Content
July 2025, Volume 17, Issue 8
- 1-14 Edge-FLGuard+: A Federated and Lightweight Anomaly Detection Framework for Securing 5G-Enabled IoT in Smart Homes
by Manuel J. C. S. Reis - 1-15 DigiHortiRobot: An AI-Driven Digital Twin Architecture for Hydroponic Greenhouse Horticulture with Dual-Arm Robotic Automation
by Roemi Fernández & Eduardo Navas & Daniel Rodríguez-Nieto & Alain Antonio Rodríguez-González & Luis Emmi - 1-15 A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics
by Rajganesh Nagarajan & Vinothiyalakshmi Palanichamy & Ramkumar Thirunavukarasu & J. Arun Pandian - 1-16 ETM: Modern Insights into Perspective on Text-to-SQL Evaluation in the Age of Large Language Models
by Benjamin G. Ascoli & Yasoda Sai Ram Kandikonda & Jinho D. Choi - 1-16 An Efficient Internet-Wide Scan Approach Based on Location Awareness
by Wenqi Shi & Huiling Shi & Hao Hao & Qiuyu Guan - 1-17 Harmonized Autonomous–Human Vehicles via Simulation for Emissions Reduction in Riyadh City
by Ali Louati & Hassen Louati & Elham Kariri - 1-18 Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT)
by Abdullah Mohammed Alharthi & Fahad S. Altuwaijri & Mohammed Alsaadi & Mourad Elloumi & Ali A. M. Al-Kubati - 1-19 Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks
by Saif Safaa Shakir & Leyli Mohammad Khanli & Hojjat Emami - 1-20 Impact of Audio Delay and Quality in Network Music Performance
by Konstantinos Tsioutas & George Xylomenos & Ioannis Doumanis - 1-22 MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT
by Jian Tang & Zhao Huang & Chunqiang Li - 1-22 Neural Network-Informed Lotka–Volterra Dynamics for Cryptocurrency Market Analysis
by Dimitris Kastoris & Dimitris Papadopoulos & Konstantinos Giotopoulos - 1-22 A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains
by John Byrd & Kritagya Upadhyay & Samir Poudel & Himanshu Sharma & Yi Gu - 1-23 Model Retraining upon Concept Drift Detection in Network Traffic Big Data
by Sikha S. Bagui & Mohammad Pale Khan & Chedlyne Valmyr & Subhash C. Bagui & Dustin Mink - 1-23 SARAC4N: Socially and Resource-Aware Caching in Clustered Content-Centric Networks
by Amir Raza Khan & Umar Shoaib & Hannan Bin Liaqat - 1-24 Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation
by Jatinder Pal Singh & Aqsa Aqsa & Imran Ghani & Raj Sonani & Vijay Govindarajan - 1-25 Scalable and Efficient GCL Scheduling for Time-Aware Shaping in Autonomous and Cyber-Physical Systems
by Chengwei Zhang & Yun Wang - 1-26 Real-Time Fall Monitoring for Seniors via YOLO and Voice Interaction
by Eugenia Tîrziu & Ana-Mihaela Vasilevschi & Adriana Alexandru & Eleonora Tudora - 1-27 A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps
by Zhonghao Zhai & Junyi Liu & Xinying Liu & Yanqin Mao & Xinjun Zhang & Jialin Ma & Chunhua Jin - 1-30 Augmented Reality and Virtual Reality in Exergaming
by Georgios Lampropoulos & Theofylaktos Anastasiadis & Juan Garzón - 1-31 An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention
by Ndukwe Ukeje & Jairo A. Gutierrez & Krassie Petrova & Ugochukwu Chinonso Okolie - 1-32 Privacy-Preserving Federated Unlearning with Ontology-Guided Relevance Modeling for Secure Distributed Systems
by Naglaa E. Ghannam & Esraa A. Mahareek - 1-32 EsCorpiusBias: The Contextual Annotation and Transformer-Based Detection of Racism and Sexism in Spanish Dialogue
by Ksenia Kharitonova & David Pérez-Fernández & Javier Gutiérrez-Hernando & Asier Gutiérrez-Fandiño & Zoraida Callejas & David Griol - 1-34 A Verilog Programming Learning Assistant System Focused on Basic Verilog with a Guided Learning Method
by Pin-Chieh Hsieh & Tzu-Lun Fang & Shaobo Jin & Yuyan Wang & Nobuo Funabiki & Yu-Cheng Fan - 1-34 Lightweight Anomaly Detection in Digit Recognition Using Federated Learning
by Anja Tanović & Ivan Mezei - 1-36 Privacy Framework for the Development of IoT-Based Systems
by Yaqin Y. Shaheen & Miguel J. Hornos & Carlos Rodríguez-Domínguez - 1-36 RestRho: A JSON-Based Domain-Specific Language for Designing and Developing RESTful APIs to Validate RhoArchitecture
