Content
October 2020, Volume 12, Issue 11
- 1-50 Password Managers—It’s All about Trust and Transparency
by Fahad Alodhyani & George Theodorakopoulos & Philipp Reinecke
September 2020, Volume 12, Issue 10
- 1-15 Digital Twin Conceptual Model within the Context of Internet of Things
by A. R. Al-Ali & Ragini Gupta & Tasneem Zaman Batool & Taha Landolsi & Fadi Aloul & Ahmad Al Nabulsi - 1-16 The Value of Simple Heuristics for Virtualized Network Function Placement
by Zahra Jahedi & Thomas Kunz - 1-16 An Internet of Things Model for Improving Process Management on University Campus
by William Villegas-Ch & Xavier Palacios-Pacheco & Milton Román-Cañizares - 1-16 Tourist Behaviour Analysis Based on Digital Pattern of Life—An Approach and Case Study
by Sergei Mikhailov & Alexey Kashevnik - 1-16 Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems
by Niraj Thapa & Zhipeng Liu & Dukka B. KC & Balakrishna Gokaraju & Kaushik Roy - 1-17 A Survey of Defensive Measures for Digital Persecution in the Global South
by Louis Edward Papa & Thaier Hayajneh - 1-27 Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
by Guma Ali & Mussa Ally Dida & Anael Elikana Sam - 1-28 Policy-Engineering Optimization with Visual Representation and Separation-of-Duty Constraints in Attribute-Based Access Control
by Wei Sun & Hui Su & Huacheng Xie - 1-37 Phishing Attacks Survey: Types, Vectors, and Technical Approaches
by Rana Alabdan
October 2020, Volume 12, Issue 10
- 1-10 An Approach to Changing Competence Assessment for Human Resources in Expert Networks
by Mikhail Petrov - 1-13 Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User
by Xin Song & Lin Xia & Siyang Xu & Yue Wang - 1-14 Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments with Eavesdropping Avoidance
by Hailong Huang & Andrey V. Savkin - 1-15 An Efficient Resource Scheduling Strategy for V2X Microservice Deployment in Edge Servers
by Yanjun Shi & Yijia Guo & Lingling Lv & Keshuai Zhang - 1-16 Visualization, Interaction and Analysis of Heterogeneous Textbook Resources
by Christian Scheel & Francesca Fallucchi & Ernesto William De Luca - 1-22 Immigration as a Divisive Topic: Clusters and Content Diffusion in the Italian Twitter Debate
by Salvatore Vilella & Mirko Lai & Daniela Paolotti & Giancarlo Ruffo - 1-23 Research Trend on the Use of IT in Digital Addiction: An Investigation Using a Systematic Literature Review
by Flourensia Sapty Rahayu & Lukito Edi Nugroho & Ridi Ferdiana & Djoko Budiyanto Setyohadi - 1-30 A Local Feature Engineering Strategy to Improve Network Anomaly Detection
by Salvatore Carta & Alessandro Sebastian Podda & Diego Reforgiato Recupero & Roberto Saia - 1-31 NFV-Enabled Efficient Renewable and Non-Renewable Energy Management: Requirements and Algorithms
by Christian Tipantuña & Xavier Hesselbach
September 2020, Volume 12, Issue 9
- 1-9 From Symptom Tracking to Contact Tracing: A Framework to Explore and Assess COVID-19 Apps
by Abinaya Megan Ramakrishnan & Aparna Nicole Ramakrishnan & Sarah Lagan & John Torous - 1-10 Intransitiveness: From Games to Random Walks
by Alberto Baldi & Franco Bagnoli - 1-15 Design and Validation of a Questionnaire to Measure Future Spanish Teachers’ Perceptions of Cinema in Pre-School and Primary Education: Towards Active and Technological Learning
by Alejandro Lorenzo-Lledó - 1-15 Expectations and limitations of Cyber-Physical Systems (CPS) for Advanced Manufacturing: A View from the Grinding Industry
by Iñigo Pombo & Leire Godino & Jose Antonio Sánchez & Rafael Lizarralde - 1-16 Generic Tasks for Algorithms
by Gregor Milicic & Sina Wetzel & Matthias Ludwig - 1-16 A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages
by Abdallah Ghourabi & Mahmood A. Mahmood & Qusay M. Alzubi - 1-18 Improving Human Activity Monitoring by Imputation of Missing Sensory Data: Experimental Study
