sérgio N. Silva & Mateus A. S. de S. Goldbarg & Lucileide M. D. da Silva & Marcelo A. C. Fernandes - 1-20 A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
by Haitham Y. Adarbah & Mehmet Sabir Kiraz & Suleyman Kardas & Ali H. Al-Bayatti & Hilal M. Y. Al-Bayatti - 1-20 Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications
by Wataru Takabatake & Yohei Shibata & Kenji Hoshino & Tomoaki Ohtsuki - 1-20 A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing
by Guiwen Jiang & Rongxi Huang & Zhiming Bao & Gaocai Wang - 1-20 Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning
by Yudai Yamamoto & Aoi Fukushima & Shingo Yamaguchi - 1-22 A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core
by Oana-Mihaela Dumitru-Guzu & Vlădeanu Călin & Robert Kooij - 1-22 Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems
by Kamal Shahid & Saleem Naseer Ahmad & Syed Tahir Hussain Rizvi - 1-24 Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities
by Gayathri Karthick & Glenford Mapp - 1-24 A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology
by Di Li & Zhibang Yang & Siyang Yu & Mingxing Duan & Shenghong Yang - 1-24 Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement
by Carolina Del-Valle-Soto & Ramon A. Briseño & Ramiro Velázquez & Gabriel Guerra-Rosales & Santiago Perez-Ochoa & Isaac H. Preciado-Bazavilvazo & Paolo Visconti & José Varela-Aldás - 1-25 Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta & Floriano Scioscia & Giuseppe Loseto & Agnese Pinto & Corrado Fasciano & Giovanna Capurso & Eugenio Di Sciascio - 1-25 A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection
by Abdallah Moubayed - 1-25 Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study
by Roberto Vergallo & Luca Mainetti - 1-25 Parallel and Distributed Frugal Tracking of a Quantile
by Italo Epicoco & Marco Pulimeno & Massimo Cafaro - 1-26 Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things
by Abeer Almutairi & Xavier Carpent & Steven Furnell