


default search action
Future Internet, Volume 16
Volume 16, Number 1, 2024
- Filippo Dolente, Rosario Giuseppe Garroppo
, Michele Pagano
:
A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions. 1 - Yashar Kor
, Liang Tan, Petr Musilek
, Marek Z. Reformat
:
Integrating Knowledge Graphs into Distribution Grid Decision Support Systems. 2 - Anestis Kousis
, Christos Tjortjis
:
Investigating the Key Aspects of a Smart City through Topic Modeling and Thematic Analysis. 3 - Goran Bubas
, Antonela Cizmesija
, Andreja Kovacic:
Development of an Assessment Scale for Measurement of Usability and User Experience Characteristics of Bing Chat Conversational AI. 4 - Ryunosuke Masaoka, Gia Khanh Tran
, Jin Nakazato
, Kei Sakaguchi
:
The Future of Flying Base Stations: Empirical and Numerical Investigations of mmWave-Enabled UAVs. 5 - Jing Liu
, Xuesong Hai, Keqin Li
:
TDLearning: Trusted Distributed Collaborative Learning Based on Blockchain Smart Contracts. 6 - Yadi Zhao, Lei Yan, Jian Wu, Ximing Song:
Design and Implementation of a Digital Twin System for Log Rotary Cutting Optimization. 7 - Patrick Toman, Nalini Ravishanker, Nathan Lally, Sanguthevar Rajasekaran:
Latent Autoregressive Student-t Prior Process Models to Assess Impact of Interventions in Time Series. 8 - Nasour Bagheri
, Ygal Bendavid, Masoumeh Safkhani
, Samad Rostampour:
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol. 9 - Emanuele Santonicola
, Ennio Andrea Adinolfi
, Simone Coppola, Francesco Pascale
:
Automotive Cybersecurity Application Based on CARDIAN. 10 - Qiang Liu, Rui Han, Yang Li:
Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism. 11 - Xiu Li
, Aron Henriksson, Martin Duneld, Jalal Nouri, Yongchao Wu
:
Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation. 12 - Herve Mbikayi Kabamba
, Matthew Khouzam, Michel R. Dagenais:
Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures. 13 - Omar Serghini
, Hayat Semlali
, Asmaa Maali
, Abdelilah Ghammaz
, Salvatore Serrano
:
1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing. 14 - Fouad Achkouty
, Richard Chbeir
, Laurent Gallon
, Elio Mansour
, Antonio Corral
:
Resource Indexing and Querying in Large Connected Environments. 15 - Javid Misirli
, Emiliano Casalicchio
:
An Analysis of Methods and Metrics for Task Scheduling in Fog Computing. 16 - Mizuki Asano
, Takumi Miyoshi
, Taku Yamazaki
:
Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments. 17 - Irina A. Kochetkova
, Kseniia Leonteva
, Ibram Ghebrial
, Anastasia S. Vlaskina
, Sofia Burtseva
, Anna Kushchazli
, Konstantin E. Samouylov
:
Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing. 18 - Chen Zhang
, Celimuge Wu
, Min Lin, Yangfei Lin, William Liu:
Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing. 19 - Lidong Liu, Shidang Li, Mingsheng Wei, Jinsong Xu, Bencheng Yu:
Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT. 20 - G. G. Md. Nawaz Ali
, Mohammad Nazmus Sadat
, Md. Suruz Miah
, Sameer Ahmed Sharief
, Yun Wang
:
A Comprehensive Study and Analysis of the Third Generation Partnership Project's 5G New Radio for Vehicle-to-Everything Communication. 21 - Mahmoud Elkhodr
, Samiya Khan
, Ergun Gide
:
A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness. 22 - Alex Galis:
Future Sustainable Internet Energy-Defined Networking. 23 - Sana Rasheed, Soulla Louca:
Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security. 24 - Chinyang Henry Tseng
, Woei-Jiunn Tsaur
, Yueh-Mao Shen:
Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection. 25 - Andrea Moreno-Cabanillas
, Elizabet Castillero-Ostio
, Antonio Castillo-Esparcia
:
Digital Communication and Social Organizations: An Evaluation of the Communication Strategies of the Most-Valued NGOs Worldwide. 26 - Xu Feng, Mengyang He, Lei Zhuang, Yanrui Song, Rumeng Peng:
Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space-Air-Ground Integrated Network. 27 - Kyle DeMedeiros
, Chan Young Koh
, Abdeltawab M. Hendawi
:
Clustering on the Chicago Array of Things: Spotting Anomalies in the Internet of Things Records. 28 - Valeriy Ivanov
, Maxim Tereshonok
:
Cross-Layer Methods for Ad Hoc Networks - Review and Classification. 29 - Jiantao Qu
, Chunyu Qi, He Meng
:
An Imbalanced Sequence Feature Extraction Approach for the Detection of LTE-R Cells with Degraded Communication Performance. 30 - Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey
, Kuo-Chu Chang:
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence. 31 - Hassan Khazane, Mohammed Ridouani
, Fatima Salahdine
, Naima Kaabouch:
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks. 32 - Spyridon Daousis, Nikolaos Peladarinos
, Vasileios Cheimaras
, Panagiotis Papageorgas
, Dimitrios D. Piromalis
, Radu Adrian Munteanu:
Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures. 33 - Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering. 34 - Muhammad Sher Ramzan
, Anees Asghar, Ata Ullah
, Fawaz Alsolami
, Iftikhar Ahmad
:
A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things. 35
Volume 16, Number 2, February 2024
- Viktor Masalskyi, Dominykas Ciciurenas, Andrius Dzedzickis
, Urte Prentice
, Gediminas Braziulis, Vytautas Bucinskas
:
Synchronization of Separate Sensors' Data Transferred through a Local Wi-Fi Network: A Use Case of Human-Gait Monitoring. 36 - Shiva Raj Pokhrel
, Jonathan Kua
, Deol Satish, Sebnem Ozer, Jeff Howe, Anwar Walid:
DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control. 37 - Min Ma, Shanrong Liu, Shufei Wang, Shengnan Shi
:
Refined Semi-Supervised Modulation Classification: Integrating Consistency Regularization and Pseudo-Labeling Techniques. 38 - Ricardo Lopes
, Marcello Trovati
, Ella Pereira
:
Volumetric Techniques for Product Routing and Loading Optimisation in Industry 4.0: A Review. 39 - Md. Mahmud Hossain, Golam Kayas, Ragib Hasan
, Anthony Skjellum, Shahid Al Noor, S. M. Riazul Islam
:
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. 40 - Melania Nitu
, Mihai Dascalu
:
Beyond Lexical Boundaries: LLM-Generated Text Detection for Romanian Digital Libraries. 41 - Aristeidis Karras
, Anastasios Giannaros
, Christos N. Karras
, Leonidas Theodorakopoulos
, Constantinos S. Mammassis
, George A. Krimpas
, Spyros Sioutas
:
TinyML Algorithms for Big Data Management in Large-Scale IoT Systems. 42 - Sergio Jesus Gonzalez Ambriz
, Rolando Menchaca-Méndez
, Sergio Alejandro Pinacho-Castellanos
, Mario Eduardo Rivero-Angeles
:
A Spectral Gap-Based Topology Control Algorithm for Wireless Backhaul Networks. 43 - Arturs Kempelis, Inese Polaka
, Andrejs Romanovs
, Antons Patlins
:
Computer Vision and Machine Learning-Based Predictive Analysis for Urban Agricultural Systems. 44 - Marcin Aftowicz
, Ievgen Kabin
, Zoya Dyka
, Peter Langendörfer
:
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning. 45 - Erica Corda
, Silvia M. Massa
, Daniele Riboni
:
Context-Aware Behavioral Tips to Improve Sleep Quality via Machine Learning and Large Language Models. 46 - Andreas F. Gkontzis
, Sotiris Kotsiantis
, Georgios Feretzakis
, Vassilios S. Verykios
:
Enhancing Urban Resilience: Smart City Data Analyses, Forecasts, and Digital Twin Techniques at the Neighborhood Level. 47 - Azizah Assiri, Hassen Sallay
:
Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks. 48 - Hamid Saadatfar
, Hamid Gholampour Ahangar
, Javad Hassannataj Joloudari
:
A New Dynamic Game-Based Pricing Model for Cloud Environment. 49 - Pradeep Kumar
, Guo-Liang Shih
, Bo-Lin Guo, Siva Kumar Nagi, Yibeltal Chanie Manie
, Cheng-Kai Yao
, Michael Augustine Arockiyadoss, Peng-Chun Peng
:
Enhancing Smart City Safety and Utilizing AI Expert Systems for Violence Detection. 50 - Ming-Yen Lin
, Ping-Chun Wu, Sue-Chen Hsueh:
Optimizing Session-Aware Recommenders: A Deep Dive into GRU-Based Latent Interaction Integration. 51 - Adwitiya Mukhopadhyay
, Aryadevi Remanidevi Devidas, P. Venkat Rangan, Maneesha Vinodini Ramesh:
A QoS-Aware IoT Edge Network for Mobile Telemedicine Enabling In-Transit Monitoring of Emergency Patients. 52 - Massimo Cafaro
, Italo Epicoco
, Marco Pulimeno
:
State-of-the-Art Future Internet Technology in Italy 2022-2023. 53 - Martin Kenyeres
, Ivana Budinská, Ladislav Hluchý, Agostino Poggi
:
Modern Trends in Multi-Agent Systems. 54 - Meng Li, Jiqiang Liu
, Yeping Yang:
Automated Identification of Sensitive Financial Data Based on the Topic Analysis. 55 - Ayman Khalil
, Besma Zeddini
:
A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability. 56 - Mohammed Bellaj, Najib Naja, Abdellah Jamali:
Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs. 57 - Adedamola Adesokan
, Rowan Kinney, Eirini-Eleni Tsiropoulou
:
CROWDMATCH: Optimizing Crowdsourcing Matching through the Integration of Matching Theory and Coalition Games. 58 - Tianjie Fu
, Peiyu Li, Chenke Shi, Youzhu Liu:
Digital-Twin-Based Monitoring System for Slab Production Process. 59 - Qian Qu, Mohsen Hatami
, Ronghua Xu
, Deeraj Nagothu
, Yu Chen
, Xiaohua Li, Erik Blasch
, Erika Ardiles-Cruz, Genshe Chen
:
