Content
September 2023, Volume 15, Issue 9
- 1-22 FLAME-VQA: A Fuzzy Logic-Based Model for High Frame Rate Video Quality Assessment
by Štefica Mrvelj & Marko Matulin - 1-22 Prototyping a Hyperledger Fabric-Based Security Architecture for IoMT-Based Health Monitoring Systems
by Filippos Pelekoudas-Oikonomou & José C. Ribeiro & Georgios Mantas & Georgia Sakellari & Jonathan Gonzalez - 1-23 Proof of Flow: A Design Pattern for the Green Energy Market
by Valerio Mandarino & Giuseppe Pappalardo & Emiliano Tramontana - 1-23 Evaluation of Blockchain Networks’ Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks
by Kithmini Godewatte Arachchige & Philip Branch & Jason But - 1-24 Wireless Energy Harvesting for Internet-of-Things Devices Using Directional Antennas
by Hsiao-Ching Chang & Hsing-Tsung Lin & Pi-Chung Wang - 1-25 Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm
by Rezak Aziz & Soumya Banerjee & Samia Bouzefrane & Thinh Le Vinh - 1-27 FL-LoRaMAC: A Novel Framework for Enabling On-Device Learning for LoRa-Based IoT Applications
by Shobhit Aggarwal & Asis Nasipuri - 1-27 Automatic Short Text Summarization Techniques in Social Media Platforms
by Fahd A. Ghanem & M. C. Padma & Ramez Alkhatib - 1-28 Analysis of Program Representations Based on Abstract Syntax Trees and Higher-Order Markov Chains for Source Code Classification Task
by Artyom V. Gorchakov & Liliya A. Demidova & Peter N. Sovietov
July 2023, Volume 15, Issue 8
- 1-13 Virtual Grid-Based Routing for Query-Driven Wireless Sensor Networks
by Shushant Kumar Jain & Rinkoo Bhatia & Neeraj Shrivastava & Sharad Salunke & Mohammad Farukh Hashmi & Neeraj Dhanraj Bokde - 1-14 An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things
by Zainab Jamroz & Insaf Ullah & Bilal Hassan & Noor Ul Amin & Muhammad Asghar Khan & Pascal Lorenz & Nisreen Innab - 1-18 RIS-Assisted Fixed NOMA: Outage Probability Analysis and Transmit Power Optimization
by Vinoth Babu Kumaravelu & Agbotiname Lucky Imoize & Francisco R. Castillo Soria & Periyakarupan Gurusamy Sivabalan Velmurugan & Sundarrajan Jayaraman Thiruvengadam & Dinh-Thuan Do & Arthi Murugadass - 1-18 A Novel Approach for Fraud Detection in Blockchain-Based Healthcare Networks Using Machine Learning
by Mohammed A. Mohammed & Manel Boujelben & Mohamed Abid - 1-19 A Comparative Analysis of High Availability for Linux Container Infrastructures
by Marek Šimon & Ladislav Huraj & Nicolas Búčik - 1-20 Intelligent Caching with Graph Neural Network-Based Deep Reinforcement Learning on SDN-Based ICN
by Jiacheng Hou & Tianhao Tao & Haoye Lu & Amiya Nayak - 1-25 The mPOC Framework: An Autonomous Outbreak Prediction and Monitoring Platform Based on Wearable IoMT Approach
by Sasan Adibi - 1-26 Towards Efficient Resource Allocation for Federated Learning in Virtualized Managed Environments
by Fotis Nikolaidis & Moysis Symeonides & Demetris Trihinas - 1-27 Features and Scope of Regulatory Technologies: Challenges and Opportunities with Industrial Internet of Things
by Jinying Li & Ananda Maiti & Jiangang Fei - 1-30 Task Allocation Methods and Optimization Techniques in Edge Computing: A Systematic Review of the Literature
by Vasilios Patsias & Petros Amanatidis & Dimitris Karampatzakis & Thomas Lagkas & Kalliopi Michalakopoulou & Alexandros Nikitas - 1-31 The Meta-Metaverse: Ideation and Future Directions
by Mohammad (Behdad) Jamshidi & Arash Dehghaniyan Serej & Alireza Jamshidi & Omid Moztarzadeh - 1-31 A Review of ARIMA vs. Machine Learning Approaches for Time Series Forecasting in Data Driven Networks
by Vaia I. Kontopoulou & Athanasios D. Panagopoulos & Ioannis Kakkos & George K. Matsopoulos - 1-60 The Power of Generative AI: A Review of Requirements, Models, Input–Output Formats, Evaluation Metrics, and Challenges
by Ajay Bandi & Pydi Venkata Satya Ramesh Adapa & Yudu Eswar Vinay Pratap Kumar Kuchi
August 2023, Volume 15, Issue 8