by Ivan Miguel Pires & Faisal Hussain & Nuno M. Garcia & Eftim Zdravevski - 1-20 An Empirical Recommendation Framework to Support Location-Based Services
by Animesh Chandra Roy & Mohammad Shamsul Arefin & A. S. M. Kayes & Mohammad Hammoudeh & Khandakar Ahmed - 1-20 On Frequency Estimation and Detection of Heavy Hitters in Data Streams
by Federica Ventruto & Marco Pulimeno & Massimo Cafaro & Italo Epicoco - 1-21 Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
by In Lee - 1-23 Integrating IP Mobility Management Protocols and MANET: A Survey
by Mohammad Al mojamed
August 2020, Volume 12, Issue 9
- 1-12 Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation
by Max Ismailov & Michail Tsikerdekis & Sherali Zeadally - 1-13 A Distributed Architecture for Smart Recycling Using Machine Learning
by Dimitris Ziouzios & Dimitris Tsiktsiris & Nikolaos Baras & Minas Dasygenis - 1-13 Online Group Student Peer-Communication as an Element of Open Education
by Daria Bylieva & Zafer Bekirogullari & Dmitry Kuznetsov & Nadezhda Almazova & Victoria Lobatyuk & Anna Rubtsova - 1-17 Topic Detection Based on Sentence Embeddings and Agglomerative Clustering with Markov Moment
by Svetlana S. Bodrunova & Andrey V. Orekhov & Ivan S. Blekanov & Nikolay S. Lyudkevich & Nikita A. Tarasov - 1-18 A Hybrid SWIM Data Naming Scheme Based on TLC Structure
by Zhijun Wu & Bohua Cui - 1-22 Social Media, Quo Vadis? Prospective Development and Implications
by Laura Studen & Victor Tiberius - 1-27 Systematic Evaluation of LibreSocial—A Peer-to-Peer Framework for Online Social Networks
by Newton Masinde & Liat Khitman & Iakov Dlikman & Kalman Graffi - 1-27 CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews
by Franklin Tchakounté & Athanase Esdras Yera Pagor & Jean Claude Kamgang & Marcellin Atemkeng - 1-30 Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey
by Babangida Isyaku & Mohd Soperi Mohd Zahid & Maznah Bte Kamat & Kamalrulnizam Abu Bakar & Fuad A. Ghaleb
July 2020, Volume 12, Issue 8
- 1-13 Considerations on the Implications of the Internet of Things in Spanish Universities: The Usefulness Perceived by Professors
by José-María Romero-Rodríguez & Santiago Alonso-García & José-Antonio Marín-Marín & Gerardo Gómez-García - 1-14 Adaptive Allocation Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks
by Walaa Hassan & Tamer Farag - 1-16 Hybrid Consensus Algorithm Based on Modified Proof-of-Probability and DPoS
by Baocheng Wang & Zetao Li & Haibin Li - 1-16 Data Lake Governance: Towards a Systemic and Natural Ecosystem Analogy
by Marzieh Derakhshannia & Carmen Gervet & Hicham Hajj-Hassan & Anne Laurent & Arnaud Martin - 1-16 The Role of the CFO of an Industrial Company: An Analysis of the Impact of Blockchain Technology
by Philipp Sandner & Anna Lange & Philipp Schulden - 1-18 Scientific Development of Educational Artificial Intelligence in Web of Science
by Antonio-José Moreno-Guerrero & Jesús López-Belmonte & José-Antonio Marín-Marín & Rebeca Soler-Costa - 1-19 Improving Transaction Speed and Scalability of Blockchain Systems via Parallel Proof of Work
by Shihab Shahriar Hazari & Qusay H. Mahmoud - 1-20 Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT
by Igor M. Coelho & Vitor N. Coelho & Rodolfo P. Araujo & Wang Yong Qiang & Brett D. Rhodes - 1-22 A PEKS-Based NDN Strategy for Name Privacy
by Kyi Thar Ko & Htet Htet Hlaing & Masahiro Mambo
August 2020, Volume 12, Issue 8
- 1-12 From Color-Avoiding to Color-Favored Percolation in Diluted Lattices
by Michele Giusfredi & Franco Bagnoli - 1-13 Multimodal Deep Learning for Group Activity Recognition in Smart Office Environments