The Microverse: A Task-Oriented Edge-Scale Metaverse. 60 - Dennis Papenfuß, Bennet Gerlach
, Stefan Fischer
, Mohamed Ahmed Hail
:
Enhancing Energy Efficiency in IoT-NDN via Parameter Optimization. 61 - Salvatore Calcagno, Andrea Calvagna
, Emiliano Tramontana
, Gabriella Verga
:
Merging Ontologies and Data from Electronic Health Records. 62 - Haohan Shi
, Xiyu Shi
, Safak Dogan
:
Speech Inpainting Based on Multi-Layer Long Short-Term Memory Networks. 63 - Ryo Matsuoka
, Koichi Kobayashi
, Yuh Yamashita
:
Online Optimization of Pickup and Delivery Problem Considering Feasibility. 64 - Paolo Bellavista
, Giuseppe Di Modica
:
IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings. 65 - Muhammad Nafees Ulfat Khan
, Weiping Cao, Zhi-Ling Tang
, Ata Ullah, Wanghua Pan:
Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT. 66
Volume 16, Number 3, March 2024
- Paul Scalise
, Matthew Boeding
, Michael Hempel
, Hamid Sharif
, Joseph Delloiacovo, John Reed:
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas. 67 - Juliana Basulo-Ribeiro
, Leonor Teixeira
:
The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis. 68 - Davy Preuveneers
, Wouter Joosen
:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. 69 - Mikael Sabuhi
, Petr Musilek
, Cor-Paul Bezemer
:
Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning. 70 - Emma Fitzgerald
, Michal Pióro:
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO. 71 - Adel Belkhiri
, Michel R. Dagenais
:
Analyzing GPU Performance in Virtualized Environments: A Case Study. 72 - Konstantinos Psychogyios
, Andreas E. Papadakis
, Stavroula Bourou
, Nikolaos P. Nikolaou, Apostolos Maniatis, Theodore B. Zahariadis
:
Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data. 73 - Reeva Lederman, Esther Brainin
, Ofir Ben-Assuli
:
The Electronic Medical Record - A New Look at the Challenges and Opportunities. 74 - Feng Zhou
, Shijing Hu, Xin Du, Xiaoli Wan, Jie Wu:
A Lightweight Neural Network Model for Disease Risk Prediction in Edge Intelligent Computing Architecture. 75 - Andry Alamsyah
, Gede Natha Wijaya Kusuma, Dian Puteri Ramadhani:
A Review on Decentralized Finance Ecosystems. 76 - Dimah Almani
, Tim Muller
, Xavier Carpent
, Takahito Yoshizawa
, Steven Furnell
:
Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments. 77 - Mohammad Javad Salariseddigh
, Ons Dabbabi, Christian Deppe
, Holger Boche
:
Deterministic K-Identification for Future Communication Networks: The Binary Symmetric Channel Results. 78 - Mattia Pellegrino
, Gianfranco Lombardo
, George Adosoglou, Stefano Cagnoni
, Panos M. Pardalos, Agostino Poggi
:
A Multi-Head LSTM Architecture for Bankruptcy Prediction with Time Series Accounting Data. 79 - Haedam Kim
, Suhyun Park
, Hyemin Hong, Jieun Park
, Seongmin Kim
:
A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection. 80 - Yushan Li
, Satoshi Fujita
:
A Synergistic Elixir-EDA-MQTT Framework for Advanced Smart Transportation Systems. 81 - Hanyue Xu
, Kah Phooi Seng, Jeremy Smith, Li-Minn Ang:
Multi-Level Split Federated Learning for Large-Scale AIoT System Based on Smart Cities. 82 - Gulshan Saleem
, Usama Ijaz Bajwa, Rana Hammad Raza
, Fan Zhang:
Edge-Enhanced TempoFuseNet: A Two-Stream Framework for Intelligent Multiclass Video Anomaly Recognition in 5G and IoT Environments. 83 - Håkon Harnes
, Donn Morrison
:
SoK: Analysis Techniques for WebAssembly. 84 - Hadeel Alrubayyi
, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem
, Mona Jaber
:
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. 85 - Peter K. K. Loh
, Aloysius Z. Y. Lee, Vivek Balachandran:
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense. 86 - Dominik Warch
, Patrick Stellbauer
, Pascal Neis
:
Advanced Techniques for Geospatial Referencing in Online Media Repositories. 87 - Dominic Lightbody
, Duc-Minh Ngo
, Andriy Temko
, Colin C. Murphy, Emanuel M. Popovici
:
Dragon_Pi: IoT Side-Channel Power Data Intrusion Detection Dataset and Unsupervised Convolutional Autoencoder for Intrusion Detection. 88 - Mostafa El Debeiki
, Saba Al-Rubaye
, Adolfo Perrusquía
, Christopher Conrad
, Juan Alejandro Flores Campos
:
An Advanced Path Planning and UAV Relay System: Enhancing Connectivity in Rural Environments. 89 - Heidi Toivonen
, Francesco Lelli
:
The Varieties of Agency in Human-Smart Device Relationships: The Four Agency Profiles. 90 - Mauro Femminella
, Gianluca Reali
:
Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies. 91 - Andreas Giannakoulopoulos
, Minas Pergantis
, Aristeidis Lamprogeorgos:
User Experience, Functionality and Aesthetics Evaluation in an Academic Multi-Site Web Ecosystem. 92 - Ziyad Almudayni, Ben Soh
, Alice S. Li:
IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks. 93 - Yu Yao, Quan Qian
:
Dynamic Industrial Optimization: A Framework Integrates Online Machine Learning for Processing Parameters Design. 94 - Ying-Hsun Lai, Shih-Yeh Chen
, Wen-Chi Chou, Hua-Yang Hsu, Han-Chieh Chao
:
Personalized Federated Learning with Adaptive Feature Extraction and Category Prediction in Non-IID Datasets. 95 - Mengchi Xing, Haojiang Deng, Rui Han:
A Method for 5G-ICN Seamless Mobility Support Based on Router Buffered Data. 96 - Ancilon Leuch Alencar
, Marcelo Dornbusch Lopes
, Anita Maria da Rocha Fernandes
, Julio Cesar Santos dos Anjos
, Juan Francisco De Paz Santana
, Valderi Reis Quietinho Leithardt
:
Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks. 97 - Muhammad Bin Saif
, Sara Migliorini
, Fausto Spoto
:
Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain. 98 - Alfonso Quarati
, Riccardo Albertoni
:
Linked Open Government Data: Still a Viable Option for Sharing and Integrating Public Data? 99 - Yogeswaranathan Kalyani
, Liam Vorster, Rebecca Whetton, Rem W. Collier
:
Application Scenarios of Digital Twins for Smart Crop Farming through Cloud-Fog-Edge Infrastructure. 100 - Alessandro Pozzebon
:
Edge and Fog Computing for the Internet of Things. 101 - Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye, Liang Zhang:
UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment. 102 - Rafael Moreno-Vozmediano
, Rubén S. Montero
, Eduardo Huedo
, Ignacio Martín Llorente
:
Intelligent Resource Orchestration for 5G Edge Infrastructures. 103 - Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, João M. L. P. Caldeira
, Vasco N. G. J. Soares
:
Using Computer Vision to Collect Information on Cycling and Hiking Trails Users. 104 - Shui Jiang, Yanning Ge
, Xu Yang, Wencheng Yang
, Hui Cui
:
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning. 105 - Tenzin Norbu, Joo-Yeon Park
, Kok Wai Wong, Hui Cui
:
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review. 106
Volume 16, Number 4, April 2024
- Ihtisham Khalid
, Vasilis Maglogiannis
, Dries Naudts
, Adnan Shahid
, Ingrid Moerman
:
Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC. 107 - Árpád Takács, Tamás Haidegger
:
A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions. 108 - Yihu Zhou, Haiming Chen
, Zhibin Dou:
MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks. 109 - Fahad Alqahtani
, Mohammed Almutairi
, Frederick T. Sheldon
:
Cloud Security Using Fine-Grained Efficient Information Flow Tracking. 110 - Anderson Carvalho, Daniel Riordan
, Joseph Walsh
:
A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud. 111 - Véronique Georlette
, Anne-Carole Honfoga, Michel Dossou, Véronique Moeyaert
:
Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning. 112 - Jun Li, Chenyang Zhang, Jianyi Zhang
, Yanhua Shao:
Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning. 113 - Priyank Kalgaonkar
, Mohamed El-Sharkawy
:
NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking. 114 - Anton Dolhopolov
, Arnaud Castelltort
, Anne Laurent
:
Implementing Federated Governance in Data Mesh Architecture. 115 - Binita Kusum Dhamala
, Babu R. Dawadi
, Pietro Manzoni
, Baikuntha Kumar Acharya
:
Performance Evaluation of Graph Neural Network-Based RouteNet Model with Attention Mechanism. 116 - Maolin Tang
, Wei Li
:
Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing. 117 - Manar Aldaoud
, Dawood Al-Abri, Medhat Awadalla, Firdous Kausar
:
Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking. 118 - Huiting Wang, Yazhi Liu, Wei Li, Zhigang Yang:
Multi-Agent Deep Reinforcement Learning-Based Fine-Grained Traffic Scheduling in Data Center Networks. 119 - Anna Agusti-Torra
, Marc Ferré-Mancebo
, Gabriel David Orozco-Urrutia
, David Rincón Rivera
, David Remondo
:
A Microservices-Based Control Plane for Time-Sensitive Networking. 120 - Bing Su, Jiwu Liang:
Research on Secure Community Opportunity Network Based on Trust Model. 121 - Radheshyam Singh
, Léo Mendiboure
, José Soler
, Michael Stübert Berger
, Tidiane Sylla, Marion Berbineau, Lars Dittmann
:
SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios. 122 - Premalatha Baskar, Prakasam Periasamy
:
Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks. 123 - Haibo Liu, Yang Liao, Changting Shi
, Jing Shen:
Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm. 124 - Stefanos Balaskas