- 1-7 Special Issue on Security and Privacy in Blockchains and the IoT Volume II
by Christoph Stach & Clémentine Gritti - 1-14 Mapping EEG Alpha Activity: Assessing Concentration Levels during Player Experience in Virtual Reality Video Games
by Jesus GomezRomero-Borquez & J. Alberto Del Puerto-Flores & Carolina Del-Valle-Soto - 1-14 Correlation Analysis Model of Environment Parameters Using IoT Framework in a Biogas Energy Generation Context
by Angelique Mukasine & Louis Sibomana & Kayalvizhi Jayavel & Kizito Nkurikiyeyezu & Eric Hitimana - 1-16 An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks
by Asad Iqbal & Muhammad Zubair & Muhammad Asghar Khan & Insaf Ullah & Ghani Ur-Rehman & Alexey V. Shvetsov & Fazal Noor - 1-16 LoRa Communication Using TVWS Frequencies: Range and Data Rate
by Anjali R. Askhedkar & Bharat S. Chaudhari & Maha Abdelhaq & Raed Alsaqour & Rashid Saeed & Marco Zennaro - 1-16 An Efficient Adaptive Data-Link-Layer Architecture for LoRa Networks
by Micael Coutinho & Jose A. Afonso & Sérgio F. Lopes - 1-16 An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network
by Amthal K. Mousa & Mohammed Najm Abdullah - 1-17 A Survey on Pump and Dump Detection in the Cryptocurrency Market Using Machine Learning
by Mohammad Javad Rajaei & Qusay H. Mahmoud - 1-19 Applying Machine Learning in Cloud Service Price Prediction: The Case of Amazon IaaS
by George Fragiadakis & Evangelia Filiopoulou & Christos Michalakelis & Thomas Kamalakis & Mara Nikolaidou - 1-19 Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
by Ugochukwu Onyekachi Obonna & Felix Kelechi Opara & Christian Chidiebere Mbaocha & Jude-Kennedy Chibuzo Obichere & Isdore Onyema Akwukwaegbu & Miriam Mmesoma Amaefule & Cosmas Ifeanyi Nwakanma - 1-19 Intelligent Transmit Antenna Selection Schemes for High-Rate Fully Generalized Spatial Modulation
by Hindavi Kishor Jadhav & Vinoth Babu Kumaravelu & Arthi Murugadass & Agbotiname Lucky Imoize & Poongundran Selvaprabhu & Arunkumar Chandrasekhar - 1-20 Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps
by Mishall Al-Zubaidie & Ghanima Sabr Shyaa - 1-21 Enhancing Network Security: A Machine Learning-Based Approach for Detecting and Mitigating Krack and Kr00k Attacks in IEEE 802.11
by Zaher Salah & Esraa Abu Elsoud - 1-21 Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)
by Anand Singh Rajawat & S. B. Goyal & Pradeep Bedi & Tony Jan & Md Whaiduzzaman & Mukesh Prasad - 1-22 Real-World Implementation and Integration of an Automatic Scoring System for Workplace Safety Courses in Italian
by Nicola Arici & Alfonso Emilio Gerevini & Matteo Olivato & Luca Putelli & Luca Sigalini & Ivan Serina - 1-24 Cluster-Based Data Aggregation in Flying Sensor Networks Enabled Internet of Things
by Abdu Salam & Qaisar Javaid & Masood Ahmad & Ishtiaq Wahid & Muhammad Yeasir Arafat - 1-28 Efficient Integration of Heterogeneous Mobility-Pollution Big Data for Joint Analytics at Scale with QoS Guarantees
by Isam Mashhour Al Jawarneh & Luca Foschini & Paolo Bellavista - 1-28 A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M
by Luis F. Gonzalez & Ivan Vidal & Francisco Valera & Raul Martin & Dulce Artalejo - 1-38 SEDIA: A Platform for Semantically Enriched IoT Data Integration and Development of Smart City Applications
by Dimitrios Lymperis & Christos Goumopoulos - 1-77 An Overview of WebAssembly for IoT: Background, Tools, State-of-the-Art, Challenges, and Future Directions
by Partha Pratim Ray
June 2023, Volume 15, Issue 7
- 1-3 Developments of Computer Vision and Image Processing: Methodologies and Applications
by Manuel J. C. S. Reis - 1-16 Heart DT: Monitoring and Preventing Cardiac Pathologies Using AI and IoT Sensors
by Roberta Avanzato & Francesco Beritelli & Alfio Lombardo & Carmelo Ricci - 1-18 Bus Travel Time Prediction Based on the Similarity in Drivers’ Driving Styles
