Content
March 2026, Volume 18, Issue 3
- 1-3 Cybersecurity in the IoT
by Christos Tryfonopoulos & Nicholas Kolokotronis - 1-3 Deep Learning in Recommender Systems
by María N. Moreno-García & Fernando de la Prieta - 1-4 Machine Learning and IoT as Enablers of Intelligent Industrial Transformation
by Paulina Ayala & Marcelo V. Garcia - 1-15 A Software Defined Radio Implementation of Non-Orthogonal Multiple Access with Reliable Decoding via Error Correction
by Dipanjan Adhikary & Eirini Eleni Tsiropoulou - 1-16 Implementation and Evaluation of an Open-Source Chatbot for Patient Information Leaflets
by Lisa Heiler & Katharina Kirchsteiger & Sten Hanke & Markus Bödenler - 1-16 Differentially Private Federated Learning with Adaptive Clipping Thresholds
by Jianhua Liu & Yanglin Zeng & Zhongmei Wang & Weiqing Zhang & Yao Tong - 1-16 Design of Network Traffic Analysis Models Based on Deep Neural Networks
by Jiantao Cui & Yixiang Zhao - 1-18 Multi-Criteria Selection of Network Security Configuration Using NSGA-II
by Bagdat Yagaliyeva & Valery Lakhno & Myroslav Lakhno & Boris Gusev & Kaiyrbek Makulov & Tomiris Sundet - 1-19 Earthquake Magnitude Detection Utilizing a Novel Hybrid Earth–Transformer–LSTM Architecture
by Amir A. Ghavifekr & Elman Ghazaei & Mohsen Mirzajani & Paolo Visconti - 1-20 Contra-KD: A Lightweight Transformer Model for Malicious URL Detection with Contrastive Representation and Model Distillation
by Zheng You Lim & Ying Han Pang & Edwin Chan Kah Jun & Shih Yin Ooi & Goh Fan Ling - 1-21 Low-Latency Holographic Video Transmission in Indoor VLC Networks Assisted by Rotatable Photodetectors
by Wenzhe Wang & Long Zhang - 1-22 A Multidimensional Maturity Model for the Metaverse: Stages, Dimensions and Architectural Alignment
by Joan-Marc Garcés Sabaté & Eloi Coloma Picó - 1-23 Adaptive Healthcare Monitoring Through Drift-Aware Edge-Cloud Intelligence
by Aleksandra Stojnev Ilic & Milos Ilic & Natalija Stojanovic & Dragan Stojanovic - 1-24 Multi-Modal Artificial Intelligence for Smart Cities: Experimental Integration of Textual and Sensor Data
by Nouf Alkhater - 1-24 AI-Driven Network Optimization for the 5G-to-6G Transition: A Taxonomy-Based Survey and Reference Framework
by Rexhep Mustafovski & Galia Marinova & Besnik Qehaja & Edmond Hajrizi & Shejnaze Gagica & Vassil Guliashki - 1-25 Lightweight LSTM-Based Homogeneous Transfer Learning for Efficient On-Device IoT Intrusion Detection
by Amjad Gamlo & Sanaa Sharaf & Rania Molla - 1-26 A Framework to Measure Maturity of Industrial IoT Technology for Agricultural Regulatory Compliance Activities and Decentralization
by Jinying Li & Ananda Maiti & Stephen Cahoon - 1-26 Analyzing Characteristics of Public Transport Complex Networks Based on Multi-Source Big Data Fusion: A Case Study of Cangzhou, China
by Linfang Zhou & Yongsheng Chen & Dongpu Ren & Qing Lan - 1-26 A Stage-Wise Framework Using Class-Incremental Learning for Unknown DoS Attack Detection
by Juncheng Ge & Yaokai Feng & Kouichi Sakurai - 1-26 ANRF: An Adaptive Network Reconstruction Framework for Community Detection in Bipartite Networks
by Furong Chang & Songxian Wu & Yue Zhao & Farhan Ullah - 1-27 Digital Twins at the Edge: A High-Availability Framework for Resilient Data Processing in IoT Sensor Networks
by Madalin Neagu & Codruta Maria Serban & Anca Hangan & Gheorghe Sebestyen - 1-27 Towards a Protocol-Aware Intrusion Detection System for LoRaWAN Networks
by Zsolt Bringye & Rita Fleiner & Eszter Kail - 1-27 A Hybrid Federated–Incremental Learning Framework for Continuous Authentication in Zero-Trust Networks
by Jie Ji & Shi Qiu & Shengpeng Ye & Xin Liu - 1-29 CCBA: Dynamic Scheduling Algorithm for Jammer Resources in Strong Electromagnetic Interference Environment
by Zhenhua Wei & Wenpeng Wu & Haiyang You & Zhaoguang Zhang & Chenxi Li & Jianwei Zhan & Shan Zhao - 1-31 Survey on Biometric Authentication for Decentralized Identity Management: Trends, Challenges, and Future Directions
by Imen Rjab & Layth Sliman - 1-31 An Edge–Fog–Cloud IoT Framework for Real-Time Cardiac Monitoring and Rapid Clinical Alerts in Hospital Wards
by Tehseen Baig & Nauman Riaz Chaudhry & Reema Choudhary & Pankaj Yadav & Younus Ahamad Shaik & Ayesha Rashid - 1-31 Model Procurement for Industrial Cyber-Physical Systems Using Cryptographic Performance Attestation
by Jay Bojič Burgos & Urban Sedlar & Matevž Pustišek - 1-31 DRT-PBFT: A Novel PBFT-Optimized Consensus Algorithm for Blockchain Based on Dynamic Reputation Tree
