Content
August 2025, Volume 17, Issue 9
- 1-3 IoT Security: Threat Detection, Analysis, and Defense
by Olivier Markowitch & Jean-Michel Dricot - 1-17 Design and Implementation of an Autonomous Mobile Robot for Object Delivery via Homography-Based Visual Servoing
by Jung-Shan Lin & Yen-Che Hsiao & Jeih-Weih Hung - 1-20 RS-MADDPG: Routing Strategy Based on Multi-Agent Deep Deterministic Policy Gradient for Differentiated QoS Services
by Shi Kuang & Jinyu Zheng & Shilin Liang & Yingying Li & Siyuan Liang & Wanwei Huang - 1-21 A Framework for Data Lifecycle Model Selection
by Mauro Iacono & Michele Mastroianni & Christian Riccio & Bruna Viscardi - 1-21 SwiftKV: A Metadata Indexing Scheme Integrating LSM-Tree and Learned Index for Distributed KV Stores
by Zhenfei Wang & Jianxun Feng & Longxiang Dun & Ziliang Bao & Chunfeng Du - 1-23 Ensemble Learning for Software Requirement-Risk Assessment: A Comparative Study of Bagging and Boosting Approaches
by Chandan Kumar & Pathan Shaheen Khan & Medandrao Srinivas & Sudhanshu Kumar Jha & Shiv Prakash & Rajkumar Singh Rathore - 1-23 From CSI to Coordinates: An IoT-Driven Testbed for Individual Indoor Localization
by Diana Macedo & Miguel Loureiro & Óscar G. Martins & Joana Coutinho Sousa & David Belo & Marco Gomes - 1-24 Modelling Large-Scale Group Decision-Making Through Grouping with Large Language Models
by Juan Carlos González-Quesada & José Ramón Trillo & Carlos Porcel & Ignacio Javier Pérez & Francisco Javier Cabrerizo - 1-24 Safeguarding Brand and Platform Credibility Through AI-Based Multi-Model Fake Profile Detection
by Vishwas Chakranarayan & Fadheela Hussain & Fayzeh Abdulkareem Jaber & Redha J. Shaker & Ali Rizwan - 1-25 Benchmarking IoT Simulation Frameworks for Edge–Fog–Cloud Architectures: A Comparative and Experimental Study
by Fatima Bendaouch & Hayat Zaydi & Safae Merzouk & Saliha Assoul - 1-27 Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks
by Akashdeep Bhardwaj & Luxmi Sapra & Shawon Rahman - 1-28 Technical Review: Architecting an AI-Driven Decision Support System for Enhanced Online Learning and Assessment
by Saipunidzam Mahamad & Yi Han Chin & Nur Izzah Nasuha Zulmuksah & Md Mominul Haque & Muhammad Shaheen & Kanwal Nisar - 1-28 Hybrid B5G-DTN Architecture with Federated Learning for Contextual Communication Offloading
by Manuel Jesús-Azabal & Meichun Zheng & Vasco N. G. J. Soares - 1-28 Reinforcement Learning in Medical Imaging: Taxonomy, LLMs, and Clinical Challenges
by A. B. M. Kamrul Islam Riad & Md. Abdul Barek & Hossain Shahriar & Guillermo Francia & Sheikh Iqbal Ahamed - 1-28 Identifying Literary Microgenres and Writing Style Differences in Romanian Novels with ReaderBench and Large Language Models
by Aura Cristina Udrea & Stefan Ruseti & Vlad Pojoga & Stefan Baghiu & Andrei Terian & Mihai Dascalu - 1-29 Is the Healthcare Industry Ready for Digital Twins? Examining the Opportunities and Challenges
by Srinivasini Sasitharasarma & Noor H. S. Alani & Zazli Lily Wisker - 1-30 A Multi-Scene Automatic Classification and Grading Method for Structured Sensitive Data Based on Privacy Preferences
by Yong Li & Zhongcheng Wu & Jinwei Li & Liyang Xie - 1-32 Novel Encoder–Decoder Architecture with Attention Mechanisms for Satellite-Based Environmental Forecasting in Smart City Applications
by Kalsoom Panhwar & Bushra Naz Soomro & Sania Bhatti & Fawwad Hassan Jaskani - 1-33 A Comparative Study of PEGASUS, BART, and T5 for Text Summarization Across Diverse Datasets
by Eman Daraghmi & Lour Atwe & Areej Jaber - 1-34 Design and Implementation of a Scalable LoRaWAN-Based Air Quality Monitoring Infrastructure for the Kurdistan Region of Iraq
by Nasih Abdulkarim Muhammed & Bakhtiar Ibrahim Saeed - 1-35 Blockchain for Security in Digital Twins
by Rahanatu Suleiman & Akshita Maradapu Vera Venkata Sai & Wei Yu & Chenyu Wang
September 2025, Volume 17, Issue 9
- 1-3 Special Issue: Intrusion Detection and Resiliency in Cyber-Physical Systems and Networks
by Olusola T. Odeyomi & Temitayo O. Olowu - 1-16 A Digital Twin Architecture for Forest Restoration: Integrating AI, IoT, and Blockchain for Smart Ecosystem Management