by Enrique Chavarriaga & Luis Rojas & Francy D. Rodríguez & Kat Sorbello & Francisco Jurado - 1-37 Efficient Machine Learning-Based Prediction of Solar Irradiance Using Multi-Site Data
by Hassan N. Noura & Zaid Allal & Ola Salman & Khaled Chahine - 1-42 A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems
by Mohamed Sayed Farghaly & Heba Kamal Aslan & Islam Tharwat Abdel Halim
August 2025, Volume 17, Issue 8
- 1-3 Editorial for the Special Issue “Virtual Reality and Metaverse: Impact on the Digital Transformation of Society—2nd Edition”
by Diego Vergara - 1-21 Rethinking Modbus-UDP for Real-Time IIoT Systems
by Ivan Cibrario Bertolotti - 1-21 Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges
by Simeon Ogunbunmi & Yu Chen & Qi Zhao & Deeraj Nagothu & Sixiao Wei & Genshe Chen & Erik Blasch - 1-21 A Novel Framework Leveraging Large Language Models to Enhance Cold-Start Advertising Systems
by Albin Uruqi & Iosif Viktoratos & Athanasios Tsadiras - 1-21 Enabling Horizontal Collaboration in Logistics Through Secure Multi-Party Computation
by Gabriele Spini & Stephan Krenn & Erich Teppan & Christina Petschnigg & Elena Wiegelmann - 1-23 AI-Supported EUD for Data Visualization: An Exploratory Case Study
by Sara Beschi & Daniela Fogli & Luigi Gargioni & Angela Locoro - 1-24 Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo - 1-26 Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments
by Daniel Sernández-Iglesias & Llanos Tobarra & Rafael Pastor-Vargas & Antonio Robles-Gómez & Pedro Vidal-Balboa & João Sarraipa - 1-26 Parallel Algorithm for NP-Hard Problem of Channel Resource Allocation Optimization in Ad Hoc and Sensor Networks
by Valeriy Ivanov & Maxim Tereshonok - 1-27 Beyond Prompt Chaining: The TB-CSPN Architecture for Agentic AI
by Uwe M. Borghoff & Paolo Bottoni & Remo Pareschi - 1-28 Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen & Mien L. Trinh & Minh T. Nguyen & Thang C. Vu & Tao V. Nguyen & Long Q. Dinh & Mui D. Nguyen - 1-30 A Multi-Layer Secure Sharing Framework for Aviation Big Data Based on Blockchain
by Qing Wang & Zhijun Wu & Yanrong Lu - 1-31 TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs
by Soundes Oumaima Boufaida & Abdelmadjid Benmachiche & Makhlouf Derdour & Majda Maatallah & Moustafa Sadek Kahil & Mohamed Chahine Ghanem - 1-38 Transforming Data Annotation with AI Agents: A Review of Architectures, Reasoning, Applications, and Impact
by Md Monjurul Karim & Sangeen Khan & Dong Hoang Van & Xinyue Liu & Chunhui Wang & Qiang Qu - 1-38 Enhancing Industrial Processes Through Augmented Reality: A Scoping Review
by Alba Miranda & Aracely M. Vallejo & Paulina Ayala & Marcelo V. Garcia & Jose E. Naranjo - 1-41 The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses
by Leandro Antonio Pazmiño Ortiz & Ivonne Fernanda Maldonado Soliz & Vanessa Katherine Guevara Balarezo - 1-44 Creating Automated Microsoft Bicep Application Infrastructure from GitHub in the Azure Cloud
by Vladislav Manolov & Daniela Gotseva & Nikolay Hinov
June 2025, Volume 17, Issue 7
- 1-16 IoT-Edge Hybrid Architecture with Cross-Modal Transformer and Federated Manifold Learning for Safety-Critical Gesture Control in Adaptive Mobility Platforms
by Xinmin Jin & Jian Teng & Jiaji Chen - 1-18 Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks
by Matthew Boeding & Paul Scalise & Michael Hempel & Hamid Sharif & Juan Lopez - 1-20 ERA-MADDPG: An Elastic Routing Algorithm Based on Multi-Agent Deep Deterministic Policy Gradient in SDN
by Wanwei Huang & Hongchang Liu & Yingying Li & Linlin Ma - 1-21 Optimizing Trajectories for Rechargeable Agricultural Robots in Greenhouse Climatic Sensing Using Deep Reinforcement Learning with Proximal Policy Optimization Algorithm
by Ashraf Sharifi & Sara Migliorini & Davide Quaglia - 1-22 AI-Based Learning Recommendations: Use in Higher Education
by Prabin Dahal & Saptadi Nugroho & Claudia Schmidt & Volker Sänger - 1-22 AUV Trajectory Planning for Optimized Sensor Data Collection in Internet of Underwater Things