by Xiaohong Deng & Lihui Liu & Zhigang Chen & Xinrong Lu & Juan Li - 1-32 MAPE-ZT: A Multi-Layer Access Policy Encryption System for Zero Trust Architectures
by Ashutosh Soni & Surendra Kumar Nanda & Jayanti Rout & Mrutyunjaya Sathua & Ganapati Panda & Manob Jyoti Saikia - 1-33 Predictive Network Slicing Resource Orchestration: A VNF Approach
by Andrés Cárdenas & Luis Sigcha & Mohammadreza Mosahebfard - 1-35 Sentiment Classification of Amazon Product Reviews Based on Machine and Deep Learning Techniques: A Comparative Study
by Eman Daraghmi & Noora Zyadeh - 1-42 GEMS: Gas-Enhanced Marine Search for Optimizing Fusion Mamba-Attention Networks for Fake Review Classification
by Sharon Roji Priya C. & Deepalakshmi Perumalsamy & Rajermani Thinakaran
February 2026, Volume 18, Issue 3
- 1-15 An Efficient Internet-Wide Port Scan Algorithm Based on Deep Reinforcement Learning
by Lu Yu & Huimin Ma & Pengfei Xue & Miao Hu & Hao Hao - 1-17 Attention-Based Transformer Encoder for Secure Wireless Sensor Operations
by Mohammad H. Baniata & Chayut Bunterngchit & Laith H. Baniata & Malek A. Almomani & Muhannad Tahboush - 1-18 An Exploratory Study on the Feasibility of Conducting Deliberative Polling ® in the Metaverse
by Pablo López Guardiola & Manuel Pardo Ríos & Pablo Salvador Blesa Aledo & Alice Siu - 1-19 Federated Intrusion Detection via Unidirectional Serialization and Multi-Scale 1D Convolutions with Attention Reweighting
by Wenqing Li & Di Gao & Tianrong Zhang - 1-20 BigchainDB for Precision Agriculture Data Sharing: A Feasibility Study
by Željko Džafić & Branko Milosavljević & Mladen Čučak & Slobodanka Pavlović - 1-20 Cybersecurity of Cyber-Physical Systems in the Quantum Era: A Systematic Literature Review-Based Approach
by Siler Amador & César Pardo & Raúl Mazo - 1-23 Conditional Counter-Inspection with Curriculum-Biased Experts for Lightweight 5G Intrusion Detection
by Khaoula Tahori & Imade Fahd Eddine Fatani & Mohamed Moughit - 1-24 A Survey of Multimodal Learning Analytics: Data, Methods, Systems, and Responsible Deployment
by Georgios Kostopoulos & Sotiris Kotsiantis & Theodor Panagiotakopoulos & Achilles Kameas - 1-25 Perceived Learning vs. Engagement in AI-Assisted Homework: A Comparative Study of ChatGPT Use Across High School, University, and Teachers in Sonora, Mexico (2024–2025)
by Raquel Torres-Peralta & Federico Cirett-Galán & María del Carmen Heras-Sanchez & Karla Lerma-Molina & Ilse Espinoza-Flores - 1-32 Lightweight AI-Based Attack Detection for LED VLC in Multi-Channel Airborne Radar Systems
by Vadim A. Nenashev & Vladimir P. Kuzmenko & Svetlana S. Dymkova & Oleg V. Varlamov - 1-35 A Comprehensive Survey on 5G RedCap: Technologies, Security Vulnerabilities, and Attack Vectors
by Pavan Raja I & Kurunandan Jain & Hari N. N & Sethu Subramanian N & Prabhakar Krishnan
February 2026, Volume 18, Issue 2
- 1-8 Special Issue on Security and Privacy in Blockchains and the IoT—3rd Edition
by Christoph Stach & Clémentine Gritti & Iouliana Litou - 1-13 Rethinking the Security Assurances of MTD: A Gap Analysis for Network Defense
by Łukasz Jalowski & Marek Zmuda & Mariusz Rawski & Paulina Rekosz - 1-16 FedAWR: Aggregation Optimization in Federated Learning with Adaptive Weights and Learning Rates
by Tong Yao & Jianqi Li & Jianhua Liu - 1-17 SPARTA: Sparse Parallel Architecture for Real-Time Threat Analysis for Lightweight Edge Network Defense
by Shi Li & Xiyun Mi & Lin Zhang & Ye Lu - 1-18 The Generative AI Paradox: GenAI and the Erosion of Trust, the Corrosion of Information Verification, and the Demise of Truth
by Emilio Ferrara - 1-18 Beyond Centralized AI: Blockchain-Enabled Decentralized Learning
by Daren Wang & Tengfei Ma & Juntao Zhu & Haihan Duan - 1-19 Aerial Image Analysis: When LLMs Assist (And When Not)
by Salvatore Calcagno & Erika Scaletta & Emiliano Tramontana & Gabriella Verga - 1-20 Semantic Search for System Dynamics Models Using Vector Embeddings in a Cloud Microservices Environment
by Pavel Kyurkchiev & Anton Iliev & Nikolay Kyurkchiev - 1-20 Network Instability as a Signal of Systemic Financial Stress: An Explainable Machine-Learning Framework
by Livia Valentina Moretti & Enrico Barbierato & Alice Gatti - 1-20 Benchmarking Large Language Models for Embedded Systems Programming in Microcontroller-Driven IoT Applications
by Marek Babiuch & Pavel Smutný - 1-20 Interference-Resilient Concurrent Sensing in Dense Environments: A Review of OFDM and OTFS Waveforms for JRC