by George Albert Florea & Radu-Casian Mihailescu - 1-13 Coping Strategies and Anxiety and Depressive Symptoms in Young Adult Victims of Cyberstalking: A Questionnaire Survey in an Italian Sample
by Tatiana Begotti & Martina Bollo & Daniela Acquadro Maran - 1-15 The Impact of English Learning Motivation and Attitude on Well-Being: Cram School Students in Taiwan
by Chih-Fong Lo & Chin-Huang Lin - 1-15 Progressive Teaching Improvement For Small Scale Learning: A Case Study in China
by Bo Jiang & Yanbai He & Rui Chen & Chuanyan Hao & Sijiang Liu & Gangyao Zhang - 1-15 Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)
by Andrew John Poulter & Steven J. Ossont & Simon J. Cox - 1-16 Consortium Blockchain Smart Contracts for Musical Rights Governance in a Collective Management Organizations (CMOs) Use Case
by Nikolaos Kapsoulis & Alexandros Psychas & Georgios Palaiokrassas & Achilleas Marinakis & Antonios Litke & Theodora Varvarigou & Charalampos Bouchlis & Amaryllis Raouzaiou & Gonçal Calvo & Jordi Escudero Subirana - 1-17 How Reputation Systems Change the Psychological Antecedents of Fairness in Virtual Environments
by Stefania Collodi & Maria Fiorenza & Andrea Guazzini & Mirko Duradoni - 1-17 Understanding the Determinants and Future Challenges of Cloud Computing Adoption for High Performance Computing
by Theo Lynn & Grace Fox & Anna Gourinovitch & Pierangelo Rosati
June 2020, Volume 12, Issue 7
- 1-14 Employing a Chatbot for News Dissemination during Crisis: Design, Implementation and Evaluation
by Theodora A. Maniou & Andreas Veglis - 1-17 Investigating the Relationship between Personality and Technology Acceptance with a Focus on the Smartphone from a Gender Perspective: Results of an Exploratory Survey Study
by Cornelia Sindermann & René Riedl & Christian Montag
July 2020, Volume 12, Issue 7
- 1-3 5G-V2X Communications and Networking for Connected and Autonomous Vehicles
by Antonella Molinaro & Claudia Campolo & Jérôme Härri & Christian Esteve Rothenberg & Alexey Vinel - 1-3 Multimedia Quality of Experience (QoE): Current Status and Future Direction
by Chaminda Hewage & Erhan Ekmekcioglu - 1-4 Innovative Topologies and Algorithms for Neural Networks
by Salvatore Graziani & Maria Gabriella Xibilia - 1-11 Science Cafés, Science Shops and the Lockdown Experience in Florence and Rome
by Giovanna Pacini & Cinzia Belmonte & Franco Bagnoli - 1-17 An IoT-Based Framework for Smart Water Supply Systems Management
by Rosiberto Gonçalves & Jesse J. M. Soares & Ricardo M. F. Lima - 1-20 Collaborative Facilitation and Collaborative Inhibition in Virtual Environments
by Andrea Guazzini & Elisa Guidi & Cristina Cecchini & Eiko Yoneki - 1-22 An Updated Survey of Efficient Hardware Architectures for Accelerating Deep Convolutional Neural Networks
by Maurizio Capra & Beatrice Bussolino & Alberto Marchisio & Muhammad Shafique & Guido Masera & Maurizio Martina - 1-23 A Decoding-Complexity and Rate-Controlled Video-Coding Algorithm for HEVC
by Thanuja Mallikarachchi & Dumidu Talagala & Hemantha Kodikara Arachchi & Chaminda Hewage & Anil Fernando - 1-24 Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach
by Vita Santa Barletta & Danilo Caivano & Antonella Nannavecchia & Michele Scalera - 1-27 Human Psychophysiological Activity Estimation Based on Smartphone Camera and Wearable Electronics
by Alexey Kashevnik & Mikhail Kruglov & Igor Lashkov & Nikolay Teslya & Polina Mikhailova & Evgeny Ripachev & Vladislav Malutin & Nikita Saveliev & Igor Ryabchikov - 1-28 A Study on Design Requirement Development and Satisfaction for Future Virtual World Systems
by Bingqing Shen & Weiming Tan & Jingzhi Guo & Hongming Cai & Bin Wang & Shuaihe Zhuo
May 2020, Volume 12, Issue 6
- 1-20 COVID-19 Epidemic as E-Learning Boost? Chronological Development and Effects at an Austrian University against the Background of the Concept of “E-Learning Readiness”