by Talal S. Almuzaini & Andrey V. Savkin - 1-22 FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments
by Bruno Ramos-Cruz & Francisco J. Quesada-Real & Javier Andreu-Pérez & Jessica Zaqueros-Martinez - 1-23 SatScope: A Data-Driven Simulator for Low-Earth-Orbit Satellite Internet
by Qichen Wang & Guozheng Yang & Yongyu Liang & Chiyu Chen & Qingsong Zhao & Sugai Chen - 1-23 The Internet of Things, Fog, and Cloud Continuum: Integration Challenges and Opportunities for Smart Cities
by Rodger Lea & Toni Adame & Alexandre Berne & Selma Azaiez - 1-24 Responsible Resilience in Cyber–Physical–Social Systems: A New Paradigm for Emergent Cyber Risk Modeling
by Theresa Sobb & Nour Moustafa & Benjamin Turnbull - 1-24 Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review
by Juan Ochoa-Aldeán & Carlos Silva-Cárdenas & Renato Torres & Jorge Ivan Gonzalez & Sergio Fortes - 1-24 ICRSSD: Identification and Classification for Railway Structured Sensitive Data
by Yage Jin & Hongming Chen & Rui Ma & Yanhua Wu & Qingxin Li - 1-24 HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications
by Saud Alharbi & Wasan Awad & David Bell - 1-25 Lower-Latency Screen Updates over QUIC with Forward Error Correction
by Nooshin Eghbal & Paul Lu - 1-26 The Role of Multi-Agent Systems in Realizing Asset Administration Shell Type 3
by Lucas Sakurada & Fernando De la Prieta & Paulo Leitao - 1-27 Cross-Lingual Cross-Domain Transfer Learning for Rumor Detection
by Eliana Providel & Marcelo Mendoza & Mauricio Solar - 1-27 Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications
by Haoming Wang & Aryan Sharma & Deepak Mishra & Aruna Seneviratne & Eliathamby Ambikairajah - 1-28 Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
by Seema G. Aarella & Venkata P. Yanambaka & Saraju P. Mohanty & Elias Kougianos - 1-28 Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users
by George Alex Stelea & Livia Sangeorzan & Nicoleta Enache-David - 1-28 Towards Automatic Detection of Pneumothorax in Emergency Care with Deep Learning Using Multi-Source Chest X-ray Data
by Santiago Ibañez Caturla & Juan de Dios Berná Mestre & Oscar Martinez Mozos - 1-30 Tourism Sentiment Chain Representation Model and Construction from Tourist Reviews
by Bosen Li & Rui Li & Junhao Wang & Aihong Song - 1-30 Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
by Germán Rodríguez-Galán & Eduardo Benavides-Astudillo & Daniel Nuñez-Agurto & Pablo Puente-Ponce & Sonia Cárdenas-Delgado & Mauricio Loachamín-Valencia - 1-31 Measurement of the Functional Size of Web Analytics Implementation: A COSMIC-Based Case Study Using Machine Learning
by Ammar Abdallah & Alain Abran & Munthir Qasaimeh & Malik Qasaimeh & Bashar Abdallah - 1-33 Metaverse Architectures: A Comprehensive Systematic Review of Definitions and Frameworks
by Cemile Boztas & Essam Ghadafi & Rasha Ibrahim - 1-33 TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing
by Hisham Ali & William J. Buchanan & Jawad Ahmad & Marwan Abubakar & Muhammad Shahbaz Khan & Isam Wadhaj - 1-34 An Experimental Tethered UAV-Based Communication System with Continuous Power Supply
by Veronica Rodriguez & Christian Tipantuña & Diego Reinoso & Jorge Carvajal-Rodriguez & Carlos Egas Acosta & Pablo Proaño & Xavier Hesselbach - 1-34 An Optimized Transformer–GAN–AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets
by Ahmad Salehiyan & Pardis Sadatian Moghaddam & Masoud Kaveh - 1-35 Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks
by Abdul Manan Sheikh & Md. Rafiqul Islam & Mohamed Hadi Habaebi & Suriza Ahmad Zabidi & Athaur Rahman Bin Najeeb & Adnan Kabbani - 1-35 Intelligent Transmission Control Scheme for 5G mmWave Networks Employing Hybrid Beamforming
by Hazem (Moh’d Said) Hatamleh & As’ad Mahmoud As’ad Alnaser & Roba Mahmoud Ali Aloglah & Tomader Jamil Bani Ata & Awad Mohamed Ramadan & Omar Radhi Aqeel Alzoubi
July 2025, Volume 17, Issue 7
- 1-14 Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City
by Gabriel Sepúlveda-Cervantes & Eduardo Vega-Alvarado & Edgar Alfredo Portilla-Flores & Eduardo Vivanco-Rodríguez - 1-17 A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks
by Sridhar Varadala & Hao Xu - 1-19 A UAV Trajectory Optimization and Task Offloading Strategy Based on Hybrid Metaheuristic Algorithm in Mobile Edge Computing
by Yeqiang Zheng & An Li & Yihu Wen & Gaocai Wang - 1-19 A Case Study on Monolith to Microservices Decomposition with Variational Autoencoder-Based Graph Neural Network
by Rokin Maharjan & Korn Sooksatra & Tomas Cerny & Yudeep Rajbhandari & Sakshi Shrestha - 1-19 Attack Surface Score for Software Systems
by Yudeep Rajbhandari & Rokin Maharjan & Sakshi Shrestha & Tomas Cerny - 1-20 Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks
by Kenan Honore Robacky Mbongo & Kanwal Ahmed & Orken Mamyrbayev & Guanghui Wang & Fang Zuo & Ainur Akhmediyarova & Nurzhan Mukazhanov & Assem Ayapbergenova - 1-21 Enhancing Security in 5G and Future 6G Networks: Machine Learning Approaches for Adaptive Intrusion Detection and Prevention
by Konstantinos Kalodanis & Charalampos Papapavlou & Georgios Feretzakis - 1-22 The Investigation of Queuing Models to Calculate Journey Times to Develop an Intelligent Transport System for Smart Cities
by Vatsal Mehta & Glenford Mapp & Vaibhav Gandhi - 1-23 An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network
by Vidhya Prakash Rajendran & Deepalakshmi Perumalsamy & Chinnasamy Ponnusamy & Ezhil Kalaimannan - 1-25 Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection
by Ma Viet Duc & Pham Minh Dang & Tran Thu Phuong & Truong Duc Truong & Vu Hai & Nguyen Huu Thanh - 1-27 TriagE-NLU: A Natural Language Understanding System for Clinical Triage and Intervention in Multilingual Emergency Dialogues
by Béatrix-May Balaban & Ioan Sacală & Alina-Claudia Petrescu-Niţă - 1-27 Parallel Agent-Based Framework for Analyzing Urban Agricultural Supply Chains
by Manuel Ignacio Manríquez & Veronica Gil-Costa & Mauricio Marin - 1-28 An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec
by Xinyu Li & Xiaoying Wang & Guoqing Yang & Jinsha Zhang & Chunhui Li & Fangfang Cui & Ruize Gu - 1-31 A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing
by Fateme Mazloomi & Shahram Shah Heydari & Khalil El-Khatib - 1-34 Advancing Neurodegenerative Disease Management: Technical, Ethical, and Regulatory Insights from the NeuroPredict Platform
by Marilena Ianculescu & Lidia Băjenaru & Ana-Mihaela Vasilevschi & Maria Gheorghe-Moisii & Cristina-Gabriela Gheorghe - 1-35 Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions
by Shruti Kulkarni & Alexios Mylonas & Stilianos Vidalis - 1-39 A Review of Research on Secure Aggregation for Federated Learning
by Xing Zhang & Yuexiang Luo & Tianning Li - 1-40 Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV)
by Isra Mahmoudi & Djallel Eddine Boubiche & Samir Athmani & Homero Toral-Cruz & Freddy I. Chan-Puc - 1-42 Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey
by Manal Alharthi & Faiza Medjek & Djamel Djenouri - 1-47 Leveraging Blockchain for Ethical AI: Mitigating Digital Threats and Strengthening Societal Resilience
by Chibuzor Udokwu & Roxana Voicu-Dorobanțu & Abiodun Afolayan Ogunyemi & Alex Norta & Nata Sturua & Stefan Craß - 1-55 A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware
by Mazen Gazzan & Bader Alobaywi & Mohammed Almutairi & Frederick T. Sheldon - 1-87 Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions
by Jean Paul A. Yaacoub & Hassan N. Noura & Ola Salman & Khaled Chahine
June 2025, Volume 17, Issue 6
- 1-14 A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication
by Tzung-Her Chen - 1-18 Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT
by Haixu Niu & Yonghai Li & Shuaixin Hou & Tianfei Chen & Lijun Sun & Mingyang Gu & Muhammad Irsyad Abdullah - 1-19 A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols
by Iftikhar Hussain & Manuel J. C. S. Reis & Carlos Serôdio & Frederico Branco - 1-20 Exact and Approximation Algorithms for Task Offloading with Service Caching and Dependency in Mobile Edge Computing