by Mehmet Yazgan & Buldan Karahan & Hüseyin Arslan & Stavros Vakalis - 1-20 Novel Video Understanding Approach for Embodied Learning of Robotics Technology
by Hongbo Zhang & Benjamin Li & Gregory Rushton - 1-21 Location-Aware SDN-IDPS Framework for Real-Time DoS Mitigation in Vehicular Networks
by Aung Aung & Kuljaree Tantayakul & Adisak Intana - 1-21 Differential Privacy Data Publication Based on Scoring Function
by Ke Yuan & Quan Zhang & Yinghao Lin & Yuye Wang & Chunfu Jia - 1-21 Assuring Brokerage Quality in the Cloud–Edge Continuum
by Evangelos Barmpas & Simeon Veloudis & Yiannis Verginadis & Iraklis Paraskakis - 1-21 Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems
by Guanyu Chen & Hiroki Watanabe & Kohei Matsumura & Yoshinari Takegawa - 1-22 From IoT to AIoT: Evolving Agricultural Systems Through Intelligent Connectivity in Low-Income Countries
by Selain K. Kasereka & Alidor M. Mbayandjambe & Ibsen G. Bazie & Heriol F. Zeufack & Okurwoth V. Ocama & Esteve Hassan & Kyandoghere Kyamakya & Tasho Tashev - 1-22 LeapNP: A Modular Python Framework for Benchmarking Learned Heuristics in Numeric Planning
by Valerio Borelli & Alfonso Emilio Gerevini & Enrico Scala & Ivan Serina - 1-22 Evaluating Reconstruction-Based and Proximity-Based Methods: A Four-Way Comparison (AE, LSTM-AE, OCSVM, IF) in SCADA Anomaly Detection Under Inverted Imbalance
by Lukasz Pawlik - 1-23 TLOA: A Power-Adaptive Algorithm Based on Air–Ground Cooperative Jamming
by Wenpeng Wu & Zhenhua Wei & Haiyang You & Zhaoguang Zhang & Chenxi Li & Jianwei Zhan & Shan Zhao - 1-23 Image-Based Malware Classification Using DCGAN-Augmented Data and a CNN–Transformer Hybrid Model
by Manya Dhingra & Achin Jain & Niharika Thakur & Anurag Choubey & Massimo Donelli & Arun Kumar Dubey & Arvind Panwar - 1-24 CEVD: Cluster-Based Ensemble Learning for Cross-Project Vulnerability Detection
by Yang Cao & Yunwei Dong & Jie Liu - 1-25 A Comparative Analysis of Self-Aware Reinforcement Learning Models for Real-Time Intrusion Detection in Fog Networks
by Nyashadzashe Tamuka & Topside Ehleketani Mathonsi & Thomas Otieno Olwal & Solly Maswikaneng & Tonderai Muchenje & Tshimangadzo Mavin Tshilongamulenzhe - 1-25 Machine Learning-Driven Intrusion Detection for Securing IoT-Based Wireless Sensor Networks
by Yirga Yayeh Munaye & Abebaw Demelash Gebeyehu & Li-Chia Tai & Zemenu Alem Abebe & Aeneas Bekele Workneh & Robel Berie Tarekegn & Yenework Belayneh Chekol & Getaneh Berie Tarekegn - 1-26 Trajectory Planning for Autonomous Underwater Vehicles in Uneven Environments: A Survey of Coverage and Sensor Data Collection Methods
by Talal S. Almuzaini & Andrey V. Savkin - 1-26 LoRa/LoRaWAN Time Synchronization: A Comprehensive Analysis, Performance Evaluation, and Compensation of Frame Timestamping
by Stefano Rinaldi & Elia Mondini & Paolo Ferrari & Alessandra Flammini & Emiliano Sisinni - 1-26 A Temporally Dynamic Feature-Extraction Framework for Phishing Detection with LIME and SHAP Explanations
by Chris Mayo & Michael Tchuindjang & Sarfraz Brohi & Nikolaos Ersotelos - 1-26 Optimizing Collaborative Filtering for Accurate Rating Predictions in Very Sparse Datasets
by Sofia-Anna Lapadaki & John Nanos & Dionisis Margaris & Costas Vassilakis & Dimitris Spiliotopoulos - 1-27 User Perceptions of Virtual Consultations and Artificial Intelligence Assistance: A Mixed Methods Study
by Pranavsingh Dhunnoo & Karen McGuigan & Vicky O’Rourke & Bertalan Meskó & Michael McCann - 1-27 A Review of Research on the Applications of Large Models in Each Functional Module of the Entire Rehabilitation Process
by Tingting Bai & Kaiwen Jiang & Yixuan Yu & Shuyan Qie & Congxiao Wang & Boyuan Wang & Wenli Zhang - 1-28 Deep Learning-Based Video Watermarking: A Robust Framework for Spatial–Temporal Embedding and Retrieval
by Antonio Cedillo-Hernandez & Lydia Velazquez-Garcia & Francisco Javier Garcia-Ugalde & Manuel Cedillo-Hernandez - 1-29 Building a Regional Platform for Monitoring Air Quality
by Stanimir Nedyalkov Stoyanov & Boyan Lyubomirov Belichev & Veneta Veselinova Tabakova-Komsalova & Yordan Georgiev Todorov & Angel Atanasov Golev & Georgi Kostadinov Maglizhanov & Ivan Stanimirov Stoyanov & Asya Georgieva Stoyanova-Doycheva - 1-29 Analysis of GitHub Advanced Security: Security Integration in GitHub and Azure DevOps
by Vladislav Manolov & Daniela Gotseva & Nikolay Hinov - 1-30 Research on an On-Chain and Off-Chain Collaborative Storage Method Based on Blockchain and IPFS
