Content
December 2023, Volume 16, Issue 1
- 1-18 Integrating Knowledge Graphs into Distribution Grid Decision Support Systems
by Yashar Kor & Liang Tan & Petr Musilek & Marek Z. Reformat - 1-18 Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
by Nasour Bagheri & Ygal Bendavid & Masoumeh Safkhani & Samad Rostampour - 1-18 Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism
by Qiang Liu & Rui Han & Yang Li - 1-19 Development of an Assessment Scale for Measurement of Usability and User Experience Characteristics of Bing Chat Conversational AI
by Goran Bubaš & Antonela Čižmešija & Andreja Kovačić - 1-20 Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures
by Herve M. Kabamba & Matthew Khouzam & Michel R. Dagenais - 1-21 Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation
by Xiu Li & Aron Henriksson & Martin Duneld & Jalal Nouri & Yongchao Wu - 1-22 An Analysis of Methods and Metrics for Task Scheduling in Fog Computing
by Javid Misirli & Emiliano Casalicchio - 1-23 Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing
by Irina Kochetkova & Kseniia Leonteva & Ibram Ghebrial & Anastasiya Vlaskina & Sofia Burtseva & Anna Kushchazli & Konstantin Samouylov - 1-24 A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions
by Filippo Dolente & Rosario Giuseppe Garroppo & Michele Pagano - 1-24 Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments
by Mizuki Asano & Takumi Miyoshi & Taku Yamazaki - 1-26 1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing
by Omar Serghini & Hayat Semlali & Asmaa Maali & Abdelilah Ghammaz & Salvatore Serrano - 1-27 Resource Indexing and Querying in Large Connected Environments
by Fouad Achkouty & Richard Chbeir & Laurent Gallon & Elio Mansour & Antonio Corral - 1-28 The Future of Flying Base Stations: Empirical and Numerical Investigations of mmWave-Enabled UAVs
by Ryunosuke Masaoka & Gia Khanh Tran & Jin Nakazato & Kei Sakaguchi - 1-33 TDLearning: Trusted Distributed Collaborative Learning Based on Blockchain Smart Contracts
by Jing Liu & Xuesong Hai & Keqin Li - 1-39 Investigating the Key Aspects of a Smart City through Topic Modeling and Thematic Analysis
by Anestis Kousis & Christos Tjortjis
November 2023, Volume 15, Issue 12
- 1-15 Enhancements in BlenderBot 3: Expanding Beyond a Singular Model Governance and Boosting Generational Performance
by Ondrej Kobza & David Herel & Jan Cuhel & Tommaso Gargiani & Jan Pichl & Petr Marek & Jakub Konrad & Jan Sedivy - 1-15 Knowledge Distillation-Based GPS Spoofing Detection for Small UAV
by Yingying Ren & Ryan D. Restivo & Wenkai Tan & Jian Wang & Yongxin Liu & Bin Jiang & Huihui Wang & Houbing Song - 1-16 Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare
by Zeeshan Ashraf & Zahid Mahmood & Muddesar Iqbal - 1-16 Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography
by Youcef Fouzar & Ahmed Lakhssassi & Ramakrishna Mundugar - 1-17 Diff-SwinT: An Integrated Framework of Diffusion Model and Swin Transformer for Radar Jamming Recognition
by Minghui Sha & Dewu Wang & Fei Meng & Wenyan Wang & Yu Han - 1-19 IoT-Based Object-Detection System to Safeguard Endangered Animals and Bolster Agricultural Farm Security
by Mohaimenul Azam Khan Raiaan & Nur Mohammad Fahad & Shovan Chowdhury & Debopom Sutradhar & Saadman Sakib Mihad & Md. Motaharul Islam - 1-19 The Multiband over Spatial Division Multiplexing Sliceable Transceiver for Future Optical Networks
by Laia Nadal & Mumtaz Ali & Francisco Javier Vílchez & Josep Maria Fàbrega & Michela Svaluto Moreolo - 1-20 User Association Performance Trade-Offs in Integrated RF/mmWave/THz Communications
by Noha Hassan & Xavier Fernando & Isaac Woungang & Alagan Anpalagan - 1-20 Extended Reality (XR) Engines for Developing Gamified Apps and Serious Games: A Scoping Review
by Humberto Marín-Vega & Giner Alor-Hernández & Maritza Bustos-López & Ignacio López-Martínez & Norma Leticia Hernández-Chaparro - 1-20 A Transmission Rate Control Method for Active Congestion Reduction Based on Network Node Bandwidth Allocation