by Bowen Cui & Jianwei Zhang - 1-21 Building Equi-Width Histograms on Homomorphically Encrypted Data
by Dragoș Lazea & Anca Hangan & Tudor Cioara - 1-21 JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs)
by Jorge Cisneros-González & Natalia Gordo-Herrera & Iván Barcia-Santos & Javier Sánchez-Soriano - 1-23 Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI
by Leandro Antonio Pazmiño Ortiz & Ivonne Fernanda Maldonado Soliz & Vanessa Katherine Guevara Balarezo - 1-24 Joint Exploitation of Physical-Layer and Artificial Features for Privacy-Preserving Distributed Source Camera Identification
by Hui Tian & Haibao Chen & Yuyan Zhao & Jiawei Zhang - 1-24 An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels
by Yiannis Kiouvrekis & Katerina Gkirtzou & Sotiris Zikas & Dimitris Kalatzis & Theodor Panagiotakopoulos & Zoran Lajic & Dimitris Papathanasiou & Ioannis Filippopoulos - 1-26 Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems
by Mohammed N. Alenezi - 1-27 A C-Based Framework for Low-Cost Real-Time Embedded Systems
by Ivan Cibrario Bertolotti - 1-29 Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8
by Momotaz Begum & Abm Kamrul Islam Riad & Abdullah Al Mamun & Thofazzol Hossen & Salah Uddin & Md Nurul Absur & Hossain Shahriar - 1-30 Network-, Cost-, and Renewable-Aware Ant Colony Optimization for Energy-Efficient Virtual Machine Placement in Cloud Datacenters
by Ali Mohammad Baydoun & Ahmed Sherif Zekri - 1-30 Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach
by Hany F. Atlam & Yifu Yang - 1-35 Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment
by Sikha S. Bagui & Germano Correa Silva De Carvalho & Asmi Mishra & Dustin Mink & Subhash C. Bagui & Stephanie Eager - 1-36 Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
by Pardis Sadatian Moghaddam & Ali Vaziri & Sarvenaz Sadat Khatami & Francisco Hernando-Gallego & Diego Martín - 1-36 A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy
by Pilleriin Lillemets & Nabaa Bashir Jawad & Joseph Kashi & Ahmad Sabah & Nicola Dragoni - 1-37 LLM4Rec: A Comprehensive Survey on the Integration of Large Language Models in Recommender Systems—Approaches, Applications and Challenges
by Sarama Shehmir & Rasha Kashef
May 2025, Volume 17, Issue 6
- 1-12 Position Accuracy and Distributed Beamforming Performance in WSNs: A Simulation Study
by José Casca & Prabhat Gupta & Marco Gomes & Vitor Silva & Rui Dinis - 1-17 Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review
by Tobias Rødahl Thingnes & Per Håkon Meland - 1-17 Multi Stage Retrieval for Web Search During Crisis
by Claudiu Constantin Tcaciuc & Daniele Rege Cambrin & Paolo Garza - 1-18 Resource Allocation for Federated Learning with Heterogeneous Computing Capability in Cloud–Edge–Client IoT Architecture
by Xubo Zhang & Yang Luo - 1-20 Analysis of Digital Skills and Infrastructure in EU Countries Based on DESI 2024 Data
by Kvitoslava Obelovska & Andrii Abziatov & Anastasiya Doroshenko & Ivanna Dronyuk & Oleh Liskevych & Rostyslav Liskevych - 1-20 Grouping-Based Dynamic Routing, Core, and Spectrum Allocation Method for Avoiding Spectrum Fragmentation and Inter-Core Crosstalk in Multi-Core Fiber Networks
by Funa Fukui & Tomotaka Kimura & Yutaka Fukuchi & Kouji Hirata - 1-21 A Deep Learning Approach for Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional Neural Networks
by Ali Abdi Seyedkolaei & Fatemeh Mahmoudi & José García - 1-21 AI-Driven Framework for Evaluating Climate Misinformation and Data Quality on Social Media
by Zeinab Shahbazi & Rezvan Jalali & Zahra Shahbazi - 1-21 Navigating Data Corruption in Machine Learning: Balancing Quality, Quantity, and Imputation Strategies
by Qi Liu & Wanjing Ma - 1-22 Inter-Data Center RDMA: Challenges, Status, and Future Directions
by Xiaoying Huang & Jingwei Wang - 1-22 An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain
by Mahmoud Elkhodr - 1-23 Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP
by Kazi Fatema & Samrat Kumar Dey & Mehrin Anannya & Risala Tasin Khan & Mohammad Mamunur Rashid & Chunhua Su & Rashed Mazumder - 1-23 Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT)