by Tianqi Zhu & Yuxiang Huang & Zhihong Liang & Mingming Qin & Ruicheng Niu & Yuanyuan Ma & Qi Feng - 1-31 A Systematic Review of Machine-Learning-Based Detection of DDoS Attacks in Software-Defined Networks
by Surendren Ganeshan & R Kanesaraj Ramasamy - 1-32 Towards Trustworthy AI Agents in Geriatric Medicine: A Secure and Assistive Architectural Blueprint
by Elena-Anca Paraschiv & Adrian Victor Vevera & Carmen Elena Cîrnu & Lidia Băjenaru & Andreea Dinu & Gabriel Ioan Prada - 1-33 Payment Rails in Smart Contract as a Service (SCaaS) Solutions from BPMN Models
by Christian Gang Liu & Peter Bodorik & Dawn Jutla - 1-35 DACCA: Distributed Adaptive Cloud Continuum Architecture
by Nektarios Deligiannakis & Vassilis Papataxiarhis & Michalis Loukeris & Stathes Hadjiefthymiades & Marios Touloupou & Syed Mafooq Ul Hassan & Herodotos Herodotou & Thanasis Moustakas & Emmanouil Bampis & Konstantinos Ioannidis & Iakovos T. Michailidis & Stefanos Vrochidis & Elias Kosmatopoulos & Francisco Javier Romero Martínez & Rafael Marín Pérez & Amr Mousa & Jacopo Castellini & Pablo Strasser - 1-35 A Hybrid LoRa/ZigBee IoT Mesh Architecture for Real-Time Performance Monitoring in Orienteering Sport Competitions: A Measurement Campaign on Different Environments
by Romeo Giuliano & Stefano Alessandro Ignazio Mocci De Martis & Antonello Tomeo & Francesco Terlizzi & Marco Gerardi & Francesca Fallucchi & Lorenzo Felli & Nicola Dall’Ora - 1-39 Research on Intelligent Resource Management Solutions for Green Cloud Computing
by Amirmohammad Parhizkar & Ehsan Arianyan & Pejman Goudarzi - 1-43 A Large-Scale Empirical Study of LLM Orchestration and Ensemble Strategies for Sentiment Analysis in Recommender Systems
by Konstantinos I. Roumeliotis & Dionisis Margaris & Dimitris Spiliotopoulos & Costas Vassilakis - 1-69 Next-Gen Explainable AI (XAI) for Federated and Distributed Internet of Things Systems: A State-of-the-Art Survey
by Aristeidis Karras & Anastasios Giannaros & Natalia Amasiadi & Christos Karras
January 2026, Volume 18, Issue 2
- 1-19 Video Deepfake Detection Based on Multimodality Semantic Consistency Fusion
by Fang Sun & Xiaoxuan Guo & Tong Zhang & Yang Liu & Jing Zhang - 1-19 AI-Driven Hybrid Architecture for Secure, Reconstruction-Resistant Multi-Cloud Storage
by Munir Ahmed & Jiann-Shiun Yuan - 1-32 Utilizing AIoT to Achieve Sustainable Agricultural Systems in a Climate-Change-Affected Environment
by Mohamed Naeem & Mohamed A. El-Khoreby & Hussein M. ELAttar & Mohamed Aboul-Dahab - 1-38 Aris-RPL: A Multi-Objective Reinforcement Learning Framework for Adaptive and Load-Balanced Routing in IoT Networks
by Najim Halloum & Ali Ahmadi & Yousef Darmani - 1-42 Socially Grounded IoT Protocol for Reliable Computer Vision in Industrial Applications
by Gokulnath Chidambaram & Shreyanka Subbarayappa & Sai Baba Magapu - 1-42 Cross Layer Optimization Using AI/ML-Assisted Federated Edge Learning in 6G Networks
by Spyridon Louvros & AnupKumar Pandey & Brijesh Shah & Yashesh Buch
January 2026, Volume 18, Issue 1
- 1-2 Correction: Sokhansanj, B.A. Uncensored AI in the Wild: Tracking Publicly Available and Locally Deployable LLMs. Future Internet 2025, 17 , 477
by Bahrad A. Sokhansanj - 1-14 Intrusion Detection for Internet of Vehicles CAN Bus Communications Using Machine Learning: An Empirical Study on the CICIoV2024 Dataset
by Hop Le & Izzat Alsmadi - 1-17 LECITE: LoRA-Enhanced and Consistency-Guided Iterative Knowledge Graph Construction
by Donghao Xiao & Quan Qian - 1-17 Unsupervised Detection of SOC Spoofing in OCPP 2.0.1 EV Charging Communication Protocol Using One-Class SVM
by Aisha B. Rahman & Md Sadman Siraj & Eirini Eleni Tsiropoulou & Georgios Fragkos & Ryan Sullivant & Yung Ryn Choe & Jhaell Jimenez & Junghwan Rhee & Kyu Hyung Lee - 1-18 AnonymAI: An Approach with Differential Privacy and Intelligent Agents for the Automated Anonymization of Sensitive Data
by Marcelo Nascimento Oliveira Soares & Leonardo Barbosa Oliveira & Antonio João Gonçalves Azambuja & Jean Phelipe de Oliveira Lima & Anderson Silva Soares - 1-21 Design of Wireless Powered Communication Systems for Low-Altitude Economy
by Huajun Chen & Zhengguo Xiao & Ming Dai & Lina Yuan - 1-21 Cyber Approach for DDoS Attack Detection Using Hybrid CNN-LSTM Model in IoT-Based Healthcare
by Mbarka Belhaj Mohamed & Dalenda Bouzidi & Manar Khalid Ibraheem & Abdullah Ali Jawad Al-Abadi & Ahmed Fakhfakh - 1-22 Predicting Demand in Supply Chain Management: A Decision Support System Using Graph Convolutional Networks