by Hongyu Liu & Hong Ni & Rui Han - 1-21 Statistical Model Checking in Process Mining: A Comprehensive Approach to Analyse Stochastic Processes
by Fawad Ali Mangi & Guoxin Su & Minjie Zhang - 1-22 ICN-Based Enhanced Content Delivery for CDN
by Lei Gao & Xiaoyong Zhu - 1-25 Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions
by Abubakar Ahmad Musa & Adamu Hussaini & Cheng Qian & Yifan Guo & Wei Yu - 1-26 Protecting Hybrid ITS Networks: A Comprehensive Security Approach
by Ricardo Severino & José Simão & Nuno Datia & António Serrador - 1-27 Review of Blockchain Tokens Creation and Valuation
by Oana Marin & Tudor Cioara & Liana Toderean & Dan Mitrea & Ionut Anghel - 1-27 A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues
by Panagiotis Gkonis & Anastasios Giannopoulos & Panagiotis Trakadas & Xavi Masip-Bruin & Francesco D’Andria - 1-29 An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection
by Karthikeyan Saminathan & Sai Tharun Reddy Mulka & Sangeetha Damodharan & Rajagopal Maheswar & Josip Lorincz - 1-33 Empowering Digital Twin for Future Networks with Graph Neural Networks: Overview, Enabling Technologies, Challenges, and Opportunities
by Duc-Thinh Ngo & Ons Aouedi & Kandaraj Piamrat & Thomas Hassan & Philippe Raipin-Parvédy - 1-36 A Structured Narrative Prompt for Prompting Narratives from Large Language Models: Sentiment Assessment of ChatGPT-Generated Narratives and Real Tweets
by Christopher J. Lynch & Erik J. Jensen & Virginia Zamponi & Kevin O’Brien & Erika Frydenlund & Ross Gore - 1-45 A Comprehensive Survey Exploring the Multifaceted Interplay between Mobile Edge Computing and Vehicular Networks
by Ali Pashazadeh & Giovanni Nardini & Giovanni Stea
December 2023, Volume 15, Issue 12
- 1-5 Recent Advances in Information-Centric Networks (ICNs)
by José Carlos López-Ardao & Miguel Rodríguez-Pérez & Sergio Herrería-Alonso - 1-13 Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution
by Evangelos D. Spyrou & Ioannis Tsoulos & Chrysostomos Stylios - 1-17 Addressing the Gaps of IoU Loss in 3D Object Detection with IIoU
by Niranjan Ravi & Mohamed El-Sharkawy - 1-19 Envisioning Digital Practices in the Metaverse: A Methodological Perspective
by Luca Sabatucci & Agnese Augello & Giuseppe Caggianese & Luigi Gallo - 1-20 Decentralized Storage with Access Control and Data Persistence for e-Book Stores
by Keigo Ogata & Satoshi Fujita - 1-21 A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation
by Zuopeng Li & Hengshuai Ju & Zepeng Ren - 1-22 PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc
by Javier Gomez & Jose Jaime Camacho-Escoto & Luis Orozco-Barbosa & Diego Rodriguez-Torres - 1-22 A Survey on Blockchain-Based Federated Learning
by Lang Wu & Weijian Ruan & Jinhui Hu & Yaobin He - 1-22 Energy Consumption Reduction in Wireless Sensor Network-Based Water Pipeline Monitoring Systems via Energy Conservation Techniques
by Valery Nkemeni & Fabien Mieyeville & Pierre Tsafack - 1-22 Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
by James Msughter Adeke & Guangjie Liu & Junjie Zhao & Nannan Wu & Hafsat Muhammad Bashir - 1-28 Blockchain in Agriculture to Ensure Trust, Effectiveness, and Traceability from Farm Fields to Groceries
by Arvind Panwar & Manju Khari & Sanjay Misra & Urvashi Sugandh - 1-28 HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference
by Duy Tung Khanh Nguyen & Dung Hoang Duong & Willy Susilo & Yang-Wai Chow & The Anh Ta - 1-31 Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks
by Aldo Hernandez-Suarez & Gabriel Sanchez-Perez & Linda Karina Toscano-Medina & Hector Manuel Perez-Meana & Jose Portillo-Portillo & Jesus Olivares-Mercado - 1-36 Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research
by Thiago Poleto & Thyago Celso Cavalcante Nepomuceno & Victor Diogho Heuer de Carvalho & Ligiane Cristina Braga de Oliveira Friaes & Rodrigo Cleiton Paiva de Oliveira & Ciro José Jardim Figueiredo - 1-43 Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions
by Shrouk A. Ali & Shaimaa Ahmed Elsaid & Abdelhamied A. Ateya & Mohammed ElAffendi & Ahmed A. Abd El-Latif - 1-54 Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions
by Jadil Alsamiri & Khalid Alsubhi
November 2023, Volume 15, Issue 11
- 1-12 Generating Synthetic Resume Data with Large Language Models for Enhanced Job Description Classification
by Panagiotis Skondras & Panagiotis Zervas & Giannis Tzimas - 1-17 Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks
by Rao Muzamal Liaqat & Philip Branch & Jason But - 1-19 Implementation of In-Band Full-Duplex Using Software Defined Radio with Adaptive Filter-Based Self-Interference Cancellation
by Wei-Shun Liao & Ou Zhao & Keren Li & Hikaru Kawasaki & Takeshi Matsumura - 1-19 Sentiment Analysis of Chinese Product Reviews Based on Fusion of DUAL-Channel BiLSTM and Self-Attention
by Ye Yuan & Wang Wang & Guangze Wen & Zikun Zheng & Zhemin Zhuang - 1-19 GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs
by Giacomo Gori & Lorenzo Rinieri & Amir Al Sadi & Andrea Melis & Franco Callegati & Marco Prandini - 1-19 Maximizing UAV Coverage in Maritime Wireless Networks: A Multiagent Reinforcement Learning Approach
by Qianqian Wu & Qiang Liu & Zefan Wu & Jiye Zhang - 1-20 An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts
by Nigang Sun & Chenyang Zhu & Yuanyi Zhang & Yining Liu - 1-20 Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing
by Afzal Badshah & Ghani Ur Rehman & Haleem Farman & Anwar Ghani & Shahid Sultan & Muhammad Zubair & Moustafa M. Nasralla - 1-25 Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications
by Sapdo Utomo & Adarsh Rouniyar & Hsiu-Chun Hsu & Pao-Ann Hsiung - 1-32 Performance of Path Loss Models over Mid-Band and High-Band Channels for 5G Communication Networks: A Review
by Farouq E. Shaibu & Elizabeth N. Onwuka & Nathaniel Salawu & Stephen S. Oyewobi & Karim Djouani & Adnan M. Abu-Mahfouz - 1-34 Edge AI for Early Detection of Chronic Diseases and the Spread of Infectious Diseases: Opportunities, Challenges, and Future Directions
by Elarbi Badidi - 1-35 Assessing Interactive Web-Based Systems Using Behavioral Measurement Techniques
by Thanaa Saad AlSalem & Majed Aadi AlShamari
October 2023, Volume 15, Issue 11
- 1-12 Improving the Efficiency of Modern Warehouses Using Smart Battery Placement
by Nikolaos Baras & Antonios Chatzisavvas & Dimitris Ziouzios & Ioannis Vanidis & Minas Dasygenis - 1-15 Latency-Aware Semi-Synchronous Client Selection and Model Aggregation for Wireless Federated Learning
by Liangkun Yu & Xiang Sun & Rana Albelaihi & Chen Yi - 1-16 New RFI Model for Behavioral Audience Segmentation in Wi-Fi Advertising System
by Shueh-Ting Lim & Lee-Yeng Ong & Meng-Chew Leow - 1-16 A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications
by Ismail El Gaabouri & Mohamed Senhadji & Mostafa Belkasmi & Brahim El Bhiri - 1-23 A Finite State Automaton for Green Data Validation in a Real-World Smart Manufacturing Environment with Special Regard to Time-Outs and Overtaking
by Simon Paasche & Sven Groppe - 1-23 Managing Access to Confidential Documents: A Case Study of an Email Security Tool
by Elham Al Qahtani & Yousra Javed & Sarah Tabassum & Lipsarani Sahoo & Mohamed Shehab - 1-23 Task Scheduling for Federated Learning in Edge Cloud Computing Environments by Using Adaptive-Greedy Dingo Optimization Algorithm and Binary Salp Swarm Algorithm
by Weihong Cai & Fengxi Duan - 1-23 Implementation and Evaluation of a Federated Learning Framework on Raspberry PI Platforms for IoT 6G Applications
by Lorenzo Ridolfi & David Naseh & Swapnil Sadashiv Shinde & Daniele Tarchi - 1-28 Digital Management of Competencies in Web 3.0: The C-Box ® Approach
by Alberto Francia & Stefano Mariani & Giuseppe Adduce & Sandro Vecchiarelli & Franco Zambonelli - 1-29 Business Intelligence through Machine Learning from Satellite Remote Sensing Data