by Nophea Sasaki & Issei Abe - 1-19 UAV Deployment Design Under Incomplete Information with a Connectivity Constraint for UAV-Assisted Networks
by Takumi Sakamoto & Tomotaka Kimura & Kouji Hirata - 1-19 Improved Generation of Drawing Sequences Using Variational and Skip-Connected Deep Networks for a Drawing Support System
by Atomu Nakamura & Homari Matsumoto & Koharu Chiba & Shun Nishide - 1-19 Prompt-Driven and Kubernetes Error Report-Aware Container Orchestration
by Niklas Beuter & André Drews & Nane Kratzke - 1-20 From Divergence to Alignment: Evaluating the Role of Large Language Models in Facilitating Agreement Through Adaptive Strategies
by Loukas Triantafyllopoulos & Dimitris Kalles - 1-21 Dynamic Resource Management in 5G-Enabled Smart Elderly Care Using Deep Reinforcement Learning
by Krishnapriya V. Shaji & Srilakshmi S. Rethy & Simi Surendran & Livya George & Namita Suresh & Hrishika Dayan - 1-21 3D Spatial Path Planning Based on Improved Particle Swarm Optimization
by Junxia Ma & Zixu Yang & Ming Chen - 1-22 GraphRAG-Enhanced Dialogue Engine for Domain-Specific Question Answering: A Case Study on the Civil IoT Taiwan Platform
by Hui-Hung Yu & Wei-Tsun Lin & Chih-Wei Kuan & Chao-Chi Yang & Kuan-Min Liao - 1-22 Dynamic Channel Selection for Rendezvous in Cognitive Radio Networks
by Mohammed Hawa & Ramzi Saifan & Talal A. Edwan & Oswa M. Amro - 1-23 Fuzzy-Based MEC-Assisted Video Adaptation Framework for HTTP Adaptive Streaming
by Waqas ur Rahman - 1-24 A Game Theoretic Approach for D2D Assisted Uncoded Caching in IoT Networks
by Jiajie Ren & Chang Guo - 1-25 Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models
by Abin Kumbalapalliyil Tom & Ansam Khraisat & Tony Jan & Md Whaiduzzaman & Thien D. Nguyen & Ammar Alazab - 1-25 Detection and Mitigation in IoT Ecosystems Using oneM2M Architecture and Edge-Based Machine Learning
by Yu-Yong Luo & Yu-Hsun Chiu & Chia-Hsin Cheng - 1-26 Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks
by Ran Xin & Yapeng Wang & Xiaohong Huang & Xu Yang & Sio Kei Im - 1-27 Refactoring Loops in the Era of LLMs: A Comprehensive Study
by Alessandro Midolo & Emiliano Tramontana - 1-28 1D-CNN-Based Performance Prediction in IRS-Enabled IoT Networks for 6G Autonomous Vehicle Applications
by Radwa Ahmed Osman - 1-28 GPT-4.1 Sets the Standard in Automated Experiment Design Using Novel Python Libraries
by Nuno Fachada & Daniel Fernandes & Carlos M. Fernandes & Bruno D. Ferreira-Saraiva & João P. Matos-Carvalho - 1-28 Toward Secure SDN Infrastructure in Smart Cities: Kafka-Enabled Machine Learning Framework for Anomaly Detection
by Gayathri Karthick & Glenford Mapp & Jon Crowcroft - 1-30 SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring
by Qian Qu & Yu Chen & Erik Blasch - 1-32 Real-Time Detection and Mitigation Strategies Newly Appearing for DDoS Profiles
by Peter Orosz & Balazs Nagy & Pal Varga - 1-32 Intercepting and Monitoring Potentially Malicious Payloads with Web Honeypots
by Rareș-Mihail Visalom & Maria-Elena Mihăilescu & Răzvan Rughiniș & Dinu Țurcanu - 1-38 A GHZ-Based Protocol for the Dining Information Brokers Problem
by Theodore Andronikos & Constantinos Bitsakos & Konstantinos Nikas & Georgios I. Goumas & Nectarios Koziris - 1-40 Intelligent Edge Computing and Machine Learning: A Survey of Optimization and Applications
by Sebastián A. Cajas Ordóñez & Jaydeep Samanta & Andrés L. Suárez-Cetrulo & Ricardo Simón Carbajo - 1-50 The Rise of Agentic AI: A Review of Definitions, Frameworks, Architectures, Applications, Evaluation Metrics, and Challenges
by Ajay Bandi & Bhavani Kongari & Roshini Naguru & Sahitya Pasnoor & Sri Vidya Vilipala
July 2025, Volume 17, Issue 8
- 1-14 Edge-FLGuard+: A Federated and Lightweight Anomaly Detection Framework for Securing 5G-Enabled IoT in Smart Homes
by Manuel J. C. S. Reis - 1-15 DigiHortiRobot: An AI-Driven Digital Twin Architecture for Hydroponic Greenhouse Horticulture with Dual-Arm Robotic Automation
by Roemi Fernández & Eduardo Navas & Daniel Rodríguez-Nieto & Alain Antonio Rodríguez-González & Luis Emmi - 1-15 A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics
by Rajganesh Nagarajan & Vinothiyalakshmi Palanichamy & Ramkumar Thirunavukarasu & J. Arun Pandian - 1-16 ETM: Modern Insights into Perspective on Text-to-SQL Evaluation in the Age of Large Language Models
by Benjamin G. Ascoli & Yasoda Sai Ram Kandikonda & Jinho D. Choi - 1-16 An Efficient Internet-Wide Scan Approach Based on Location Awareness
by Wenqi Shi & Huiling Shi & Hao Hao & Qiuyu Guan - 1-17 Harmonized Autonomous–Human Vehicles via Simulation for Emissions Reduction in Riyadh City
by Ali Louati & Hassen Louati & Elham Kariri - 1-18 Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT)
by Abdullah Mohammed Alharthi & Fahad S. Altuwaijri & Mohammed Alsaadi & Mourad Elloumi & Ali A. M. Al-Kubati - 1-19 Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks
by Saif Safaa Shakir & Leyli Mohammad Khanli & Hojjat Emami - 1-20 Impact of Audio Delay and Quality in Network Music Performance
by Konstantinos Tsioutas & George Xylomenos & Ioannis Doumanis - 1-22 MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT
by Jian Tang & Zhao Huang & Chunqiang Li - 1-22 Neural Network-Informed Lotka–Volterra Dynamics for Cryptocurrency Market Analysis
by Dimitris Kastoris & Dimitris Papadopoulos & Konstantinos Giotopoulos - 1-22 A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains
by John Byrd & Kritagya Upadhyay & Samir Poudel & Himanshu Sharma & Yi Gu - 1-23 Model Retraining upon Concept Drift Detection in Network Traffic Big Data
by Sikha S. Bagui & Mohammad Pale Khan & Chedlyne Valmyr & Subhash C. Bagui & Dustin Mink - 1-23 SARAC4N: Socially and Resource-Aware Caching in Clustered Content-Centric Networks
by Amir Raza Khan & Umar Shoaib & Hannan Bin Liaqat - 1-24 Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation
by Jatinder Pal Singh & Aqsa Aqsa & Imran Ghani & Raj Sonani & Vijay Govindarajan - 1-25 Scalable and Efficient GCL Scheduling for Time-Aware Shaping in Autonomous and Cyber-Physical Systems
by Chengwei Zhang & Yun Wang - 1-26 Real-Time Fall Monitoring for Seniors via YOLO and Voice Interaction
by Eugenia Tîrziu & Ana-Mihaela Vasilevschi & Adriana Alexandru & Eleonora Tudora - 1-27 A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps
by Zhonghao Zhai & Junyi Liu & Xinying Liu & Yanqin Mao & Xinjun Zhang & Jialin Ma & Chunhua Jin - 1-30 Augmented Reality and Virtual Reality in Exergaming
by Georgios Lampropoulos & Theofylaktos Anastasiadis & Juan Garzón - 1-31 An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention
by Ndukwe Ukeje & Jairo A. Gutierrez & Krassie Petrova & Ugochukwu Chinonso Okolie - 1-32 Privacy-Preserving Federated Unlearning with Ontology-Guided Relevance Modeling for Secure Distributed Systems
by Naglaa E. Ghannam & Esraa A. Mahareek - 1-32 EsCorpiusBias: The Contextual Annotation and Transformer-Based Detection of Racism and Sexism in Spanish Dialogue
by Ksenia Kharitonova & David Pérez-Fernández & Javier Gutiérrez-Hernando & Asier Gutiérrez-Fandiño & Zoraida Callejas & David Griol - 1-34 A Verilog Programming Learning Assistant System Focused on Basic Verilog with a Guided Learning Method
by Pin-Chieh Hsieh & Tzu-Lun Fang & Shaobo Jin & Yuyan Wang & Nobuo Funabiki & Yu-Cheng Fan - 1-34 Lightweight Anomaly Detection in Digit Recognition Using Federated Learning
by Anja Tanović & Ivan Mezei - 1-36 Privacy Framework for the Development of IoT-Based Systems
by Yaqin Y. Shaheen & Miguel J. Hornos & Carlos Rodríguez-Domínguez - 1-36 RestRho: A JSON-Based Domain-Specific Language for Designing and Developing RESTful APIs to Validate RhoArchitecture
by Enrique Chavarriaga & Luis Rojas & Francy D. Rodríguez & Kat Sorbello & Francisco Jurado - 1-37 Efficient Machine Learning-Based Prediction of Solar Irradiance Using Multi-Site Data
by Hassan N. Noura & Zaid Allal & Ola Salman & Khaled Chahine - 1-42 A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems
by Mohamed Sayed Farghaly & Heba Kamal Aslan & Islam Tharwat Abdel Halim
August 2025, Volume 17, Issue 8
- 1-3 Editorial for the Special Issue “Virtual Reality and Metaverse: Impact on the Digital Transformation of Society—2nd Edition”
by Diego Vergara - 1-13 Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations
by Yonit Rusho & Daphne Ruth Raban & Michal Chalamish & Vered Pnueli - 1-17 An Energy-Efficient Scheme for Waking Co-Channel TDMA in LoRa Networks via the Integration of Bidirectional Timestamp Correction and Address Recognition
by Zongliang Xu & Guicai Yu & Yingcong Luo & Hao Jiang - 1-17 Adaptive and User-Friendly Framework for Image Classification with Transfer Learning Models
by Manan Khatri & Manmita Sahoo & Sameer Sayyad & Javed Sayyad - 1-21 Rethinking Modbus-UDP for Real-Time IIoT Systems
by Ivan Cibrario Bertolotti - 1-21 Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges
by Simeon Ogunbunmi & Yu Chen & Qi Zhao & Deeraj Nagothu & Sixiao Wei & Genshe Chen & Erik Blasch - 1-21 A Novel Framework Leveraging Large Language Models to Enhance Cold-Start Advertising Systems
by Albin Uruqi & Iosif Viktoratos & Athanasios Tsadiras - 1-21 Enabling Horizontal Collaboration in Logistics Through Secure Multi-Party Computation
by Gabriele Spini & Stephan Krenn & Erich Teppan & Christina Petschnigg & Elena Wiegelmann - 1-21 A High-Capacity Reversible Data Hiding Scheme for Encrypted Hyperspectral Images Using Multi-Layer MSB Block Labeling and ERLE Compression
by Yijie Lin & Chia-Chen Lin & Zhe-Min Yeh & Ching-Chun Chang & Chin-Chen Chang - 1-22 The Future of Education: A Systematic Literature Review of Self-Directed Learning with AI
by Carmen del Rosario Navas Bonilla & Luis Miguel Viñan Carrasco & Jhoanna Carolina Gaibor Pupiales & Daniel Eduardo Murillo Noriega - 1-23 AI-Supported EUD for Data Visualization: An Exploratory Case Study
by Sara Beschi & Daniela Fogli & Luigi Gargioni & Angela Locoro - 1-24 Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo - 1-24 Unsupervised Person Re-Identification via Deep Attribute Learning
by Shun Zhang & Yaohui Xu & Xuebin Zhang & Boyang Cheng & Ke Wang - 1-26 Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments
by Daniel Sernández-Iglesias & Llanos Tobarra & Rafael Pastor-Vargas & Antonio Robles-Gómez & Pedro Vidal-Balboa & João Sarraipa - 1-26 Parallel Algorithm for NP-Hard Problem of Channel Resource Allocation Optimization in Ad Hoc and Sensor Networks
by Valeriy Ivanov & Maxim Tereshonok - 1-27 Beyond Prompt Chaining: The TB-CSPN Architecture for Agentic AI
by Uwe M. Borghoff & Paolo Bottoni & Remo Pareschi - 1-28 Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen & Mien L. Trinh & Minh T. Nguyen & Thang C. Vu & Tao V. Nguyen & Long Q. Dinh & Mui D. Nguyen - 1-29 DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
by Shengmin Peng & Jialin Tian & Xiangyu Zheng & Shuwu Chen & Zhaogang Shu - 1-29 Internet of Things Driven Digital Twin for Intelligent Manufacturing in Shipbuilding Workshops
by Caiping Liang & Xiang Li & Wenxu Niu & Yansong Zhang - 1-29 A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks
by Max Hashem Eiza & Brian Akwirry & Alessandro Raschella & Michael Mackay & Mukesh Kumar Maheshwari - 1-30 A Multi-Layer Secure Sharing Framework for Aviation Big Data Based on Blockchain
by Qing Wang & Zhijun Wu & Yanrong Lu - 1-30 A High-Acceptance-Rate VxWorks Fuzzing Framework Based on Protocol Feature Fusion and Memory Extraction
by Yichuan Wang & Jiazhao Han & Xi Deng & Xinhong Hei - 1-31 TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs
by Soundes Oumaima Boufaida & Abdelmadjid Benmachiche & Makhlouf Derdour & Majda Maatallah & Moustafa Sadek Kahil & Mohamed Chahine Ghanem - 1-33 Patient-Oriented Smart Applications to Support the Diagnosis, Rehabilitation, and Care of Patients with Parkinson’s: An Umbrella Review
by Rute Bastardo & João Pavão & Ana Isabel Martins & Anabela G. Silva & Nelson Pacheco Rocha - 1-34 Federated Learning for Anomaly Detection: A Systematic Review on Scalability, Adaptability, and Benchmarking Framework
by Le-Hang Lim & Lee-Yeng Ong & Meng-Chew Leow - 1-38 Transforming Data Annotation with AI Agents: A Review of Architectures, Reasoning, Applications, and Impact
by Md Monjurul Karim & Sangeen Khan & Dong Hoang Van & Xinyue Liu & Chunhui Wang & Qiang Qu - 1-38 Enhancing Industrial Processes Through Augmented Reality: A Scoping Review