by Stefani Sifuentes-Domínguez & Jose-Manuel Mejia-Muñoz & Oliverio Cruz-Mejia & Rubén Pizarro-Gurrola & Aracelí-Soledad Domínguez-Flores & Leticia Ortega-Máynez - 1-22 Edge–Cloud Platform for Monitoring Sustainability Metrics in Organizational Contexts
by Maurizio Cellura & Ylenia Galluzzo & Domenico Garlisi & Fabrizio Giuliano & Domenico Panno & Simona E. Rombo - 1-22 A Multiclass Machine Learning Framework for Detecting Routing Attacks in RPL-Based IoT Networks Using a Novel Simulation-Driven Dataset
by Niharika Panda & Supriya Muthuraman - 1-22 Multi-Attribute Physical-Layer Authentication Against Jamming and Battery-Depletion Attacks in LoRaWAN
by Azita Pourghasem & Raimund Kirner & Athanasios Tsokanos & Iosif Mporas & Alexios Mylonas - 1-22 A Multi-Objective Optimization-Based Container Cloud Resource Scheduling Method
by Danping Zhang & Xiaolan Xie & Yuhui Song - 1-22 RBCrowd: A Reliable Blockchain-Based Reputation Management Framework for Privacy Preservation in Mobile Crowdsensing
by Zaina Maqour & Hanan El Bakkali & Driss Benhaddou & Houda Benbrahim - 1-23 A Physics-Aware Latent Diffusion Framework for Mitigating Adversarial Perturbations in Manufacturing Quality Control
by Nikolaos Nikolakis & Paolo Catti - 1-23 Lightweight Frame Format for Interoperability in Wireless Sensor Networks of IoT-Based Smart Systems
by Samer Jaloudi - 1-23 Heterogeneous Federated Learning via Knowledge Transfer Guided by Global Pseudo Proxy Data
by Wenhao Sun & Xiaoxuan Guo & Wenjun Liu & Fang Sun - 1-24 Detecting TLS Protocol Anomalies Through Network Monitoring and Compliance Tools
by Diana Gratiela Berbecaru & Marco De Santo - 1-25 Capacity Planning for Software Applications in Natural Disaster Scenarios
by Juan Ovando-Leon & Luis Veas-Castillo & Veronica Gil-Costa & Mauricio Marin - 1-25 Decentralized Dynamic Heterogeneous Redundancy Architecture Based on Raft Consensus Algorithm
by Ke Chen & Leyi Shi - 1-25 A Hybrid AI-Driven Knowledge-Based Expert System for Optimizing Gear Design: A Case Study for Education
by Boris Aberšek & Samo Kralj & Andrej Flogie - 1-25 Machine Learning for Assessing Vital Signs in Humans in Smart Cities Based on a Multi-Agent System
by Nejood Faisal Abdulsattar & Hassan Khotanlou & Hatam Abdoli - 1-25 Architecting Multi-Cluster Layer-2 Connectivity for Cloud-Native Network Slicing
by Alex T. de Cock Buning & Ivan Vidal & Francisco Valera - 1-25 Using Traffic Management Approaches to Assess Digital Infrastructure Disruptions: Insights from a Signal Tampering Case Study
by Chrysostomos Mylonas & Apostolos Vouitsis & Evangelos Mitsakis & Konstantinos Kepaptsoglou - 1-25 Resilience-by-Design: Extracting Resilience Requirements Using the Resilience Graph in the Automotive Concept Phase
by Isaac Mpidi Bita & Elif Ugur & Aschot Hovemann & Roman Dumitrescu - 1-25 Edge-Enhanced YOLOV8 for Spacecraft Instance Segmentation in Cloud-Edge IoT Environments
by Ming Chen & Wenjie Chen & Yanfei Niu & Ping Qi & Fucheng Wang - 1-26 A Two-Stage Multi-Objective Cooperative Optimization Strategy for Computation Offloading in Space–Air–Ground Integrated Networks
by He Ren & Yinghua Tong - 1-26 An Unsupervised Cloud-Centric Intrusion Diagnosis Framework Using Autoencoder and Density-Based Learning
by Suresh K. S & Thenmozhi Elumalai & Radhakrishnan Rajamani & Anubhav Kumar & Balamurugan Balusamy & Sumendra Yogarayan & Kaliyaperumal Prabu - 1-26 Performance Evaluation of MongoDB and RavenDB in IIoT-Inspired Data-Intensive Mobile and Web Applications
by Mădălina Ciumac & Cornelia Aurora Győrödi & Robert Ștefan Győrödi & Felicia Mirabela Costea - 1-27 LEO Satellite and UAV-Assisted Maritime Internet of Things: Modeling and Performance Analysis for Data Acquisition
by Xu Hu & Bin Lin & Ping Wang & Xiao Lu - 1-28 Adaptive and Sustainable Smart Environments Using Predictive Reasoning and Context-Aware Reinforcement Learning
by Abderrahim Lakehal & Boubakeur Annane & Adel Alti & Philippe Roose & Soliman Aljarboa - 1-29 Benchmarking SQL and NoSQL Persistence in Microservices Under Variable Workloads
by Nenad Pantelic & Ljiljana Matic & Lazar Jakovljevic & Stefan Eric & Milan Eric & Miladin Stefanović & Aleksandar Djordjevic - 1-30 MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data
by Lihua Zhang & Jiali Luo & Yi Yang & Wenbiao Wang - 1-30 Guarded Swarms: Building Trusted Autonomy Through Digital Intelligence and Physical Safeguards
