


default search action
Future Internet, Volume 16
Volume 16, Number 1, 2024
- Filippo Dolente, Rosario Giuseppe Garroppo
, Michele Pagano
:
A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions. 1 - Yashar Kor
, Liang Tan, Petr Musilek
, Marek Z. Reformat
:
Integrating Knowledge Graphs into Distribution Grid Decision Support Systems. 2 - Anestis Kousis
, Christos Tjortjis
:
Investigating the Key Aspects of a Smart City through Topic Modeling and Thematic Analysis. 3 - Goran Bubas
, Antonela Cizmesija
, Andreja Kovacic:
Development of an Assessment Scale for Measurement of Usability and User Experience Characteristics of Bing Chat Conversational AI. 4 - Ryunosuke Masaoka, Gia Khanh Tran
, Jin Nakazato
, Kei Sakaguchi
:
The Future of Flying Base Stations: Empirical and Numerical Investigations of mmWave-Enabled UAVs. 5 - Jing Liu
, Xuesong Hai, Keqin Li
:
TDLearning: Trusted Distributed Collaborative Learning Based on Blockchain Smart Contracts. 6 - Yadi Zhao, Lei Yan, Jian Wu, Ximing Song:
Design and Implementation of a Digital Twin System for Log Rotary Cutting Optimization. 7 - Patrick Toman, Nalini Ravishanker, Nathan Lally, Sanguthevar Rajasekaran:
Latent Autoregressive Student-t Prior Process Models to Assess Impact of Interventions in Time Series. 8 - Nasour Bagheri
, Ygal Bendavid, Masoumeh Safkhani
, Samad Rostampour:
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol. 9 - Emanuele Santonicola
, Ennio Andrea Adinolfi
, Simone Coppola, Francesco Pascale
:
Automotive Cybersecurity Application Based on CARDIAN. 10 - Qiang Liu, Rui Han, Yang Li:
Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism. 11 - Xiu Li
, Aron Henriksson, Martin Duneld, Jalal Nouri, Yongchao Wu
:
Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation. 12 - Herve Mbikayi Kabamba
, Matthew Khouzam, Michel R. Dagenais:
Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures. 13 - Omar Serghini
, Hayat Semlali
, Asmaa Maali
, Abdelilah Ghammaz
, Salvatore Serrano
:
1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing. 14 - Fouad Achkouty
, Richard Chbeir
, Laurent Gallon
, Elio Mansour
, Antonio Corral
:
Resource Indexing and Querying in Large Connected Environments. 15 - Javid Misirli
, Emiliano Casalicchio
:
An Analysis of Methods and Metrics for Task Scheduling in Fog Computing. 16 - Mizuki Asano
, Takumi Miyoshi
, Taku Yamazaki
:
Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments. 17 - Irina A. Kochetkova
, Kseniia Leonteva
, Ibram Ghebrial
, Anastasia S. Vlaskina
, Sofia Burtseva
, Anna Kushchazli
, Konstantin E. Samouylov
:
Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing. 18 - Chen Zhang
, Celimuge Wu
, Min Lin, Yangfei Lin, William Liu:
Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing. 19 - Lidong Liu, Shidang Li, Mingsheng Wei, Jinsong Xu, Bencheng Yu:
Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT. 20 - G. G. Md. Nawaz Ali
, Mohammad Nazmus Sadat
, Md. Suruz Miah
, Sameer Ahmed Sharief
, Yun Wang
:
A Comprehensive Study and Analysis of the Third Generation Partnership Project's 5G New Radio for Vehicle-to-Everything Communication. 21 - Mahmoud Elkhodr
, Samiya Khan
, Ergun Gide
:
A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness. 22 - Alex Galis:
Future Sustainable Internet Energy-Defined Networking. 23 - Sana Rasheed, Soulla Louca:
Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security. 24 - Chinyang Henry Tseng
, Woei-Jiunn Tsaur
, Yueh-Mao Shen:
Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection. 25 - Andrea Moreno-Cabanillas
, Elizabet Castillero-Ostio
, Antonio Castillo-Esparcia
:
Digital Communication and Social Organizations: An Evaluation of the Communication Strategies of the Most-Valued NGOs Worldwide. 26 - Xu Feng, Mengyang He, Lei Zhuang, Yanrui Song, Rumeng Peng:
Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space-Air-Ground Integrated Network. 27 - Kyle DeMedeiros
, Chan Young Koh
, Abdeltawab M. Hendawi
:
Clustering on the Chicago Array of Things: Spotting Anomalies in the Internet of Things Records. 28 - Valeriy Ivanov
, Maxim Tereshonok
:
Cross-Layer Methods for Ad Hoc Networks - Review and Classification. 29 - Jiantao Qu
, Chunyu Qi, He Meng
:
An Imbalanced Sequence Feature Extraction Approach for the Detection of LTE-R Cells with Degraded Communication Performance. 30 - Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey
, Kuo-Chu Chang:
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence. 31 - Hassan Khazane, Mohammed Ridouani
, Fatima Salahdine
, Naima Kaabouch:
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks. 32 - Spyridon Daousis, Nikolaos Peladarinos
, Vasileios Cheimaras
, Panagiotis Papageorgas
, Dimitrios D. Piromalis
, Radu Adrian Munteanu:
Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures. 33 - Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering. 34 - Muhammad Sher Ramzan
, Anees Asghar, Ata Ullah
, Fawaz Alsolami
, Iftikhar Ahmad
:
A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things. 35
Volume 16, Number 2, February 2024
- Viktor Masalskyi, Dominykas Ciciurenas, Andrius Dzedzickis
, Urte Prentice
, Gediminas Braziulis, Vytautas Bucinskas
:
Synchronization of Separate Sensors' Data Transferred through a Local Wi-Fi Network: A Use Case of Human-Gait Monitoring. 36 - Shiva Raj Pokhrel
, Jonathan Kua
, Deol Satish, Sebnem Ozer, Jeff Howe, Anwar Walid:
DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control. 37 - Min Ma, Shanrong Liu, Shufei Wang, Shengnan Shi
:
Refined Semi-Supervised Modulation Classification: Integrating Consistency Regularization and Pseudo-Labeling Techniques. 38 - Ricardo Lopes
, Marcello Trovati
, Ella Pereira
:
Volumetric Techniques for Product Routing and Loading Optimisation in Industry 4.0: A Review. 39 - Md. Mahmud Hossain, Golam Kayas, Ragib Hasan
, Anthony Skjellum, Shahid Al Noor, S. M. Riazul Islam
:
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. 40 - Melania Nitu
, Mihai Dascalu
:
Beyond Lexical Boundaries: LLM-Generated Text Detection for Romanian Digital Libraries. 41 - Aristeidis Karras
, Anastasios Giannaros
, Christos N. Karras
, Leonidas Theodorakopoulos
, Constantinos S. Mammassis
, George A. Krimpas
, Spyros Sioutas
:
TinyML Algorithms for Big Data Management in Large-Scale IoT Systems. 42 - Sergio Jesus Gonzalez Ambriz
, Rolando Menchaca-Méndez