by Naveed Ahmed & Md Asri Ngadi & Abdulaleem Ali Almazroi & Nouf Atiahallah Alghanmi - 1-24 LLM Performance in Low-Resource Languages: Selecting an Optimal Model for Migrant Integration Support in Greek
by Alexandros Tassios & Stergios Tegos & Christos Bouas & Konstantinos Manousaridis & Maria Papoutsoglou & Maria Kaltsa & Eleni Dimopoulou & Thanassis Mavropoulos & Stefanos Vrochidis & Georgios Meditskos - 1-25 Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine
by Rene Francisco Santana-Cruz & Martin Moreno & Daniel Aguilar-Torres & Román Arturo Valverde-Domínguez & Rubén Vázquez-Medina - 1-26 Enhancing Customer Quality of Experience Through Omnichannel Digital Strategies: Evidence from a Service Environment in an Emerging Context
by Fabricio Miguel Moreno-Menéndez & Victoriano Eusebio Zacarías-Rodríguez & Sara Ricardina Zacarías-Vallejos & Vicente González-Prida & Pedro Emil Torres-Quillatupa & Hilario Romero-Girón & José Francisco Vía y Rada-Vittes & Luis Ángel Huaynate-Espejo - 1-27 A Robust Conformal Framework for IoT-Based Predictive Maintenance
by Alberto Moccardi & Claudia Conte & Rajib Chandra Ghosh & Francesco Moscato - 1-27 Semantic Fusion of Health Data: Implementing a Federated Virtualized Knowledge Graph Framework Leveraging Ontop System
by Abid Ali Fareedi & Stephane Gagnon & Ahmad Ghazawneh & Raul Valverde - 1-27 Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection
by Sangita Baruah & Vaskar Deka & Dulumani Das & Utpal Barman & Manob Jyoti Saikia - 1-29 Machine Learning and Deep Learning-Based Atmospheric Duct Interference Detection and Mitigation in TD-LTE Networks
by Rasendram Muralitharan & Upul Jayasinghe & Roshan G. Ragel & Gyu Myoung Lee - 1-31 A Tale of Many Networks: Splitting and Merging of Chord-like Overlays in Partitioned Networks
by Tobias Amft & Kalman Graffi - 1-32 Optimization of Ground Station Energy Saving in LEO Satellite Constellations for Earth Observation Applications
by Francesco Valente & Francesco Giacinto Lavacca & Marco Polverini & Tiziana Fiori & Vincenzo Eramo - 1-54 Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services
by Dimitrios G. Arnaoutoglou & Tzichat M. Empliouk & Theodoros N. F. Kaifas & Constantinos L. Zekios & George A. Kyriacou - 1-60 Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
by Mohammed El-Hajj
May 2025, Volume 17, Issue 5
- 1-2 Correction: Kalodanis et al. High-Risk AI Systems—Lie Detection Application. Future Internet 2025, 17 , 26
by Konstantinos Kalodanis & Panagiotis Rizomiliotis & Georgios Feretzakis & Charalampos Papapavlou & Dimosthenis Anagnostopoulos - 1-3 Industrial Internet of Things (IIoT): Trends and Technologies
by Zhihao Liu & Franco Davoli & Davide Borsatti - 1-13 Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers
by Lingfeng Shen & Jiangtao Nie & Ming Li & Guanghui Wang & Qiankun Zhang & Xin He - 1-15 XGBoost-Based Detection of DDoS Attacks in Named Data Networking
by Liang Liu & Weiqing Yu & Zhijun Wu & Silin Peng - 1-16 Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach
by Cristian Bua & Francesco Fiorini & Michele Pagano & Davide Adami & Stefano Giordano - 1-16 A Portable Non-Motorized Smart IoT Weather Station Platform for Urban Thermal Comfort Studies
by Raju Sethupatu Bala & Salaheddin Hosseinzadeh & Farhad Sadeghineko & Craig Scott Thomson & Rohinton Emmanuel - 1-17 Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks
by Alexander Gegov & Boriana Vatchova & Yordanka Boneva & Alexandar Ichtev - 1-18 A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks
by Anubhav Kumar & Rajamani Radhakrishnan & Mani Sumithra & Prabu Kaliyaperumal & Balamurugan Balusamy & Francesco Benedetto - 1-20 A Network Traffic Characteristics Reconstruction Method for Mitigating the Impact of Packet Loss in Edge Computing Scenarios
by Jiawei Ye & Yanting Chen & Aierpanjiang Simayi & Yu Liu & Zhihui Lu & Jie Wu - 1-20 Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs
by Jing Li & Wei Zong & Yang-Wai Chow & Willy Susilo - 1-21 Adversarial Training for Mitigating Insider-Driven XAI-Based Backdoor Attacks
by R. G. Gayathri & Atul Sajjanhar & Yong Xiang - 1-21 Real-Time Identification of Look-Alike Medical Vials Using Mixed Reality-Enabled Deep Learning
by Bahar Uddin Mahmud & Guanyue Hong & Virinchi Ravindrakumar Lalwani & Nicholas Brown & Zachary D. Asher - 1-22 Classification of Hacker’s Posts Based on Zero-Shot, Few-Shot, and Fine-Tuned LLMs in Environments with Constrained Resources
by Theodoros Giannilias & Andreas Papadakis & Nikolaos Nikolaou & Theodore Zahariadis - 1-22 A Web-Based Application for Smart City Data Analysis and Visualization
by Panagiotis Karampakakis & Despoina Ioakeimidou & Periklis Chatzimisios & Konstantinos A. Tsintotas - 1-22 A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture
by Rui Lu & Lei Shi & Yinlong Liu & Zhongkai Dang - 1-23 A Blockchain-Based Strategy for Certifying Timestamps in a Distributed Healthcare Emergency Response Systems
by Daniele Marletta & Alessandro Midolo & Emiliano Tramontana - 1-23 U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds
by Jiawei Ye & Ming Yan & Shenglin Wu & Jingxuan Tan & Jie Wu - 1-26 Research on Advancing Radio Wave Source Localization Technology Through UAV Path Optimization
by Tomoroh Takahashi & Gia Khanh Tran - 1-27 AI-Powered Stroke Diagnosis System: Methodological Framework and Implementation
by Marta Narigina & Agris Vindecs & Dušanka Bošković & Yuri Merkuryev & Andrejs Romanovs - 1-27 DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization
by Hardi Sabah Talabani & Zrar Khalid Abdul & Hardi Mohammed Mohammed Saleh - 1-30 Explainable AI Assisted IoMT Security in Future 6G Networks
by Navneet Kaur & Lav Gupta - 1-33 Enhanced Propaganda Detection in Public Social Media Discussions Using a Fine-Tuned Deep Learning Model: A Diffusion of Innovation Perspective
by Pir Noman Ahmad & Adnan Muhammad Shah & KangYoon Lee - 1-36 Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods
by Mohammad Jaminur Islam & Saminur Islam & Mahmud Hossain & Shahid Noor & S. M. Riazul Islam - 1-36 Multi-Criteria Genetic Algorithm for Optimizing Distributed Computing Systems in Neural Network Synthesis
by Valeriya V. Tynchenko & Ivan Malashin & Sergei O. Kurashkin & Vadim Tynchenko & Andrei Gantimurov & Vladimir Nelyub & Aleksei Borodulin
April 2025, Volume 17, Issue 5
- 1-15 Using Machine Learning to Detect Vault (Anti-Forensic) Apps
by Michael N. Johnstone & Wencheng Yang & Mohiuddin Ahmed - 1-17 A Machine Learning Approach for Predicting Maternal Health Risks in Lower-Middle-Income Countries Using Sparse Data and Vital Signs
by Avnish Malde & Vishnunarayan Girishan Prabhu & Dishant Banga & Michael Hsieh & Chaithanya Renduchintala & Ronald Pirrallo - 1-17 Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security
by Guobin Xu & Oluwole Adetifa & Jianzhou Mao & Eric Sakk & Shuangbao Wang - 1-17 Implementation and Performance Analysis of an Industrial Robot’s Vision System Based on Cloud Vision Services
by Ioana-Livia Stefan & Andrei Mateescu & Ionut Lentoiu & Silviu Raileanu & Florin Daniel Anton & Dragos Constantin Popescu & Ioan Stefan Sacala - 1-18 Feature Extraction in 5G Wireless Systems: A Quantum Cat Swarm and Wavelet-Based Approach
by Anand Raju & Sathishkumar Samiappan - 1-18 C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers’ Power Consumption
by Marcello Artioli & Andrea Borghesi & Marta Chinnici & Anna Ciampolini & Michele Colonna & Davide De Chiara & Daniela Loreti - 1-20 Towards Safer Cities: AI-Powered Infrastructure Fault Detection Based on YOLOv11
by Raiyen Z. Rakin & Mahmudur Rahman & Kanij F. Borsa & Fahmid Al Farid & Shakila Rahman & Jia Uddin & Hezerul Abdul Karim - 1-20 BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network
by Wanwei Huang & Huicong Yu & Yingying Li & Xi He & Rui Chen - 1-23 Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR
by Mingjun Wang & Xuezhi Zhang & Feng Jing & Mei Gao - 1-26 Ephemeral Node Identifiers for Enhanced Flow Privacy