by Uwe M. Borghoff & Paolo Bottoni & Remo Pareschi - 1-31 Digital Learning Hubs: Evaluating Their Role in Fostering Complex and Computational Thinking
by Inés Alvarez-Icaza & Luis Magdiel Oliva-Córdova & Rasikh Tariq & José Luis Martín-Núñez - 1-32 A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption
by Xin Li & Minsheng Tan & Wenlong Tian - 1-32 Adaptive Assistive Technologies for Learning Mexican Sign Language: Design of a Mobile Application with Computer Vision and Personalized Educational Interaction
by Carlos Hurtado-Sánchez & Ricardo Rosales Cisneros & José Ricardo Cárdenas-Valdez & Andrés Calvillo-Téllez & Everardo Inzunza-Gonzalez - 1-33 Synergistic Phishing Intrusion Detection: Integrating Behavioral and Structural Indicators with Hybrid Ensembles and XAI Validation
by Isaac Kofi Nti & Murat Ozer & Chengcheng Li - 1-35 Evaluating Digital Marketing, Innovation, and Entrepreneurial Impact in AI-Built vs. Professionally Developed DeFi Websites
by Nikolaos T. Giannakopoulos & Damianos P. Sakas & Nikos Kanellos - 1-36 IRDS4C–CTIB: A Blockchain-Driven Deception Architecture for Ransomware Detection and Intelligence Sharing
by Ahmed El-Kosairy & Heba Aslan & Nashwa AbdelBaki - 1-37 Highly Efficient Software Development Using DevOps and Microservices: A Comprehensive Framework
by David Barbosa & Vítor Santos & Maria Clara Silveira & Arnaldo Santos & Henrique S. Mamede - 1-37 Synthetizing 6G KPIs for Diverse Future Use Cases: A Comprehensive Review of Emerging Standards, Technologies, and Societal Needs
by Shujat Ali & Asma Abu-Samah & Mohammed H. Alsharif & Rosdiadee Nordin & Nauman Saqib & Mohammed Sani Adam & Umawathy Techanamurthy & Manzareen Mustafa & Nor Fadzilah Abdullah - 1-39 Performance Assessment of DL for Network Intrusion Detection on a Constrained IoT Device
by Armin Mazinani & Daniele Antonucci & Luca Davoli & Gianluigi Ferrari - 1-42 DRL-TinyEdge: Energy- and Latency-Aware Deep Reinforcement Learning for Adaptive TinyML at the 6G Edge
by Saad Alaklabi & Saleh Alharbi - 1-42 Leveraging the DAO for Edge-to-Cloud Data Sharing and Availability
by Adnan Imeri & Uwe Roth & Michail Alexandros Kourtis & Andreas Oikonomakis & Achilleas Economopoulos & Lorenzo Fogli & Antonella Cadeddu & Alessandro Bianchini & Daniel Iglesias & Wouter Tavernier - 1-44 Linearization Strategies for Energy-Aware Optimization of Single-Truck, Multiple-Drone Last-Mile Delivery Systems
by Ornela Gordani & Eglantina Kalluci & Fatos Xhafa - 1-46 A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation
by Evangelos Chaskos & Nicholas Kolokotronis & Stavros Shiaeles - 1-64 Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers
by Phil Steadman & Paul Jenkins & Rajkumar Singh Rathore & Chaminda Hewage
December 2025, Volume 18, Issue 1
- 1-13 Adaptive Privacy-Preserving Insider Threat Detection Using Generative Sequence Models
by Fatmah Bamashmoos - 1-16 Federated Learning-Based Intrusion Detection in Industrial IoT Networks
by George Dominic Pecherle & Robert Ștefan Győrödi & Cornelia Aurora Győrödi - 1-21 Dynamic Evolution and Relation Perception for Temporal Knowledge Graph Reasoning
by Yuan Huang & Pengwei Shi & Xiaozheng Zhou & Ruizhi Yin - 1-21 A Dual-Attention CNN–GCN–BiLSTM Framework for Intelligent Intrusion Detection in Wireless Sensor Networks
by Laith H. Baniata & Ashraf ALDabbas & Jaffar M. Atwan & Hussein Alahmer & Basil Elmasri & Chayut Bunterngchit - 1-22 The Design and Implementation of a Graph-Based P2P Data Storage Service
by Lunodzo J. Mwinuka & Massimo Cafaro & Lucas Pereira & Hugo Morais - 1-22 A Dynamic Offloading Strategy Based on Optimal Stopping Theory in Vehicle-to-Vehicle Communication Scenarios
by An Li & Jiaxuan Ling & Yeqiang Zheng & Mingliang Chen & Gaocai Wang - 1-22 A Deterministic, Rule-Based Framework for Detecting Anomalous IP Packet Fragmentation
by Maksim Iavich & Vladimer Svanadze & Oksana Kovalchuk - 1-23 An Intelligent Software Architecture for Digital Library Systems in Sustainable Education
by Ana M. Gonzalez de Miguel & Antonio Sarasa-Cabezuelo - 1-23 A Lightweight LSTM Model for Flight Trajectory Prediction in Autonomous UAVs
by Disen Jia & Jonathan Kua & Xiao Liu - 1-24 Distributed Cooperative Spectrum Sensing via Push–Sum Consensus for Full-Duplex Cognitive Aerial Base Stations
by Andrea Tani & Dania Marabissi - 1-25 Identity Leakage in Encrypted IM Call Services: An Empirical Study of Metadata Correlation
by Chen-Yu Li - 1-26 Seamless Vital Signs-Based Continuous Authentication Using Machine Learning