by Martin Ebner & Sandra Schön & Clarissa Braun & Markus Ebner & Ypatios Grigoriadis & Maria Haas & Philipp Leitner & Behnam Taraghi - 1-25 Simulating Resource Management across the Cloud-to-Thing Continuum: A Survey and Future Directions
by Malika Bendechache & Sergej Svorobej & Patricia Takako Endo & Theo Lynn
June 2020, Volume 12, Issue 6
- 1-14 Multi-Source Neural Model for Machine Translation of Agglutinative Language
by Yirong Pan & Xiao Li & Yating Yang & Rui Dong - 1-15 CMS: A Continuous Machine-Learning and Serving Platform for Industrial Big Data
by KeDi Li & Ning Gui - 1-17 Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks
by Gonzalo Olmedo & Román Lara-Cueva & Diego Martínez & Celso de Almeida - 1-17 Validating the Adoption of Heterogeneous Internet of Things with Blockchain
by Lulwah AlSuwaidan & Nuha Almegren - 1-20 Volunteer Down: How COVID-19 Created the Largest Idling Supercomputer on Earth
by Nane Kratzke - 1-20 Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking
by William Hurst & Aaron Boddy & Madjid Merabti & Nathan Shone - 1-20 Collective Intelligence in Polish-Ukrainian Internet Projects. Debate Models and Research Methods
by Rafał Olszowski & Marcin Chmielowski - 1-21 Performance Model for Video Service in 5G Networks
by Jiao Wang & Jay Weitzen & Oguz Bayat & Volkan Sevindik & Mingzhe Li - 1-23 A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
by Alessandra de Melo e Silva & João José Costa Gondim & Robson de Oliveira Albuquerque & Luis Javier García Villalba - 1-24 Input Selection Methods for Soft Sensor Design: A Survey
by Francesco Curreri & Giacomo Fiumara & Maria Gabriella Xibilia - 1-24 Risk-Based Access Control Model: A Systematic Literature Review
by Hany F. Atlam & Muhammad Ajmal Azad & Madini O. Alassafi & Abdulrahman A. Alshdadi & Ahmed Alenezi - 1-30 SOLIOT—Decentralized Data Control and Interactions for IoT
by Sebastian R. Bader & Maria Maleshkova - 1-31 Improvements of the xAAL Home Automation System
by Christophe Lohr & Jérôme Kerdreux
April 2020, Volume 12, Issue 5
- 1-11 Digital Cloud Environment: Present Challenges and Future Forecast
by Serg Mescheryakov & Dmitry Shchemelinin & Konstantin Izrailov & Victor Pokussov - 1-11 Mobile Application to Provide Traffic Congestion Estimates and Tourism Spots to Promote Additional Stopovers
by Saizo Aoyagi & Yiping Le & Tetsuo Shimizu & Kazuki Takahashi - 1-12 Immersive Safe Oceans Technology: Developing Virtual Onboard Training Episodes for Maritime Safety
by Evangelos Markopoulos & Mika Luimula - 1-16 Adolescent’s Collective Intelligence: Empirical Evidence in Real and Online Classmates Groups
by Enrico Imbimbo & Federica Stefanelli & Andrea Guazzini - 1-18 Human-Smart Environment Interactions in Smart Cities: Exploring Dimensionalities of Smartness
by H. Patricia McKenna - 1-21 A Scalable and Semantic Data as a Service Marketplace for Enhancing Cloud-Based Applications
by Evangelos Psomakelis & Anastasios Nikolakopoulos & Achilleas Marinakis & Alexandros Psychas & Vrettos Moulos & Theodora Varvarigou & Andreas Christou - 1-31 Suitability of Graph Database Technology for the Analysis of Spatio-Temporal Data
by Sedick Baker Effendi & Brink van der Merwe & Wolf-Tilo Balke
May 2020, Volume 12, Issue 5
- 1-10 Artificial Intelligence Systems-Aided News and Copyright: Assessing Legal Implications for Journalism Practices
by Javier Díaz-Noci - 1-13 Implementation of a Topology Independent MAC (TiMAC) Policy on a Low-Cost IoT System
by Georgios Tsoumanis & Asterios Papamichail & Vasileios Dragonas & George Koufoudakis & Constantinos T. Angelis & Konstantinos Oikonomou - 1-15 RE-examining the Effect of Online Social Support on Subjective Well-Being: The Moderating Role of Experience