by Zhenzhong Yin & Bin Zhang - 1-18 Exploiting Misconfiguration Vulnerabilities in Microsoft’s Azure Active Directory for Privilege Escalation Attacks
by Ibrahim Bu Haimed & Marwan Albahar & Ali Alzubaidi - 1-18 Synonyms, Antonyms and Factual Knowledge in BERT Heads
by Lorenzo Serina & Luca Putelli & Alfonso Emilio Gerevini & Ivan Serina - 1-20 Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects
by Andrea Pinna & Maria Ilaria Lunesu & Stefano Orrù & Roberto Tonelli - 1-23 Cache-Enabled Adaptive Video Streaming: A QoE-Based Evaluation Study
by Eirini Liotou & Dionysis Xenakis & Vasiliki Georgara & Georgios Kourouniotis & Lazaros Merakos - 1-26 KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments
by Giorgio Dell’Immagine & Jacopo Soldani & Antonio Brogi - 1-27 A New AI-Based Semantic Cyber Intelligence Agent
by Fahim Sufi - 1-29 Artificial Intelligence in Virtual Telemedicine Triage: A Respiratory Infection Diagnosis Tool with Electronic Measuring Device
by Naythan Villafuerte & Santiago Manzano & Paulina Ayala & Marcelo V. García - 1-31 Hybridizing Fuzzy String Matching and Machine Learning for Improved Ontology Alignment
by Mohammed Suleiman Mohammed Rudwan & Jean Vincent Fonou-Dombeu - 1-34 An Ontology for Spatio-Temporal Media Management and an Interactive Application
by Takuro Sone & Shin Kato & Ray Atarashi & Jin Nakazato & Manabu Tsukada & Hiroshi Esaki - 1-38 Secure Partitioning of Cloud Applications, with Cost Look-Ahead
by Alessandro Bocci & Stefano Forti & Roberto Guanciale & Gian-Luigi Ferrari & Antonio Brogi
July 2023, Volume 15, Issue 7
- 1-13 Optimization of the Decision Criterion for Increasing the Bandwidth Utilization by Means of the Novel Effective DBA Algorithm in NG-PON2 Networks
by Rastislav Róka - 1-16 Assisting Drivers at Stop Signs in a Connected Vehicle Environment
by Maram Bani Younes - 1-16 An IoT System and MODIS Images Enable Smart Environmental Management for Mekong Delta
by Vu Hien Phan & Danh Phan Hong Pham & Tran Vu Pham & Kashif Naseer Qureshi & Cuong Pham-Quoc - 1-16 A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network
by Yang Hu & Liangliang Gong & Xinyang Li & Hui Li & Ruoxin Zhang & Rentao Gu - 1-17 Analysis of ICS and SCADA Systems Attacks Using Honeypots
by Mohamed Mesbah & Mahmoud Said Elsayed & Anca Delia Jurcut & Marianne Azer - 1-17 Machine Learning for Network Intrusion Detection—A Comparative Study
by Mustafa Al Lail & Alejandro Garcia & Saul Olivo - 1-18 Intelligent Video Streaming at Network Edge: An Attention-Based Multiagent Reinforcement Learning Solution
by Xiangdong Tang & Fei Chen & Yunlong He - 1-18 Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22
by Sikha S. Bagui & Dustin Mink & Subhash C. Bagui & Michael Plain & Jadarius Hill & Marshall Elam - 1-19 An Accurate Platform for Investigating TCP Performance in Wi-Fi Networks
by Shunji Aoyagi & Yuki Horie & Do Thi Thu Hien & Thanh Duc Ngo & Duy-Dinh Le & Kien Nguyen & Hiroo Sekiya - 1-20 Acoustic TDOA Measurement and Accurate Indoor Positioning for Smartphone
by Bingbing Cheng & Jiao Wu - 1-21 Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis
by Ikram Karabila & Nossayba Darraz & Anas El-Ansari & Nabil Alami & Mostafa El Mallahi - 1-21 Unveiling the Landscape of Operating System Vulnerabilities
by Manish Bhurtel & Danda B. Rawat - 1-27 Beyond the Semantic Web: Towards an Implicit Pragmatic Web and a Web of Social Representations
by Yannis Haralambous & Philippe Lenca - 1-28 A Cyber-Physical System for Wildfire Detection and Firefighting
by Pietro Battistoni & Andrea Antonio Cantone & Gerardo Martino & Valerio Passamano & Marco Romano & Monica Sebillo & Giuliana Vitiello - 1-42 Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools
by Obinna Johnphill & Ali Safaa Sadiq & Feras Al-Obeidat & Haider Al-Khateeb & Mohammed Adam Taheir & Omprakash Kaiwartya & Mohammed Ali
May 2023, Volume 15, Issue 6
- 1-13 Feature Construction Using Persistence Landscapes for Clustering Noisy IoT Time Series