by Reem Alrawili & Evelyn Sowells-Boone & Saif Al-Dean Qawasmeh - 1-27 A Versatile and Low-Cost IoT Solution for Bioclimatic Monitoring in Precision Viticulture
by António Vieira & Nuno Silva & David Pascoal & Raul Morais - 1-29 CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic
by Jinsha Zhang & Xiaoying Wang & Chunhui Li & Qingjie Zhang & Guoqing Yang & Xinyu Li & Fangfang Cui & Ruize Gu & Panpan Qi & Shuai Liu - 1-31 ICU-Transformer: Multi-Head Attention Expert System for ICU Resource Allocation Robust to Data Poisoning Attacks
by Manal Alghieth - 1-34 Research and Application of a Model Selection Forecasting System for Wind Speed and Theoretical Power Generation
by Ming Zeng & Qianqian Jia & Zhenming Wen & Fang Mao & Haotao Huang & Jingyuan Pan - 1-36 WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication
by Rafał Skowroński - 1-36 Semantic Communication Unlearning: A Variational Information Bottleneck Approach for Backdoor Defense in Wireless Systems
by Sümeye Nur Karahan & Merve Güllü & Mustafa Serdar Osmanca & Necaattin Barışçı - 1-46 Wangiri Fraud Detection: A Comprehensive Approach to Unlabeled Telecom Data
by Amirreza Balouchi & Meisam Abdollahi & Ali Eskandarian & Kianoush Karimi Pour Kerman & Elham Majd & Neda Azouji & Amirali Baniasadi
November 2025, Volume 17, Issue 12
- 1-16 Artificial Intelligence-Enabled Facial Expression Analysis for Mental Health Assessment in Older Adults: A Systematic Review and Research Agenda
by Fernando M. Runzer-Colmenares & Nelson Luis Cahuapaza-Gutierrez & Cielo Cinthya Calderon-Hernandez & Christian Loret de Mola - 1-19 LLMs in Staging: An Orchestrated LLM Workflow for Structured Augmentation with Fact Scoring
by Giuseppe Trimigno & Gianfranco Lombardo & Michele Tomaiuolo & Stefano Cagnoni & Agostino Poggi - 1-20 Design of an Improved IoT-Based PV-Powered Soil Remote Monitoring System with Low Data Acquisition Failure Rate
by Fuqiang Li & Zhe Li & Lisai Gao & Chen Peng - 1-21 Transformer-Based Intrusion Detection for Post-5G and 6G Telecommunication Networks Using Dynamic Semantic Embedding
by Haonan Yan & Xin Pang & Shaopeng Zhou & Honghui Fan - 1-23 RIS-Assisted Joint Communication, Sensing, and Multi-Tier Computing Systems
by Yunzhe Wang & Minzheng Li - 1-24 BERT-Based Approaches for Web Service Selection and Recommendation: A Systematic Review with a Focus on QoS Prediction
by Vijayalakshmi Mahanra Rao & R Kanesaraj Ramasamy & Md Shohel Sayeed - 1-25 A Resilient Deep Learning Framework for Mobile Malware Detection: From Architecture to Deployment
by Aysha Alfaw & Mohsen Rouached & Aymen Akremi - 1-25 The AI-Powered Healthcare Ecosystem: Bridging the Chasm Between Technical Validation and Systemic Integration—A Systematic Review
by Babiker Mohamed Rahamtalla & Isameldin Elamin Medani & Mohammed Eltahir Abdelhag & Sara Ahmed Eltigani & Sudha K. Rajan & Essam Falgy & Nazik Mubarak Hassan & Marwa Elfatih Fadailu & Hayat Ahmad Khudhayr & Abuzar Abdalla - 1-26 Emotional Sequencing as a Marker of Manipulation in Social Media Disinformation
by Renatha Souza Vieira & Álvaro Figueira - 1-28 Computation Offloading in Space–Air–Ground Integrated Networks for Diverse Task Requirements with Integrated Reliability Mechanisms
by Yitian Chen & Yinghua Tong - 1-28 A Blockchain-Based Framework for OSINT Evidence Collection and Identification
by Han-Wen Huang & Chih-Hung Shih & Chen-Yu Li & Hao-Yung Teng - 1-29 IoT Applications and Challenges in Global Healthcare Systems: A Comprehensive Review
by Fadele Ayotunde Alaba & Alvaro Rocha & Hakeem Adewale Sulaimon & Owamoyo Najeem - 1-30 Research on a Blockchain Adaptive Differential Privacy Mechanism for Medical Data Protection
by Wang Feier & Guo Rongzuo - 1-31 The Challenge of Dynamic Environments in Regard to RSSI-Based Indoor Wi-Fi Positioning—A Systematic Review
by Zi Yang Chia & Pey Yun Goh & Lee Yeng Ong & Shing Chiang Tan - 1-33 A Literature Review of Personalized Large Language Models for Email Generation and Automation
by Rodrigo Novelo & Rodrigo Rocha Silva & Jorge Bernardino - 1-39 Permissionless Blockchain Recent Trends, Privacy Concerns, Potential Solutions and Secure Development Lifecycle
by Talgar Bayan & Adnan Yazici & Richard Banach - 1-42 Blockchain–AI–Geolocation Integrated Architecture for Mobile Identity and OTP Verification
by Gajasin Gamage Damith Sulochana & Dilshan Indraraj De Silva - 1-43 Survey of Intra-Node GPU Interconnection in Scale-Up Network: Challenges, Status, Insights, and Future Directions