by Meng-Hsiang Hsu & Chun-Ming Chang & Shing-Ling Wu - 1-16 A Time Bank System Design on the Basis of Hyperledger Fabric Blockchain
by Yu-Tse Lee & Jhan-Jia Lin & Jane Yung-Jen Hsu & Ja-Ling Wu - 1-18 Language-Independent Fake News Detection: English, Portuguese, and Spanish Mutual Features
by Hugo Queiroz Abonizio & Janaina Ignacio de Morais & Gabriel Marques Tavares & Sylvio Barbon Junior - 1-18 Multi-Blockchain Structure for a Crowdsensing-Based Smart Parking System
by Mihui Kim & Youngmin Kim - 1-18 A Bibliometric Overview of Twitter-Related Studies Indexed in Web of Science
by Jingyuan Yu & Juan Muñoz-Justicia - 1-20 Modeling and Simulation Tools for Fog Computing—A Comprehensive Survey from a Cost Perspective
by Spiridoula V. Margariti & Vassilios V. Dimakopoulos & Georgios Tsoumanis - 1-20 Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks
by Alexandros Fakis & Georgios Karopoulos & Georgios Kambourakis - 1-23 DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems
by Jane Henriksen-Bulmer & Shamal Faily & Sheridan Jeary
March 2020, Volume 12, Issue 4
- 1-12 Blockchain and Fog Based Architecture for Internet of Everything in Smart Cities
by Parminder Singh & Anand Nayyar & Avinash Kaur & Uttam Ghosh - 1-19 Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives
by Todor Tagarev
April 2020, Volume 12, Issue 4
- 1-10 Semantic Search Enhanced with Rating Scores
by Anna Formica & Elaheh Pourabbas & Francesco Taglino - 1-12 Blockchain Behavioral Traffic Model as a Tool to Influence Service IT Security
by Vasiliy Elagin & Anastasia Spirkina & Andrei Levakov & Ilya Belozertsev - 1-13 A Design of a Parcel Delivery Systemfor Point to Point Delivery with IoT Technology
by Ha Yoon Song & Hyochang Han - 1-14 Micro-Blog Sentiment Classification Method Based on the Personality and Bagging Algorithm
by Wenzhong Yang & Tingting Yuan & Liejun Wang - 1-15 Improving Recommendation Accuracy Using Social Network of Owners in Social Internet of Vehicles
by Kashif Zia & Muhammad Shafi & Umar Farooq - 1-17 Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey
by Georgios Kavallieratos & Sokratis Katsikas & Vasileios Gkioulos - 1-18 Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET
by Nishu Gupta & Ravikanti Manaswini & Bongaram Saikrishna & Francisco Silva & Ariel Teles - 1-19 PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting
by Ajit Kumar & Vinti Agarwal & Shishir Kumar Shandilya & Andrii Shalaginov & Saket Upadhyay & Bhawna Yadav - 1-19 What Is an Open IoT Platform? Insights from a Systematic Mapping Study
by Bahtijar Vogel & Yuji Dong & Blerim Emruli & Paul Davidsson & Romina Spalazzese - 1-19 DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities
by Fayozbek Rustamov & Juhwan Kim & JooBeom Yun - 1-21 Revisiting the High-Performance Reconfigurable Computing for Future Datacenters
by Qaiser Ijaz & El-Bay Bourennane & Ali Kashif Bashir & Hira Asghar - 1-21 Publishing Anonymized Set-Valued Data via Disassociation towards Analysis
by Nancy Awad & Jean-Francois Couchot & Bechara Al Bouna & Laurent Philippe - 1-23 Aggregated Indices in Website Quality Assessment
by Karol Król & Dariusz Zdonek - 1-43 Exploring the Dominance of the English Language on the Websites of EU Countries
by Andreas Giannakoulopoulos & Minas Pergantis & Nikos Konstantinou & Aristeidis Lamprogeorgos & Laida Limniati & Iraklis Varlamis
March 2020, Volume 12, Issue 3
- 1-2 The Internet of Things for Smart Environments
by Giuseppe Ruggeri & Valeria Loscrí & Marica Amadeo & Carlos T. Calafate - 1-12 Improved Proactive Routing Protocol Considering Node Density Using Game Theory in Dense Networks
by Omuwa Oyakhire & Koichi Gyoda - 1-12 Smart Devices Security Enhancement via Power Supply Monitoring