, Georgia Kotsari, Maria Rigou
:
Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis. 125 - Florian Maier, Markus Weinberger
:
Metaverse Meets Smart Cities - Applications, Benefits, and Challenges. 126 - Zhongcheng Wei
, Yanhu Dong
:
Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device. 127 - Peixiong He
, Yi Zhou
, Xiao Qin
:
A Survey on Energy-Aware Security Mechanisms for the Internet of Things. 128 - Georgios Koukis
, Konstantina Safouri, Vassilis Tsaoussidis
:
All about Delay-Tolerant Networking (DTN) Contributions to Future Internet. 129 - David Todolí Ferrandis
, Javier Silvestre-Blanes, Víctor-M. Sempere-Payá
, Salvador Santonja-Climent:
Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks. 130 - Wei Li, Mengzhen Ren, Yazhi Liu, Chenyu Li, Hui Qian, Zhenyou Zhang:
Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks. 131 - Rohit Ahuja
, Sahil Chugh
, Raman Singh
:
SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain. 132 - Bowen Liu
, Qiang Tang
:
Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation. 133 - Yuning Jiang
, Wei Wang
, Jianguo Ding
, Xin Lu
, Yanguo Jing
:
Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber-Physical Production Systems. 134 - Stanly Wilson
, Kwabena Adu-Duodu
, Yinhao Li
, Ringo W. H. Sham, Mohammed Almubarak
, Yingli Wang
, Ellis Solaiman
, Charith Perera
, Rajiv Ranjan
, Omer F. Rana
:
Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains. 135 - Yazhi Liu, Pengfei Zhong, Zhigang Yang, Wei Li, Siwei Li:
Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing. 136 - Vyron Kampourakis
, Georgios Michail Makrakis
, Constantinos Kolias
:
From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks. 137 - Laura Lemmi
, Carlo Puliafito, Antonio Virdis
, Enzo Mingozzi
:
SRv6-Based Edge Service Continuity in 5G Mobile Networks. 138 - Md Motiur Rahman
, Deepti Gupta
, Smriti Bhatt
, Shiva Shokouhmand
, Miad Faezipour
:
A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions. 139 - Yuze Liu
, Weihong Wu, Ying Wang, Jiang Liu, Fan Yang:
SUDC: Synchronous Update with the Division and Combination of SRv6 Policy. 140 - Zuopeng Li, Hengshuai Ju
, Zepeng Ren:
Correction: Li et al. A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation. Future Internet 2023, 15, 395. 141 - Hsin-Tung Lin, Chih-Yu Wen
:
Edge Federated Optimization for Heterogeneous Data. 142 - Bing Zhang, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu, Huan Wang
:
Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN. 143
Volume 16, Number 5, May 2024
- Albert Weichselbraun
, Norman Süsstrunk
, Roger Waldvogel
, André Glatzl
, Adrian M. P. Brasoveanu
, Arno Scharl
:
Anticipating Job Market Demands - A Deep Learning Approach to Determining the Future Readiness of Professional Skills. 144 - Zacharias Kamarianakis
, Spyros Perdikakis, Ioannis N. Daliakopoulos
, Dimitrios M. Papadimitriou, Spyros Panagiotakis
:
Design and Implementation of a Low-Cost, Linear Robotic Camera System, Targeting Greenhouse Plant Growth Monitoring. 145 - Maria Andrea Romo-Chavero
, Jose Antonio Cantoral-Ceballos
, Jesús Arturo Pérez Díaz
, Carlos Martinez-Cagnazzo
:
Median Absolute Deviation for BGP Anomaly Detection. 146 - Bruno Fanini
, Giorgio Gosti
:
A New Generation of Collaborative Immersive Analytics on the Web: Open-Source Services to Capture, Process and Inspect Users' Sessions in 3D Environments. 147 - Yazan Aref, Abdelkader Ouda
:
HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security. 148 - Andrea Calvagna
, Giovanni Marotta
, Giuseppe Pappalardo
, Emiliano Tramontana
:
A Blockchain-Based Real-Time Power Balancing Service for Trustless Renewable Energy Grids. 149 - Jingzhe Zhang, Tiange Chen, Wenjie Gong
, Jiayue Liu, Jiangjie Chen
:
Exploring Data Input Problems in Mixed Reality Environments: Proposal and Evaluation of Natural Interaction Techniques. 150 - Aye Nyein Aung
, Che-Wei Liao, Jeih-Weih Hung
:
Effective Monoaural Speech Separation through Convolutional Top-Down Multi-View Network. 151 - Mansoor Jamal, Zaib Ullah
, Muddasar Naeem
, Musarat Abbas
, Antonio Coronato
:
A Hybrid Multi-Agent Reinforcement Learning Approach for Spectrum Sharing in Vehicular Networks. 152 - Daniel Nuñez-Agurto
, Walter Fuertes
, Luis Marrone
, Eduardo Benavides-Astudillo
, Christian Coronel-Guerrero
, Franklin Perez
:
A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking. 153 - John David Sprunger, Alvin S. Lim, David M. Bevly:
A Method for the Rapid Propagation of Emergency Event Notifications in a Long Vehicle Convoy. 154 - Matthew Boeding
, Michael Hempel
, Hamid Sharif
:
Novel Approach towards a Fully Deep Learning-Based IoT Receiver Architecture: From Estimation to Decoding. 155 - Cyril Naves Samuel
, François Verdier
, Severine Glock, Patricia Guitton-Ouhamou:
A Fair Crowd-Sourced Automotive Data Monetization Approach Using Substrate Hybrid Consensus Blockchain. 156 - Tuan-Kiet Dang
, Khai-Duy Nguyen
, Binh Kieu-Do-Nguyen
, Trong-Thuc Hoang
, Cong-Kha Pham
:
Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications. 157 - Lassaad Zaway, Nader Ben Amor, Jalel Ktari
, Mohamed Jallouli, Larbi Chrifi-Alaoui
, Laurent Delahoche:
Optimization of Wheelchair Control via Multi-Modal Integration: Combining Webcam and EEG. 158 - Ibrahim Althamary
, Rubbens Boisguene
, Chih-Wei Huang
:
Enhanced Multi-Task Traffic Forecasting in Beyond 5G Networks: Leveraging Transformer Technology and Multi-Source Data Fusion. 159 - Sarah Kaleem
, Muhammad Asim
, Mohammed Ahmed El-Affendi
, Muhammad Babar
:
Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework. 160 - Jieli Chen, Kah Phooi Seng, Li-Minn Ang, Jeremy Smith, Hanyue Xu
:
AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses. 161 - Caixiang Fan
, Hamzeh Khazaei
, Petr Musilek
:
BPET: A Unified Blockchain-Based Framework for Peer-to-Peer Energy Trading. 162 - Zhe Ma, Xuhesheng Chen
, Tiejiang Sun, Xukang Wang
, Ying-Cheng Wu
, Mengjie Zhou:
Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization. 163 - Yu Zhang, Xiaowei Peng, Hequn Xian:
pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework. 164 - Yuzhu Zhang, Hao Xu:
Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning. 165 - Sonali Patwe
, Sunil B. Mane:
Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments. 166 - Anjia Ye
, Ananda Maiti
, Matthew W. Schmidt
, Scott J. Pedersen
:
A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis. 167 - Muhammad Imran, Annalisa Appice
, Donato Malerba
:
Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection. 168 - Franco Frattolillo
:
Blockchain and Smart Contracts for Digital Copyright Protection. 169 - Alireza Fath
, Nicholas Hanna, Yi Liu, Scott Tanch, Tian Xia, Dryver Huston:
Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface. 170 - Na Liu
, Wei-Tek Tsai:
SmartDED: A Blockchain- and Smart Contract-Based Digital Electronic Detonator Safety Supervision System. 171 - Ioannis G. Tsoulos
, Alexandros T. Tzallas
, Evangelos Karvounis
:
Using Optimization Techniques in Grammatical Evolution. 172 - Roilhi Frajo Ibarra-Hernández
, Francisco Rubén Castillo Soria
, Carlos A. Gutiérrez
, Abel García-Barrientos
, Luis Alberto Vasquez-Toledo
, Jose Alberto Del Puerto-Flores
:
Machine Learning Strategies for Reconfigurable Intelligent Surface-Assisted Communication Systems - A Review. 173 - Thi-Hao Nguyen, Van-Hung Le
, Huu-Son Do, Trung-Hieu Te, Van-Nam Phan:
TQU-SLAM Benchmark Dataset for Comparative Study to Build Visual Odometry Based on Extracted Features from Feature Descriptors and Deep Learning. 174 - Isabel Auer, Stephan Schlögl
, Gundula Glowka
:
Chatbots in Airport Customer Service - Exploring Use Cases and Technology Acceptance. 175 - Faisal Fiaz
, Syed Muhammad Sajjad, Zafar Iqbal
, Muhammad Yousaf
, Zia Muhammad
:
MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. 176 - Sakhi Aggrawal
, Alejandra J. Magana
:
Teamwork Conflict Management Training and Conflict Resolution Practice via Large Language Models. 177 - Young Sook Kim, Seng-Phil Hong
, Marko Majer:
Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform. 178
Volume 16, Number 6, June 2024
- Jorge Lopes, Luis Paulo Mota, Samuel Marques Mota, José Manuel Torres
, Rui S. Moreira
, Christophe Soares
, Ivo Pereira
, Feliz Ribeiro Gouveia
, Pedro Miguel Sobral:
Object and Event Detection Pipeline for Rink Hockey Games. 179 - Nuno Marques, Rodrigo Rocha Silva
, Jorge Bernardino
:
Using ChatGPT in Software Requirements Engineering: A Comprehensive Review. 180 - Yuchen Wang, Zishan Huang, Zhongcheng Wei
, Jijun Zhao:
MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing. 181 - Liyuan Liang
, Like Gobeawan
, Siu-Kit Lau
, Ervine Shengwei Lin, Kai Keng Ang
:
Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature. 182 - Ayman Khalil
, Besma Zeddini
:
Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks. 183 - Fouzi Harrou
, Benamar Bouyeddou
, Abdelkader Dairi
, Ying Sun
:
Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids. 184 - Xingyu Li, Ruifeng Li, Yanchen Liu