by Alba Miranda & Aracely M. Vallejo & Paulina Ayala & Marcelo V. Garcia & Jose E. Naranjo - 1-39 Efficient Charging Station Selection for Minimizing Total Travel Time of Electric Vehicles
by Yaqoob Al-Zuhairi & Prashanth Kannan & Alberto Bazán Guillén & Luis J. de la Cruz Llopis & Mónica Aguilar Igartua - 1-41 The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses
by Leandro Antonio Pazmiño Ortiz & Ivonne Fernanda Maldonado Soliz & Vanessa Katherine Guevara Balarezo - 1-44 Creating Automated Microsoft Bicep Application Infrastructure from GitHub in the Azure Cloud
by Vladislav Manolov & Daniela Gotseva & Nikolay Hinov
June 2025, Volume 17, Issue 7
- 1-16 IoT-Edge Hybrid Architecture with Cross-Modal Transformer and Federated Manifold Learning for Safety-Critical Gesture Control in Adaptive Mobility Platforms
by Xinmin Jin & Jian Teng & Jiaji Chen - 1-18 Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks
by Matthew Boeding & Paul Scalise & Michael Hempel & Hamid Sharif & Juan Lopez - 1-20 ERA-MADDPG: An Elastic Routing Algorithm Based on Multi-Agent Deep Deterministic Policy Gradient in SDN
by Wanwei Huang & Hongchang Liu & Yingying Li & Linlin Ma - 1-21 Optimizing Trajectories for Rechargeable Agricultural Robots in Greenhouse Climatic Sensing Using Deep Reinforcement Learning with Proximal Policy Optimization Algorithm
by Ashraf Sharifi & Sara Migliorini & Davide Quaglia - 1-22 AI-Based Learning Recommendations: Use in Higher Education
by Prabin Dahal & Saptadi Nugroho & Claudia Schmidt & Volker Sänger - 1-22 AUV Trajectory Planning for Optimized Sensor Data Collection in Internet of Underwater Things
by Talal S. Almuzaini & Andrey V. Savkin - 1-22 FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments
by Bruno Ramos-Cruz & Francisco J. Quesada-Real & Javier Andreu-Pérez & Jessica Zaqueros-Martinez - 1-23 SatScope: A Data-Driven Simulator for Low-Earth-Orbit Satellite Internet
by Qichen Wang & Guozheng Yang & Yongyu Liang & Chiyu Chen & Qingsong Zhao & Sugai Chen - 1-23 The Internet of Things, Fog, and Cloud Continuum: Integration Challenges and Opportunities for Smart Cities
by Rodger Lea & Toni Adame & Alexandre Berne & Selma Azaiez - 1-24 Responsible Resilience in Cyber–Physical–Social Systems: A New Paradigm for Emergent Cyber Risk Modeling
by Theresa Sobb & Nour Moustafa & Benjamin Turnbull - 1-24 Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review
by Juan Ochoa-Aldeán & Carlos Silva-Cárdenas & Renato Torres & Jorge Ivan Gonzalez & Sergio Fortes - 1-24 ICRSSD: Identification and Classification for Railway Structured Sensitive Data
by Yage Jin & Hongming Chen & Rui Ma & Yanhua Wu & Qingxin Li - 1-24 HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications
by Saud Alharbi & Wasan Awad & David Bell - 1-25 Lower-Latency Screen Updates over QUIC with Forward Error Correction
by Nooshin Eghbal & Paul Lu - 1-26 The Role of Multi-Agent Systems in Realizing Asset Administration Shell Type 3
by Lucas Sakurada & Fernando De la Prieta & Paulo Leitao - 1-27 Cross-Lingual Cross-Domain Transfer Learning for Rumor Detection
by Eliana Providel & Marcelo Mendoza & Mauricio Solar - 1-27 Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications
by Haoming Wang & Aryan Sharma & Deepak Mishra & Aruna Seneviratne & Eliathamby Ambikairajah - 1-28 Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
by Seema G. Aarella & Venkata P. Yanambaka & Saraju P. Mohanty & Elias Kougianos - 1-28 Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users
by George Alex Stelea & Livia Sangeorzan & Nicoleta Enache-David - 1-28 Towards Automatic Detection of Pneumothorax in Emergency Care with Deep Learning Using Multi-Source Chest X-ray Data
by Santiago Ibañez Caturla & Juan de Dios Berná Mestre & Oscar Martinez Mozos - 1-30 Tourism Sentiment Chain Representation Model and Construction from Tourist Reviews
by Bosen Li & Rui Li & Junhao Wang & Aihong Song - 1-30 Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
by Germán Rodríguez-Galán & Eduardo Benavides-Astudillo & Daniel Nuñez-Agurto & Pablo Puente-Ponce & Sonia Cárdenas-Delgado & Mauricio Loachamín-Valencia - 1-31 Measurement of the Functional Size of Web Analytics Implementation: A COSMIC-Based Case Study Using Machine Learning
