Content
June 2025, Volume 17, Issue 7
- 1-16 IoT-Edge Hybrid Architecture with Cross-Modal Transformer and Federated Manifold Learning for Safety-Critical Gesture Control in Adaptive Mobility Platforms
by Xinmin Jin & Jian Teng & Jiaji Chen - 1-26 The Role of Multi-Agent Systems in Realizing Asset Administration Shell Type 3
by Lucas Sakurada & Fernando De la Prieta & Paulo Leitao - 1-28 Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users
by George Alex Stelea & Livia Sangeorzan & Nicoleta Enache-David - 1-29 Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
by Seema G. Aarella & Venkata P. Yanambaka & Saraju P. Mohanty & Elias Kougianos - 1-30 Tourism Sentiment Chain Representation Model and Construction from Tourist Reviews
by Bosen Li & Rui Li & Junhao Wang & Aihong Song - 1-34 An Experimental Tethered UAV-Based Communication System with Continuous Power Supply
by Veronica Rodriguez & Christian Tipantuña & Diego Reinoso & Jorge Carvajal-Rodriguez & Carlos Egas Acosta & Pablo Proaño & Xavier Hesselbach - 1-35 Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks
by Abdul Manan Sheikh & Md. Rafiqul Islam & Mohamed Hadi Habaebi & Suriza Ahmad Zabidi & Athaur Rahman Bin Najeeb & Adnan Kabbani
June 2025, Volume 17, Issue 6
- 1-14 A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication
by Tzung-Her Chen - 1-18 Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT
by Haixu Niu & Yonghai Li & Shuaixin Hou & Tianfei Chen & Lijun Sun & Mingyang Gu & Muhammad Irsyad Abdullah - 1-19 A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols
by Iftikhar Hussain & Manuel J. C. S. Reis & Carlos Serôdio & Frederico Branco - 1-20 Exact and Approximation Algorithms for Task Offloading with Service Caching and Dependency in Mobile Edge Computing
by Bowen Cui & Jianwei Zhang - 1-21 Building Equi-Width Histograms on Homomorphically Encrypted Data
by Dragoș Lazea & Anca Hangan & Tudor Cioara - 1-21 JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs)
by Jorge Cisneros-González & Natalia Gordo-Herrera & Iván Barcia-Santos & Javier Sánchez-Soriano - 1-23 Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI
by Leandro Antonio Pazmiño Ortiz & Ivonne Fernanda Maldonado Soliz & Vanessa Katherine Guevara Balarezo - 1-24 Joint Exploitation of Physical-Layer and Artificial Features for Privacy-Preserving Distributed Source Camera Identification
by Hui Tian & Haibao Chen & Yuyan Zhao & Jiawei Zhang - 1-24 An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels
by Yiannis Kiouvrekis & Katerina Gkirtzou & Sotiris Zikas & Dimitris Kalatzis & Theodor Panagiotakopoulos & Zoran Lajic & Dimitris Papathanasiou & Ioannis Filippopoulos - 1-26 Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems
by Mohammed N. Alenezi - 1-27 A C-Based Framework for Low-Cost Real-Time Embedded Systems
by Ivan Cibrario Bertolotti - 1-29 Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8
by Momotaz Begum & Abm Kamrul Islam Riad & Abdullah Al Mamun & Thofazzol Hossen & Salah Uddin & Md Nurul Absur & Hossain Shahriar - 1-30 Network-, Cost-, and Renewable-Aware Ant Colony Optimization for Energy-Efficient Virtual Machine Placement in Cloud Datacenters
by Ali Mohammad Baydoun & Ahmed Sherif Zekri - 1-30 Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach
by Hany F. Atlam & Yifu Yang - 1-35 Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment
by Sikha S. Bagui & Germano Correa Silva De Carvalho & Asmi Mishra & Dustin Mink & Subhash C. Bagui & Stephanie Eager - 1-36 Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
by Pardis Sadatian Moghaddam & Ali Vaziri & Sarvenaz Sadat Khatami & Francisco Hernando-Gallego & Diego Martín - 1-36 A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy
by Pilleriin Lillemets & Nabaa Bashir Jawad & Joseph Kashi & Ahmad Sabah & Nicola Dragoni - 1-37 LLM4Rec: A Comprehensive Survey on the Integration of Large Language Models in Recommender Systems—Approaches, Applications and Challenges
by Sarama Shehmir & Rasha Kashef
May 2025, Volume 17, Issue 6
- 1-12 Position Accuracy and Distributed Beamforming Performance in WSNs: A Simulation Study