by Christos Kyriakos & Manolis Vavalis - 1-30 Reinforcement Learning vs. Computational Intelligence: Comparing Service Management Approaches for the Cloud Continuum
by Filippo Poltronieri & Cesare Stefanelli & Mauro Tortonesi & Mattia Zaccarini - 1-32 The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges
by Carlos Serôdio & José Cunha & Guillermo Candela & Santiago Rodriguez & Xosé Ramón Sousa & Frederico Branco - 1-44 An Overview of Current Challenges and Emerging Technologies to Facilitate Increased Energy Efficiency, Safety, and Sustainability of Railway Transport
by Zdenko Kljaić & Danijel Pavković & Mihael Cipek & Maja Trstenjak & Tomislav Josip Mlinarić & Mladen Nikšić
September 2023, Volume 15, Issue 10
- 1-13 Modeling 3D NAND Flash with Nonparametric Inference on Regression Coefficients for Reliable Solid-State Storage
by Michela Borghesi & Cristian Zambelli & Rino Micheloni & Stefano Bonnini - 1-13 Temporal-Guided Knowledge Graph-Enhanced Graph Convolutional Network for Personalized Movie Recommendation Systems
by Chin-Yi Chen & Jih-Jeng Huang - 1-14 Exploring the Factors Affecting Countries’ Adoption of Blockchain-Enabled Central Bank Digital Currencies
by Medina Ayta Mohammed & Carmen De-Pablos-Heredero & José Luis Montes Botella - 1-15 MSEN: A Multi-Scale Evolutionary Network for Modeling the Evolution of Temporal Knowledge Graphs
by Yong Yu & Shudong Chen & Rong Du & Da Tong & Hao Xu & Shuai Chen - 1-18 An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction
by Mazen Gazzan & Frederick T. Sheldon - 1-18 Investigating IPTV Malware in the Wild
by Adam Lockett & Ioannis Chalkias & Cagatay Yucel & Jane Henriksen-Bulmer & Vasilis Katos - 1-19 Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks
by Dechuan Chen & Jin Li & Jianwei Hu & Xingang Zhang & Shuai Zhang - 1-25 Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review
by Pavlos Cheimonidis & Konstantinos Rantos - 1-26 Application of an Effective Hierarchical Deep-Learning-Based Object Detection Model Integrated with Image-Processing Techniques for Detecting Speed Limit Signs, Rockfalls, Potholes, and Car Crashes
by Yao-Liang Chung - 1-27 A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection
by Zoltán Szabó & Vilmos Bilicki
October 2023, Volume 15, Issue 10
- 1-12 Challenges of Network Forensic Investigation in Fog and Edge Computing
by Daniel Spiekermann & Jörg Keller - 1-15 Financial Data Quality Evaluation Method Based on Multiple Linear Regression
by Meng Li & Jiqiang Liu & Yeping Yang - 1-15 Reinforcement Learning Approach for Adaptive C-V2X Resource Management
by Teguh Indra Bayu & Yung-Fa Huang & Jeang-Kuo Chen - 1-16 Comparison of Supervised Learning Algorithms on a 5G Dataset Reduced via Principal Component Analysis (PCA)
by Joan D. Gonzalez-Franco & Jorge E. Preciado-Velasco & Jose E. Lozano-Rizk & Raul Rivera-Rodriguez & Jorge Torres-Rodriguez & Miguel A. Alonso-Arevalo - 1-17 Evaluating MPTCP Congestion Control Algorithms: Implications for Streaming in Open Internet
by Łukasz Piotr Łuczak & Przemysław Ignaciuk & Michał Morawski - 1-18 Data-Driven Safe Deliveries: The Synergy of IoT and Machine Learning in Shared Mobility
by Fatema Elwy & Raafat Aburukba & A. R. Al-Ali & Ahmad Al Nabulsi & Alaa Tarek & Ameen Ayub & Mariam Elsayeh - 1-20 Flying Watchdog-Based Guard Patrol with Check Point Data Verification
by Endrowednes Kuantama & Avishkar Seth & Alice James & Yihao Zhang - 1-21 A Personalized Ontology Recommendation System to Effectively Support Ontology Development by Reuse
by Marwa Abdelreheim & Taysir Hassan A. Soliman & Friederike Klan - 1-21 Edge-Computing-Based People-Counting System for Elevators Using MobileNet–Single-Stage Object Detection
by Tsu-Chuan Shen & Edward T.-H. Chu - 1-22 kClusterHub: An AutoML-Driven Tool for Effortless Partition-Based Clustering over Varied Data Types
by Konstantinos Gratsos & Stefanos Ougiaroglou & Dionisis Margaris - 1-22 Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms
by Athanasios Koulianos & Antonios Litke - 1-23 End-to-End Service Availability in Heterogeneous Multi-Tier Cloud–Fog–Edge Networks
by Igor Kabashkin - 1-26 Fluent but Not Factual: A Comparative Analysis of ChatGPT and Other AI Chatbots’ Proficiency and Originality in Scientific Writing for Humanities
by Edisa Lozić & Benjamin Štular - 1-28 A Graph DB-Based Solution for Semantic Technologies in the Future Internet
by Stefano Ferilli & Eleonora Bernasconi & Davide Di Pierro & Domenico Redavid - 1-29 Machine Learning: Models, Challenges, and Research Directions
by Tala Talaei Khoei & Naima Kaabouch - 1-29 Oceania’s 5G Multi-Tier Fixed Wireless Access Link’s Long-Term Resilience and Feasibility Analysis
by Satyanand Singh & Joanna Rosak-Szyrocka & István Drotár & Xavier Fernando - 1-31 Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities
by Salman Ali AlQahtani - 1-37 Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks
by Šarūnas Grigaliūnas & Michael Schmidt & Rasa Brūzgienė & Panayiota Smyrli & Vladislav Bidikov - 1-46 A Comprehensive Analysis and Investigation of the Public Discourse on Twitter about Exoskeletons from 2017 to 2023
by Nirmalya Thakur & Kesha A. Patel & Audrey Poon & Rishika Shah & Nazif Azizi & Changhee Han
August 2023, Volume 15, Issue 9
- 1-15 Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges
by Peng Zhang & Maged N. Kamel Boulos - 1-15 Short-Term Mobile Network Traffic Forecasting Using Seasonal ARIMA and Holt-Winters Models
by Irina Kochetkova & Anna Kushchazli & Sofia Burtseva & Andrey Gorshenin - 1-16 Digital Twin Applications in Manufacturing Industry: A Case Study from a German Multi-National
by Martin Wynn & Jose Irizar - 1-16 3D Visualization in Digital Medicine Using XR Technology
by Miklos Vincze & Bela Molnar & Miklos Kozlovszky - 1-16 Enhancing E-Learning with Blockchain: Characteristics, Projects, and Emerging Trends
by Mahmoud Bidry & Abdellah Ouaguid & Mohamed Hanine - 1-17 E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios
by Lijun Zu & Hongyi Li & Liang Zhang & Zhihui Lu & Jiawei Ye & Xiaoxia Zhao & Shijing Hu - 1-17 Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing
by Vyas O’Neill & Ben Soh - 1-19 Autism Screening in Toddlers and Adults Using Deep Learning and Fair AI Techniques
by Ishaani Priyadarshini - 1-21 Prospects of Cybersecurity in Smart Cities
by Fernando Almeida - 1-24 A Novel SDWSN-Based Testbed for IoT Smart Applications
by Duaa Zuhair Al-Hamid & Pejman A. Karegar & Peter Han Joo Chong - 1-31 Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security
by Carolina Del-Valle-Soto & Ramon A. Briseño & Leonardo J. Valdivia & Ramiro Velázquez & Juan Arturo Nolazco-Flores - 1-35 3D Path Planning Algorithms in UAV-Enabled Communications Systems: A Mapping Study
by Jorge Carvajal-Rodriguez & Marco Morales & Christian Tipantuña
September 2023, Volume 15, Issue 9
- 1-2 Advances Techniques in Computer Vision and Multimedia
by Yang Wang - 1-2 Editorial for the Special Issue on “Software Engineering and Data Science”, Volume II
by Davide Tosi - 1-16 FREDY: Federated Resilience Enhanced with Differential Privacy
by Zacharias Anastasakis & Terpsichori-Helen Velivassaki & Artemis Voulkidis & Stavroula Bourou & Konstantinos Psychogyios & Dimitrios Skias & Theodore Zahariadis - 1-17 Entering the Metaverse from the JVM: The State of the Art, Challenges, and Research Areas of JVM-Based Web 3.0 Tools and Libraries
by Vlad Bucur & Liviu-Cristian Miclea - 1-17 On Evaluating IoT Data Trust via Machine Learning
by Timothy Tadj & Reza Arablouei & Volkan Dedeoglu - 1-18 Precoding for RIS-Assisted Multi-User MIMO-DQSM Transmission Systems
by Francisco R. Castillo-Soria & J. Alberto Del Puerto-Flores & Cesar A. Azurdia-Meza & Vinoth Babu Kumaravelu & Jorge Simón & Carlos A. Gutierrez - 1-18 Application of ChatGPT-Based Digital Human in Animation Creation
by Chong Lan & Yongsheng Wang & Chengze Wang & Shirong Song & Zheng Gong - 1-19 Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection
by Furkat Safarov & Mainak Basak & Rashid Nasimov & Akmalbek Abdusalomov & Young Im Cho - 1-19 A Hybrid Neural Ordinary Differential Equation Based Digital Twin Modeling and Online Diagnosis for an Industrial Cooling Fan
by Chao-Chung Peng & Yi-Ho Chen - 1-19 Internet of Robotic Things (IoRT) and Metaheuristic Optimization Techniques Applied for Wheel-Legged Robot
by Mateusz Malarczyk & Grzegorz Kaczmarczyk & Jaroslaw Szrek & Marcin Kaminski - 1-19 An Automatic Transformer from Sequential to Parallel Java Code
by Alessandro Midolo & Emiliano Tramontana - 1-19 Force-Based Self-Organizing MANET/FANET with a UAV Swarm
by Fabrice Saffre & Hanno Hildmann & Antti Anttonen - 1-20 Intelligent Unsupervised Network Traffic Classification Method Using Adversarial Training and Deep Clustering for Secure Internet of Things
by Weijie Zhang & Lanping Zhang & Xixi Zhang & Yu Wang & Pengfei Liu & Guan Gui - 1-21 Hospital Readmission and Length-of-Stay Prediction Using an Optimized Hybrid Deep Model
by Alireza Tavakolian & Alireza Rezaee & Farshid Hajati & Shahadat Uddin - 1-21 Technical, Qualitative and Energy Analysis of Wireless Control Modules for Distributed Smart Home Systems
by Andrzej Ożadowicz - 1-22 FLAME-VQA: A Fuzzy Logic-Based Model for High Frame Rate Video Quality Assessment
by Štefica Mrvelj & Marko Matulin - 1-22 Prototyping a Hyperledger Fabric-Based Security Architecture for IoMT-Based Health Monitoring Systems
by Filippos Pelekoudas-Oikonomou & José C. Ribeiro & Georgios Mantas & Georgia Sakellari & Jonathan Gonzalez - 1-23 Proof of Flow: A Design Pattern for the Green Energy Market
by Valerio Mandarino & Giuseppe Pappalardo & Emiliano Tramontana - 1-23 Evaluation of Blockchain Networks’ Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks
by Kithmini Godewatte Arachchige & Philip Branch & Jason But - 1-24 Wireless Energy Harvesting for Internet-of-Things Devices Using Directional Antennas
by Hsiao-Ching Chang & Hsing-Tsung Lin & Pi-Chung Wang - 1-25 Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm
by Rezak Aziz & Soumya Banerjee & Samia Bouzefrane & Thinh Le Vinh - 1-27 FL-LoRaMAC: A Novel Framework for Enabling On-Device Learning for LoRa-Based IoT Applications
by Shobhit Aggarwal & Asis Nasipuri - 1-27 Automatic Short Text Summarization Techniques in Social Media Platforms
by Fahd A. Ghanem & M. C. Padma & Ramez Alkhatib - 1-28 Analysis of Program Representations Based on Abstract Syntax Trees and Higher-Order Markov Chains for Source Code Classification Task
by Artyom V. Gorchakov & Liliya A. Demidova & Peter N. Sovietov
July 2023, Volume 15, Issue 8
- 1-13 Virtual Grid-Based Routing for Query-Driven Wireless Sensor Networks
by Shushant Kumar Jain & Rinkoo Bhatia & Neeraj Shrivastava & Sharad Salunke & Mohammad Farukh Hashmi & Neeraj Dhanraj Bokde - 1-14 An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things
by Zainab Jamroz & Insaf Ullah & Bilal Hassan & Noor Ul Amin & Muhammad Asghar Khan & Pascal Lorenz & Nisreen Innab - 1-18 RIS-Assisted Fixed NOMA: Outage Probability Analysis and Transmit Power Optimization
by Vinoth Babu Kumaravelu & Agbotiname Lucky Imoize & Francisco R. Castillo Soria & Periyakarupan Gurusamy Sivabalan Velmurugan & Sundarrajan Jayaraman Thiruvengadam & Dinh-Thuan Do & Arthi Murugadass - 1-18 A Novel Approach for Fraud Detection in Blockchain-Based Healthcare Networks Using Machine Learning
by Mohammed A. Mohammed & Manel Boujelben & Mohamed Abid - 1-19 A Comparative Analysis of High Availability for Linux Container Infrastructures
by Marek Šimon & Ladislav Huraj & Nicolas Búčik - 1-20 Intelligent Caching with Graph Neural Network-Based Deep Reinforcement Learning on SDN-Based ICN
by Jiacheng Hou & Tianhao Tao & Haoye Lu & Amiya Nayak - 1-25 The mPOC Framework: An Autonomous Outbreak Prediction and Monitoring Platform Based on Wearable IoMT Approach
by Sasan Adibi - 1-26 Towards Efficient Resource Allocation for Federated Learning in Virtualized Managed Environments