by Ammar Abdallah & Alain Abran & Munthir Qasaimeh & Malik Qasaimeh & Bashar Abdallah - 1-33 Metaverse Architectures: A Comprehensive Systematic Review of Definitions and Frameworks
by Cemile Boztas & Essam Ghadafi & Rasha Ibrahim - 1-33 TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing
by Hisham Ali & William J. Buchanan & Jawad Ahmad & Marwan Abubakar & Muhammad Shahbaz Khan & Isam Wadhaj - 1-34 An Experimental Tethered UAV-Based Communication System with Continuous Power Supply
by Veronica Rodriguez & Christian Tipantuña & Diego Reinoso & Jorge Carvajal-Rodriguez & Carlos Egas Acosta & Pablo Proaño & Xavier Hesselbach - 1-34 An Optimized Transformer–GAN–AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets
by Ahmad Salehiyan & Pardis Sadatian Moghaddam & Masoud Kaveh - 1-35 Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks
by Abdul Manan Sheikh & Md. Rafiqul Islam & Mohamed Hadi Habaebi & Suriza Ahmad Zabidi & Athaur Rahman Bin Najeeb & Adnan Kabbani - 1-35 Intelligent Transmission Control Scheme for 5G mmWave Networks Employing Hybrid Beamforming
by Hazem (Moh’d Said) Hatamleh & As’ad Mahmoud As’ad Alnaser & Roba Mahmoud Ali Aloglah & Tomader Jamil Bani Ata & Awad Mohamed Ramadan & Omar Radhi Aqeel Alzoubi
July 2025, Volume 17, Issue 7
- 1-14 Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City
by Gabriel Sepúlveda-Cervantes & Eduardo Vega-Alvarado & Edgar Alfredo Portilla-Flores & Eduardo Vivanco-Rodríguez - 1-17 A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks
by Sridhar Varadala & Hao Xu - 1-19 A UAV Trajectory Optimization and Task Offloading Strategy Based on Hybrid Metaheuristic Algorithm in Mobile Edge Computing
by Yeqiang Zheng & An Li & Yihu Wen & Gaocai Wang - 1-19 A Case Study on Monolith to Microservices Decomposition with Variational Autoencoder-Based Graph Neural Network
by Rokin Maharjan & Korn Sooksatra & Tomas Cerny & Yudeep Rajbhandari & Sakshi Shrestha - 1-19 Attack Surface Score for Software Systems
by Yudeep Rajbhandari & Rokin Maharjan & Sakshi Shrestha & Tomas Cerny - 1-20 Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks
by Kenan Honore Robacky Mbongo & Kanwal Ahmed & Orken Mamyrbayev & Guanghui Wang & Fang Zuo & Ainur Akhmediyarova & Nurzhan Mukazhanov & Assem Ayapbergenova - 1-21 Enhancing Security in 5G and Future 6G Networks: Machine Learning Approaches for Adaptive Intrusion Detection and Prevention
by Konstantinos Kalodanis & Charalampos Papapavlou & Georgios Feretzakis - 1-22 The Investigation of Queuing Models to Calculate Journey Times to Develop an Intelligent Transport System for Smart Cities
by Vatsal Mehta & Glenford Mapp & Vaibhav Gandhi - 1-23 An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network
by Vidhya Prakash Rajendran & Deepalakshmi Perumalsamy & Chinnasamy Ponnusamy & Ezhil Kalaimannan - 1-25 Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection
by Ma Viet Duc & Pham Minh Dang & Tran Thu Phuong & Truong Duc Truong & Vu Hai & Nguyen Huu Thanh - 1-27 TriagE-NLU: A Natural Language Understanding System for Clinical Triage and Intervention in Multilingual Emergency Dialogues
by Béatrix-May Balaban & Ioan Sacală & Alina-Claudia Petrescu-Niţă - 1-27 Parallel Agent-Based Framework for Analyzing Urban Agricultural Supply Chains
by Manuel Ignacio Manríquez & Veronica Gil-Costa & Mauricio Marin - 1-28 An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec
by Xinyu Li & Xiaoying Wang & Guoqing Yang & Jinsha Zhang & Chunhui Li & Fangfang Cui & Ruize Gu - 1-31 A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing
by Fateme Mazloomi & Shahram Shah Heydari & Khalil El-Khatib - 1-34 Advancing Neurodegenerative Disease Management: Technical, Ethical, and Regulatory Insights from the NeuroPredict Platform
by Marilena Ianculescu & Lidia Băjenaru & Ana-Mihaela Vasilevschi & Maria Gheorghe-Moisii & Cristina-Gabriela Gheorghe - 1-35 Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions
by Shruti Kulkarni & Alexios Mylonas & Stilianos Vidalis - 1-39 A Review of Research on Secure Aggregation for Federated Learning