by Dimitrios Myridakis & Georgios Spathoulas & Athanasios Kakarountas & Dimitrios Schinianakis - 1-12 Consensus Crash Testing: Exploring Ripple’s Decentralization Degree in Adversarial Environments
by Klitos Christodoulou & Elias Iosif & Antonios Inglezakis & Marinos Themistocleous - 1-13 Introducing External Knowledge to Answer Questions with Implicit Temporal Constraints over Knowledge Base
by Wenqing Wu & Zhenfang Zhu & Qiang Lu & Dianyuan Zhang & Qiangqiang Guo - 1-14 RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
by Mohamed Amine Ferrag & Leandros Maglaras & Ahmed Ahmim & Makhlouf Derdour & Helge Janicke - 1-14 Emerging Trends and Innovation Modes of Internet Finance—Results from Co-Word and Co-Citation Networks
by Xiaoyu Li & Jiahong Yuan & Yan Shi & Zilai Sun & Junhu Ruan - 1-14 Feature Selection Algorithms as One of the Python Data Analytical Tools
by Nikita Pilnenskiy & Ivan Smetannikov - 1-15 A Review of the Control Plane Scalability Approaches in Software Defined Networking
by Abdelrahman Abuarqoub - 1-15 A Systematic Review of Blockchain Literature in Logistics and Supply Chain Management: Identifying Research Questions and Future Directions
by Sebastian Kummer & David M. Herold & Mario Dobrovnik & Jasmin Mikl & Nicole Schäfer - 1-16 Graph-based Method for App Usage Prediction with Attributed Heterogeneous Network Embedding
by Yifei Zhou & Shaoyong Li & Yaping Liu - 1-19 Development of User-Participatory Crowdsensing System for Improved Privacy Preservation
by Mihui Kim & Junhyeok Yun - 1-19 Do Cryptocurrency Prices Camouflage Latent Economic Effects? A Bayesian Hidden Markov Approach
by Constandina Koki & Stefanos Leonardos & Georgios Piliouras - 1-20 Security of IoT Application Layer Protocols: Challenges and Findings
by Giuseppe Nebbione & Maria Carla Calzarossa - 1-25 LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations
by Bharat S. Chaudhari & Marco Zennaro & Suresh Borkar - 1-26 Multi-formalism Models for Performance Engineering
by Enrico Barbierato & Marco Gribaudo & Giuseppe Serazzi - 1-37 Considered Factors of Online News Based on Respondents’ Eye Activity Using Eye-Tracker Analysis
by Daniel Hadrian Yohandy & Djoko Budiyanto Setyohadi & Albertus Joko Santoso
February 2020, Volume 12, Issue 3
- 1-14 Language Cognition and Pronunciation Training Using Applications
by Ming Sung Kan & Atsushi Ito - 1-17 BASN—Learning Steganography with a Binary Attention Mechanism
by Pin Wu & Xuting Chang & Yang Yang & Xiaoqiang Li
January 2020, Volume 12, Issue 2
- 1-12 Well-Being and Social Media: A Systematic Review of Bergen Addiction Scales
by Mirko Duradoni & Federico Innocenti & Andrea Guazzini - 1-17 MCCM: An Approach for Connectivity and Coverage Maximization
by Alia Ghaddar & Monah Bou Hatoum & Ghassan Fadlallah & Hamid Mcheick - 1-18 Adaptive Pre/Post-Compensation of Cascade Filters in Coherent Optical Transponders
by Ahmad Abdo & Claude D’Amours - 1-27 A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures
by Grigorios Kakkavas & Despoina Gkatzioura & Vasileios Karyotis & Symeon Papavassiliou - 1-27 Mobility, Citizens, Innovation and Technology in Digital and Smart Cities
by Thays A. Oliveira & Yuri B. Gabrich & Helena Ramalhinho & Miquel Oliver & Miri W. Cohen & Luiz S. Ochi & Serigne Gueye & Fábio Protti & Alysson A. Pinto & Diógenes V. M. Ferreira & Igor M. Coelho & Vitor N. Coelho - 1-27 A Rule-Based Language and Verification Framework of Dynamic Service Composition
by Willy Kengne Kungne & Georges-Edouard Kouamou & Claude Tangha
February 2020, Volume 12, Issue 2
- 1-2 Information-Centric Networking (ICN)
by Nikos Fotiou - 1-3 Global Trends and Advances Towards a Smarter Grid and Smart Cities
by Om P. Malik - 1-12 A Novel Low-Complexity Fault Diagnosis Algorithm for Energy Internet in Smart Cities