by José Casca & Prabhat Gupta & Marco Gomes & Vitor Silva & Rui Dinis - 1-17 Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review
by Tobias Rødahl Thingnes & Per Håkon Meland - 1-17 Multi Stage Retrieval for Web Search During Crisis
by Claudiu Constantin Tcaciuc & Daniele Rege Cambrin & Paolo Garza - 1-18 Resource Allocation for Federated Learning with Heterogeneous Computing Capability in Cloud–Edge–Client IoT Architecture
by Xubo Zhang & Yang Luo - 1-20 Analysis of Digital Skills and Infrastructure in EU Countries Based on DESI 2024 Data
by Kvitoslava Obelovska & Andrii Abziatov & Anastasiya Doroshenko & Ivanna Dronyuk & Oleh Liskevych & Rostyslav Liskevych - 1-20 Grouping-Based Dynamic Routing, Core, and Spectrum Allocation Method for Avoiding Spectrum Fragmentation and Inter-Core Crosstalk in Multi-Core Fiber Networks
by Funa Fukui & Tomotaka Kimura & Yutaka Fukuchi & Kouji Hirata - 1-21 A Deep Learning Approach for Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional Neural Networks
by Ali Abdi Seyedkolaei & Fatemeh Mahmoudi & José García - 1-21 AI-Driven Framework for Evaluating Climate Misinformation and Data Quality on Social Media
by Zeinab Shahbazi & Rezvan Jalali & Zahra Shahbazi - 1-21 Navigating Data Corruption in Machine Learning: Balancing Quality, Quantity, and Imputation Strategies
by Qi Liu & Wanjing Ma - 1-22 Inter-Data Center RDMA: Challenges, Status, and Future Directions
by Xiaoying Huang & Jingwei Wang - 1-22 An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain
by Mahmoud Elkhodr - 1-23 Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP
by Kazi Fatema & Samrat Kumar Dey & Mehrin Anannya & Risala Tasin Khan & Mohammad Mamunur Rashid & Chunhua Su & Rashed Mazumder - 1-23 Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT)
by Naveed Ahmed & Md Asri Ngadi & Abdulaleem Ali Almazroi & Nouf Atiahallah Alghanmi - 1-24 LLM Performance in Low-Resource Languages: Selecting an Optimal Model for Migrant Integration Support in Greek
by Alexandros Tassios & Stergios Tegos & Christos Bouas & Konstantinos Manousaridis & Maria Papoutsoglou & Maria Kaltsa & Eleni Dimopoulou & Thanassis Mavropoulos & Stefanos Vrochidis & Georgios Meditskos - 1-25 Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine
by Rene Francisco Santana-Cruz & Martin Moreno & Daniel Aguilar-Torres & Román Arturo Valverde-Domínguez & Rubén Vázquez-Medina - 1-26 Enhancing Customer Quality of Experience Through Omnichannel Digital Strategies: Evidence from a Service Environment in an Emerging Context
by Fabricio Miguel Moreno-Menéndez & Victoriano Eusebio Zacarías-Rodríguez & Sara Ricardina Zacarías-Vallejos & Vicente González-Prida & Pedro Emil Torres-Quillatupa & Hilario Romero-Girón & José Francisco Vía y Rada-Vittes & Luis Ángel Huaynate-Espejo - 1-27 A Robust Conformal Framework for IoT-Based Predictive Maintenance
by Alberto Moccardi & Claudia Conte & Rajib Chandra Ghosh & Francesco Moscato - 1-27 Semantic Fusion of Health Data: Implementing a Federated Virtualized Knowledge Graph Framework Leveraging Ontop System
by Abid Ali Fareedi & Stephane Gagnon & Ahmad Ghazawneh & Raul Valverde - 1-27 Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection
by Sangita Baruah & Vaskar Deka & Dulumani Das & Utpal Barman & Manob Jyoti Saikia - 1-29 Machine Learning and Deep Learning-Based Atmospheric Duct Interference Detection and Mitigation in TD-LTE Networks
by Rasendram Muralitharan & Upul Jayasinghe & Roshan G. Ragel & Gyu Myoung Lee - 1-31 A Tale of Many Networks: Splitting and Merging of Chord-like Overlays in Partitioned Networks
by Tobias Amft & Kalman Graffi - 1-32 Optimization of Ground Station Energy Saving in LEO Satellite Constellations for Earth Observation Applications
by Francesco Valente & Francesco Giacinto Lavacca & Marco Polverini & Tiziana Fiori & Vincenzo Eramo - 1-55 Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services
by Dimitrios G. Arnaoutoglou & Tzichat M. Empliouk & Theodoros N. F. Kaifas & Constantinos L. Zekios & George A. Kyriacou - 1-60 Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