by Xing Zhang & Yuexiang Luo & Tianning Li - 1-40 Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV)
by Isra Mahmoudi & Djallel Eddine Boubiche & Samir Athmani & Homero Toral-Cruz & Freddy I. Chan-Puc - 1-42 Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey
by Manal Alharthi & Faiza Medjek & Djamel Djenouri - 1-47 Leveraging Blockchain for Ethical AI: Mitigating Digital Threats and Strengthening Societal Resilience
by Chibuzor Udokwu & Roxana Voicu-Dorobanțu & Abiodun Afolayan Ogunyemi & Alex Norta & Nata Sturua & Stefan Craß - 1-55 A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware
by Mazen Gazzan & Bader Alobaywi & Mohammed Almutairi & Frederick T. Sheldon - 1-87 Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions
by Jean Paul A. Yaacoub & Hassan N. Noura & Ola Salman & Khaled Chahine
June 2025, Volume 17, Issue 6
- 1-14 A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication
by Tzung-Her Chen - 1-18 Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT
by Haixu Niu & Yonghai Li & Shuaixin Hou & Tianfei Chen & Lijun Sun & Mingyang Gu & Muhammad Irsyad Abdullah - 1-19 A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols
by Iftikhar Hussain & Manuel J. C. S. Reis & Carlos Serôdio & Frederico Branco - 1-20 Exact and Approximation Algorithms for Task Offloading with Service Caching and Dependency in Mobile Edge Computing
by Bowen Cui & Jianwei Zhang - 1-21 Building Equi-Width Histograms on Homomorphically Encrypted Data
by Dragoș Lazea & Anca Hangan & Tudor Cioara - 1-21 JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs)
by Jorge Cisneros-González & Natalia Gordo-Herrera & Iván Barcia-Santos & Javier Sánchez-Soriano - 1-23 Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI
by Leandro Antonio Pazmiño Ortiz & Ivonne Fernanda Maldonado Soliz & Vanessa Katherine Guevara Balarezo - 1-24 Joint Exploitation of Physical-Layer and Artificial Features for Privacy-Preserving Distributed Source Camera Identification
by Hui Tian & Haibao Chen & Yuyan Zhao & Jiawei Zhang - 1-24 An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels
by Yiannis Kiouvrekis & Katerina Gkirtzou & Sotiris Zikas & Dimitris Kalatzis & Theodor Panagiotakopoulos & Zoran Lajic & Dimitris Papathanasiou & Ioannis Filippopoulos - 1-26 Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems
by Mohammed N. Alenezi - 1-27 A C-Based Framework for Low-Cost Real-Time Embedded Systems
by Ivan Cibrario Bertolotti - 1-29 Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8
by Momotaz Begum & Abm Kamrul Islam Riad & Abdullah Al Mamun & Thofazzol Hossen & Salah Uddin & Md Nurul Absur & Hossain Shahriar - 1-30 Network-, Cost-, and Renewable-Aware Ant Colony Optimization for Energy-Efficient Virtual Machine Placement in Cloud Datacenters
by Ali Mohammad Baydoun & Ahmed Sherif Zekri - 1-30 Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach
by Hany F. Atlam & Yifu Yang - 1-35 Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment
by Sikha S. Bagui & Germano Correa Silva De Carvalho & Asmi Mishra & Dustin Mink & Subhash C. Bagui & Stephanie Eager - 1-36 Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
by Pardis Sadatian Moghaddam & Ali Vaziri & Sarvenaz Sadat Khatami & Francisco Hernando-Gallego & Diego Martín - 1-36 A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy
by Pilleriin Lillemets & Nabaa Bashir Jawad & Joseph Kashi & Ahmad Sabah & Nicola Dragoni - 1-37 LLM4Rec: A Comprehensive Survey on the Integration of Large Language Models in Recommender Systems—Approaches, Applications and Challenges
by Sarama Shehmir & Rasha Kashef
May 2025, Volume 17, Issue 6
- 1-12 Position Accuracy and Distributed Beamforming Performance in WSNs: A Simulation Study
by José Casca & Prabhat Gupta & Marco Gomes & Vitor Silva & Rui Dinis - 1-17 Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review
by Tobias Rødahl Thingnes & Per Håkon Meland - 1-17 Multi Stage Retrieval for Web Search During Crisis
by Claudiu Constantin Tcaciuc & Daniele Rege Cambrin & Paolo Garza - 1-18 Resource Allocation for Federated Learning with Heterogeneous Computing Capability in Cloud–Edge–Client IoT Architecture