, Sergio Alejandro Pinacho-Castellanos
, Mario Eduardo Rivero-Angeles
:
A Spectral Gap-Based Topology Control Algorithm for Wireless Backhaul Networks. 43 - Arturs Kempelis, Inese Polaka
, Andrejs Romanovs
, Antons Patlins
:
Computer Vision and Machine Learning-Based Predictive Analysis for Urban Agricultural Systems. 44 - Marcin Aftowicz
, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning. 45 - Erica Corda
, Silvia M. Massa
, Daniele Riboni
:
Context-Aware Behavioral Tips to Improve Sleep Quality via Machine Learning and Large Language Models. 46 - Andreas F. Gkontzis
, Sotiris Kotsiantis
, Georgios Feretzakis
, Vassilios S. Verykios
:
Enhancing Urban Resilience: Smart City Data Analyses, Forecasts, and Digital Twin Techniques at the Neighborhood Level. 47 - Azizah Assiri, Hassen Sallay
:
Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks. 48 - Hamid Saadatfar
, Hamid Gholampour Ahangar
, Javad Hassannataj Joloudari
:
A New Dynamic Game-Based Pricing Model for Cloud Environment. 49 - Pradeep Kumar
, Guo-Liang Shih
, Bo-Lin Guo, Siva Kumar Nagi, Yibeltal Chanie Manie
, Cheng-Kai Yao
, Michael Augustine Arockiyadoss, Peng-Chun Peng:
Enhancing Smart City Safety and Utilizing AI Expert Systems for Violence Detection. 50 - Ming-Yen Lin
, Ping-Chun Wu, Sue-Chen Hsueh:
Optimizing Session-Aware Recommenders: A Deep Dive into GRU-Based Latent Interaction Integration. 51 - Adwitiya Mukhopadhyay
, Aryadevi Remanidevi Devidas, P. Venkat Rangan, Maneesha Vinodini Ramesh:
A QoS-Aware IoT Edge Network for Mobile Telemedicine Enabling In-Transit Monitoring of Emergency Patients. 52 - Massimo Cafaro
, Italo Epicoco
, Marco Pulimeno
:
State-of-the-Art Future Internet Technology in Italy 2022-2023. 53 - Martin Kenyeres
, Ivana Budinská, Ladislav Hluchý, Agostino Poggi
:
Modern Trends in Multi-Agent Systems. 54 - Meng Li, Jiqiang Liu
, Yeping Yang:
Automated Identification of Sensitive Financial Data Based on the Topic Analysis. 55 - Ayman Khalil
, Besma Zeddini
:
A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability. 56 - Mohammed Bellaj, Najib Naja, Abdellah Jamali:
Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs. 57 - Adedamola Adesokan
, Rowan Kinney, Eirini-Eleni Tsiropoulou
:
CROWDMATCH: Optimizing Crowdsourcing Matching through the Integration of Matching Theory and Coalition Games. 58 - Tianjie Fu
, Peiyu Li, Chenke Shi, Youzhu Liu:
Digital-Twin-Based Monitoring System for Slab Production Process. 59 - Qian Qu, Mohsen Hatami
, Ronghua Xu
, Deeraj Nagothu
, Yu Chen
, Xiaohua Li, Erik Blasch
, Erika Ardiles-Cruz, Genshe Chen
:
The Microverse: A Task-Oriented Edge-Scale Metaverse. 60 - Dennis Papenfuß, Bennet Gerlach
, Stefan Fischer
, Mohamed Ahmed Hail
:
Enhancing Energy Efficiency in IoT-NDN via Parameter Optimization. 61 - Salvatore Calcagno, Andrea Calvagna
, Emiliano Tramontana
, Gabriella Verga
:
Merging Ontologies and Data from Electronic Health Records. 62 - Haohan Shi
, Xiyu Shi
, Safak Dogan
:
Speech Inpainting Based on Multi-Layer Long Short-Term Memory Networks. 63 - Ryo Matsuoka
, Koichi Kobayashi
, Yuh Yamashita
:
Online Optimization of Pickup and Delivery Problem Considering Feasibility. 64 - Paolo Bellavista
, Giuseppe Di Modica
:
IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings. 65 - Muhammad Nafees Ulfat Khan
, Weiping Cao, Zhi-Ling Tang
, Ata Ullah, Wanghua Pan:
Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT. 66
Volume 16, Number 3, March 2024
- Paul Scalise
, Matthew Boeding
, Michael Hempel
, Hamid Sharif
, Joseph Delloiacovo, John Reed:
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas. 67 - Juliana Basulo-Ribeiro
, Leonor Teixeira
:
The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis. 68 - Davy Preuveneers
, Wouter Joosen
:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. 69 - Mikael Sabuhi
, Petr Musilek
, Cor-Paul Bezemer
:
Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning. 70 - Emma Fitzgerald
, Michal Pióro:
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO. 71 - Adel Belkhiri
, Michel R. Dagenais
:
Analyzing GPU Performance in Virtualized Environments: A Case Study. 72 - Konstantinos Psychogyios
, Andreas E. Papadakis
, Stavroula Bourou
, Nikolaos P. Nikolaou, Apostolos Maniatis, Theodore B. Zahariadis
:
Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data. 73 - Reeva Lederman, Esther Brainin, Ofir Ben-Assuli
:
The Electronic Medical Record - A New Look at the Challenges and Opportunities. 74 - Feng Zhou
, Shijing Hu, Xin Du, Xiaoli Wan, Jie Wu:
A Lightweight Neural Network Model for Disease Risk Prediction in Edge Intelligent Computing Architecture. 75 - Andry Alamsyah
, Gede Natha Wijaya Kusuma, Dian Puteri Ramadhani:
A Review on Decentralized Finance Ecosystems. 76 - Dimah Almani
, Tim Muller
, Xavier Carpent
, Takahito Yoshizawa
, Steven Furnell
:
Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments. 77 - Mohammad Javad Salariseddigh
, Ons Dabbabi, Christian Deppe
, Holger Boche
:
Deterministic K-Identification for Future Communication Networks: The Binary Symmetric Channel Results. 78 - Mattia Pellegrino
, Gianfranco Lombardo
, George Adosoglou, Stefano Cagnoni
, Panos M. Pardalos, Agostino Poggi
:
A Multi-Head LSTM Architecture for Bankruptcy Prediction with Time Series Accounting Data. 79 - Haedam Kim
, Suhyun Park
, Hyemin Hong, Jieun Park
, Seongmin Kim
:
A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection. 80 - Yushan Li
, Satoshi Fujita
:
A Synergistic Elixir-EDA-MQTT Framework for Advanced Smart Transportation Systems. 81 - Hanyue Xu
, Kah Phooi Seng, Jeremy Smith, Li-Minn Ang:
Multi-Level Split Federated Learning for Large-Scale AIoT System Based on Smart Cities. 82 - Gulshan Saleem
, Usama Ijaz Bajwa, Rana Hammad Raza
, Fan Zhang:
Edge-Enhanced TempoFuseNet: A Two-Stream Framework for Intelligent Multiclass Video Anomaly Recognition in 5G and IoT Environments. 83 - Håkon Harnes
, Donn Morrison
:
SoK: Analysis Techniques for WebAssembly. 84 - Hadeel Alrubayyi
, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem
, Mona Jaber
:
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. 85 - Peter K. K. Loh
, Aloysius Z. Y. Lee, Vivek Balachandran:
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense. 86 - Dominik Warch
, Patrick Stellbauer
, Pascal Neis
:
Advanced Techniques for Geospatial Referencing in Online Media Repositories. 87 - Dominic Lightbody