by Renjie Chen & Nalini Ravishanker - 1-14 Research and Design of a Decentralized Edge-Computing-Assisted LoRa Gateway
by Han Gao & Zhangqin Huang & Xiaobo Zhang & Huapeng Yang - 1-16 Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches
by Abdul Majeed & Abdullah M. Alnajim & Athar Waseem & Aleem Khaliq & Aqdas Naveed & Shabana Habib & Muhammad Islam & Sheroz Khan - 1-17 Digital Art and the Metaverse: Benefits and Challenges
by William Hurst & Orestis Spyrou & Bedir Tekinerdogan & Caspar Krampe - 1-17 In-Depth Co-Design of Mental Health Monitoring Technologies by People with Lived Experience
by Bronwin Patrickson & Mike Musker & Dan Thorpe & Yasmin van Kasteren & Niranjan Bidargaddi & The Consumer and Carer Advisory Group (CCAG) - 1-18 PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz & Gustavo Chica Pedraza & Rafael Cubillos-Sánchez & Alexander Aponte-Moreno & Mónica Espinosa Buitrago - 1-19 Elastic Stack and GRAPHYP Knowledge Graph of Web Usage: A Win–Win Workflow for Semantic Interoperability in Decision Making
by Otmane Azeroual & Renaud Fabre & Uta Störl & Ruidong Qi - 1-19 Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions
by Muneerah Al Asqah & Tarek Moulahi - 1-20 Task Automation Intelligent Agents: A Review
by Abdul Wali & Saipunidzam Mahamad & Suziah Sulaiman - 1-21 How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
by Yiming Zhu & Dehua Zhou & Yuan Li & Beibei Song & Chuansheng Wang - 1-23 From NFT 1.0 to NFT 2.0: A Review of the Evolution of Non-Fungible Tokens
by Barbara Guidi & Andrea Michienzi - 1-24 ChatGPT and Open-AI Models: A Preliminary Review
by Konstantinos I. Roumeliotis & Nikolaos D. Tselikas - 1-24 Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey
by Abubakar Ahmad Musa & Adamu Hussaini & Weixian Liao & Fan Liang & Wei Yu - 1-24 Avoiding Detection by Hostile Nodes in Airborne Tactical Networks
by Dragos Ilie & Håkan Grahn & Lars Lundberg & Alexander Westerhagen & Bo Granbom & Anders Höök - 1-26 Synchronizing Many Filesystems in Near Linear Time
by Elod P. Csirmaz & Laszlo Csirmaz - 1-28 Methods of Annotating and Identifying Metaphors in the Field of Natural Language Processing
by Martina Ptiček & Jasminka Dobša - 1-45 Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
by Shereen Ismail & Diana W. Dawoud & Hassan Reza
June 2023, Volume 15, Issue 6
- 1-15 Mitigating Technological Anxiety through the Application of Natural Interaction in Mixed Reality Systems
by Yiming Sun & Tatsuo Nakajima - 1-16 Research on Blockchain Data Availability and Storage Scalability
by Honghao Si & Baoning Niu - 1-17 RSSI and Device Pose Fusion for Fingerprinting-Based Indoor Smartphone Localization Systems
by Imran Moez Khan & Andrew Thompson & Akram Al-Hourani & Kandeepan Sithamparanathan & Wayne S. T. Rowe - 1-19 A DQN-Based Multi-Objective Participant Selection for Efficient Federated Learning
by Tongyang Xu & Yuan Liu & Zhaotai Ma & Yiqiang Huang & Peng Liu - 1-19 BERT4Loc: BERT for Location—POI Recommender System
by Syed Raza Bashir & Shaina Raza & Vojislav B. Misic - 1-19 Dual-Channel Feature Enhanced Collaborative Filtering Recommendation Algorithm
by Yuanyou Ou & Baoning Niu - 1-19 Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow
by Kai Lehniger & Peter Langendörfer - 1-19 Optimal Meshing Degree Performance Analysis in a mmWave FWA 5G Network Deployment
by Iffat Gheyas & Alessandro Raschella & Michael Mackay - 1-21 Neural Network Exploration for Keyword Spotting on Edge Devices
by Jacob Bushur & Chao Chen - 1-22 Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware
by Jinting Zhu & Julian Jang-Jaccard & Amardeep Singh & Paul A. Watters & Seyit Camtepe - 1-25 A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards
by Khaled A. M. Ahmed & Sabry F. Saraya & John F. Wanis & Amr M. T. Ali-Eldin - 1-27 S2NetM: A Semantic Social Network of Things Middleware for Developing Smart and Collaborative IoT-Based Solutions