by Xiaoyong Song & Danyuan Zhou & Kai Li & Jiayuan Chen & Hao Zhang & Xiaoguang Zhang & Xuxia Zhong - 1-43 Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment
by Labib Hasan Bayzid & Tonny Shekha Kar & Mohammad Tariqul Islam & Md. Shabiul Islam & Firoz Ahmed - 1-49 Federated Learning for Smart Cities: A Thematic Review of Challenges and Approaches
by Laila Alterkawi & Fadi K. Dib
December 2025, Volume 17, Issue 12
- 1-14 Cross-Gen: An Efficient Generator Network for Adversarial Attacks on Cross-Modal Hashing Retrieval
by Chao Hu & Li Chen & Sisheng Li & Yin Yi & Yu Zhan & Chengguang Liu & Jianling Liu & Ronghua Shi - 1-15 Optimizing LoRaWAN Performance Through Learning Automata-Based Channel Selection
by Luka Aime Atadet & Richard Musabe & Eric Hitimana & Omar Gatera - 1-18 MalScore: A Quality Assessment Framework for Visual Malware Datasets Using No-Reference Image Quality Metrics
by Jakub Czaplicki & Mohamed Rahouti & Abdellah Chehri & Thaier Hayajneh - 1-18 MEC-Chain: Towards a New Framework for a MEC-Enabled Mobile Blockchain Network Under the PoS Consensus
by Rima Grati & Khouloud Boukadi & Safa Elleuch - 1-18 Population Estimation and Scanning System Using LEO Satellites Based on Wireless LAN Signals for Post-Disaster Areas
by Futo Noda & Gia Khanh Tran - 1-19 Smart IoT-Based Temperature-Sensing Device for Energy-Efficient Glass Window Monitoring
by Vaclav Mach & Jiri Vojtesek & Milan Adamek & Pavel Drabek & Pavel Stoklasek & Stepan Dlabaja & Lukas Kopecek & Ales Mizera - 1-20 Hybrid PON–RoF LTE Video Transmission with Experimental BLER Analysis and Amplifier Trade-Off
by Berenice Arguero & Mateo Leiva & Kevin Christopher Pozo Guerrero & Germán V. Arévalo & Miltón N. Tipán & Christian Tipantuña & Michela Meo - 1-20 A Conceptual Model of a Digital Twin Driven Co-Pilot for Speed Coordination in Congested Urban Traffic
by Adrian Vasile Olteanu & Maximilian Nicolae & Bianca Alexe & Stefan Mocanu - 1-21 Methodology for Detecting Suspicious Claims in Health Insurance Using Supervised Machine Learning
by Jose Villegas-Ortega & Luis Napoleon Quiroz Aviles & Juan Nazario Arancibia & Wilder Carpio Montenegro & Rosa Delgadillo & David Mauricio - 1-22 Understanding Generation Z’s Tourism Purchasing Decisions Through Internet Technologies: The Case of Influencer Marketing
by Petra Vašaničová & Zuzana Kosťová & Ivana Hodorová & Natália Kolková & Viliam Obšut & Michal Češkovič - 1-22 LSCNet: A Lightweight Shallow Feature Cascade Network for Small Object Detection in UAV Imagery
by Zening Wang & Amiya Nayak - 1-22 Selection of Optimal Cluster Head Using MOPSO and Decision Tree for Cluster-Oriented Wireless Sensor Networks
by Rahul Mishra & Sudhanshu Kumar Jha & Shiv Prakash & Rajkumar Singh Rathore - 1-24 High-Degree Connectivity Sensor Networks: Applications in Pastured Cow Herd Monitoring
by Geunho Lee & Teruyuki Yamane & Kota Okabe & Fumiaki Sugino & Yeunwoong Kyung - 1-25 A Proposal of a Scale to Evaluate Attitudes of People Towards a Social Metaverse
by Stefano Mottura & Marta Mondellini - 1-25 Enhancing Microservice Security Through Adaptive Moving Target Defense Policies to Mitigate DDoS Attacks in Cloud-Native Environments
by Yuyang Zhou & Guang Cheng & Kang Du - 1-26 Iron Ore Image Recognition Through Multi-View Evolutionary Deep Fusion Method
by Di Zhang & Xiaolong Qian & Chenyang Shi & Yuang Zhang & Yining Qian & Shengyue Zhou - 1-26 A Context-Aware Lightweight Framework for Source Code Vulnerability Detection
by Yousef Sanjalawe & Budoor Allehyani & Salam Al-E’mari - 1-26 Cybersecurity in Higher Education Institutions: A Systematic Review of Emerging Trends, Challenges and Solutions
by Oladele Afolalu & Mohohlo Samuel Tsoeu - 1-27 Graph-SENet: An Unsupervised Learning-Based Graph Neural Network for Skeleton Extraction from Point Cloud
by Jie Li & Wei Guo & Wenli Zhang - 1-27 Concurrency Bug Detection via Static Analysis and Large Language Models
by Zuocheng Feng & Yiming Chen & Kaiwen Zhang & Xiaofeng Li & Guanjun Liu - 1-27 SatNet-B3: A Lightweight Deep Edge Intelligence Framework for Satellite Imagery Classification
by Tarbia Hasan & Jareen Anjom & Md. Ishan Arefin Hossain & Zia Ush Shamszaman - 1-29 Fog-Aware Hierarchical Autoencoder with Density-Based Clustering for AI-Driven Threat Detection in Smart Farming IoT Systems
by Manikandan Thirumalaisamy & Sumendra Yogarayan & Md Shohel Sayeed & Siti Fatimah Abdul Razak & Ramesh Shunmugam
Printed from https://ideas.repec.org/s/gam/jftint.html