by Mohammed El-Hajj
May 2025, Volume 17, Issue 5
- 1-2 Correction: Kalodanis et al. High-Risk AI Systems—Lie Detection Application. Future Internet 2025, 17 , 26
by Konstantinos Kalodanis & Panagiotis Rizomiliotis & Georgios Feretzakis & Charalampos Papapavlou & Dimosthenis Anagnostopoulos - 1-3 Industrial Internet of Things (IIoT): Trends and Technologies
by Zhihao Liu & Franco Davoli & Davide Borsatti - 1-13 Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers
by Lingfeng Shen & Jiangtao Nie & Ming Li & Guanghui Wang & Qiankun Zhang & Xin He - 1-15 XGBoost-Based Detection of DDoS Attacks in Named Data Networking
by Liang Liu & Weiqing Yu & Zhijun Wu & Silin Peng - 1-16 Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach
by Cristian Bua & Francesco Fiorini & Michele Pagano & Davide Adami & Stefano Giordano - 1-16 A Portable Non-Motorized Smart IoT Weather Station Platform for Urban Thermal Comfort Studies
by Raju Sethupatu Bala & Salaheddin Hosseinzadeh & Farhad Sadeghineko & Craig Scott Thomson & Rohinton Emmanuel - 1-18 A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks
by Anubhav Kumar & Rajamani Radhakrishnan & Mani Sumithra & Prabu Kaliyaperumal & Balamurugan Balusamy & Francesco Benedetto - 1-19 Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks
by Alexander Gegov & Boriana Vatchova & Yordanka Boneva & Alexandar Ichtev - 1-20 A Network Traffic Characteristics Reconstruction Method for Mitigating the Impact of Packet Loss in Edge Computing Scenarios
by Jiawei Ye & Yanting Chen & Aierpanjiang Simayi & Yu Liu & Zhihui Lu & Jie Wu - 1-20 Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs
by Jing Li & Wei Zong & Yang-Wai Chow & Willy Susilo - 1-21 Adversarial Training for Mitigating Insider-Driven XAI-Based Backdoor Attacks
by R. G. Gayathri & Atul Sajjanhar & Yong Xiang - 1-21 Real-Time Identification of Look-Alike Medical Vials Using Mixed Reality-Enabled Deep Learning
by Bahar Uddin Mahmud & Guanyue Hong & Virinchi Ravindrakumar Lalwani & Nicholas Brown & Zachary D. Asher - 1-22 Classification of Hacker’s Posts Based on Zero-Shot, Few-Shot, and Fine-Tuned LLMs in Environments with Constrained Resources
by Theodoros Giannilias & Andreas Papadakis & Nikolaos Nikolaou & Theodore Zahariadis - 1-22 A Web-Based Application for Smart City Data Analysis and Visualization
by Panagiotis Karampakakis & Despoina Ioakeimidou & Periklis Chatzimisios & Konstantinos A. Tsintotas - 1-22 A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture
by Rui Lu & Lei Shi & Yinlong Liu & Zhongkai Dang - 1-23 A Blockchain-Based Strategy for Certifying Timestamps in a Distributed Healthcare Emergency Response Systems
by Daniele Marletta & Alessandro Midolo & Emiliano Tramontana - 1-23 U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds
by Jiawei Ye & Ming Yan & Shenglin Wu & Jingxuan Tan & Jie Wu - 1-27 AI-Powered Stroke Diagnosis System: Methodological Framework and Implementation
by Marta Narigina & Agris Vindecs & Dušanka Bošković & Yuri Merkuryev & Andrejs Romanovs - 1-27 DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization
by Hardi Sabah Talabani & Zrar Khalid Abdul & Hardi Mohammed Mohammed Saleh - 1-27 Research on Advancing Radio Wave Source Localization Technology Through UAV Path Optimization
by Tomoroh Takahashi & Gia Khanh Tran - 1-30 Explainable AI Assisted IoMT Security in Future 6G Networks
by Navneet Kaur & Lav Gupta - 1-33 Enhanced Propaganda Detection in Public Social Media Discussions Using a Fine-Tuned Deep Learning Model: A Diffusion of Innovation Perspective
by Pir Noman Ahmad & Adnan Muhammad Shah & KangYoon Lee - 1-36 Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods
by Mohammad Jaminur Islam & Saminur Islam & Mahmud Hossain & Shahid Noor & S. M. Riazul Islam - 1-36 Multi-Criteria Genetic Algorithm for Optimizing Distributed Computing Systems in Neural Network Synthesis
by Valeriya V. Tynchenko & Ivan Malashin & Sergei O. Kurashkin & Vadim Tynchenko & Andrei Gantimurov & Vladimir Nelyub & Aleksei Borodulin
April 2025, Volume 17, Issue 5
- 1-15 Using Machine Learning to Detect Vault (Anti-Forensic) Apps