by Antonios Pliatsios & Dimitrios Lymperis & Christos Goumopoulos - 1-29 Anomaly Detection for Hydraulic Power Units—A Case Study
by Paweł Fic & Adam Czornik & Piotr Rosikowski - 1-29 Searching Online for Art and Culture: User Behavior Analysis
by Minas Pergantis & Iraklis Varlamis & Nikolaos Grigorios Kanellopoulos & Andreas Giannakoulopoulos - 1-30 Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms
by Ashish Koirala & Rabindra Bista & Joao C. Ferreira - 1-35 2D Semantic Segmentation: Recent Developments and Future Directions
by Yu Guo & Guigen Nie & Wenliang Gao & Mi Liao
May 2023, Volume 15, Issue 5
- 1-14 Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload
by Raman Singh & Zeeshan Pervez & Hitesh Tewari - 1-14 Securing UAV Flying Base Station for Mobile Networking: A Review
by Sang-Yoon Chang & Kyungmin Park & Jonghyun Kim & Jinoh Kim - 1-14 A Hybrid Text Generation-Based Query Expansion Method for Open-Domain Question Answering
by Wenhao Zhu & Xiaoyu Zhang & Qiuhong Zhai & Chenyun Liu - 1-16 Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by Yufeng Li & Mengxiao Liu & Chenhong Cao & Jiangtao Li - 1-17 Blockchain Solution for Buildings’ Multi-Energy Flexibility Trading Using Multi-Token Standards
by Oana Marin & Tudor Cioara & Ionut Anghel - 1-17 Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs
by Anas Abu Taleb & Qasem Abu Al-Haija & Ammar Odeh - 1-18 Predicting Football Team Performance with Explainable AI: Leveraging SHAP to Identify Key Team-Level Performance Metrics
by Serafeim Moustakidis & Spyridon Plakias & Christos Kokkotis & Themistoklis Tsatalas & Dimitrios Tsaopoulos - 1-19 Deep Reinforcement Learning-Based Video Offloading and Resource Allocation in NOMA-Enabled Networks
by Siyu Gao & Yuchen Wang & Nan Feng & Zhongcheng Wei & Jijun Zhao - 1-20 Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA
by Khai-Minh Ma & Duc-Hung Le & Cong-Kha Pham & Trong-Thuc Hoang - 1-24 Distributed Average Consensus Algorithms in d-Regular Bipartite Graphs: Comparative Study
by Martin Kenyeres & Jozef Kenyeres - 1-27 Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection
by Dominic Lightbody & Duc-Minh Ngo & Andriy Temko & Colin C. Murphy & Emanuel Popovici - 1-28 Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology
by Ayodeji Falayi & Qianlong Wang & Weixian Liao & Wei Yu - 1-32 5G-MEC Testbeds for V2X Applications
by Prachi V. Wadatkar & Rosario G. Garroppo & Gianfranco Nencioni - 1-35 Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment
by Agbotiname Lucky Imoize & Friday Udeji & Joseph Isabona & Cheng-Chi Lee - 1-47 A Review on Deep-Learning-Based Cyberbullying Detection
by Md. Tarek Hasan & Md. Al Emran Hossain & Md. Saddam Hossain Mukta & Arifa Akter & Mohiuddin Ahmed & Salekul Islam
April 2023, Volume 15, Issue 5
- 1-10 Theory and Applications of Web 3.0 in the Media Sector
by Charalampos A. Dimoulas & Andreas Veglis - 1-13 System Performance Analysis of Sensor Networks for RF Energy Harvesting and Information Transmission
by Kuncheng Lei & Zhenrong Zhang - 1-15 Watermarking Protocols: A Short Guide for Beginners
by Franco Frattolillo - 1-15 Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks
by Fahad M. Alotaibi & Vassilios G. Vassilakis - 1-16 A Context-Aware Edge Computing Framework for Smart Internet of Things
by Abdelkarim Ben Sada & Abdenacer Naouri & Amar Khelloufi & Sahraoui Dhelim & Huansheng Ning - 1-16 Domain Adaptation Speech-to-Text for Low-Resource European Portuguese Using Deep Learning
by Eduardo Medeiros & Leonel Corado & Luís Rato & Paulo Quaresma & Pedro Salgueiro - 1-17 A Reverse Shortest Path Tree-Based Multicast Joining Node Selection Method
by Zhenyu Tian & Jiali You & Linlin Hu - 1-17 NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data Networking