by Jiong Wang & Hua Zhang & Dongliang Lin & Huibin Feng & Tao Wang & Hongyan Zhang & Xiaoding Wang - 1-12 A Methodology Based on Computational Patterns for Offloading of Big Data Applications on Cloud-Edge Platforms
by Beniamino Di Martino & Salvatore Venticinque & Antonio Esposito & Salvatore D’Angelo - 1-12 RFID RSS Fingerprinting System for Wearable Human Activity Recognition
by Wafa Shuaieb & George Oguntala & Ali AlAbdullah & Huthaifa Obeidat & Rameez Asif & Raed A. Abd-Alhameed & Mohammed S. Bin-Melha & Chakib Kara-Zaïtri - 1-13 Unsteady Multi-Element Time Series Analysis and Prediction Based on Spatial-Temporal Attention and Error Forecast Fusion
by Xiaofan Wang & Lingyu Xu - 1-13 Know Your Customer (KYC) Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture
by Nikolaos Kapsoulis & Alexandros Psychas & Georgios Palaiokrassas & Achilleas Marinakis & Antonios Litke & Theodora Varvarigou - 1-14 A Survey on Troll Detection
by Michele Tomaiuolo & Gianfranco Lombardo & Monica Mordonini & Stefano Cagnoni & Agostino Poggi - 1-14 Data Exchange in Cluster Structure for Longevity of IoT
by Soobin Jeon - 1-14 Hierarchical Gated Recurrent Unit with Semantic Attention for Event Prediction
by Zichun Su & Jialin Jiang - 1-15 Latent Structure Matching for Knowledge Transfer in Reinforcement Learning
by Yi Zhou & Fenglei Yang - 1-16 A Blockchain based PKI Validation System based on Rare Events Management
by Maurizio Talamo & Franco Arcieri & Andrea Dimitri & Christian H. Schunck - 1-18 Intelligent Thermal Comfort Controlling System for Buildings Based on IoT and AI
by Yafei Zhao & Paolo Vincenzo Genovese & Zhixing Li - 1-19 Cognitive Training for the Treatment of Addictions Mediated by Information and Communication Technologies (ICT)
by Sandra Restrepo & Dubis Rincón & Edwin Sepulveda - 1-20 EAOA: Energy-Aware Grid-Based 3D-Obstacle Avoidance in Coverage Path Planning for UAVs
by Alia Ghaddar & Ahmad Merei - 1-23 A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices
by Miao Yu & Jianwei Zhuge & Ming Cao & Zhiwei Shi & Lin Jiang - 1-30 Strategies of Success for Social Networks: Mermaids and Temporal Evolution
by Massimo Marchiori & Lino Possamai
January 2020, Volume 12, Issue 1
- 1-3 Software Defined Networking (SDN) and Network Function Virtualization (NFV)
by Symeon Papavassiliou - 1-8 Acknowledgement to Reviewers of Future Internet in 2019
by Future Internet Editorial Office - 1-11 Geocentric Spherical Surfaces Emulating the Geostationary Orbit at Any Latitude with Zenith Links
by Emilio Matricciani - 1-13 Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
by Zhijun Wu & Yun Zhang & Enzhong Xu - 1-15 Study on Bridge Displacement Monitoring Algorithms Based on Multi-Targets Tracking
by Jiajia Wang & Guangming Li - 1-15 Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
by Zhijun Wu & Rong Li & Panpan Yin & Changliang Li - 1-16 Mitigating Webshell Attacks through Machine Learning Techniques
by You Guo & Hector Marco-Gisbert & Paul Keir - 1-16 Twitter-Based Safety Confirmation System for Disaster Situations
by Keisuke Utsu & Mariko Abe & Shuji Nishikawa & Osamu Uchida - 1-17 Long-Range Wireless Radio Technologies: A Survey
by Brandon Foubert & Nathalie Mitton - 1-19 An Architecture for Biometric Electronic Identification Document System Based on Blockchain †
by Rafael Páez & Manuel Pérez & Gustavo Ramírez & Juan Montes & Lucas Bouvarel - 1-21 WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications
by Asfund Ausaf & Mohammad Zubair Khan & Muhammad Awais Javed & Ali Kashif Bashir - 1-22 A Novel Resource Allocation Scheme in NOMA-Based Cellular Network with D2D Communications
by Jingpu Wang & Xin Song & Yatao Ma
December 2019, Volume 12, Issue 1