, Duc-Minh Ngo
, Andriy Temko
, Colin C. Murphy, Emanuel M. Popovici
:
Dragon_Pi: IoT Side-Channel Power Data Intrusion Detection Dataset and Unsupervised Convolutional Autoencoder for Intrusion Detection. 88 - Mostafa El Debeiki, Saba Al-Rubaye
, Adolfo Perrusquía
, Christopher Conrad
, Juan Alejandro Flores Campos
:
An Advanced Path Planning and UAV Relay System: Enhancing Connectivity in Rural Environments. 89 - Heidi Toivonen
, Francesco Lelli
:
The Varieties of Agency in Human-Smart Device Relationships: The Four Agency Profiles. 90 - Mauro Femminella
, Gianluca Reali
:
Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies. 91 - Andreas Giannakoulopoulos
, Minas Pergantis
, Aristeidis Lamprogeorgos:
User Experience, Functionality and Aesthetics Evaluation in an Academic Multi-Site Web Ecosystem. 92 - Ziyad Almudayni, Ben Soh
, Alice S. Li:
IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks. 93 - Yu Yao, Quan Qian
:
Dynamic Industrial Optimization: A Framework Integrates Online Machine Learning for Processing Parameters Design. 94 - Ying-Hsun Lai, Shih-Yeh Chen
, Wen-Chi Chou, Hua-Yang Hsu, Han-Chieh Chao:
Personalized Federated Learning with Adaptive Feature Extraction and Category Prediction in Non-IID Datasets. 95 - Mengchi Xing, Haojiang Deng, Rui Han:
A Method for 5G-ICN Seamless Mobility Support Based on Router Buffered Data. 96 - Ancilon Leuch Alencar
, Marcelo Dornbusch Lopes
, Anita Maria da Rocha Fernandes
, Julio Cesar Santos dos Anjos
, Juan Francisco De Paz Santana
, Valderi Reis Quietinho Leithardt
:
Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks. 97 - Muhammad Bin Saif
, Sara Migliorini
, Fausto Spoto
:
Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain. 98 - Alfonso Quarati
, Riccardo Albertoni
:
Linked Open Government Data: Still a Viable Option for Sharing and Integrating Public Data? 99 - Yogeswaranathan Kalyani
, Liam Vorster, Rebecca Whetton, Rem W. Collier
:
Application Scenarios of Digital Twins for Smart Crop Farming through Cloud-Fog-Edge Infrastructure. 100 - Alessandro Pozzebon
:
Edge and Fog Computing for the Internet of Things. 101 - Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye, Liang Zhang:
UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment. 102 - Rafael Moreno-Vozmediano
, Rubén S. Montero
, Eduardo Huedo
, Ignacio Martín Llorente
:
Intelligent Resource Orchestration for 5G Edge Infrastructures. 103 - Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, João M. L. P. Caldeira
, Vasco N. G. J. Soares
:
Using Computer Vision to Collect Information on Cycling and Hiking Trails Users. 104 - Shui Jiang, Yanning Ge
, Xu Yang, Wencheng Yang
, Hui Cui
:
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning. 105 - Tenzin Norbu, Joo-Yeon Park
, Kok Wai Wong, Hui Cui
:
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review. 106
Volume 16, Number 4, April 2024
- Ihtisham Khalid
, Vasilis Maglogiannis
, Dries Naudts
, Adnan Shahid
, Ingrid Moerman
:
Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC. 107 - Árpád Takács, Tamás Haidegger
:
A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions. 108 - Yihu Zhou, Haiming Chen
, Zhibin Dou:
MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks. 109 - Fahad Alqahtani
, Mohammed Almutairi
, Frederick T. Sheldon
:
Cloud Security Using Fine-Grained Efficient Information Flow Tracking. 110 - Anderson Carvalho, Daniel Riordan
, Joseph Walsh
:
A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud. 111 - Véronique Georlette
, Anne-Carole Honfoga, Michel Dossou, Véronique Moeyaert
:
Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning. 112 - Jun Li, Chenyang Zhang, Jianyi Zhang
, Yanhua Shao:
Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning. 113 - Priyank Kalgaonkar
, Mohamed El-Sharkawy
:
NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking. 114 - Anton Dolhopolov
, Arnaud Castelltort
, Anne Laurent
:
Implementing Federated Governance in Data Mesh Architecture. 115 - Binita Kusum Dhamala
, Babu R. Dawadi
, Pietro Manzoni
, Baikuntha Kumar Acharya
:
Performance Evaluation of Graph Neural Network-Based RouteNet Model with Attention Mechanism. 116 - Maolin Tang
, Wei Li
:
Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing. 117 - Manar Aldaoud
, Dawood Al-Abri, Medhat Awadalla, Firdous Kausar
:
Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking. 118 - Huiting Wang, Yazhi Liu, Wei Li, Zhigang Yang:
Multi-Agent Deep Reinforcement Learning-Based Fine-Grained Traffic Scheduling in Data Center Networks. 119 - Anna Agusti-Torra
, Marc Ferré-Mancebo
, Gabriel David Orozco-Urrutia
, David Rincón Rivera
, David Remondo
:
A Microservices-Based Control Plane for Time-Sensitive Networking. 120 - Bing Su, Jiwu Liang:
Research on Secure Community Opportunity Network Based on Trust Model. 121 - Radheshyam Singh
, Léo Mendiboure
, José Soler
, Michael Stübert Berger
, Tidiane Sylla, Marion Berbineau, Lars Dittmann
:
SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios. 122 - Premalatha Baskar, Prakasam Periasamy
:
Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks. 123 - Haibo Liu, Yang Liao, Changting Shi
, Jing Shen:
Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm. 124 - Stefanos Balaskas
, Georgia Kotsari, Maria Rigou
:
Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis. 125 - Florian Maier, Markus Weinberger
:
Metaverse Meets Smart Cities - Applications, Benefits, and Challenges. 126 - Zhongcheng Wei
, Yanhu Dong
:
Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device. 127 - Peixiong He
, Yi Zhou
, Xiao Qin
:
A Survey on Energy-Aware Security Mechanisms for the Internet of Things. 128 - Georgios Koukis
, Konstantina Safouri, Vassilis Tsaoussidis
:
All about Delay-Tolerant Networking (DTN) Contributions to Future Internet. 129 - David Todolí Ferrandis
, Javier Silvestre-Blanes, Víctor-M. Sempere-Payá
, Salvador Santonja-Climent:
Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks. 130 - Wei Li, Mengzhen Ren, Yazhi Liu, Chenyu Li, Hui Qian, Zhenyou Zhang:
Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks. 131 - Rohit Ahuja
, Sahil Chugh
, Raman Singh
:
SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain. 132 - Bowen Liu
, Qiang Tang
:
Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation. 133 - Yuning Jiang