by Xubo Zhang & Yang Luo - 1-20 Analysis of Digital Skills and Infrastructure in EU Countries Based on DESI 2024 Data
by Kvitoslava Obelovska & Andrii Abziatov & Anastasiya Doroshenko & Ivanna Dronyuk & Oleh Liskevych & Rostyslav Liskevych - 1-20 Grouping-Based Dynamic Routing, Core, and Spectrum Allocation Method for Avoiding Spectrum Fragmentation and Inter-Core Crosstalk in Multi-Core Fiber Networks
by Funa Fukui & Tomotaka Kimura & Yutaka Fukuchi & Kouji Hirata - 1-21 A Deep Learning Approach for Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional Neural Networks
by Ali Abdi Seyedkolaei & Fatemeh Mahmoudi & José García - 1-21 AI-Driven Framework for Evaluating Climate Misinformation and Data Quality on Social Media
by Zeinab Shahbazi & Rezvan Jalali & Zahra Shahbazi - 1-21 Navigating Data Corruption in Machine Learning: Balancing Quality, Quantity, and Imputation Strategies
by Qi Liu & Wanjing Ma - 1-22 Inter-Data Center RDMA: Challenges, Status, and Future Directions
by Xiaoying Huang & Jingwei Wang - 1-22 An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain
by Mahmoud Elkhodr - 1-23 Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP
by Kazi Fatema & Samrat Kumar Dey & Mehrin Anannya & Risala Tasin Khan & Mohammad Mamunur Rashid & Chunhua Su & Rashed Mazumder - 1-23 Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT)
by Naveed Ahmed & Md Asri Ngadi & Abdulaleem Ali Almazroi & Nouf Atiahallah Alghanmi - 1-24 LLM Performance in Low-Resource Languages: Selecting an Optimal Model for Migrant Integration Support in Greek
by Alexandros Tassios & Stergios Tegos & Christos Bouas & Konstantinos Manousaridis & Maria Papoutsoglou & Maria Kaltsa & Eleni Dimopoulou & Thanassis Mavropoulos & Stefanos Vrochidis & Georgios Meditskos - 1-25 Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine
by Rene Francisco Santana-Cruz & Martin Moreno & Daniel Aguilar-Torres & Román Arturo Valverde-Domínguez & Rubén Vázquez-Medina - 1-26 Enhancing Customer Quality of Experience Through Omnichannel Digital Strategies: Evidence from a Service Environment in an Emerging Context
by Fabricio Miguel Moreno-Menéndez & Victoriano Eusebio Zacarías-Rodríguez & Sara Ricardina Zacarías-Vallejos & Vicente González-Prida & Pedro Emil Torres-Quillatupa & Hilario Romero-Girón & José Francisco Vía y Rada-Vittes & Luis Ángel Huaynate-Espejo - 1-27 A Robust Conformal Framework for IoT-Based Predictive Maintenance
by Alberto Moccardi & Claudia Conte & Rajib Chandra Ghosh & Francesco Moscato - 1-27 Semantic Fusion of Health Data: Implementing a Federated Virtualized Knowledge Graph Framework Leveraging Ontop System
by Abid Ali Fareedi & Stephane Gagnon & Ahmad Ghazawneh & Raul Valverde - 1-27 Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection
by Sangita Baruah & Vaskar Deka & Dulumani Das & Utpal Barman & Manob Jyoti Saikia - 1-29 Machine Learning and Deep Learning-Based Atmospheric Duct Interference Detection and Mitigation in TD-LTE Networks
by Rasendram Muralitharan & Upul Jayasinghe & Roshan G. Ragel & Gyu Myoung Lee - 1-31 A Tale of Many Networks: Splitting and Merging of Chord-like Overlays in Partitioned Networks
by Tobias Amft & Kalman Graffi - 1-32 Optimization of Ground Station Energy Saving in LEO Satellite Constellations for Earth Observation Applications
by Francesco Valente & Francesco Giacinto Lavacca & Marco Polverini & Tiziana Fiori & Vincenzo Eramo - 1-54 Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services
by Dimitrios G. Arnaoutoglou & Tzichat M. Empliouk & Theodoros N. F. Kaifas & Constantinos L. Zekios & George A. Kyriacou - 1-60 Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
by Mohammed El-Hajj
May 2025, Volume 17, Issue 5
- 1-2 Correction: Kalodanis et al. High-Risk AI Systems—Lie Detection Application. Future Internet 2025, 17 , 26
by Konstantinos Kalodanis & Panagiotis Rizomiliotis & Georgios Feretzakis & Charalampos Papapavlou & Dimosthenis Anagnostopoulos - 1-3 Industrial Internet of Things (IIoT): Trends and Technologies
by Zhihao Liu & Franco Davoli & Davide Borsatti