- 1-2 Search Engine Optimization
by Andreas Veglis & Dimitrios Giomelakis - 1-13 Coverage and Energy Efficiency Analysis for Two-Tier Heterogeneous Cellular Networks Based on Matérn Hard-Core Process
by Jie Yang & Ziyu Pan & Lihong Guo - 1-13 An Adaptive Differential Protection and Fast Auto-Closing System for 10 kV Distribution Networks Based on 4G LTE Wireless Communication
by Wen An & Jun Jie Ma & Hong Yang Zhou & Hong Shan Chen & Xu Jun & Xu Jian - 1-14 Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems
by Samuel Yankson & Mahdi Ghamkhari - 1-16 Decoupling-Based Channel Access Mechanism for Improving Throughput and Fairness in Dense Multi-Rate WLANs
by Jianjun Lei & Ying Wang & Hong Yun - 1-16 5G Cross-Border Operation for Connected and Automated Mobility: Challenges and Solutions
by Apostolos Kousaridas & Andreas Schimpe & Sebastian Euler & Xavier Vilajosana & Mikael Fallgren & Giada Landi & Francesca Moscatelli & Sokratis Barmpounakis & Francisco Vázquez-Gallego & Roshan Sedar & Rodrigo Silva & Laurent Dizambourg & Stefan Wendt & Maciej Muehleisen & Kurt Eckert & Jérôme Härri & Jesus Alonso-Zarate
December 2019, Volume 11, Issue 12
- 1-10 Partial Pre-Emphasis for Pluggable 400 G Short-Reach Coherent Systems
by Ahmad Abdo & Xueyang Li & Md Samiul Alam & Mahdi Parvizi & Naim Ben-Hamida & Claude D’Amours & David Plant - 1-11 Dependable and Secure Voting Mechanism in Edge Computing
by Pedro A.R.S. Costa & Marko Beko - 1-12 A Method of Node Layout of a Complex Network Based on Community Compression
by Chengxiang Liu & Wei Xiong & Xitao Zhang & Zheng Liu - 1-12 Reinforcement Learning Based Query Routing Approach for P2P Systems
by Fawaz Alanazi & Taoufik Yeferny - 1-13 A Novel Neural Network-Based Method for Medical Text Classification
by Li Qing & Weng Linhong & Ding Xuehai - 1-13 The Missing Link to Computational Thinking
by Michael Pollak & Martin Ebner - 1-14 Spectrum Management Schemes for Internet of Remote Things (IoRT) Devices in 5G Networks via GEO Satellite
by Gbolahan Aiyetoro & Pius Owolawi - 1-15 Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment
by Zakariae Belghazi & Nabil Benamar & Adnane Addaim & Chaker Abdelaziz Kerrache - 1-15 SEO inside Newsrooms: Reports from the Field
by Dimitrios Giomelakis & Christina Karypidou & Andreas Veglis - 1-16 Research on Community Detection of Online Social Network Members Based on the Sparse Subspace Clustering Approach
by Zihe Zhou & Bo Tian - 1-16 Blockchain: Current Challenges and Future Prospects/Applications
by Spyros Makridakis & Klitos Christodoulou - 1-18 An Efficient Dynamic Load Balancing Scheme Based on Nash Bargaining in SDN
by Guoyan Li & Kaixin Li & Yi Liu & Yuheng Pan - 1-23 A Review of Internet of Things Technologies for Ambient Assisted Living Environments
by Rytis Maskeliūnas & Robertas Damaševičius & Sagiv Segal - 1-23 Acquiring Ontology Axioms through Mappings to Data Sources
by Floriana Di Pinto & Giuseppe De Giacomo & Domenico Lembo & Maurizio Lenzerini & Riccardo Rosati
November 2019, Volume 11, Issue 12
- 1-11 Learning Dynamic Factors to Improve the Accuracy of Bus Arrival Time Prediction via a Recurrent Neural Network
by Xin Zhou & Peixin Dong & Jianping Xing & Peijia Sun - 1-13 A Deep Ensemble Learning Method for Effort-Aware Just-In-Time Defect Prediction
by Saleh Albahli - 1-16 Real-Time Stream Processing in Social Networks with RAM 3 S
by Ilaria Bartolini & Marco Patella - 1-24 Performance Analysis of On-Demand Scheduling with and without Network Coding in Wireless Broadcast
by G. G. Md. Nawaz Ali & Victor C. S. Lee & Yuxuan Meng & Peter H. J. Chong & Jun Chen
November 2019, Volume 11, Issue 11
- 1-12 Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics
by Majid Ashouri & Fabian Lorig & Paul Davidsson & Romina Spalazzese