by Michael N. Johnstone & Wencheng Yang & Mohiuddin Ahmed - 1-17 Feature Extraction in 5G Wireless Systems: A Quantum Cat Swarm and Wavelet-Based Approach
by Anand Raju & Sathishkumar Samiappan - 1-17 A Machine Learning Approach for Predicting Maternal Health Risks in Lower-Middle-Income Countries Using Sparse Data and Vital Signs
by Avnish Malde & Vishnunarayan Girishan Prabhu & Dishant Banga & Michael Hsieh & Chaithanya Renduchintala & Ronald Pirrallo - 1-17 Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security
by Guobin Xu & Oluwole Adetifa & Jianzhou Mao & Eric Sakk & Shuangbao Wang - 1-17 Implementation and Performance Analysis of an Industrial Robot’s Vision System Based on Cloud Vision Services
by Ioana-Livia Stefan & Andrei Mateescu & Ionut Lentoiu & Silviu Raileanu & Florin Daniel Anton & Dragos Constantin Popescu & Ioan Stefan Sacala - 1-18 C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers’ Power Consumption
by Marcello Artioli & Andrea Borghesi & Marta Chinnici & Anna Ciampolini & Michele Colonna & Davide De Chiara & Daniela Loreti - 1-20 Towards Safer Cities: AI-Powered Infrastructure Fault Detection Based on YOLOv11
by Raiyen Z. Rakin & Mahmudur Rahman & Kanij F. Borsa & Fahmid Al Farid & Shakila Rahman & Jia Uddin & Hezerul Abdul Karim - 1-20 BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network
by Wanwei Huang & Huicong Yu & Yingying Li & Xi He & Rui Chen - 1-23 Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR
by Mingjun Wang & Xuezhi Zhang & Feng Jing & Mei Gao - 1-27 Ephemeral Node Identifiers for Enhanced Flow Privacy
by Gregor Tamati Haywood & Saleem Noel Bhatti - 1-28 An Improved Reference Paper Collection System Using Web Scraping with Three Enhancements
by Tresna Maulana Fahrudin & Nobuo Funabiki & Komang Candra Brata & Inzali Naing & Soe Thandar Aung & Amri Muhaimin & Dwi Arman Prasetya - 1-30 Railway Cloud Resource Management as a Service
by Ivaylo Atanasov & Dragomira Dimitrova & Evelina Pencheva & Ventsislav Trifonov - 1-30 Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration
by Negin Jahanbakhsh & Mario Vega-Barbas & Iván Pau & Lucas Elvira-Martín & Hirad Moosavi & Carolina García-Vázquez - 1-31 Leveraging Blockchain Technology for Secure 5G Offloading Processes
by Cristina Regueiro & Santiago de Diego & Borja Urkizu - 1-32 Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System
by Hanen Ben Rjeb & Layth Sliman & Hela Zorgati & Raoudha Ben Djemaa & Amine Dhraief - 1-35 Integrating AIoT Technologies in Aquaculture: A Systematic Review
by Fahmida Wazed Tina & Nasrin Afsarimanesh & Anindya Nag & Md Eshrat E. Alahi - 1-38 Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings
by Rosario G. Garroppo & Pietro Giuseppe Giardina & Giada Landi & Marco Ruta - 1-55 SoK: Delegated Security in the Internet of Things
by Emiliia Geloczi & Felix Klement & Patrick Struck & Stefan Katzenbeisser
April 2025, Volume 17, Issue 4
- 1-12 A Transformer-Based Autoencoder with Isolation Forest and XGBoost for Malfunction and Intrusion Detection in Wireless Sensor Networks for Forest Fire Prediction
by Ahshanul Haque & Hamdy Soliman - 1-14 Multi-Class Intrusion Detection in Internet of Vehicles: Optimizing Machine Learning Models on Imbalanced Data
by Ágata Palma & Mário Antunes & Jorge Bernardino & Ana Alves - 1-14 NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters
by Peng Li & Chen Qing & Hao Liu - 1-17 A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks
by Sunan Wang & Rong Song & Xiangyu Zheng & Wanwei Huang & Hongchang Liu - 1-18 C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control
by Efstratios Chatzoglou & Georgios Kambourakis - 1-21 Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models
by Jaewoo Yang & Hayun Kim & Junyung Ji & Younghoon Kim - 1-22 Reinforcement Learning-Based Dynamic Fuzzy Weight Adjustment for Adaptive User Interfaces in Educational Software
by Christos Troussas & Akrivi Krouska & Phivos Mylonas & Cleo Sgouropoulou - 1-22 Multimodal Fall Detection Using Spatial–Temporal Attention and Bi-LSTM-Based Feature Fusion