, Wei Wang
, Jianguo Ding
, Xin Lu
, Yanguo Jing
:
Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber-Physical Production Systems. 134 - Stanly Wilson
, Kwabena Adu-Duodu
, Yinhao Li
, Ringo W. H. Sham, Mohammed Almubarak
, Yingli Wang
, Ellis Solaiman
, Charith Perera
, Rajiv Ranjan
, Omer F. Rana
:
Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains. 135 - Yazhi Liu, Pengfei Zhong, Zhigang Yang, Wei Li, Siwei Li:
Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing. 136 - Vyron Kampourakis
, Georgios Michail Makrakis
, Constantinos Kolias
:
From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks. 137 - Laura Lemmi
, Carlo Puliafito, Antonio Virdis
, Enzo Mingozzi
:
SRv6-Based Edge Service Continuity in 5G Mobile Networks. 138 - Md. Motiur Rahman
, Deepti Gupta
, Smriti Bhatt
, Shiva Shokouhmand
, Miad Faezipour
:
A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions. 139 - Yuze Liu
, Weihong Wu, Ying Wang, Jiang Liu, Fan Yang:
SUDC: Synchronous Update with the Division and Combination of SRv6 Policy. 140 - Zuopeng Li, Hengshuai Ju
, Zepeng Ren:
Correction: Li et al. A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation. Future Internet 2023, 15, 395. 141 - Hsin-Tung Lin, Chih-Yu Wen
:
Edge Federated Optimization for Heterogeneous Data. 142 - Bing Zhang, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu, Huan Wang
:
Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN. 143
Volume 16, Number 5, May 2024
- Albert Weichselbraun
, Norman Süsstrunk
, Roger Waldvogel
, André Glatzl
, Adrian M. P. Brasoveanu
, Arno Scharl
:
Anticipating Job Market Demands - A Deep Learning Approach to Determining the Future Readiness of Professional Skills. 144 - Zacharias Kamarianakis
, Spyros Perdikakis, Ioannis N. Daliakopoulos
, Dimitrios M. Papadimitriou, Spyros Panagiotakis
:
Design and Implementation of a Low-Cost, Linear Robotic Camera System, Targeting Greenhouse Plant Growth Monitoring. 145 - Maria Andrea Romo-Chavero
, Jose Antonio Cantoral-Ceballos
, Jesús Arturo Pérez Díaz
, Carlos Martinez-Cagnazzo
:
Median Absolute Deviation for BGP Anomaly Detection. 146 - Bruno Fanini
, Giorgio Gosti
:
A New Generation of Collaborative Immersive Analytics on the Web: Open-Source Services to Capture, Process and Inspect Users' Sessions in 3D Environments. 147 - Yazan Aref, Abdelkader Ouda
:
HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security. 148 - Andrea Calvagna
, Giovanni Marotta
, Giuseppe Pappalardo
, Emiliano Tramontana
:
A Blockchain-Based Real-Time Power Balancing Service for Trustless Renewable Energy Grids. 149 - Jingzhe Zhang, Tiange Chen, Wenjie Gong
, Jiayue Liu, Jiangjie Chen
:
Exploring Data Input Problems in Mixed Reality Environments: Proposal and Evaluation of Natural Interaction Techniques. 150 - Aye Nyein Aung
, Che-Wei Liao, Jeih-Weih Hung
:
Effective Monoaural Speech Separation through Convolutional Top-Down Multi-View Network. 151 - Mansoor Jamal, Zaib Ullah
, Muddasar Naeem
, Musarat Abbas, Antonio Coronato
:
A Hybrid Multi-Agent Reinforcement Learning Approach for Spectrum Sharing in Vehicular Networks. 152 - Daniel Nuñez-Agurto
, Walter Fuertes
, Luis Marrone
, Eduardo Benavides-Astudillo
, Christian Coronel-Guerrero
, Franklin Perez
:
A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking. 153 - John David Sprunger, Alvin S. Lim, David M. Bevly:
A Method for the Rapid Propagation of Emergency Event Notifications in a Long Vehicle Convoy. 154 - Matthew Boeding
, Michael Hempel
, Hamid Sharif
:
Novel Approach towards a Fully Deep Learning-Based IoT Receiver Architecture: From Estimation to Decoding. 155 - Cyril Naves Samuel
, François Verdier
, Severine Glock, Patricia Guitton-Ouhamou:
A Fair Crowd-Sourced Automotive Data Monetization Approach Using Substrate Hybrid Consensus Blockchain. 156 - Tuan-Kiet Dang
, Khai-Duy Nguyen
, Binh Kieu-Do-Nguyen
, Trong-Thuc Hoang
, Cong-Kha Pham
:
Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications. 157 - Lassaad Zaway, Nader Ben Amor, Jalel Ktari
, Mohamed Jallouli, Larbi Chrifi-Alaoui
, Laurent Delahoche:
Optimization of Wheelchair Control via Multi-Modal Integration: Combining Webcam and EEG. 158 - Ibrahim Althamary
, Rubbens Boisguene
, Chih-Wei Huang
:
Enhanced Multi-Task Traffic Forecasting in Beyond 5G Networks: Leveraging Transformer Technology and Multi-Source Data Fusion. 159 - Sarah Kaleem
, Muhammad Asim
, Mohammed Ahmed El-Affendi
, Muhammad Babar
:
Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework. 160 - Jieli Chen, Kah Phooi Seng, Li-Minn Ang, Jeremy Smith, Hanyue Xu
:
AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses. 161 - Caixiang Fan
, Hamzeh Khazaei
, Petr Musilek
:
BPET: A Unified Blockchain-Based Framework for Peer-to-Peer Energy Trading. 162 - Zhe Ma, Xuhesheng Chen
, Tiejiang Sun, Xukang Wang
, Ying-Cheng Wu
, Mengjie Zhou:
Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization. 163 - Yu Zhang, Xiaowei Peng, Hequn Xian:
pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework. 164 - Yuzhu Zhang, Hao Xu:
Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning. 165 - Sonali Patwe
, Sunil B. Mane:
Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments. 166 - Anjia Ye
, Ananda Maiti
, Matthew W. Schmidt
, Scott J. Pedersen
:
A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis. 167 - Muhammad Imran, Annalisa Appice
, Donato Malerba
:
Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection. 168 - Franco Frattolillo
:
Blockchain and Smart Contracts for Digital Copyright Protection. 169 - Alireza Fath
, Nicholas Hanna, Yi Liu, Scott Tanch, Tian Xia, Dryver Huston:
Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface. 170 - Na Liu
, Wei-Tek Tsai:
SmartDED: A Blockchain- and Smart Contract-Based Digital Electronic Detonator Safety Supervision System. 171 - Ioannis G. Tsoulos
, Alexandros T. Tzallas
, Evangelos Karvounis
:
Using Optimization Techniques in Grammatical Evolution. 172 - Roilhi Frajo Ibarra-Hernández
, Francisco Rubén Castillo Soria
, Carlos A. Gutiérrez
, Abel García-Barrientos
, Luis Alberto Vasquez-Toledo
, Jose Alberto Del Puerto-Flores
:
Machine Learning Strategies for Reconfigurable Intelligent Surface-Assisted Communication Systems - A Review. 173 - Thi-Hao Nguyen, Van-Hung Le
, Huu-Son Do, Trung-Hieu Te, Van-Nam Phan:
TQU-SLAM Benchmark Dataset for Comparative Study to Build Visual Odometry Based on Extracted Features from Feature Descriptors and Deep Learning. 174 - Isabel Auer, Stephan Schlögl
, Gundula Glowka
:
Chatbots in Airport Customer Service - Exploring Use Cases and Technology Acceptance. 175 - Faisal Fiaz
, Syed Muhammad Sajjad, Zafar Iqbal
, Muhammad Yousaf, Zia Muhammad
:
MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. 176 - Sakhi Aggrawal
, Alejandra J. Magana
:
Teamwork Conflict Management Training and Conflict Resolution Practice via Large Language Models. 177 - Young Sook Kim, Seng-Phil Hong
, Marko Majer:
Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform. 178
Volume 16, Number 6, June 2024
- Jorge Lopes, Luis Paulo Mota, Samuel Marques Mota, José Manuel Torres
, Rui S. Moreira
, Christophe Soares
, Ivo Pereira
, Feliz Ribeiro Gouveia
, Pedro Miguel Sobral:
Object and Event Detection Pipeline for Rink Hockey Games. 179 - Nuno Marques, Rodrigo Rocha Silva
, Jorge Bernardino
:
Using ChatGPT in Software Requirements Engineering: A Comprehensive Review. 180 - Yuchen Wang, Zishan Huang, Zhongcheng Wei
, Jijun Zhao:
MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing. 181 - Liyuan Liang
, Like Gobeawan
, Siu-Kit Lau
, Ervine Shengwei Lin, Kai Keng Ang
:
Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature. 182 - Ayman Khalil
, Besma Zeddini
:
Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks. 183 - Fouzi Harrou
, Benamar Bouyeddou
, Abdelkader Dairi
, Ying Sun:
Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids. 184 - Xingyu Li, Ruifeng Li, Yanchen Liu:
HP-LSTM: Hawkes Process-LSTM-Based Detection of DDoS Attack for In-Vehicle Network. 185 - Josué I. Rojo-García
, Sergio A. Vera-Chavarría
, Yair Lozano-Hernández
, Victor G. Sánchez-Meza
, Jaime González-Sierra
, Luz N. Oliva-Moreno
:
Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor. 186 - Erik Ortiz Guerra
, Mario Martínez Morfa
, Carlos Manuel García Algora
, Hector Cruz-Enriquez
, Kris Steenhaut
, Samuel Montejo Sanchez
:
Enhanced Beacons Dynamic Transmission over TSCH. 187 - Davide Tosi
:
Studying the Quality of Source Code Generated by Different AI Generative Engines: An Empirical Evaluation. 188 - Dong Wang
, Hongji Yang
, Hua Zhou:
Dynamic Spatial-Temporal Self-Attention Network for Traffic Flow Prediction. 189 - Evgenia Paxinou, Georgios Feretzakis, Rozita Tsoni, Dimitrios Karapiperis, Dimitrios Kalles, Vassilios S. Verykios:
Tracing Student Activity Patterns in E-Learning Environments: Insights into Academic Performance. 190 - Mohammad Imran Ali
, Shahi Dost
, Khurram S. Khattak
, Muhammad Imran Khan
, Riaz Muhammad
:
Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring. 191 - Jindong Yang, Xiran Zhang, Wenhao Chen, Fei Rong:
Prophet-CEEMDAN-ARBiLSTM-Based Model for Short-Term Load Forecasting. 192 - Muthana Al-Amidie
, Laith Alzubaidi
, Muhammad Aminul Islam, Derek T. Anderson:
Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values. 193 - Rui Zhao
, Jutao Hao, Huan Huo:
Research on Multi-Modal Pedestrian Detection and Tracking Algorithm Based on Deep Learning. 194 - Cristian Volosciuc, Razvan Bogdan
, Bianca-Lucia Blajovan, Cristina Stangaciu
, Marius Marcu
:
GreenLab, an IoT-Based Small-Scale Smart Greenhouse. 195 - Tahani Baabdullah, Amani Alzahrani
, Danda B. Rawat
, Chunmei Liu:
Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems. 196 - Carol Maher
, Kylie A. Dankiw
, Ben Singh
, Svetlana Bogomolova
, Rachel G. Curtis
:
In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System. 197 - Zisis Vasilakopoulos, Theocharis Tavantzis
, Rafail Promikyridis
, Efthimios Tambouris
:
The Use of Artificial Intelligence in eParticipation: Mapping Current Research. 198 - Carmen Ruiz Viñals, Marta Gil Ibáñez, José Luis Del Olmo Arriaga:
Metaverse and Fashion: An Analysis of Consumer Online Interest. 199 - Abbas Javed
, Amna Ehtsham, Muhammad Jawad
, Muhammad Naeem Awais, Ayyaz-Ul-Haq Qureshi, Hadi Larijani
:
Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes. 200 - Gabriel Arquelau Pimenta Rodrigues
, André Luiz Marques Serrano
, Guilherme Fay Vergara
, Robson de Oliveira Albuquerque
, Georges Daniel Amvame Nze
:
Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies. 201 - Fernando Loor, Veronica Gil-Costa, Mauricio Marín:
Metric Space Indices for Dynamic Optimization in a Peer to Peer-Based Image Classification Crowdsourcing Platform. 202 - Héctor Orrillo
, André Sabino
, Mário Marques da Silva
:
Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models. 203 - Majed A. Alshamari, Maha M. Althobaiti
:
Usability Evaluation of Wearable Smartwatches Using Customized Heuristics and System Usability Scale Score. 204 - Wuzheng Tan
, Shenglong Du
, Jian Weng:
Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks. 205 - Wala Bagunaid
, Naveen K. Chilamkurti
, Ahmad Salehi Shahraki, Saeed Bamashmos:
Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction. 206 - Rendrikson Soares
, André Araújo
:
Towards a New Business Model for Streaming Platforms Using Blockchain Technology. 207 - Luca Cotti
, Davide Guizzardi
, Barbara Rita Barricelli
, Daniela Fogli
:
Enabling End-User Development in Smart Homes: A Machine Learning-Powered Digital Twin for Energy Efficient Management. 208 - Jiayi Zhang
, Abdelkader Ouda
, Raafat Aburukba
:
Authentication and Key Agreement Protocol in Hybrid Edge-Fog-Cloud Computing Enhanced by 5G Networks. 209 - Xu Wang, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction. 210 - Jingshi Qian, Jiahe Li, Nobuyoshi Komuro
, Won-Suk Kim
, Younghwan Yoo
:
Improved Particle Filter in Machine Learning-Based BLE Fingerprinting Method to Reduce Indoor Location Estimation Errors. 211 - Umang Garg
, Santosh Kumar
, Aniket Mahanti:
IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. 212 - Cheng Fang
, Feifei Liang
, Tianchi Li
, Fangheng Guan
:
Learning Modality Consistency and Difference Information with Multitask Learning for Multimodal Sentiment Analysis. 213 - Pedro Nunes
, Eugénio Rocha
, José P. Santos
:
Adaptive Framework for Maintenance Scheduling Based on Dynamic Preventive Intervals and Remaining Useful Life Estimation. 214 - Vitor Hugo dos Santos Filho
, Luis Mauricio Martins de Resende
, Joseane Pontes:
Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0). 215 - Ashot N. Harutyunyan
, Arnak V. Poghosyan
, Tigran Bunarjyan