by Fotis Nikolaidis & Moysis Symeonides & Demetris Trihinas - 1-27 Features and Scope of Regulatory Technologies: Challenges and Opportunities with Industrial Internet of Things
by Jinying Li & Ananda Maiti & Jiangang Fei - 1-30 Task Allocation Methods and Optimization Techniques in Edge Computing: A Systematic Review of the Literature
by Vasilios Patsias & Petros Amanatidis & Dimitris Karampatzakis & Thomas Lagkas & Kalliopi Michalakopoulou & Alexandros Nikitas - 1-31 The Meta-Metaverse: Ideation and Future Directions
by Mohammad (Behdad) Jamshidi & Arash Dehghaniyan Serej & Alireza Jamshidi & Omid Moztarzadeh - 1-31 A Review of ARIMA vs. Machine Learning Approaches for Time Series Forecasting in Data Driven Networks
by Vaia I. Kontopoulou & Athanasios D. Panagopoulos & Ioannis Kakkos & George K. Matsopoulos - 1-60 The Power of Generative AI: A Review of Requirements, Models, Input–Output Formats, Evaluation Metrics, and Challenges
by Ajay Bandi & Pydi Venkata Satya Ramesh Adapa & Yudu Eswar Vinay Pratap Kumar Kuchi
August 2023, Volume 15, Issue 8
- 1-7 Special Issue on Security and Privacy in Blockchains and the IoT Volume II
by Christoph Stach & Clémentine Gritti - 1-14 Mapping EEG Alpha Activity: Assessing Concentration Levels during Player Experience in Virtual Reality Video Games
by Jesus GomezRomero-Borquez & J. Alberto Del Puerto-Flores & Carolina Del-Valle-Soto - 1-14 Correlation Analysis Model of Environment Parameters Using IoT Framework in a Biogas Energy Generation Context
by Angelique Mukasine & Louis Sibomana & Kayalvizhi Jayavel & Kizito Nkurikiyeyezu & Eric Hitimana - 1-16 An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks
by Asad Iqbal & Muhammad Zubair & Muhammad Asghar Khan & Insaf Ullah & Ghani Ur-Rehman & Alexey V. Shvetsov & Fazal Noor - 1-16 LoRa Communication Using TVWS Frequencies: Range and Data Rate
by Anjali R. Askhedkar & Bharat S. Chaudhari & Maha Abdelhaq & Raed Alsaqour & Rashid Saeed & Marco Zennaro - 1-16 An Efficient Adaptive Data-Link-Layer Architecture for LoRa Networks
by Micael Coutinho & Jose A. Afonso & Sérgio F. Lopes - 1-16 An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network
by Amthal K. Mousa & Mohammed Najm Abdullah - 1-17 A Survey on Pump and Dump Detection in the Cryptocurrency Market Using Machine Learning
by Mohammad Javad Rajaei & Qusay H. Mahmoud - 1-19 Applying Machine Learning in Cloud Service Price Prediction: The Case of Amazon IaaS
by George Fragiadakis & Evangelia Filiopoulou & Christos Michalakelis & Thomas Kamalakis & Mara Nikolaidou - 1-19 Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
by Ugochukwu Onyekachi Obonna & Felix Kelechi Opara & Christian Chidiebere Mbaocha & Jude-Kennedy Chibuzo Obichere & Isdore Onyema Akwukwaegbu & Miriam Mmesoma Amaefule & Cosmas Ifeanyi Nwakanma - 1-19 Intelligent Transmit Antenna Selection Schemes for High-Rate Fully Generalized Spatial Modulation
by Hindavi Kishor Jadhav & Vinoth Babu Kumaravelu & Arthi Murugadass & Agbotiname Lucky Imoize & Poongundran Selvaprabhu & Arunkumar Chandrasekhar - 1-20 Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps
by Mishall Al-Zubaidie & Ghanima Sabr Shyaa - 1-21 Enhancing Network Security: A Machine Learning-Based Approach for Detecting and Mitigating Krack and Kr00k Attacks in IEEE 802.11
by Zaher Salah & Esraa Abu Elsoud - 1-21 Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)
by Anand Singh Rajawat & S. B. Goyal & Pradeep Bedi & Tony Jan & Md Whaiduzzaman & Mukesh Prasad - 1-22 Real-World Implementation and Integration of an Automatic Scoring System for Workplace Safety Courses in Italian
by Nicola Arici & Alfonso Emilio Gerevini & Matteo Olivato & Luca Putelli & Luca Sigalini & Ivan Serina - 1-24 Cluster-Based Data Aggregation in Flying Sensor Networks Enabled Internet of Things
by Abdu Salam & Qaisar Javaid & Masood Ahmad & Ishtiaq Wahid & Muhammad Yeasir Arafat - 1-28 Efficient Integration of Heterogeneous Mobility-Pollution Big Data for Joint Analytics at Scale with QoS Guarantees