by Jungpil Shin & Abu Saleh Musa Miah & Rei Egawa & Najmul Hassan & Koki Hirooka & Yoichi Tomioka - 1-23 Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance
by Ade Dotun Ajasa & Hassan Chizari & Abu Alam - 1-24 The New CAP Theorem on Blockchain Consensus Systems
by Aristidis G. Anagnostakis & Euripidis Glavas - 1-24 CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks
by Junchao Wang & Honglin Li & Yan Sun & Chris Phillips & Alexios Mylonas & Dimitris Gritzalis - 1-24 Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario
by Ivan Cibrario Bertolotti & Luca Durante & Enrico Cambiaso - 1-24 Analysis of Universal Decoding Techniques for 6G Ultra-Reliable and Low-Latency Communication Scenario
by Abhilasha Gautam & Prabhat Thakur & Ghanshyam Singh - 1-25 Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms
by Hajar Zaidani & Rim Koulali & Abderrahim Maizate & Mohamed Ouzzif - 1-26 Comparative Feature-Guided Regression Network with a Model-Eye Pretrained Model for Online Refractive Error Screening
by Jiayi Wang & Tianyou Zheng & Yang Zhang & Tianli Zheng & Weiwei Fu - 1-26 Edge AI for Real-Time Anomaly Detection in Smart Homes
by Manuel J. C. S. Reis & Carlos Serôdio - 1-27 Detecting Disinformation in Croatian Social Media Comments
by Igor Ljubi & Zdravko Grgić & Marin Vuković & Gordan Gledec - 1-27 Big-Delay Estimation for Speech Separation in Assisted Living Environments
by Swarnadeep Bagchi & Ruairí de Fréin - 1-29 Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach
by Ali Vaziri & Pardis Sadatian Moghaddam & Mehrdad Shoeibi & Masoud Kaveh - 1-30 Internet of Things and Deep Learning for Citizen Security: A Systematic Literature Review on Violence and Crime
by Chrisbel Simisterra-Batallas & Pablo Pico-Valencia & Jaime Sayago-Heredia & Xavier Quiñónez-Ku - 1-31 Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets
by Mohammed Salem Atoum & Ala Abdulsalam Alarood & Eesa Alsolami & Adamu Abubakar & Ahmad K. Al Hwaitat & Izzat Alsmadi - 1-34 AI-MDD-UX: Revolutionizing E-Commerce User Experience with Generative AI and Model-Driven Development
by Adel Alti & Abderrahim Lakehal - 1-37 Employing Streaming Machine Learning for Modeling Workload Patterns in Multi-Tiered Data Storage Systems
by Edson Ramiro Lucas Filho & George Savva & Lun Yang & Kebo Fu & Jianqiang Shen & Herodotos Herodotou - 1-37 Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology
by Adrian Alexandrescu & Delia-Elena Bărbuță & Cristian Nicolae Buțincu & Alexandru Archip & Silviu-Dumitru Pavăl & Cătălin Mironeanu & Gabriel-Alexandru Scînteie - 1-39 Enabling Green Cellular Networks: A Review and Proposal Leveraging Software-Defined Networking, Network Function Virtualization, and Cloud-Radio Access Network
by Radheshyam Singh & Line M. P. Larsen & Eder Ollora Zaballa & Michael Stübert Berger & Christian Kloch & Lars Dittmann - 1-40 A Systematic Review on the Combination of VR, IoT and AI Technologies, and Their Integration in Applications
by Dimitris Kostadimas & Vlasios Kasapakis & Konstantinos Kotis - 1-40 Distributed Reputation for Accurate Vehicle Misbehavior Reporting (DRAMBR)
by Dimah Almani & Tim Muller & Steven Furnell - 1-41 Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies
by Md Kamrul Siam & Bilash Saha & Md Mehedi Hasan & Md Jobair Hossain Faruk & Nafisa Anjum & Sharaban Tahora & Aiasha Siddika & Hossain Shahriar - 1-47 Enhancing Transplantation Care with eHealth: Benefits, Challenges, and Key Considerations for the Future
by Ilaisaane Falevai & Farkhondeh Hassandoust - 1-54 A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies
by Abdul Manan Sheikh & Md. Rafiqul Islam & Mohamed Hadi Habaebi & Suriza Ahmad Zabidi & Athaur Rahman Bin Najeeb & Adnan Kabbani
March 2025, Volume 17, Issue 4
- 1-2 eHealth and mHealth
by Bernhard Neumayer & Stefan Sauermann & Sten Hanke - 1-4 Scalable and Distributed Cloud Continuum Orchestration for Next-Generation IoT Applications: Latest Advances and Prospects
by Dimitrios Dechouniotis & Ioannis Dimolitsas - 1-15 On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective
by Fragkiskos Ninos & Konstantinos Karalas & Dimitrios Dechouniotis & Michael Polemis - 1-18 GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering
by Danial Ahmadzadeh & Mehrdad Jalali & Reza Ghaemi & Maryam Kheirabadi - 1-19 A Cross-Chain-Based Access Control Framework for Cloud Environment
by Saad Belcaid & Mostapha Zbakh & Siham Aouad & Abdellah Touhafi & An Braeken - 1-19 Generative AI-Enhanced Intelligent Tutoring System for Graduate Cybersecurity Programs
by Madhav Mukherjee & John Le & Yang-Wai Chow - 1-19 Balancing Prediction Accuracy and Explanation Power of Path Loss Modeling in a University Campus Environment via Explainable AI
by Hamed Khalili & Hannes Frey & Maria A. Wimmer - 1-20 Explainable Identification of Similarities Between Entities for Discovery in Large Text
by Akhil Joshi & Sai Teja Erukude & Lior Shamir - 1-20 Enhancing IoT Scalability and Interoperability Through Ontology Alignment and FedProx
by Chaimae Kanzouai & Soukaina Bouarourou & Abderrahim Zannou & Abdelhak Boulaalam & El Habib Nfaoui - 1-20 EmoSDS: Unified Emotionally Adaptive Spoken Dialogue System Using Self-Supervised Speech Representations
by Jaehwan Lee & Youngjun Sim & Jinyou Kim & Young-Joo Suh - 1-21 Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions
by Oladele Afolalu & Mohohlo Samuel Tsoeu - 1-21 A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
by Paul Scalise & Michael Hempel & Hamid Sharif - 1-22 Knowledge Sharing in Security-Sensitive Communities
by Yonit Rusho & Daphne Ruth Raban & David Simantov & Gilad Ravid - 1-23 Integration of a Digital Twin Framework for Trajectory Control of a 2RRR Planar Parallel Manipulator Using ROS/Gazebo and MATLAB
by Carlos Andrés Mesa-Montoya & Néstor Iván Marín Peláez & Kevin David Ortega-Quiñones & German Andrés Holguín-Londoño & Libardo Vicente Vanegas-Useche & Gian Carlo Daraviña-Peña & Edwan Anderson Ariza-Echeverri & Diego Vergara - 1-24 Data-Driven Diagnostics for Pediatric Appendicitis: Machine Learning to Minimize Misdiagnoses and Unnecessary Surgeries
by Deborah Maffezzoni & Enrico Barbierato & Alice Gatti - 1-25 Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan
by Tenzin Norbu & Joo Yeon Park & Kok Wai Wong & Hui Cui - 1-25 Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
by Ali Zaman & Salman A. Khan & Nazeeruddin Mohammad & Abdelhamied A. Ateya & Sadique Ahmad & Mohammed A. ElAffendi - 1-25 Task Scheduling for Public Clouds Using a Fuzzy Controller-Based Priority- and Deadline-Aware Approach
by Saad Qamar & Nesar Ahmad & Parvez Mahmood Khan - 1-26 GDPR and Large Language Models: Technical and Legal Obstacles
by Georgios Feretzakis & Evangelia Vagena & Konstantinos Kalodanis & Paraskevi Peristera & Dimitris Kalles & Athanasios Anastasiou - 1-26 Practical Comparison Between the CI/CD Platforms Azure DevOps and GitHub
by Vladislav Manolov & Daniela Gotseva & Nikolay Hinov - 1-27 Benchmarking Large Language Models from Open and Closed Source Models to Apply Data Annotation for Free-Text Criteria in Healthcare
by Ali Nemati & Mohammad Assadi Shalmani & Qiang Lu & Jake Luo - 1-28 Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams
by Ivan Nedyalkov - 1-32 The Role of AI-Based Chatbots in Public Health Emergencies: A Narrative Review
by Francesco Branda & Massimo Stella & Cecilia Ceccarelli & Federico Cabitza & Giancarlo Ceccarelli & Antonello Maruotti & Massimo Ciccozzi & Fabio Scarpa
February 2025, Volume 17, Issue 3
- 1-5 Edge Intelligence: Edge Computing for 5G and the Internet of Things
by Yuezhi Zhou & Xu Chen - 1-15 Blockchain-Based Decentralised Authentication in Closed Environments
by Wata Kanjanapruthipong & Sirapat Boonkrong - 1-15 Gamitest: A Game-like Online Student Assessment System
by Jakub Swacha & Artur Kulpa - 1-15 Assessing Browser Security: A Detailed Study Based on CVE Metrics
by Oleksii Chalyi & Kęstutis Driaunys & Vytautas Rudžionis - 1-19 Optimizing Electric Vehicle Routing Efficiency Using K-Means Clustering and Genetic Algorithms
by Tal Gaon & Yovel Gabay & Miri Weiss Cohen - 1-19 Metastable Substructure Embedding and Robust Classification of Multichannel EEG Data Using Spectral Graph Kernels