by Ahmed Benmoussa & Chaker Abdelaziz Kerrache & Carlos T. Calafate & Nasreddine Lagraa - 1-17 Benchmarking Change Detector Algorithms from Different Concept Drift Perspectives
by Guilherme Yukio Sakurai & Jessica Fernandes Lopes & Bruno Bogaz Zarpelão & Sylvio Barbon Junior - 1-17 A Distributed Sensor System Based on Cloud-Edge-End Network for Industrial Internet of Things
by Mian Wang & Cong’an Xu & Yun Lin & Zhiyi Lu & Jinlong Sun & Guan Gui - 1-19 Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
by Nuwan Weerasinghe & Muhammad Arslan Usman & Chaminda Hewage & Eckhard Pfluegel & Christos Politis - 1-20 Chinese Short-Text Sentiment Prediction: A Study of Progressive Prediction Techniques and Attentional Fine-Tuning
by Jinlong Wang & Dong Cui & Qiang Zhang - 1-20 Mobile Application for Real-Time Food Plan Management for Alzheimer Patients through Design-Based Research
by Rui P. Duarte & Carlos A. S. Cunha & Valter N. N. Alves - 1-23 Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques
by Luis Alberto Martínez Hernández & Ana Lucila Sandoval Orozco & Luis Javier García Villalba - 1-24 Blockchain-Based Loyalty Management System
by André F. Santos & José Marinho & Jorge Bernardino - 1-25 The Future of the Human–Machine Interface (HMI) in Society 5.0
by Dimitris Mourtzis & John Angelopoulos & Nikos Panopoulos - 1-26 Machine Failure Prediction Using Survival Analysis
by Dimitris Papathanasiou & Konstantinos Demertzis & Nikos Tziritas - 1-27 Extending Learning and Collaboration in Quantum Information with Internet Support: A Future Perspective on Research Education beyond Boundaries, Limitations, and Frontiers
by Francisco Delgado - 1-28 Future Internet Architectures on an Emerging Scale—A Systematic Review
by Sarfaraz Ahmed Mohammed & Anca L. Ralescu - 1-31 Online Privacy Fatigue: A Scoping Review and Research Agenda
by Karl van der Schyff & Greg Foster & Karen Renaud & Stephen Flowerday
March 2023, Volume 15, Issue 4
- 1-13 View Synthesis with Scene Recognition for Cross-View Image Localization
by Uddom Lee & Peng Jiang & Hongyi Wu & Chunsheng Xin - 1-14 A Novel Multi-Cell Interference-Aware Cooperative QoS-Based NOMA Group D2D System
by Muhammad Amish Hasan & Tanveer Ahmad & Asim Anwar & Salman Siddiq & Abdul Malik & Waseem Nazar & Imran Razzaq - 1-14 A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part
by Kongpei Wu & Huiqin Qu & Conggui Huang - 1-14 Effective IoT Congestion Control Algorithm
by Husam H. Hasan & Zainab T. Alisa - 1-14 Contrastive Refinement for Dense Retrieval Inference in the Open-Domain Question Answering Task
by Qiuhong Zhai & Wenhao Zhu & Xiaoyu Zhang & Chenyun Liu - 1-16 A Deep Learning Approach to Detect Failures in Bridges Based on the Coherence of Signals
by Francesco Morgan Bono & Luca Radicioni & Simone Cinquemani & Lorenzo Benedetti & Gabriele Cazzulani & Claudio Somaschini & Marco Belloli - 1-17 Banging Interaction: A Ubimus-Design Strategy for the Musical Internet
by Damián Keller & Azeema Yaseen & Joseph Timoney & Sutirtha Chakraborty & Victor Lazzarini - 1-17 A Comparative Study of Single and Multi-Stage Forecasting Algorithms for the Prediction of Electricity Consumption Using a UK-National Health Service (NHS) Hospital Dataset
by Ahmad Taha & Basel Barakat & Mohammad M. A. Taha & Mahmoud A. Shawky & Chun Sing Lai & Sajjad Hussain & Muhammad Zainul Abideen & Qammer H. Abbasi - 1-18 A Replica-Selection Algorithm Based on Transmission Completion Time Estimation in ICN
by Zhiyuan Wang & Hong Ni & Rui Han - 1-18 Insights into How Vietnamese Retailers Utilize Social Media to Facilitate Knowledge Creation through the Process of Value Co-Creation
by Peter R. J. Trim & Yang-Im Lee & An Vu - 1-18 Influential Factors in the Design and Development of a Sustainable Web3/Metaverse and Its Applications
by Reza Aria & Norm Archer & Moein Khanlari & Bharat Shah - 1-18 Study of Coded ALOHA with Multi-User Detection under Heavy-Tailed and Correlated Arrivals