, Andranik Haroyan, Marine Harutyunyan, Lilit Harutyunyan, Nelson Baloian
:
Discovery of Cloud Applications from Logs. 216 - Shaolong Chen
, Yunzi Dai, Liwei Liu, Xinting Yu:
Optimizing Data Parallelism for FM-Based Short-Read Alignment on the Heterogeneous Non-Uniform Memory Access Architectures. 217 - Joel Weijia Lai
:
Adapting Self-Regulated Learning in an Age of Generative Artificial Intelligence Chatbots. 218
Volume 16, Number 7, July 2024
- Ketmanto Wangsa
, Shakir Karim
, Ergun Gide
, Mahmoud Elkhodr
:
A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok. 219 - Mirwais Ahmadzai
, Giang T. Nguyen
:
Differential Private Federated Learning in Geographically Distributed Public Administration Processes. 220 - Loukas Triantafyllopoulos
, Evgenia Paxinou
, Georgios Feretzakis
, Dimitris Kalles
, Vassilios S. Verykios
:
Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis. 221 - Adedamola Adesokan
, Aisha B. Rahman
, Eirini-Eleni Tsiropoulou
:
INFLUTRUST: Trust-Based Influencer Marketing Campaigns in Online Social Networks. 222 - Aris Cahyadi Risdianto
, Muhammad Usman
, Muhammad Ahmad Rathore:
Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility. 223 - Bhavani Malisetty, Alfredo J. Perez
:
Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation. 224 - Gabriela Walczyk
, Andrzej Ozadowicz
:
Building Information Modeling and Digital Twins for Functional and Technical Design of Smart Buildings with Distributed IoT Networks - Review and New Challenges Discussion. 225 - José Cunha
, Pedro Ferreira, Eva M. Castro, Paula Cristina Oliveira, Maria João Nicolau
, Iván Núñez, Xosé Ramón Sousa, Carlos Serôdio
:
Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies. 226 - Qiang Duan
, Zhihui Lu
:
Edge Cloud Computing and Federated-Split Learning in Internet of Things. 227 - Pietro Ruiu
, Salvatore Saiu
, Enrico Grosso
:
Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics. 228 - Lucas Henriques
, Felipe Prata Lima
, Cecilia Castro
:
Combining Advanced Feature-Selection Methods to Uncover Atypical Energy-Consumption Patterns. 229 - Ehsan Ahmad
, Brian R. Larson, Abdulbasid Banga:
Trusted Composition of Internet of Medical Things over Imperfect Networks. 230 - Dionysios Stamatopoulos
, Menelaos Katsantonis
, Panagiotis E. Fouliras
, Ioannis Mavridis
:
Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. 231 - Luisanna Cocco
, Roberto Tonelli:
Digital Transformation in the Construction Sector: Blockchain, BIM and SSI for a More Sustainable and Transparent System. 232 - Marcus Pieskä
, Andreas Kassler
, Anna Brunström
, Veselin Rakocevic
, Markus Amend:
Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling. 233 - Mian Qian
, Cheng Qian
, Guobin Xu, Pu Tian, Wei Yu:
Smart Irrigation Systems from Cyber-Physical Perspective: State of Art and Future Directions. 234 - Enbo Sun, Jiaxuan Han, Yiquan Li, Cheng Huang:
A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model. 235 - Stefano Mottura:
Does Anyone Care about the Opinion of People on Participating in a "Social" Metaverse? A Review and a Draft Proposal for a Surveying Tool. 236 - Simon Daniel Duque Antón
:
Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios. 237 - Badr Ben Elallid, Nabil Benamar
, Miloud Bagaa, Yassine Hadjadj Aoul
:
Enhancing Autonomous Driving Navigation Using Soft Actor-Critic. 238 - Ragini Gupta
, Beitong Tian
, Yaohui Wang, Klara Nahrstedt
:
TWIN-ADAPT: Continuous Learning for Digital Twin-Enabled Online Anomaly Classification in IoT-Driven Smart Labs. 239 - Darya Y. Ostrikova
, Elizaveta Golos
, Vitalii Beschastnyi
, Egor Machnev
, Yuliya Gaidamaka
, Konstantin E. Samouylov
:
Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities. 240 - Ilias Siachos
, Nikos I. Karacapilidis
:
Explainable Artificial Intelligence Methods to Enhance Transparency and Trust in Digital Deliberation Settings. 241 - Samir A. Younis, Dalia Sobhy, Noha S. Tawfik:
Evaluating Convolutional Neural Networks and Vision Transformers for Baby Cry Sound Analysis. 242 - Imen Ahmed
, Mariem Turki
, Mouna Baklouti
, Bouthaina Dammak, Amnah Alshahrani
:
Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System. 243 - Natalia Dashkevich, Steve Counsell, Giuseppe Destefanis
:
Blockchain Financial Statements: Innovating Financial Reporting, Accounting, and Liquidity Management. 244 - Wen Qiu
, Xun Shao
, Hiroshi Masui, William Liu:
Optimizing Drone Energy Use for Emergency Communications in Disasters via Deep Reinforcement Learning. 245 - Sara Lazzaro
, Francesco Buccafurri
:
Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System. 246 - Lorenzo Vaiani
, Luca Cagliero
, Paolo Garza
:
Emotion Recognition from Videos Using Multimodal Large Language Models. 247 - Nerijus Satkauskas, Algimantas Venckauskas
:
Multi-Agent Dynamic Fog Service Placement Approach. 248 - Álvaro Antón-Sancho
, Pablo Fernández-Arias
, Edwan Anderson Ariza-Echeverri
, Diego Vergara
:
The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI). 249 - Amr Adel
, Tony Jan
:
Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges. 250 - Shaopei Gao, Qiang Liu
, Junjie Zeng, Li Li:
SD-GPSR: A Software-Defined Greedy Perimeter Stateless Routing Method Based on Geographic Location Information. 251 - Oleksandr Kuznetsov
, Emanuele Frontoni
, Kateryna Kuznetsova, Ruslan Shevchuk
, Mikolaj P. Karpinski
:
NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization. 252 - Prabu Kaliyaperumal
, Sudhakar Periyasamy, Manikandan Thirumalaisamy
, Balamurugan Balusamy, Francesco Benedetto
:
A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT. 253 - Rui Yu
, Sooyeon Lee
, Jingyi Xie
, Syed Masum Billah
, John M. Carroll
:
Human-AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era. 254 - Bo Cui
, Yachao Chai, Zhen Yang, Keqin Li
:
Intrusion Detection in IoT Using Deep Residual Networks with Attention Mechanisms. 255 - Mohamed Azarudheen Mohamed Mohideen
, Muhammad Shahroz Nadeem, James Hardy, Haider Ali, Umair Ullah Tariq, Fariza Sabrina
, Muhammad Waqar
, Salman Ahmed
:
Behind the Code: Identifying Zero-Day Exploits in WordPress. 256 - Mira M. Zarie, Abdelhamied A. Ateya
, Mohammed Sharaf Sayed
, Mohammed Ahmed El-Affendi, Mohammad M. Abdellatif
:
Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles. 257
Volume 16, Number 8, August 2024
- Albatool Alhawas
, Abdelfettah Belghith
:
Software-Defined Named Data Networking in Literature: A Review. 258 - Naonobu Okazaki, Shotaro Usuzaki
, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba, Kentaro Aburada:
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. 259 - Chaelim Park, Hayoung Lee, OkRan Jeong:
Leveraging Medical Knowledge Graphs and Large Language Models for Enhanced Mental Disorder Information Extraction. 260 - Mohsin Khan
, Håvard D. Johansen
, Dag Johansen
:
Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor. 261 - Amna Shabbir, Muhammad Faizan Shirazi
, Safdar Rizvi
, Sadique Ahmad
, Abdelhamied A. Ateya
:
Energy Efficiency and Load Optimization in Heterogeneous Networks through Dynamic Sleep Strategies: A Constraint-Based Optimization Approach. 262 - Alessio Luschi
, Giovanni Luca Daino, Gianpaolo Ghisalberti, Vincenzo Mezzatesta, Ernesto Iadanza
:
Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation. 263 - Khoa Dinh Nguyen Dang
, Peppino Fazio
, Miroslav Voznák
:
A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network. 264 - Deol Satish, Jonathan Kua
, Shiva Raj Pokhrel
:
Active Queue Management in L4S with Asynchronous Advantage Actor-Critic: A FreeBSD Networking Stack Perspective. 265 - Chuanzhe Gao, Shidang Li, Yixuan Wu, Siyi Duan, Mingsheng Wei, Bencheng Yu:
Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems. 266 - Yao Du
, Zehua Wang
, Cyril Leung
, Victor C. M. Leung
:
Towards Collaborative Edge Intelligence: Blockchain-Based Data Valuation and Scheduling for Improved Quality of Service. 267 - Salvatore Flavio Pileggi
:
Ontology in Hybrid Intelligence: A Concise Literature Review. 268 - Danish Hamid, Muhammad Ehatisham-ul-Haq, Amanullah Yasin
, Fiza Murtaza, Muhammad Awais Azam
:
Enhancing Recognition of Human-Object Interaction from Visual Data Using Egocentric Wearable Camera. 269 - Yang Li
, Shichao Yan, Fangtao Zhao, Yi Jiang, Shuai Chen, Lei Wang, Li Ma:
MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations. 270 - Noah Oghenefego Ogwara, Krassie Petrova
, Mee Loong Bobby Yang, Stephen G. MacDonell:
A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments. 271 - Santosh A. Janawade
, Prabu Krishnan
, Krishnamoorthy Kandasamy, Shashank S. Holla, Karthik Rao, Aditya Chandrasekar:
A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication. 272 - Aicha Aiche
, Pierre-Martin Tardif
, Mohammed Erritali:
Modeling Trust in IoT Systems for Drinking-Water Management. 273 - Andrei Tara
, Hjalmar K. Turesson
, Nicolae Natea:
Dynamic Storage Optimization for Communication between AI Agents. 274 - Francesco Fiorini
, Michele Pagano
, Rosario Giuseppe Garroppo
, Antonio Osele:
Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator. 275 - Igor Kabashkin
, Leonid Shoshin
:
Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems. 276 - Vincent Abella, Johnfil Initan, Jake Mark Perez, Philip Virgil Astillo
, Luis Gerardo Cañete
, Gaurav Choudhary
:
Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation. 277 - Sean Tsikteris
, Aisha B. Rahman
, Md. Sadman Siraj
, Eirini-Eleni Tsiropoulou
:
TRUST-ME: Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing. 278 - Diego Alejandro Albarracin-Acero, Fidel Alfonso Romero-Toledo
, Claudia Esperanza Saavedra-Bautista
, Edwan Anderson Ariza-Echeverri
:
Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age. 279 - Minyechil Alehegn Tefera
, Amare Mulatie Dehnaw
, Yibeltal Chanie Manie, Cheng-Kai Yao
, Shegaw Demessie Bogale
, Peng-Chun Peng:
Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors. 280 - Martin Baumgartner
, Karl Kreiner
, Fabian Wiesmüller, Dieter Hayn
, Christian Puelacher, Günter Schreier:
Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text. 281 - Abdelaziz Bouzidi, Lala H. Rajaoarisoa
, Luka Claeys:
Explainable Artificial Intelligence Approach for Improving Head-Mounted Fault Display Systems. 282 - Antonio Francesco Gentile
, Davide Macrì
, Emilio Greco
, Peppino Fazio
:
Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment. 283 - Shu-Ming Tseng
, Yan-Qi Wang, Yung-Chung Wang:
Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset. 284 - Yunus Kareem
, Djamel Djenouri
, Essam Ghadafi
:
A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things. 285 - Jawaher Alghamdi, Yuqing Lin
, Suhuai Luo:
Cross-Domain Fake News Detection Using a Prompt-Based Approach. 286 - Tasin Islam
, Alina Dana Miron
, Xiaohui Liu
, Yongmin Li
:
Dynamic Fashion Video Synthesis from Static Imagery. 287 - Khaled Mahbub, Antonio Nehme, Mohammad Patwary, Marc Lacoste, Sylvain Allio:
FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation. 288 - Alexis Carrillo
, Moisés Betancort:
Testing Stimulus Equivalence in Transformer-Based Agents. 289 - Giorgio Piccardo, Lorenzo Conti, Alessio Martino
:
Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey. 290 - Matan Davidian, Michael Kiperberg, Natalia Vanetik
:
Early Ransomware Detection with Deep Learning Models. 291 - Janith Kavindu Dassanayake
, Minxiao Wang
, Muhammad Z. Hameed, Ning Yang
:
Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks. 292 - Lisi Liu
, Zijie Xu, Xiaobin Qu
:
Development of a Novel Open Control System Implementation Method under Industrial IoT. 293 - Wesam Fallatah
, Joakim Kävrestad
, Steven Furnell:
Establishing a Model for the User Acceptance of Cybersecurity Training. 294 - Mingxuan Xie
, Tao Zou
, Junchen Ye, Bowen Du
, Runhe Huang
:
Dynamic Graph Representation Learning for Passenger Behavior Prediction. 295 - Jinpeng Miao
, Dasari Rajasekhar
, Shivakant Mishra
, Sanjeet Kumar Nayak
, Ram Narayan Yadav
:
A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge. 296 - Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Recompression Scheme for VQ Index Tables. 297 - Eleftheria Papageorgiou, Christos Chronis
, Iraklis Varlamis
, Yassine Himeur
:
A Survey on the Use of Large Language Models (LLMs) in Fake News. 298 - Kieu Anh Nguyen
, Yi-Jia Jiang, Chiao-Shin Huang, Meng-Hsuan Kuo, Walter W. Chen
:
Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways. 299 - Daniel C. Lawo
, Rana Abu Bakar, Abraham Cano Aguilera, Filippo Cugini, José Luis Imaña
, Idelfonso Tafur Monroy
, Juan Jose Vegas Olmos:
Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel. 300 - Teodora Vasilas
, Claudiu Bacila, Remus Brad
:
Beat the Heat: Syscall Attack Detection via Thermal Side Channel. 301 - Peng Wang, Yonghua Xiong
:
A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT. 302
Volume 16, Number 9, September 2024
- Marco Grossi
, Fabrizio Alfonsi, Marco Prandini
, Alessandro Gabrielli
:
Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays. 303 - Fabian Nunes
, Patrício Domingues, Miguel Frade
:
The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications. 304 - Konstantinos Sakkas, Eirini Georgia Dimitriou, Niki Eleni Ntagka, Nikolaos Giannakeas, Konstantinos Kalafatakis, Alexandros T. Tzallas, Evripidis Glavas:
Personalized Visualization of the Gestures of Parkinson's Disease Patients with Virtual Reality. 305 - Gábor Arányi, Ágnes Vathy-Fogarassy
, Veronika Szücs
:
Evaluation of a New-Concept Secure File Server Solution. 306 - Parisa Mashreghi-Moghadam
, Tarek Ould-Bachir
, Yvon Savaria
:
PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA. 307 - Xian Gao, Peixiong He
, Yi Zhou, Xiao Qin
:
Artificial Intelligence Applications in Smart Healthcare: A Survey. 308 - Theodore Andronikos
, Alla Sirokofskich:
A Multiparty Quantum Private Equality Comparison Scheme Relying on |GHZ3⟩ States. 309 - Zhibo Qi, Lei Du, Ru Huo, Tao Huang
:
Predictive Maintenance Based on Identity Resolution and Transformers in IIoT. 310 - Farid Yessoufou
, Salma Sassi
, Elie Chicha
, Richard Chbeir
, Jules Degila
:
User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks. 311 - Jing Zou, Peizhe Xin, Chang Wang, Heli Zhang
, Lei Wei, Ying Wang:
AI Services-Oriented Dynamic Computing Resource Scheduling Algorithm Based on Distributed Data Parallelism in Edge Computing Network of Smart Grid. 312 - Mounib Khanafer
, Mouhcine Guennoun, Mohammed El-Abd, Hussein T. Mouftah:
Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks. 313 - Shezon Saleem Mohammed Abdul
, Anup Shrestha
, Jianming Yong:
CrossDeFi: A Novel Cross-Chain Communication Protocol. 314 - Muhammad Bin Saif, Sara Migliorini
, Fausto Spoto
:
A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements. 315 - Sérgio N. Silva
, Mateus A. S. S. Goldbarg
, Lucileide M. D. Da Silva
, Marcelo A. C. Fernandes
:
Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing. 316 - Gayathri Karthick
, Glenford Mapp
:
Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities. 317 - Aristidis G. Vrahatis
, Konstantinos Lazaros, Sotiris Kotsiantis
:
Graph Attention Networks: A Comprehensive Review of Methods and Applications. 318 - Guoxin Su
, Li Liu
:
Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification. 319 - Di Li
, Zhibang Yang, Siyang Yu, Mingxing Duan, Shenghong Yang:
A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology. 320 - Raed M. Bani-Hani
, Ahmed S. Shatnawi
, Lana Al-Yahya:
Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning. 321 - Lara Aslan, Michal Ptaszynski
, Jukka Jauhiainen:
Are Strong Baselines Enough? False News Detection with Machine Learning. 322 - Carolina Del-Valle-Soto
, Ramon A. Briseño, Ramiro Velázquez
, Gabriel Guerra-Rosales
, Santiago Perez-Ochoa, Isaac H. Preciado-Bazavilvazo, Paolo Visconti
, José Varela
:
Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement. 323 - Elias Dritsas
, Maria Trigka
:
Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey. 324 - Oana-Mihaela Ungureanu, Calin Vladeanu
, Robert E. Kooij
:
A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core. 325 - Lihui Li
, Hanwen Deng, Zhongyi Zhai, Sheng-Lung Peng
:
Privacy-Preserving Authentication Based on PUF for VANETs. 326 - Michele Ruta
, Floriano Scioscia
, Giuseppe Loseto
, Agnese Pinto
, Corrado Fasciano
, Giovanna Capurso
, Eugenio Di Sciascio
:
Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects. 327 - Haitham Y. Adarbah
, Mehmet Sabir Kiraz
, Süleyman Kardas
, Ali H. Al-Bayatti
, Hilal M. Y. Al-Bayatti:
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs. 328 - Alexandru Miron Rancea
, Ionut Anghel
, Tudor Cioara
:
Edge Computing in Healthcare: Innovations, Opportunities, and Challenges. 329 - Shyam Kumar Shrestha
, Shiva Raj Pokhrel
, Jonathan Kua
:
On the Fairness of Internet Congestion Control over WiFi with Deep Reinforcement Learning. 330 - Abdallah Moubayed
:
A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection. 331 - Wataru Takabatake
, Yohei Shibata
, Kenji Hoshino, Tomoaki Ohtsuki
:
Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications. 332 - Guiwen Jiang, Rongxi Huang, Zhiming Bao, Gaocai Wang
:
A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing. 333 - Roberto Vergallo
, Luca Mainetti
:
Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study. 334 - Italo Epicoco
, Marco Pulimeno
, Massimo Cafaro
:
Parallel and Distributed Frugal Tracking of a Quantile. 335 - Yudai Yamamoto, Aoi Fukushima, Shingo Yamaguchi
:
Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning. 336 - Waleed Shahjehan, Rajkumar Singh Rathore
, Syed Waqar Shah, Mohammad Aljaidi
, Ali Safaa Sadiq
, Omprakash Kaiwartya
:
A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems. 337 - Spiridoula V. Margariti
, Ioannis G. Tsoulos
, Evangelia Kiousi, Eleftherios Stergiou:
Traffic Classification in Software-Defined Networking Using Genetic Programming Tools. 338 - Kamal Shahid, Saleem Naseer Ahmad
, Syed Tahir Hussain Rizvi
:
Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems. 339 - Abdullah Khanfor
:
Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises. 340 - Lucas Silva, José Carlos Metrôlho, Fernando Reinaldo Ribeiro:
Efficient Data Exchange between WebAssembly Modules. 341 - Jesús Calle-Cancho
, Carlos Cañada, Rafael Pastor Vargas
, Mercedes Eugenia Paoletti
, Juan Mario Haut
:
Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation. 342 - Gianluca Reali
, Mauro Femminella
:
Artificial Intelligence to Reshape the Healthcare Ecosystem. 343 - Ondrej Kobza, David Herel
, Jan Cuhel, Tommaso Gargiani, Petr Marek, Jan Sedivý:
Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations. 344 - Jobish John
, Md. Noor-A-Rahim
, Aswathi Vijayan
, H. Vincent Poor
, Dirk Pesch
:
Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing. 345 - Abeer Almutairi
, Xavier Carpent
, Steven Furnell
:
Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things. 346 - Sanusi Mohammad Bunu
, Omar Younis Alani
, Mohammad Saraee
:
An Improved Routing Protocol for Optimum Quality of Service in Device-to-Device and Energy Efficiency in 5G/B5G. 347

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.