by Rashmi N. Muralinath & Vishwambhar Pathak & Prabhat K. Mahanti - 1-21 User-Generated Content and Its Impact on Purchase Intent for Tourism Products: A Comparative Analysis of Millennials and Centennials on TikTok
by Eva Correia Ramos & Célia M. Q. Ramos - 1-23 IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System
by Nicoletta González-Cancelas & Javier Vaca-Cabrero & Alberto Camarero-Orive - 1-28 An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design
by J. de Curtò & I. de Zarzà & Leandro Sebastián Fervier & Victoria Sanagustín-Fons & Carlos T. Calafate - 1-32 Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network
by Mario Martínez-Morfa & Carlos Ruiz de Mendoza & Cristina Cervelló-Pastor & Sebastia Sallent-Ribes - 1-34 Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks
by Jinying Li & Ananda Maiti
March 2025, Volume 17, Issue 3
- 1-15 Deep Neural Network-Based Modeling of Multimodal Human–Computer Interaction in Aircraft Cockpits
by Li Wang & Heming Zhang & Changyuan Wang - 1-15 Resource-Aware ECG Classification with Heterogeneous Models in Federated Learning
by Mohammad Munzurul Islam & Mohammed Alawad - 1-16 GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning
by Yulin Kang & Wuzheng Tan & Linlin Fan & Yinuo Chen & Xinbin Lai & Jian Weng - 1-18 Frame Aggregation with Simple Block Acknowledgement Mechanism to Provide Strict Quality of Service Guarantee to Emergency Traffic in Wireless Networks
by Shuaib K. Memon & Md Akbar Hossain & Nurul I. Sarkar - 1-19 Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events
by J. D. Morillo Reina & T. J. Mateo Sanguino - 1-19 A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios
by Fabrizio Messina & Domenico Rosaci & Giuseppe M. L. Sarnè - 1-20 Mobility Prediction and Resource-Aware Client Selection for Federated Learning in IoT
by Rana Albelaihi - 1-20 SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features
by Tieqi Xi & Qiuhua Zheng & Chuanhui Cheng & Ting Wu & Guojie Xie & Xuebiao Qian & Haochen Ye & Zhenyu Sun - 1-20 A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping
by Amanda Thomson & Leandros Maglaras & Naghmeh Moradpoor - 1-20 CommC: A Multi-Purpose COMModity Hardware Cluster
by Agorakis Bompotas & Nikitas-Rigas Kalogeropoulos & Christos Makris - 1-20 Enabling Tactile Internet via 6G: Application Characteristics, Requirements, and Design Considerations
by Bharat S. Chaudhari - 1-20 How Does Digital Capability Shape Resilient Supply Chains?—Evidence from China’s Electric Vehicle Manufacturing Industry
by Yanxuan Li & Vatcharapol Sukhotu - 1-21 A Distributed Machine Learning-Based Scheme for Real-Time Highway Traffic Flow Prediction in Internet of Vehicles
by Hani Alnami & Imad Mahgoub & Hamzah Al-Najada & Easa Alalwany - 1-22 University Students’ Subjective Well-Being in Japan Between 2021 and 2023: Its Relationship with Social Media Use
by Shaoyu Ye & Kevin K. W. Ho - 1-22 FedRecI2C: A Novel Federated Recommendation Framework Integrating Communication and Computation to Accelerate Convergence Under Communication Constraints
by Qizhong Zheng & Xiujie Huang - 1-24 Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk
by Vincenzo Barrile & Emanuela Genovese & Clemente Maesano & Sonia Calluso & Maurizio Pasquale Manti - 1-25 Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects’ Stigmergic Communication
by Ojilvie Avila-Cortés & Saúl E. Pomares Hernández & Julio César Pérez-Sansalvador & Lil María Xibai Rodríguez-Henríquez - 1-27 Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms
by Andri Santoso & Samsul Huda & Yuta Kodera & Yasuyuki Nogami - 1-28 A Regional Multi-Agent Air Monitoring Platform
by Stanimir Stoyanov & Emil Doychev & Asya Stoyanova-Doycheva & Veneta Tabakova-Komsalova & Ivan Stoyanov & Iliya Nedelchev - 1-28 A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models
by Nicholas Jones & Md Whaiduzzaman & Tony Jan & Amr Adel & Ammar Alazab & Afnan Alkreisat - 1-30 Advanced Trajectory Analysis of NASA’s Juno Mission Using Unsupervised Machine Learning: Insights into Jupiter’s Orbital Dynamics