by María E. Sousa-Vieira & Manuel Fernández-Veiga - 1-18 SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
by Yuting Guan & Junjiang He & Tao Li & Hui Zhao & Baoqiang Ma - 1-18 Performance Evaluation of a Lane Correction Module Stress Test: A Field Test of Tesla Model 3
by Jonathan Lancelot & Bhaskar P. Rimal & Edward M. Dennis - 1-20 A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm
by Jiaqi Zhao & Ming Xu & Yunzhi Chen & Guoliang Xu - 1-21 Addressing ZSM Security Issues with Blockchain Technology
by Michael Xevgenis & Dimitrios G. Kogias & Panagiotis A. Karkazis & Helen C. Leligou - 1-23 Developing a Virtual World for an Open-House Event: A Metaverse Approach
by Keattikorn Samarnggoon & Supara Grudpan & Noppon Wongta & Konlawat Klaynak - 1-23 Transforming IoT Events to Meaningful Business Events on the Edge: Implementation for Smart Farming Application
by Dimitris Gkoulis & Cleopatra Bardaki & George Kousiouris & Mara Nikolaidou - 1-24 Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks
by Sikha Bagui & Dustin Mink & Subhash Bagui & Sakthivel Subramaniam & Daniel Wallace - 1-27 PVPBC: Privacy and Verifiability Preserving E-Voting Based on Permissioned Blockchain
by Muntadher Sallal & Ruairí de Fréin & Ali Malik - 1-31 A Highly Interactive Honeypot-Based Approach to Network Threat Management
by Xingyuan Yang & Jie Yuan & Hao Yang & Ya Kong & Hao Zhang & Jinyu Zhao
April 2023, Volume 15, Issue 4
- 1-2 Distributed Systems for Emerging Computing: Platform and Application
by Xu Wang & Bin Shi & Yili Fang - 1-12 Emerging Technologies and Their Link to Digital Competence in Teaching
by Miguel Ángel García-Delgado & Sonia Rodríguez-Cano & Vanesa Delgado-Benito & María Lozano-Álvarez - 1-13 Applying Patient Segmentation Using Primary Care Electronic Medical Records to Develop a Virtual Peer-to-Peer Intervention for Patients with Type 2 Diabetes
by Alessia Paglialonga & Rebecca Theal & Bruce Knox & Robert Kyba & David Barber & Aziz Guergachi & Karim Keshavjee - 1-15 Future of Drug Discovery: The Synergy of Edge Computing, Internet of Medical Things, and Deep Learning
by Mohammad (Behdad) Jamshidi & Omid Moztarzadeh & Alireza Jamshidi & Ahmed Abdelgawad & Ayman S. El-Baz & Lukas Hauer - 1-17 Implementing GDPR-Compliant Surveys Using Blockchain
by Ricardo Martins Gonçalves & Miguel Mira da Silva & Paulo Rupino da Cunha - 1-18 Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems
by Mazen Gazzan & Frederick T. Sheldon - 1-18 A Multipath Data-Scheduling Strategy Based on Path Correlation for Information-Centric Networking
by Yong Xu & Hong Ni & Xiaoyong Zhu - 1-19 Consumer’s Attitude towards Display Google Ads
by Mohammad Al Khasawneh & Abdel-Aziz Ahmad Sharabati & Shafig Al-Haddad & Rania Al-Daher & Sarah Hammouri & Sima Shaqman - 1-19 Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions
by Beibei Song & Dehua Zhou & Jiahe Wu & Xiaowei Yuan & Yiming Zhu & Chuansheng Wang - 1-20 A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
by Soumya Prakash Otta & Subhrakanta Panda & Maanak Gupta & Chittaranjan Hota - 1-21 Target-Oriented Data Annotation for Emotion and Sentiment Analysis in Tourism Related Social Media Data
by Alireza Alaei & Ying Wang & Vinh Bui & Bela Stantic - 1-24 A Multiverse Graph to Help Scientific Reasoning from Web Usage: Interpretable Patterns of Assessor Shifts in GRAPHYP
by Renaud Fabre & Otmane Azeroual & Joachim Schöpfel & Patrice Bellot & Daniel Egret - 1-29 Post-Digital Learning for Rural Development: A Case Study of Open Biotec MOOCs in Colombia
by Carlos Ocampo-López & Oscar Muñoz-Blandón & Leidy Rendón-Castrillón & Margarita Ramírez-Carmona - 1-32 Towards a Reference Architecture for Cargo Ports
by Virginia M. Romero & Eduardo B. Fernandez
February 2023, Volume 15, Issue 3
- 1-13 Data Protection and Multi-Database Data-Driven Models