by Isam Mashhour Al Jawarneh & Luca Foschini & Paolo Bellavista - 1-28 A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M
by Luis F. Gonzalez & Ivan Vidal & Francisco Valera & Raul Martin & Dulce Artalejo - 1-38 SEDIA: A Platform for Semantically Enriched IoT Data Integration and Development of Smart City Applications
by Dimitrios Lymperis & Christos Goumopoulos - 1-77 An Overview of WebAssembly for IoT: Background, Tools, State-of-the-Art, Challenges, and Future Directions
by Partha Pratim Ray
June 2023, Volume 15, Issue 7
- 1-3 Developments of Computer Vision and Image Processing: Methodologies and Applications
by Manuel J. C. S. Reis - 1-16 Heart DT: Monitoring and Preventing Cardiac Pathologies Using AI and IoT Sensors
by Roberta Avanzato & Francesco Beritelli & Alfio Lombardo & Carmelo Ricci - 1-18 Bus Travel Time Prediction Based on the Similarity in Drivers’ Driving Styles
by Zhenzhong Yin & Bin Zhang - 1-18 Exploiting Misconfiguration Vulnerabilities in Microsoft’s Azure Active Directory for Privilege Escalation Attacks
by Ibrahim Bu Haimed & Marwan Albahar & Ali Alzubaidi - 1-18 Synonyms, Antonyms and Factual Knowledge in BERT Heads
by Lorenzo Serina & Luca Putelli & Alfonso Emilio Gerevini & Ivan Serina - 1-20 Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects
by Andrea Pinna & Maria Ilaria Lunesu & Stefano Orrù & Roberto Tonelli - 1-23 Cache-Enabled Adaptive Video Streaming: A QoE-Based Evaluation Study
by Eirini Liotou & Dionysis Xenakis & Vasiliki Georgara & Georgios Kourouniotis & Lazaros Merakos - 1-26 KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments
by Giorgio Dell’Immagine & Jacopo Soldani & Antonio Brogi - 1-27 A New AI-Based Semantic Cyber Intelligence Agent
by Fahim Sufi - 1-29 Artificial Intelligence in Virtual Telemedicine Triage: A Respiratory Infection Diagnosis Tool with Electronic Measuring Device
by Naythan Villafuerte & Santiago Manzano & Paulina Ayala & Marcelo V. García - 1-31 Hybridizing Fuzzy String Matching and Machine Learning for Improved Ontology Alignment
by Mohammed Suleiman Mohammed Rudwan & Jean Vincent Fonou-Dombeu - 1-34 An Ontology for Spatio-Temporal Media Management and an Interactive Application
by Takuro Sone & Shin Kato & Ray Atarashi & Jin Nakazato & Manabu Tsukada & Hiroshi Esaki - 1-38 Secure Partitioning of Cloud Applications, with Cost Look-Ahead
by Alessandro Bocci & Stefano Forti & Roberto Guanciale & Gian-Luigi Ferrari & Antonio Brogi
July 2023, Volume 15, Issue 7
- 1-13 Optimization of the Decision Criterion for Increasing the Bandwidth Utilization by Means of the Novel Effective DBA Algorithm in NG-PON2 Networks
by Rastislav Róka - 1-16 Assisting Drivers at Stop Signs in a Connected Vehicle Environment
by Maram Bani Younes - 1-16 An IoT System and MODIS Images Enable Smart Environmental Management for Mekong Delta
by Vu Hien Phan & Danh Phan Hong Pham & Tran Vu Pham & Kashif Naseer Qureshi & Cuong Pham-Quoc - 1-16 A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network
by Yang Hu & Liangliang Gong & Xinyang Li & Hui Li & Ruoxin Zhang & Rentao Gu - 1-17 Analysis of ICS and SCADA Systems Attacks Using Honeypots
by Mohamed Mesbah & Mahmoud Said Elsayed & Anca Delia Jurcut & Marianne Azer - 1-17 Machine Learning for Network Intrusion Detection—A Comparative Study
by Mustafa Al Lail & Alejandro Garcia & Saul Olivo - 1-18 Intelligent Video Streaming at Network Edge: An Attention-Based Multiagent Reinforcement Learning Solution
by Xiangdong Tang & Fei Chen & Yunlong He - 1-18 Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22
by Sikha S. Bagui & Dustin Mink & Subhash C. Bagui & Michael Plain & Jadarius Hill & Marshall Elam - 1-19 An Accurate Platform for Investigating TCP Performance in Wi-Fi Networks
by Shunji Aoyagi & Yuki Horie & Do Thi Thu Hien & Thanh Duc Ngo & Duy-Dinh Le & Kien Nguyen & Hiroo Sekiya - 1-20 Acoustic TDOA Measurement and Accurate Indoor Positioning for Smartphone
by Bingbing Cheng & Jiao Wu