by Ashraf ALDabbas & Zaid Mustafa & Zoltan Gal - 1-36 CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality
by Daneesha Ranasinghe & Nayomi Kankanamge & Chathura De Silva & Nuwani Kangana & Rifat Mahamood & Tan Yigitcanlar - 1-39 Dynamic Workload Management System in the Public Sector: A Comparative Analysis
by Konstantinos C. Giotopoulos & Dimitrios Michalopoulos & Gerasimos Vonitsanos & Dimitris Papadopoulos & Ioanna Giannoukou & Spyros Sioutas - 1-41 Edge and Cloud Computing in Smart Cities
by Maria Trigka & Elias Dritsas - 1-48 Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things
by John Mulo & Hengshuo Liang & Mian Qian & Milon Biswas & Bharat Rawal & Yifan Guo & Wei Yu - 1-50 Health Misinformation in Social Networks: A Survey of Information Technology Approaches
by Vasiliki Papanikou & Panagiotis Papadakos & Theodora Karamanidou & Thanos G. Stavropoulos & Evaggelia Pitoura & Panayiotis Tsaparas
January 2025, Volume 17, Issue 2
- 1-15 Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing
by David Ortiz-Perez & Pablo Ruiz-Ponce & David Mulero-Pérez & Manuel Benavent-Lledo & Javier Rodriguez-Juan & Hugo Hernandez-Lopez & Anatoli Iarovikov & Srdjan Krco & Daliborka Nedic & Dejan Vukobratovic & Jose Garcia-Rodriguez - 1-18 Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality
by Ana Cassia Cruz & Rogério Luís de C. Costa & Leonel Santos & Carlos Rabadão & Anabela Marto & Alexandrino Gonçalves - 1-21 Enhancing Human–Agent Interaction via Artificial Agents That Speculate About the Future
by Casey C. Bennett & Young-Ho Bae & Jun-Hyung Yoon & Say Young Kim & Benjamin Weiss - 1-23 IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model
by Huu Dang Quoc & Loc Nguyen The & Truong Bui Quang & Phuong Han Minh - 1-29 Survey on Secure Scientific Workflow Scheduling in Cloud Environments
by Hadeel Amjed Saeed & Sufyan T. Faraj Al-Janabi & Esam Taha Yassen & Omar A. Aldhaibani - 1-32 BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups
by Brahim Benaissa & Filip Hendrichovsky & Mansur As & Kaori Yoshida - 1-44 Sixth Generation Enabling Technologies and Machine Learning Intersection: A Performance Optimization Perspective
by Emmanuel Ekene Okere & Vipin Balyan
February 2025, Volume 17, Issue 2
- 1-1 Correction: Marti et al. Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. Future Internet 2024, 16 , 446
by Patrizia Marti & Giulia Teverini & Cecilia Goracci & Lorenzo Franchi - 1-5 Machine Learning for Blockchain and IoT Systems in Smart City
by Cheng-Chi Lee & Dinh-Thuan Do & Agbotiname Lucky Imoize - 1-14 Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN
by Azita Pourghasem & Raimund Kirner & Athanasios Tsokanos & Iosif Mporas & Alexios Mylonas - 1-15 Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems
by Manuel Cheminod & Ivan Cibrario Bertolotti & Adriano Valenzano & Luca Durante - 1-18 MAGIC: Multi-User Advanced Graphic Immersive Configurator for Sustainable Customization of Complex Design Products—A Sailing Yacht Case Study
by Saverio Piccininni & Mine Dastan & Fabio Vangi & Michele Fiorentino - 1-19 Transmission Power Control in Multi-Hop Communications of THz Communication Using a Potential Game Approach
by Evangelos D. Spyrou & Vassilios Kappatos & Chrysostomos Stylios - 1-19 Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures
by Peng Liu & Lili Jia & Yang Xiao - 1-19 Framework of Best Practices to Drive the Digital Transition: Towards a 4.0 Paradigm Based on Evidence from Case Studies
by Tiago Bastos & Cármen Guimarães & Leonor Teixeira - 1-20 Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification
by Oleksandr Kuznetsov & Emanuele Frontoni & Kateryna Kuznetsova & Marco Arnesano - 1-20 Hybrid Solution Through Systematic Electrical Impedance Tomography Data Reduction and CNN Compression for Efficient Hand Gesture Recognition on Resource-Constrained IoT Devices
by Salwa Sahnoun & Mahdi Mnif & Bilel Ghoul & Mohamed Jemal & Ahmed Fakhfakh & Olfa Kanoun - 1-21 Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach
by Alfredo Cuzzocrea & Mst Shapna Akter & Hossain Shahriar & Pablo García Bringas