by Lili Jiang & Vicenç Torra - 1-15 Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network
by Raman Singh & Sean Sturley & Hitesh Tewari - 1-16 When Operation Technology Meets Information Technology: Challenges and Opportunities
by Davide Berardi & Franco Callegati & Andrea Giovine & Andrea Melis & Marco Prandini & Lorenzo Rinieri - 1-17 Machine Learning for Data Center Optimizations: Feature Selection Using Shapley Additive exPlanation (SHAP)
by Yibrah Gebreyesus & Damian Dalton & Sebastian Nixon & Davide De Chiara & Marta Chinnici - 1-17 Scope and Accuracy of Analytic and Approximate Results for FIFO, Clock-Based and LRU Caching Performance
by Gerhard Hasslinger & Konstantinos Ntougias & Frank Hasslinger & Oliver Hohlfeld - 1-17 A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks
by Jingsha He & Yue Li & Nafei Zhu - 1-20 Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms
by Denis Rangelov & Philipp Lämmel & Lisa Brunzel & Stephan Borgert & Paul Darius & Nikolay Tcholtchev & Michell Boerger - 1-21 Integrating a Blockchain-Based Governance Framework for Responsible AI
by Rameez Asif & Syed Raheel Hassan & Gerard Parr - 1-22 Fast Way to Predict Parking Lots Availability: For Shared Parking Lots Based on Dynamic Parking Fee System
by Sheng-Ming Wang & Wei-Min Cheng - 1-23 A Mobile-Based System for Detecting Ginger Leaf Disorders Using Deep Learning
by Hamna Waheed & Waseem Akram & Saif ul Islam & Abdul Hadi & Jalil Boudjadar & Noureen Zafar - 1-23 HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain
by Leina Abdelgalil & Mohamed Mejri - 1-23 A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber–Physical Attacks
by Konstantinos Ntafloukas & Liliana Pasquale & Beatriz Martinez-Pastor & Daniel P. McCrum - 1-33 Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme
by Oluwakemi Christiana Abikoye & Esau Taiwo Oladipupo & Agbotiname Lucky Imoize & Joseph Bamidele Awotunde & Cheng-Chi Lee & Chun-Ta Li - 1-34 BPMNE4IoT: A Framework for Modeling, Executing and Monitoring IoT-Driven Processes
by Yusuf Kirikkayis & Florian Gallik & Michael Winter & Manfred Reichert - 1-36 Quantum Computing for Healthcare: A Review
by Raihan Ur Rasool & Hafiz Farooq Ahmad & Wajid Rafique & Adnan Qayyum & Junaid Qadir & Zahid Anwar
March 2023, Volume 15, Issue 3
- 1-13 A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework
by Karen Schnell & Kaushik Roy & Madhuri Siddula - 1-14 Optimizing Task Execution: The Impact of Dynamic Time Quantum and Priorities on Round Robin Scheduling
by Mansoor Iqbal & Zahid Ullah & Izaz Ahmad Khan & Sheraz Aslam & Haris Shaheer & Mujtaba Humayon & Muhammad Asjad Salahuddin & Adeel Mehmood - 1-15 Beamforming Based on a SSS Angle Estimation Algorithm for 5G NR Networks
by Daniel Andrade & Roberto Magueta & Adão Silva & Paulo Marques - 1-15 Co-Design, Development, and Evaluation of a Health Monitoring Tool Using Smartwatch Data: A Proof-of-Concept Study
by Ruhi Kiran Bajaj & Rebecca Mary Meiring & Fernando Beltran - 1-16 Relational Action Bank with Semantic–Visual Attention for Few-Shot Action Recognition
by Haoming Liang & Jinze Du & Hongchen Zhang & Bing Han & Yan Ma - 1-16 Utilizing Random Forest with iForest-Based Outlier Detection and SMOTE to Detect Movement and Direction of RFID Tags
by Ganjar Alfian & Muhammad Syafrudin & Norma Latif Fitriyani & Sahirul Alam & Dinar Nugroho Pratomo & Lukman Subekti & Muhammad Qois Huzyan Octava & Ninis Dyah Yulianingsih & Fransiskus Tatas Dwi Atmaji & Filip Benes - 1-17 Research on Spaceborne Target Detection Based on Yolov5 and Image Compression
by Qi Shi & Daheng Wang & Wen Chen & Jinpei Yu & Weiting Zhou & Jun Zou & Guangzu Liu - 1-18 IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning
by Juan Wang & Jing Zhong & Jiangqi Li - 1-18 Artificial-Intelligence-Based Charger Deployment in Wireless Rechargeable Sensor Networks
by Hsin-Hung Cho & Wei-Che Chien & Fan-Hsun Tseng & Han-Chieh Chao