by Gregor Tamati Haywood & Saleem Noel Bhatti - 1-28 An Improved Reference Paper Collection System Using Web Scraping with Three Enhancements
by Tresna Maulana Fahrudin & Nobuo Funabiki & Komang Candra Brata & Inzali Naing & Soe Thandar Aung & Amri Muhaimin & Dwi Arman Prasetya - 1-30 Railway Cloud Resource Management as a Service
by Ivaylo Atanasov & Dragomira Dimitrova & Evelina Pencheva & Ventsislav Trifonov - 1-30 Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration
by Negin Jahanbakhsh & Mario Vega-Barbas & Iván Pau & Lucas Elvira-Martín & Hirad Moosavi & Carolina García-Vázquez - 1-31 Leveraging Blockchain Technology for Secure 5G Offloading Processes
by Cristina Regueiro & Santiago de Diego & Borja Urkizu - 1-32 Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System
by Hanen Ben Rjeb & Layth Sliman & Hela Zorgati & Raoudha Ben Djemaa & Amine Dhraief - 1-35 Integrating AIoT Technologies in Aquaculture: A Systematic Review
by Fahmida Wazed Tina & Nasrin Afsarimanesh & Anindya Nag & Md Eshrat E. Alahi - 1-38 Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings
by Rosario G. Garroppo & Pietro Giuseppe Giardina & Giada Landi & Marco Ruta - 1-55 SoK: Delegated Security in the Internet of Things
by Emiliia Geloczi & Felix Klement & Patrick Struck & Stefan Katzenbeisser
April 2025, Volume 17, Issue 4
- 1-12 A Transformer-Based Autoencoder with Isolation Forest and XGBoost for Malfunction and Intrusion Detection in Wireless Sensor Networks for Forest Fire Prediction
by Ahshanul Haque & Hamdy Soliman - 1-14 Multi-Class Intrusion Detection in Internet of Vehicles: Optimizing Machine Learning Models on Imbalanced Data
by Ágata Palma & Mário Antunes & Jorge Bernardino & Ana Alves - 1-14 NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters
by Peng Li & Chen Qing & Hao Liu - 1-17 A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks
by Sunan Wang & Rong Song & Xiangyu Zheng & Wanwei Huang & Hongchang Liu - 1-18 C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control
by Efstratios Chatzoglou & Georgios Kambourakis - 1-21 Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models
by Jaewoo Yang & Hayun Kim & Junyung Ji & Younghoon Kim - 1-22 Reinforcement Learning-Based Dynamic Fuzzy Weight Adjustment for Adaptive User Interfaces in Educational Software
by Christos Troussas & Akrivi Krouska & Phivos Mylonas & Cleo Sgouropoulou - 1-22 Multimodal Fall Detection Using Spatial–Temporal Attention and Bi-LSTM-Based Feature Fusion
by Jungpil Shin & Abu Saleh Musa Miah & Rei Egawa & Najmul Hassan & Koki Hirooka & Yoichi Tomioka - 1-23 Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance
by Ade Dotun Ajasa & Hassan Chizari & Abu Alam - 1-24 The New CAP Theorem on Blockchain Consensus Systems
by Aristidis G. Anagnostakis & Euripidis Glavas - 1-24 CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks
by Junchao Wang & Honglin Li & Yan Sun & Chris Phillips & Alexios Mylonas & Dimitris Gritzalis - 1-24 Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario
by Ivan Cibrario Bertolotti & Luca Durante & Enrico Cambiaso - 1-24 Analysis of Universal Decoding Techniques for 6G Ultra-Reliable and Low-Latency Communication Scenario
by Abhilasha Gautam & Prabhat Thakur & Ghanshyam Singh - 1-25 Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms
by Hajar Zaidani & Rim Koulali & Abderrahim Maizate & Mohamed Ouzzif - 1-26 Comparative Feature-Guided Regression Network with a Model-Eye Pretrained Model for Online Refractive Error Screening
by Jiayi Wang & Tianyou Zheng & Yang Zhang & Tianli Zheng & Weiwei Fu - 1-26 Edge AI for Real-Time Anomaly Detection in Smart Homes
by Manuel J. C. S. Reis & Carlos Serôdio - 1-27 Detecting Disinformation in Croatian Social Media Comments
by Igor Ljubi & Zdravko Grgić & Marin Vuković & Gordan Gledec - 1-27 Big-Delay Estimation for Speech Separation in Assisted Living Environments
by Swarnadeep Bagchi & Ruairí de Fréin - 1-29 Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach
by Ali Vaziri & Pardis Sadatian Moghaddam & Mehrdad Shoeibi & Masoud Kaveh