:
HP-LSTM: Hawkes Process-LSTM-Based Detection of DDoS Attack for In-Vehicle Network. 185 - Josué I. Rojo-García
, Sergio A. Vera-Chavarría
, Yair Lozano-Hernández
, Victor G. Sánchez-Meza
, Jaime González-Sierra
, Luz N. Oliva-Moreno
:
Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor. 186 - Erik Ortiz Guerra
, Mario Martínez Morfa
, Carlos Manuel García Algora
, Hector Cruz-Enriquez
, Kris Steenhaut
, Samuel Montejo Sanchez
:
Enhanced Beacons Dynamic Transmission over TSCH. 187 - Davide Tosi
:
Studying the Quality of Source Code Generated by Different AI Generative Engines: An Empirical Evaluation. 188 - Dong Wang
, Hongji Yang
, Hua Zhou:
Dynamic Spatial-Temporal Self-Attention Network for Traffic Flow Prediction. 189 - Evgenia Paxinou, Georgios Feretzakis, Rozita Tsoni, Dimitrios Karapiperis, Dimitrios Kalles, Vassilios S. Verykios:
Tracing Student Activity Patterns in E-Learning Environments: Insights into Academic Performance. 190 - Mohammad Imran Ali
, Shahi Dost
, Khurram S. Khattak
, Muhammad Imran Khan
, Riaz Muhammad
:
Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring. 191 - Jindong Yang, Xiran Zhang, Wenhao Chen, Fei Rong:
Prophet-CEEMDAN-ARBiLSTM-Based Model for Short-Term Load Forecasting. 192 - Muthana Al-Amidie
, Laith Alzubaidi
, Muhammad Aminul Islam, Derek T. Anderson:
Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values. 193 - Rui Zhao
, Jutao Hao, Huan Huo:
Research on Multi-Modal Pedestrian Detection and Tracking Algorithm Based on Deep Learning. 194 - Cristian Volosciuc, Razvan Bogdan
, Bianca-Lucia Blajovan, Cristina Stangaciu
, Marius Marcu
:
GreenLab, an IoT-Based Small-Scale Smart Greenhouse. 195 - Tahani Baabdullah, Amani Alzahrani
, Danda B. Rawat
, Chunmei Liu:
Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems. 196 - Carol Maher
, Kylie A. Dankiw
, Ben Singh
, Svetlana Bogomolova
, Rachel G. Curtis
:
In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System. 197 - Zisis Vasilakopoulos, Theocharis Tavantzis
, Rafail Promikyridis
, Efthimios Tambouris
:
The Use of Artificial Intelligence in eParticipation: Mapping Current Research. 198 - Carmen Ruiz Viñals, Marta Gil Ibáñez
, José Luis Del Olmo Arriaga:
Metaverse and Fashion: An Analysis of Consumer Online Interest. 199 - Abbas Javed
, Amna Ehtsham, Muhammad Jawad
, Muhammad Naeem Awais, Ayyaz-Ul-Haq Qureshi, Hadi Larijani
:
Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes. 200 - Gabriel Arquelau Pimenta Rodrigues
, André Luiz Marques Serrano
, Guilherme Fay Vergara
, Robson de Oliveira Albuquerque
, Georges Daniel Amvame Nze
:
Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies. 201 - Fernando Loor, Veronica Gil-Costa, Mauricio Marín:
Metric Space Indices for Dynamic Optimization in a Peer to Peer-Based Image Classification Crowdsourcing Platform. 202 - Héctor Orrillo
, André Sabino
, Mário Marques da Silva
:
Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models. 203 - Majed A. Alshamari, Maha M. Althobaiti
:
Usability Evaluation of Wearable Smartwatches Using Customized Heuristics and System Usability Scale Score. 204 - Wuzheng Tan
, Shenglong Du
, Jian Weng:
Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks. 205 - Wala Bagunaid
, Naveen K. Chilamkurti
, Ahmad Salehi Shahraki, Saeed Bamashmos:
Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction. 206 - Rendrikson Soares
, André Araújo
:
Towards a New Business Model for Streaming Platforms Using Blockchain Technology. 207 - Luca Cotti
, Davide Guizzardi
, Barbara Rita Barricelli
, Daniela Fogli
:
Enabling End-User Development in Smart Homes: A Machine Learning-Powered Digital Twin for Energy Efficient Management. 208 - Jiayi Zhang
, Abdelkader Ouda
, Raafat Aburukba
:
Authentication and Key Agreement Protocol in Hybrid Edge-Fog-Cloud Computing Enhanced by 5G Networks. 209 - Xu Wang, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction. 210 - Jingshi Qian, Jiahe Li, Nobuyoshi Komuro
, Won-Suk Kim
, Younghwan Yoo
:
Improved Particle Filter in Machine Learning-Based BLE Fingerprinting Method to Reduce Indoor Location Estimation Errors. 211 - Umang Garg
, Santosh Kumar
, Aniket Mahanti:
IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. 212 - Cheng Fang
, Feifei Liang
, Tianchi Li
, Fangheng Guan
:
Learning Modality Consistency and Difference Information with Multitask Learning for Multimodal Sentiment Analysis. 213 - Pedro Nunes
, Eugénio Rocha
, José P. Santos
:
Adaptive Framework for Maintenance Scheduling Based on Dynamic Preventive Intervals and Remaining Useful Life Estimation. 214 - Vitor Hugo dos Santos Filho
, Luis Mauricio Martins de Resende
, Joseane Pontes:
Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0). 215 - Ashot N. Harutyunyan
, Arnak V. Poghosyan
, Tigran Bunarjyan
, Andranik Haroyan, Marine Harutyunyan, Lilit Harutyunyan, Nelson Baloian
:
Discovery of Cloud Applications from Logs. 216 - Shaolong Chen
, Yunzi Dai, Liwei Liu, Xinting Yu:
Optimizing Data Parallelism for FM-Based Short-Read Alignment on the Heterogeneous Non-Uniform Memory Access Architectures. 217 - Joel Weijia Lai
:
Adapting Self-Regulated Learning in an Age of Generative Artificial Intelligence Chatbots. 218
Volume 16, Number 7, July 2024
- Ketmanto Wangsa
, Shakir Karim
, Ergun Gide
, Mahmoud Elkhodr
:
A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok. 219 - Mirwais Ahmadzai
, Giang T. Nguyen
:
Differential Private Federated Learning in Geographically Distributed Public Administration Processes. 220 - Loukas Triantafyllopoulos
, Evgenia Paxinou
, Georgios Feretzakis
, Dimitris Kalles
, Vassilios S. Verykios
:
Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis. 221 - Adedamola Adesokan
, Aisha B. Rahman
, Eirini-Eleni Tsiropoulou
:
INFLUTRUST: Trust-Based Influencer Marketing Campaigns in Online Social Networks. 222 - Aris Cahyadi Risdianto
, Muhammad Usman
, Muhammad Ahmad Rathore:
Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility. 223 - Bhavani Malisetty, Alfredo J. Perez
:
Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation. 224 - Gabriela Walczyk
, Andrzej Ozadowicz
:
Building Information Modeling and Digital Twins for Functional and Technical Design of Smart Buildings with Distributed IoT Networks - Review and New Challenges Discussion. 225 - José Cunha
, Pedro Ferreira, Eva M. Castro, Paula Cristina Oliveira
, Maria João Nicolau
, Iván Núñez, Xosé Ramón Sousa, Carlos Serôdio
:
Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies. 226 - Qiang Duan
, Zhihui Lu
:
Edge Cloud Computing and Federated-Split Learning in Internet of Things. 227 - Pietro Ruiu
, Salvatore Saiu
, Enrico Grosso
:
Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics. 228 - Lucas Henriques
, Felipe Prata Lima
, Cecilia Castro
:
Combining Advanced Feature-Selection Methods to Uncover Atypical Energy-Consumption Patterns. 229 - Ehsan Ahmad
, Brian R. Larson, Abdulbasid Banga:
Trusted Composition of Internet of Medical Things over Imperfect Networks. 230 - Dionysios Stamatopoulos
, Menelaos Katsantonis
, Panagiotis E. Fouliras
, Ioannis Mavridis
:
Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. 231 - Luisanna Cocco
, Roberto Tonelli:
Digital Transformation in the Construction Sector: Blockchain, BIM and SSI for a More Sustainable and Transparent System. 232 - Marcus Pieskä
, Andreas Kassler
, Anna Brunström
, Veselin Rakocevic
, Markus Amend:
Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling. 233 - Mian Qian
, Cheng Qian
, Guobin Xu, Pu Tian, Wei Yu
:
Smart Irrigation Systems from Cyber-Physical Perspective: State of Art and Future Directions. 234 - Enbo Sun, Jiaxuan Han, Yiquan Li, Cheng Huang:
A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model. 235 - Stefano Mottura:
Does Anyone Care about the Opinion of People on Participating in a "Social" Metaverse? A Review and a Draft Proposal for a Surveying Tool. 236 - Simon Daniel Duque Antón
:
Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios. 237 - Badr Ben Elallid, Nabil Benamar
, Miloud Bagaa, Yassine Hadjadj-Aoul
:
Enhancing Autonomous Driving Navigation Using Soft Actor-Critic. 238 - Ragini Gupta
, Beitong Tian
, Yaohui Wang, Klara Nahrstedt
:
TWIN-ADAPT: Continuous Learning for Digital Twin-Enabled Online Anomaly Classification in IoT-Driven Smart Labs. 239 - Darya Y. Ostrikova
, Elizaveta Golos
, Vitalii Beschastnyi
, Egor Machnev
, Yuliya Gaidamaka
, Konstantin E. Samouylov
:
Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities. 240 - Ilias Siachos
, Nikos I. Karacapilidis
:
Explainable Artificial Intelligence Methods to Enhance Transparency and Trust in Digital Deliberation Settings. 241 - Samir A. Younis, Dalia Sobhy, Noha S. Tawfik:
Evaluating Convolutional Neural Networks and Vision Transformers for Baby Cry Sound Analysis. 242 - Imen Ahmed
, Mariem Turki
, Mouna Baklouti
, Bouthaina Dammak, Amnah Alshahrani
:
Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System. 243 - Natalia Dashkevich, Steve Counsell, Giuseppe Destefanis
:
Blockchain Financial Statements: Innovating Financial Reporting, Accounting, and Liquidity Management. 244 - Wen Qiu
, Xun Shao
, Hiroshi Masui, William Liu:
Optimizing Drone Energy Use for Emergency Communications in Disasters via Deep Reinforcement Learning. 245 - Sara Lazzaro
, Francesco Buccafurri
:
Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System. 246 - Lorenzo Vaiani
, Luca Cagliero
, Paolo Garza
:
Emotion Recognition from Videos Using Multimodal Large Language Models. 247 - Nerijus Satkauskas, Algimantas Venckauskas
:
Multi-Agent Dynamic Fog Service Placement Approach. 248 - Álvaro Antón-Sancho
, Pablo Fernández-Arias
, Edwan Anderson Ariza-Echeverri
, Diego Vergara
:
The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI). 249 - Amr Adel
, Tony Jan
:
Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges. 250 - Shaopei Gao, Qiang Liu
, Junjie Zeng, Li Li:
SD-GPSR: A Software-Defined Greedy Perimeter Stateless Routing Method Based on Geographic Location Information. 251 - Oleksandr Kuznetsov
, Emanuele Frontoni
, Kateryna Kuznetsova, Ruslan Shevchuk
, Mikolaj P. Karpinski
:
NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization. 252 - Prabu Kaliyaperumal
, Sudhakar Periyasamy
, Manikandan Thirumalaisamy
, Balamurugan Balusamy, Francesco Benedetto
:
A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT. 253 - Rui Yu
, Sooyeon Lee
, Jingyi Xie
, Syed Masum Billah
, John M. Carroll
:
Human-AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era. 254 - Bo Cui
, Yachao Chai, Zhen Yang, Keqin Li
:
Intrusion Detection in IoT Using Deep Residual Networks with Attention Mechanisms. 255 - Mohamed Azarudheen Mohamed Mohideen
, Muhammad Shahroz Nadeem, James Hardy, Haider Ali, Umair Ullah Tariq, Fariza Sabrina
, Muhammad Waqar
, Salman Ahmed
:
Behind the Code: Identifying Zero-Day Exploits in WordPress. 256 - Mira M. Zarie, Abdelhamied A. Ateya
, Mohammed Sharaf Sayed
, Mohammed Ahmed El-Affendi, Mohammad M. Abdellatif
:
Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles. 257
Volume 16, Number 8, August 2024
- Albatool Alhawas
, Abdelfettah Belghith
:
Software-Defined Named Data Networking in Literature: A Review. 258 - Naonobu Okazaki, Shotaro Usuzaki
, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba, Kentaro Aburada:
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. 259 - Chaelim Park, Hayoung Lee
, OkRan Jeong:
Leveraging Medical Knowledge Graphs and Large Language Models for Enhanced Mental Disorder Information Extraction. 260 - Mohsin Khan
, Håvard D. Johansen
, Dag Johansen
:
Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor. 261 - Amna Shabbir, Muhammad Faizan Shirazi
, Safdar Rizvi
, Sadique Ahmad
, Abdelhamied A. Ateya
:
Energy Efficiency and Load Optimization in Heterogeneous Networks through Dynamic Sleep Strategies: A Constraint-Based Optimization Approach. 262 - Alessio Luschi
, Giovanni Luca Daino, Gianpaolo Ghisalberti, Vincenzo Mezzatesta, Ernesto Iadanza
:
Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation. 263 - Khoa Dinh Nguyen Dang
, Peppino Fazio
, Miroslav Voznák
:
A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network. 264 - Deol Satish, Jonathan Kua
, Shiva Raj Pokhrel
:
Active Queue Management in L4S with Asynchronous Advantage Actor-Critic: A FreeBSD Networking Stack Perspective. 265 - Chuanzhe Gao, Shidang Li, Yixuan Wu, Siyi Duan, Mingsheng Wei, Bencheng Yu:
Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems. 266 - Yao Du
, Zehua Wang
, Cyril Leung
, Victor C. M. Leung
:
Towards Collaborative Edge Intelligence: Blockchain-Based Data Valuation and Scheduling for Improved Quality of Service. 267 - Salvatore Flavio Pileggi
:
Ontology in Hybrid Intelligence: A Concise Literature Review. 268 - Danish Hamid, Muhammad Ehatisham-ul-Haq, Amanullah Yasin
, Fiza Murtaza, Muhammad Awais Azam
:
Enhancing Recognition of Human-Object Interaction from Visual Data Using Egocentric Wearable Camera. 269 - Yang Li
, Shichao Yan, Fangtao Zhao, Yi Jiang, Shuai Chen, Lei Wang, Li Ma:
MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations. 270 - Noah Oghenefego Ogwara, Krassie Petrova
, Mee Loong Bobby Yang, Stephen G. MacDonell:
A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments. 271 - Santosh A. Janawade
, Prabu Krishnan
, Krishnamoorthy Kandasamy, Shashank S. Holla, Karthik Rao, Aditya Chandrasekar:
A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication. 272 - Aicha Aiche
, Pierre-Martin Tardif
, Mohammed Erritali:
Modeling Trust in IoT Systems for Drinking-Water Management. 273 - Andrei Tara
, Hjalmar K. Turesson
, Nicolae Natea:
Dynamic Storage Optimization for Communication between AI Agents. 274 - Francesco Fiorini
, Michele Pagano
, Rosario Giuseppe Garroppo
, Antonio Osele:
Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator. 275 - Igor Kabashkin
, Leonid Shoshin
:
Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems. 276 - Vincent Abella, Johnfil Initan, Jake Mark Perez, Philip Virgil Astillo
, Luis Gerardo Cañete
, Gaurav Choudhary
:
Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation. 277 - Sean Tsikteris
, Aisha B. Rahman
, Md. Sadman Siraj
, Eirini-Eleni Tsiropoulou
:
TRUST-ME: Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing. 278 - Diego Alejandro Albarracin-Acero, Fidel Alfonso Romero-Toledo
, Claudia Esperanza Saavedra-Bautista
, Edwan Anderson Ariza-Echeverri
:
Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age. 279 - Minyechil Alehegn Tefera
, Amare Mulatie Dehnaw
, Yibeltal Chanie Manie, Cheng-Kai Yao
, Shegaw Demessie Bogale
, Peng-Chun Peng
:
Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors. 280 - Martin Baumgartner
, Karl Kreiner
, Fabian Wiesmüller, Dieter Hayn
, Christian Puelacher, Günter Schreier:
Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text. 281 - Abdelaziz Bouzidi, Lala H. Rajaoarisoa
, Luka Claeys:
Explainable Artificial Intelligence Approach for Improving Head-Mounted Fault Display Systems. 282 - Antonio Francesco Gentile
, Davide Macrì
, Emilio Greco
, Peppino Fazio
:
Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment. 283 - Shu-Ming Tseng
, Yan-Qi Wang, Yung-Chung Wang:
Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset. 284 - Yunus Kareem
, Djamel Djenouri
, Essam Ghadafi
:
A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things. 285 - Jawaher Alghamdi, Yuqing Lin
, Suhuai Luo:
Cross-Domain Fake News Detection Using a Prompt-Based Approach. 286 - Tasin Islam
, Alina Dana Miron
, Xiaohui Liu
, Yongmin Li
:
Dynamic Fashion Video Synthesis from Static Imagery. 287 - Khaled Mahbub, Antonio Nehme
, Mohammad Patwary, Marc Lacoste, Sylvain Allio:
FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation. 288 - Alexis Carrillo
, Moisés Betancort:
Testing Stimulus Equivalence in Transformer-Based Agents. 289 - Giorgio Piccardo, Lorenzo Conti, Alessio Martino
:
Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey. 290 - Matan Davidian, Michael Kiperberg, Natalia Vanetik
:
Early Ransomware Detection with Deep Learning Models. 291 - Janith Kavindu Dassanayake
, Minxiao Wang
, Muhammad Z. Hameed, Ning Yang
:
Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks. 292 - Lisi Liu
, Zijie Xu, Xiaobin Qu
:
Development of a Novel Open Control System Implementation Method under Industrial IoT. 293 - Wesam Fallatah
, Joakim Kävrestad
, Steven Furnell:
Establishing a Model for the User Acceptance of Cybersecurity Training. 294 - Mingxuan Xie
, Tao Zou
, Junchen Ye, Bowen Du
, Runhe Huang
:
Dynamic Graph Representation Learning for Passenger Behavior Prediction. 295 - Jinpeng Miao
, Dasari Rajasekhar
, Shivakant Mishra
, Sanjeet Kumar Nayak
, Ram Narayan Yadav
:
A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge. 296 - Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Recompression Scheme for VQ Index Tables. 297 - Eleftheria Papageorgiou, Christos Chronis
, Iraklis Varlamis
, Yassine Himeur
:
A Survey on the Use of Large Language Models (LLMs) in Fake News. 298 - Kieu Anh Nguyen
, Yi-Jia Jiang, Chiao-Shin Huang, Meng-Hsuan Kuo, Walter W. Chen
:
Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways. 299 - Daniel C. Lawo
, Rana Abu Bakar, Abraham Cano Aguilera, Filippo Cugini, José Luis Imaña
, Idelfonso Tafur Monroy
, Juan Jose Vegas Olmos:
Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel. 300 - Teodora Vasilas
, Claudiu Bacila, Remus Brad
:
Beat the Heat: Syscall Attack Detection via Thermal Side Channel. 301 - Peng Wang, Yonghua Xiong
:
A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT. 302
Volume 16, Number 9, September 2024
- Marco Grossi
, Fabrizio Alfonsi, Marco Prandini
, Alessandro Gabrielli
:
Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays. 303 - Fabian Nunes
, Patrício Domingues
, Miguel Frade
:
The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications. 304 - Konstantinos Sakkas, Eirini Georgia Dimitriou, Niki Eleni Ntagka, Nikolaos Giannakeas, Konstantinos Kalafatakis, Alexandros T. Tzallas, Evripidis Glavas:
Personalized Visualization of the Gestures of Parkinson's Disease Patients with Virtual Reality. 305 - Gábor Arányi, Ágnes Vathy-Fogarassy
, Veronika Szücs
:
Evaluation of a New-Concept Secure File Server Solution. 306 - Parisa Mashreghi-Moghadam
, Tarek Ould-Bachir
, Yvon Savaria
:
PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA. 307 - Xian Gao, Peixiong He
, Yi Zhou, Xiao Qin
:
Artificial Intelligence Applications in Smart Healthcare: A Survey. 308 - Theodore Andronikos
, Alla Sirokofskich:
A Multiparty Quantum Private Equality Comparison Scheme Relying on |GHZ3⟩ States. 309 - Zhibo Qi, Lei Du, Ru Huo, Tao Huang
:
Predictive Maintenance Based on Identity Resolution and Transformers in IIoT. 310 - Farid Yessoufou
, Salma Sassi
, Elie Chicha
, Richard Chbeir
, Jules Degila
:
User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks. 311 - Jing Zou, Peizhe Xin, Chang Wang, Heli Zhang
, Lei Wei, Ying Wang:
AI Services-Oriented Dynamic Computing Resource Scheduling Algorithm Based on Distributed Data Parallelism in Edge Computing Network of Smart Grid. 312 - Mounib Khanafer
, Mouhcine Guennoun, Mohammed El-Abd
, Hussein T. Mouftah:
Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks. 313 - Shezon Saleem Mohammed Abdul
, Anup Shrestha
, Jianming Yong:
CrossDeFi: A Novel Cross-Chain Communication Protocol. 314 - Muhammad Bin Saif, Sara Migliorini
, Fausto Spoto
:
A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements. 315 - Sérgio N. Silva
, Mateus A. S. S. Goldbarg
, Lucileide M. D. Da Silva
, Marcelo A. C. Fernandes
:
Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing. 316 - Gayathri Karthick
, Glenford Mapp
:
Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities. 317 - Aristidis G. Vrahatis
, Konstantinos Lazaros, Sotiris Kotsiantis
:
Graph Attention Networks: A Comprehensive Review of Methods and Applications. 318 - Guoxin Su
, Li Liu
:
Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification. 319 - Di Li
, Zhibang Yang, Siyang Yu, Mingxing Duan, Shenghong Yang:
A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology. 320 - Raed M. Bani-Hani
, Ahmed S. Shatnawi
, Lana Al-Yahya:
Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning. 321 - Lara Aslan, Michal Ptaszynski
, Jukka Jauhiainen:
Are Strong Baselines Enough? False News Detection with Machine Learning. 322 - Carolina Del-Valle-Soto
, Ramon A. Briseño, Ramiro Velázquez
, Gabriel Guerra-Rosales
, Santiago Perez-Ochoa, Isaac H. Preciado-Bazavilvazo, Paolo Visconti
, José Varela
:
Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement. 323 - Elias Dritsas
, Maria Trigka
:
Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey. 324 - Oana-Mihaela Ungureanu, Calin Vladeanu
, Robert E. Kooij
:
A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core. 325 - Lihui Li
, Hanwen Deng, Zhongyi Zhai, Sheng-Lung Peng
:
Privacy-Preserving Authentication Based on PUF for VANETs. 326 - Michele Ruta
, Floriano Scioscia
, Giuseppe Loseto
, Agnese Pinto
, Corrado Fasciano
, Giovanna Capurso
, Eugenio Di Sciascio
:
Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects. 327 - Haitham Y. Adarbah
, Mehmet Sabir Kiraz
, Süleyman Kardas
, Ali H. Al-Bayatti
, Hilal M. Y. Al-Bayatti:
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs. 328 - Alexandru Miron Rancea
, Ionut Anghel
, Tudor Cioara
:
Edge Computing in Healthcare: Innovations, Opportunities, and Challenges. 329 - Shyam Kumar Shrestha
, Shiva Raj Pokhrel
, Jonathan Kua
:
On the Fairness of Internet Congestion Control over WiFi with Deep Reinforcement Learning. 330 - Abdallah Moubayed
:
A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection. 331 - Wataru Takabatake
, Yohei Shibata
, Kenji Hoshino, Tomoaki Ohtsuki
:
Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications. 332 - Guiwen Jiang, Rongxi Huang, Zhiming Bao, Gaocai Wang
:
A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing. 333 - Roberto Vergallo
, Luca Mainetti
:
Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study. 334 - Italo Epicoco
, Marco Pulimeno
, Massimo Cafaro
:
Parallel and Distributed Frugal Tracking of a Quantile. 335 - Yudai Yamamoto, Aoi Fukushima, Shingo Yamaguchi
:
Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning. 336 - Waleed Shahjehan, Rajkumar Singh Rathore
, Syed Waqar Shah, Mohammad Aljaidi
, Ali Safaa Sadiq
, Omprakash Kaiwartya
:
A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems. 337 - Spiridoula V. Margariti
, Ioannis G. Tsoulos
, Evangelia Kiousi, Eleftherios Stergiou:
Traffic Classification in Software-Defined Networking Using Genetic Programming Tools. 338 - Kamal Shahid, Saleem Naseer Ahmad
, Syed Tahir Hussain Rizvi
:
Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems. 339 - Abdullah Khanfor
:
Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises. 340 - Lucas Silva, José Carlos Metrôlho
, Fernando Reinaldo Ribeiro:
Efficient Data Exchange between WebAssembly Modules. 341 - Jesús Calle-Cancho
, Carlos Cañada, Rafael Pastor Vargas
, Mercedes Eugenia Paoletti
, Juan Mario Haut
:
Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation. 342 - Gianluca Reali
, Mauro Femminella
:
Artificial Intelligence to Reshape the Healthcare Ecosystem. 343 - Ondrej Kobza, David Herel
, Jan Cuhel, Tommaso Gargiani, Petr Marek, Jan Sedivý:
Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations. 344 - Jobish John
, Md. Noor-A-Rahim
, Aswathi Vijayan
, H. Vincent Poor
, Dirk Pesch
:
Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing. 345 - Abeer Almutairi
, Xavier Carpent
, Steven Furnell
:
Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things. 346 - Sanusi Mohammad Bunu
, Omar Younis Alani
, Mohammad Saraee
:
An Improved Routing Protocol for Optimum Quality of Service in Device-to-Device and Energy Efficiency in 5G/B5G. 347
Volume 16, Number 10, 2024
- Yi Liu, Leonard Barolli:
An Intelligent System for Determining Driver Anxiety Level: A Comparison Study of Two Fuzzy-Based Models. 348 - Nandan Banerji, Chayan Paul, Bikash Debnath, Biplab Das, Gurpreet Singh Chhabra, Bhabendu Kumar Mohanta, Ali Ismail Awad:
Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios. 349 - Juliana Basulo-Ribeiro, Carina Pimentel, Leonor Teixeira:
Digital Transformation in Maritime Ports: Defining Smart Gates through Process Improvement in a Portuguese Container Terminal. 350 - Junyung Ji, Jiwoo Kim, Younghoon Kim:
Predicting Missing Values in Survey Data Using Prompt Engineering for Addressing Item Non-Response. 351 - Fadi Mohsen, Bedir Chaushi, Hamed Abdelhaq, Dimka Karastoyanova, Kevin Wang:
Automated Detection of Misinformation: A Hybrid Approach for Fake News Detection. 352 - Luca Franziska Hörner, Manfred Reichert:
Generating Process Models by Interacting with Chatbots - A Literature Review. 353 - Chuhao Wu, He Zhang, John M. Carroll:
AI Governance in Higher Education: Case Studies of Guidance at Big Ten Universities. 354 - Yaarob Al-Nidawi, Haider Tarish Haider, Dhiaa Halboot Muhsen, Ghadeer Ghazi Shayea:
Multi-User Optimal Load Scheduling of Different Objectives Combined with Multi-Criteria Decision Making for Smart Grid. 355 - Abraham Romero, Roberto Hernandez:
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies. 356 - Ali Peivandizadeh, Haitham Y. Adarbah, Behzad Molavi, Amir Hossein Mohajerzadeh, Ali H. Al-Badi:
A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment. 357 - Ryo Yanagida, Saleem N. Bhatti:
Mobility-Multihoming Duality. 358 - Nanavath Kiran Singh Nayak, Budhaditya Bhattacharyya:
An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology. 359 - Jeih-Weih Hung, Pin-Chen Huang, Li-Yin Li:
Employing Huber and TAP Losses to Improve Inter-SubNet in Speech Enhancement. 360 - Igor Calzada:
Decentralized Web3 Reshaping Internet Governance: Towards the Emergence of New Forms of Nation-Statehood? 361 - Enrico Barbierato, Alice Gatti:
Decoding Urban Intelligence: Clustering and Feature Importance in Smart Cities. 362 - Kyungmin Sim, Honyeong Heo, Haehyun Cho:
Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy. 363 - Izzat Alsmadi, Iyad Alazzam, Mohammad Al-Ramahi, Mohammad Zarour:
Stance Detection in the Context of Fake News - A New Approach. 364 - Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, Chee-Wei Tan:
Large Language Models Meet Next-Generation Networking Technologies: A Review. 365 - Marek Bolanowski, Michal Cmil, Adrian Starzec:
New Model for Defining and Implementing Performance Tests. 366 - Najla Alharbi, Bashayer Alkalifah, Ghaida Alqarawi, Murad A. Rassam:
Countering Social Media Cybercrime Using Deep Learning: Instagram Fake Accounts Detection. 367 - Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, Aisha Ajmal, Simon Jigwan Park:
Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices. 368 - Nsikak Pius Owoh, John Adejoh, Salaheddin Hosseinzadeh, Moses Ashawa, Jude Osamor, Ayyaz Qureshi:
Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit-Generative Adversarial Network Model Approach. 369 - Filippos Efthymiadis, Aristeidis Karras, Christos N. Karras, Spyros Sioutas:
Advanced Optimization Techniques for Federated Learning on Non-IID Data. 370 - Fanghua Chen, Deguang Shang, Gang Zhou, Ke Ye, Guofang Wu:
Multi-Source Data Fusion for Vehicle Maintenance Project Prediction. 371 - Yazan Otoum, Chaosheng Hu, Eyad Haj Said, Amiya Nayak:
Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration. 372 - Rafiq Ul Islam, Pasquale Mazzei, Claudio Savaglio:
Healthiness and Safety of Smart Environments through Edge Intelligence and Internet of Things Technologies. 373 - Habib Ullah Manzoor, Attia Shabbir, Ao Chen, David Flynn, Ahmed Zoha:
A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy. 374 - Xiaotong Guo, Huijie Zhao, Shuwei Shao, Xudong Li, Baochang Zhang, Na Li:
SPDepth: Enhancing Self-Supervised Indoor Monocular Depth Estimation via Self-Propagation. 375 - Godlove Suila Kuaban, Valery Nkemeni, Onyeka J. Nwobodo, Piotr Czekalski, Fabien Mieyeville:
Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain. 376 - Kian Raheem Qasim, Noor M. Naser, Ahmed J. Jabur:
An IoT-Enhanced Traffic Light Control System with Arduino and IR Sensors for Optimized Traffic Patterns. 377 - Mahmoud Elkhodr, Ketmanto Wangsa, Ergun Gide, Shakir Karim:
A Systematic Review and Multifaceted Analysis of the Integration of Artificial Intelligence and Blockchain: Shaping the Future of Australian Higher Education. 378 - Mohsen Hatami, Qian Qu, Yu Chen, Hisham A. Kholidy, Erik Blasch, Erika Ardiles-Cruz:
A Survey of the Real-Time Metaverse: Challenges and Opportunities. 379 - Rachel Kufakunesu, Gerhard P. Hancke, Adnan M. Abu-Mahfouz:
Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN. 380 - Sennanur Srinivasan Abinayaa, Prakash Arumugam, Divya Bhavani Mohan, Anand Rajendran, Abderezak Lashab, Baoze Wei, Josep M. Guerrero:
Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks. 381 - Sanket Vilas Salunke, Abdelkader Ouda:
A Performance Benchmark for the PostgreSQL and MySQL Databases. 382 - Teodora Vasilas, Claudiu Bacila, Remus Brad:
Correction: Vasilas et al. Beat the Heat: Syscall Attack Detection via Thermal Side Channel. Future Internet 2024, 16, 301. 383 - Albérico Travassos Rosário, Ricardo Raimundo:
Internet of Things and Distributed Computing Systems in Business Models. 384
Volume 16, Number 11, 2024
- Jian Peng, Kai Zhong:
Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology. 385 - As'ad Mahmoud As'ad Alnaser, Said S. Saloum, Ahmed A. M. Sharadqh, Hazem Abdel Majid Hatamleh:
Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques. 386 - Dania Marabissi, Lorenzo Mucchi:
Key Enabling Technologies for Beyond 5G Networks. 387 - Eman Yasser Daraghmi, Ahmed Hamoudi, Mamoun Abu Helou:
Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine. 388 - Samaneh Madanian, Tserendorj Chinbat, Maduka Subasinghage, David Airehrour, Farkhondeh Hassandoust, Sira Yongchareon:
Health IoT Threats: Survey of Risks and Vulnerabilities. 389 - Xinyun Liu, Ronghua Xu, Yu Chen:
A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks. 390 - Youssef Abadade, Nabil Benamar, Miloud Bagaa, Habiba Chaoui:
Empowering Healthcare: TinyML for Precise Lung Disease Classification. 391 - Jinlin Xu, Wansu Pan, Haibo Tan, Longle Cheng, Xiru Li, Xiaofeng Li:
A Modified TCP BBR to Enable High Fairness in High-Speed Wireless Networks. 392 - Beniamino Di Martino, Gennaro Junior Pezzullo, Vincenzo Bombace, Ling-Huey Li, Kuan-Ching Li:
On Exploiting and Implementing Collaborative Virtual and Augmented Reality in a Cloud Continuum Scenario. 393 - Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, Ramiro Velázquez, Donato Cafagna, Roberto de Fazio:
Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review. 394 - Ignacio Fernandez De Arroyabe, Tim Watson, Iain W. Phillips:
Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach. 395 - Constantina Kopitsa, Ioannis G. Tsoulos, Vasileios Charilogis, Athanassios Stavrakoudis:
Predicting the Duration of Forest Fires Using Machine Learning Methods. 396 - Yves Adou, Ekaterina V. Markova, Yuliya Gaidamaka:
Streaming and Elastic Traffic Service in 5G-Sliced Wireless Networks and Mutual Utilization of Guaranteed Resource Units. 397 - Pejman Abdollahzadeh Karegar, Duaa Zuhair Al-Hamid, Peter Han Joo Chong:
Deep Reinforcement Learning for UAV-Based SDWSN Data Collection. 398 - Manuel Jesús-Azabal, Zheng Zhang, Bingxia Gao, Jing Yang, Vasco N. G. J. Soares:
Connection-Aware Digital Twin for Mobile Adhoc Networks in the 5G Era. 399 - Alessandro Raschellà, Michael Mackay:
Editorial for the Special Issue on Moving Towards 6G Wireless Technologies. 400 - Aniket Basu, Oroojeni M. J. Hooman, Georgios Samakovitis, Mohammad Majid al-Rifaie:
Three-Dimensional Drone Cell Placement: Drone Placement for Optimal Coverage. 401 - Vladimir Nikic, Dusan Bortnik, Milan Lukic, Dejan Vukobratovic, Ivan Mezei:
Lightweight Digit Recognition in Smart Metering System Using Narrowband Internet of Things and Federated Learning. 402 - Paul Wiessner, Grigor Bezirganyan, Sana Sellami, Richard Chbeir, Hans-Joachim Bungartz:
Uncertainty-Aware Time Series Anomaly Detection. 403 - Alessandro Vizzarri, Franco Mazzenga:
6G Use Cases and Scenarios: A Comparison Analysis Between ITU and Other Initiatives. 404 - Antonio Maña, Francisco J. Jaime, Francisco L. Gutiérrez:
A Secure Auditable Remote Registry Pattern for IoT Systems. 405 - Aron E. Owen, Jonathan C. Roberts:
Visualisation Design Ideation with AI: A New Framework, Vocabulary, and Tool. 406 - Bakhtawar Mudassar, Shahzaib Tahir, Fawad Khan, Syed Aziz Shah, Syed Ikram Shah, Qammer Hussain Abbasi:
Privacy-Preserving Data Analytics in Internet of Medical Things. 407 - Md. Kamruzzaman, Nurul I. Sarkar, Jairo A. Gutiérrez:
Machine Learning-Based Resource Allocation Algorithm to Mitigate Interference in D2D-Enabled Cellular Networks. 408 - Venushini Rajendran, R. Kanesaraj Ramasamy:
Real-Time Evaluation of the Improved Eagle Strategy Model in the Internet of Things. 409 - Markus Walter, Jörg Keller:
Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio. 410 - Sherine Nagy Saleh, Mazen Nabil Elagamy, Yasmine N. M. Saleh, Radwa Ahmed Osman:
An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks. 411 - Joachim de Curtò, Irene C. Zarza, Juan-Carlos Cano, Carlos T. Calafate:
Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum. 412 - Evangelia Fragkou, Dimitrios Katsaros:
A Joint Survey in Decentralized Federated Learning and TinyML: A Brief Introduction to Swarm Learning. 413 - Zaher Salah, Hamza Abu Owida, Esraa Abu Elsoud, Esraa Alhenawi, Suhaila Abuowaida, Nawaf Alshdaifat:
An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form. 414 - Christos Papadopoulos, Konstantinos-Filippos Kollias, George F. Fragulis:
Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends. 415 - Daniele Marletta, Alessandro Midolo, Emiliano Tramontana:
Automatically Injecting Robustness Statements into Distributed Applications. 416 - Iana Fominska, Stefano Di Tore, Michele Nappi, Gerardo Iovane, Maurizio Sibilio, Angela Gelo:
Approaches to Identifying Emotions and Affections During the Museum Learning Experience in the Context of the Future Internet. 417 - Antonello Calabrò, Enrico Cambiaso, Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Agostino Forestiero, Flavio Lombardi, Giuseppe Manco, Eda Marchetti, Albina Orlando, Giuseppe Papuzzo:
A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures. 418 - Shaoping Xiao, Junchao Li, Zhaoan Wang, Yingbin Chen, Soheyla Tofighi:
Advancing Additive Manufacturing Through Machine Learning Techniques: A State-of-the-Art Review. 419 - Omer Nawaz, Siamak Khatibi, Muhammad Nauman Sheikh, Markus Fiedler:
Eye Tracking and Human Influence Factors' Impact on Quality of Experience of Mobile Gaming. 420 - Ahmed M. Abdelmoniem, Mona Jaber, Ali Anwar, Yuchao Zhang, Mingliang Gao:
Towards a Decentralized Collaborative Framework for Scalable Edge AI. 421 - Rasool Seyghaly, Jordi Garcia, Xavi Masip-Bruin, Jovana Kuljanin:
SBNNR: Small-Size Bat-Optimized KNN Regression. 422 - Naba Raj Khatiwoda, Babu R. Dawadi, Sashidhar Ram Joshi:
Capacity and Coverage Dimensioning for 5G Standalone Mixed-Cell Architecture: An Impact of Using Existing 4G Infrastructure. 423 - Elena-Anca Paraschiv, Lidia Bajenaru, Cristian Petrache, Ovidiu Bica, Nicolae-Dragos Nicolau:
AI-Driven Neuro-Monitoring: Advancing Schizophrenia Detection and Management Through Deep Learning and EEG Analysis. 424 - Abbas Rushdi Kubba, Hafedh Trabelsi, Faouzi Derbel:
Enhanced Long-Range Network Performance of an Oil Pipeline Monitoring System Using a Hybrid Deep Extreme Learning Machine Model. 425 - Jonathan Adkins, Ali Al Bataineh, Majd Khalaf:
Identifying Persons of Interest in Digital Forensics Using NLP-Based AI. 426 - Hamish Sturley, Augustin Fournier, Andoni Salcedo-Navarro, Miguel García-Pineda, Jaume Segura-Garcia:
Virtualization vs. Containerization, a Comparative Approach for Application Deployment in the Computing Continuum Focused on the Edge. 427 - David Carrascal, Paula Bartolomé, Elisa Rojas, Diego Lopez-Pajares, Nicolas Manso, Javier Diaz-Fuentes:
Fault Prediction and Reconfiguration Optimization in Smart Grids: AI-Driven Approach. 428 - Amma Liesvarastranta Haz, Yohanes Yohanie Fridelin Panduman, Nobuo Funabiki, Evianita Dewi Fajrianti, Sritrusta Sukaridhoto:
Fully Open-Source Meeting Minutes Generation Tool. 429 - Vikas Tomer, Sachin Sharma, Mark Davis:
Resilience in the Internet of Medical Things: A Review and Case Study. 430 - Maria Crespo-Aguado, Raul Lozano, Fernando Hernandez-Gobertti, Nuria Molner, David Gomez-Barquero:
Flexible Hyper-Distributed IoT-Edge-Cloud Platform for Real-Time Digital Twin Applications on 6G-Intended Testbeds for Logistics and Industry. 431
Volume 16, Number 12, 2024
- Vishnu S. Pendyala, Ashwin Chintalapati:
Using Multimodal Foundation Models for Detecting Fake Images on the Internet with Explanations. 432 - Mohsen Eskandari, Andrey V. Savkin:
Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications. 433 - Irene Vilà, Jordi Pérez-Romero, Oriol Sallent:
A Transfer Reinforcement Learning Approach for Capacity Sharing in Beyond 5G Networks. 434 - Vesna Antoska Knights, Olivera Petrovska, Jasenka Gajdos Kljusuric:
Nonlinear Dynamics and Machine Learning for Robotic Control Systems in IoT Applications. 435 - Mirza Ateeq Ahmed Baig, Naeem Iqbal Ratyal, Adil Amin, Umar Jamil, Sheroze Liaquat, Haris M. Khalid, Muhammad Fahad Zia:
An Ensemble Deep CNN Approach for Power Quality Disturbance Classification: A Technological Route Towards Smart Cities Using Image-Based Transfer. 436 - Amna Almutawa, Richard Adeyemi Ikuesan, Huwida Said:
Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model. 437 - Markus Hornsteiner, Michael Kreussel, Christoph Steindl, Fabian Ebner, Philip Empl, Stefan Schönig:
Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases. 438 - Diogo Barbosa, Le Gruenwald, Laurent d'Orazio, Jorge Bernardino:
QRLIT: Quantum Reinforcement Learning for Database Index Tuning. 439 - Humberto Marín-Vega, Giner Alor-Hernández, Maritza Bustos-López, Jonathan Hernández-Capistrán, Norma Leticia Hernández-Chaparro, Sergio David Ixmatlahua-Diaz:
TasksZE: A Task-Based and Challenge-Based Math Serious Game Using Facial Emotion Recognition. 440 - Minseok Koo, Jaesung Park:
MEC Server Status Optimization Framework for Energy Efficient MEC Systems by Taking a Deep-Learning Approach. 441 - Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Max Hashem Eiza, Frank T. H. den Hartog:
Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources. 442 - Dimitrios Loukatos, Athanasios Fragkos, Georgios Kargas, Konstantinos G. Arvanitis:
Implementation and Evaluation of a Low-Cost Measurement Platform over LoRa and Applicability for Soil Monitoring. 443 - Nikshep Shetty, Yongmin Li:
Detailed Image Captioning and Hashtag Generation. 444 - Débora Souza, Gabriele C. Iwashima, Viviane Cunha Farias da Costa, Carlos Eduardo Barbosa, Jano Moreira de Souza, Geraldo Zimbrão:
Architectural Trends in Collaborative Computing: Approaches in the Internet of Everything Era. 445 - Patrizia Marti, Giulia Teverini, Cecilia Goracci, Lorenzo Franchi:
Gamification of Orthodontic Treatment with Personalised Facemasks: Enhancing Patient Compliance Through Playful Engagement. 446 - Luca Ulrich, Giulio Carmassi, Paolo Garelli, Gianluca Lo Presti, Gioele Ramondetti, Giorgia Marullo, Chiara Innocente, Enrico Vezzetti:
SIGNIFY: Leveraging Machine Learning and Gesture Recognition for Sign Language Teaching Through a Serious Game. 447 - Yonit Rusho, Ganit Richter, Daphne Ruth Raban:
Assessing the Value of Information in an Augmented Reality City Experience. 448 - Emmanuel Ekene Okere, Vipin Balyan:
Advances in Blockchain-Based Internet of Vehicles Application: Prospect for Machine Learning Integration. 449 - Madiyar Nurgaliyev, Askhat Bolatbek, Batyrbek Zholamanov, Ahmet Saymbetov, Kymbat Kopbay, Evan Yershov, Sayat Orynbassar, Gulbakhar Dosymbetova, Ainur Kapparova, Nurzhigit Kuttybay, Nursultan Koshkarbay:
Machine Learning Based Localization of LoRa Mobile Wireless Nodes Using a Novel Sectorization Method. 450 - Muzun Althunayyan, Amir Javed, Omer F. Rana, Theodoros Spyridopoulos:
Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks. 451 - Mohsen Rouached, Aymen Akremi, Mouna Macherki, Naoufel Kraiem:
Policy-Based Smart Contracts Management for IoT Privacy Preservation. 452 - Meryem Chajia, El Habib Nfaoui:
Customer Churn Prediction Approach Based on LLM Embeddings and Logistic Regression. 453 - Heejoo Kim, Zhe Xiao, Xiaocai Zhang, Xiuju Fu, Zheng Qin:
Rethinking Blockchain Technologies for the Maritime Industry: An Overview of the Current Landscape. 454 - Kon Papazis, Naveen Chilamkurti:
Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems. 455 - Ernesto Cadena Muñoz, Gustavo Chica-Pedraza, Alexander Aponte-Moreno:
Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks. 456 - Nick Bray, Matthew Boeding, Michael Hempel, Hamid Sharif, Tapio Heikkilä, Markku Suomalainen, Tuomas Seppälä:
A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios. 457 - Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei:
Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection. 458 - Magdalena von Schwerin, Manfred Reichert:
A Systematic Comparison Between Open- and Closed-Source Large Language Models in the Context of Generating GDPR-Compliant Data Categories for Processing Activity Records. 459 - Mehrdad Shoeibi, Anita Ershadi Oskouei, Masoud Kaveh:
A Novel Six-Dimensional Chimp Optimization Algorithm - Deep Reinforcement Learning-Based Optimization Scheme for Reconfigurable Intelligent Surface-Assisted Energy Harvesting in Batteryless IoT Networks. 460 - Xinyang Yuan, Jiarong Wang, Haozhi Zhao, Tian Yan, Fazhi Qi:
Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method. 461 - Peng Zhang, Jiayu Shi, Maged N. Kamel Boulos:
Generative AI in Medicine and Healthcare: Moving Beyond the 'Peak of Inflated Expectations'. 462 - Bennet Gerlach, Hannes Hesse, Stefan Fischer, Martin Leucker:
Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications. 463 - Yuqi Liu, Rui Han, Xu Wang:
A Reordering Buffer Management Method at Edge Gateway in Hybrid IP-ICN Multipath Transmission System. 464 - Jerry Chou, Wu-Chun Chung:
Cloud Computing and High Performance Computing (HPC) Advances for Next Generation Internet. 465 - Shanyu Jin, Dongwoo Kim:
WiFi Fingerprint Indoor Localization Employing Adaboost and Probability-One Access Point Selection for Multi-Floor Campus Buildings. 466 - Weicheng Xing, Tianqing Zhu, Jenny Wang, Bo Liu:
A Survey on MLLMs in Education: Application and Future Directions. 467 - Demetris Trihinas, Panagiotis Michael, Moysis Symeonides:
Evaluating DL Model Scaling Trade-Offs During Inference via an Empirical Benchmark Analysis. 468 - Jesús Vegas, César Llamas:
Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments. 469 - Anthony Kenyon, Lipika Deka, David A. Elizondo:
Characterising Payload Entropy in Packet Flows - Baseline Entropy Analysis for Network Anomaly Detection. 470 - Stefan Iordache, Catalina Camelia Patilea, Ciprian Paduraru:
Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems. 471 - Eugenia Tirziu, Ana-Mihaela Vasilevschi, Adriana Alexandru, Eleonora Tudora:
Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring. 472 - Luisanna Cocco, Roberto Tonelli:
A Self-Sovereign Identity-Blockchain-Based Model Proposal for Deep Digital Transformation in the Healthcare Sector. 473 - Raul Aragonés, Joan Oliver, Carles Ferrer:
Thermoelectric Generator-Powered Long-Range Wireless Real-Time Steam Leak Detection in Steam Traps. 474 - Jeong Yang, Anoop Abraham:
Analyzing the Features, Usability, and Performance of Deploying a Containerized Mobile Web Application on Serverless Cloud Platforms. 475 - Gonçalo Augusto, Rui Pedro Duarte, Carlos Augusto S. Cunha, Ana Cristina Matos:
Pattern Recognition in Older Adults' Activities of Daily Living. 476 - Sharmin Attaran, Mohsen Attaran:
Advancing Healthcare Through the Integration of Digital Twins Technology: Personalized Medicine's Next Frontier. 477 - Mengcai Zhou, Minglun Li, Kenta Ono, Makoto Watanabe:
A Comparative Study of the User Interaction Behavior and Experience in a Home-Oriented Multi-User Interface (MUI) During Family Collaborative Cooking. 478 - Roberto Morales-Caporal, Rodolfo Eleazar Pérez Loaiza, Edmundo Bonilla Huerta, Julio Hernández-Pérez, Jose de Jesus Rangel-Magdaleno:
IoT-Based LPG Level Sensor for Domestic Stationary Tanks with Data Sharing to a Filling Plant to Optimize Distribution Routes. 479 - Ziyu Wang, Jing Ma, Edmund M.-K. Lai:
A Survey of Scenario Generation for Automated Vehicle Testing and Validation. 480 - Hesham Kamal, Maggie Mashaly:
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques. 481 - Mahmoud AlJamal, Rabee Alqura'n, Ayoub Alsarhan, Mohammad Aljaidi, Mohammad Alhmmad, Wafa' Q. Al-Jamal, Nasser S. Albalawi:
A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks. 482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.