You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 12, Issue 2

February 2020 - 23 articles

Cover Story: With the emergence and development of the Internet of Things (IoT), devices have been widely used at home and in industry and transportation. While IoT provides many valuable benefits, security vulnerabilities often occur in IoT devices, which create severe risks to users’ privacy and property. This article focuses on the core topic of vulnerability analysis technologies in the field of IoT security. It summarizes related research according to the life cycle of vulnerability analysis, including vulnerability discovery, detection, and mitigation. In the future, there will be more and more technologies combined with new fields to implement automated vulnerability analysis on large-scale and cross-architecture.View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (23)

  • Article
  • Open Access
46 Citations
17,436 Views
13 Pages

Know Your Customer (KYC) Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture

  • Nikolaos Kapsoulis,
  • Alexandros Psychas,
  • Georgios Palaiokrassas,
  • Achilleas Marinakis,
  • Antonios Litke and
  • Theodora Varvarigou

24 February 2020

Enterprise blockchain solutions attempt to solve the crucial matter of user privacy, albeit that blockchain was initially directed towards full transparency. In the context of Know Your Customer (KYC) standardization, a decentralized schema that enab...

  • Editorial
  • Open Access
2 Citations
3,759 Views
3 Pages

14 February 2020

Taking advantage of new developing technologies, power systems are being developed into smarter grids with the vision of becoming the next-generation electric grid for smart cities. Some of the emerging issues and challenges associated with the devel...

  • Review
  • Open Access
3 Citations
6,100 Views
19 Pages

14 February 2020

This work constitutes a narrative review of the state of knowledge and advances in the intervention and treatment of addictions through the use of information and communication technologies, considering the growing demand for virtuality-mediated stra...

  • Article
  • Open Access
11 Citations
4,837 Views
14 Pages

14 February 2020

Event prediction plays an important role in financial risk assessment and disaster warning, which can help government decision-making and economic investment. Previous works are mainly based on time series for event prediction such as statistical lan...

  • Article
  • Open Access
31 Citations
5,733 Views
16 Pages

A Blockchain based PKI Validation System based on Rare Events Management

  • Maurizio Talamo,
  • Franco Arcieri,
  • Andrea Dimitri and
  • Christian H. Schunck

14 February 2020

Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI...

  • Article
  • Open Access
14 Citations
4,561 Views
13 Pages

13 February 2020

Harmful algal blooms (HABs) often cause great harm to fishery production and the safety of human lives. Therefore, the detection and prediction of HABs has become an important issue. Machine learning has been increasingly used to predict HABs at home...

  • Article
  • Open Access
1 Citations
4,637 Views
15 Pages

13 February 2020

Reinforcement learning algorithms usually require a large number of empirical samples and give rise to a slow convergence in practical applications. One solution is to introduce transfer learning: Knowledge from well-learned source tasks can be reuse...

  • Article
  • Open Access
1 Citations
3,810 Views
14 Pages

12 February 2020

In the Internet of Things (IoT), the scope of wireless sensor nodes is extended to things deployed in a pervasive world. For various IoT service applications, things can gather and share their information with each other through self-decision-making....

  • Article
  • Open Access
21 Citations
4,915 Views
12 Pages

RFID RSS Fingerprinting System for Wearable Human Activity Recognition

  • Wafa Shuaieb,
  • George Oguntala,
  • Ali AlAbdullah,
  • Huthaifa Obeidat,
  • Rameez Asif,
  • Raed A. Abd-Alhameed,
  • Mohammed S. Bin-Melha and
  • Chakib Kara-Zaïtri

12 February 2020

Alternative healthcare solutions have been identified as a viable approach to ameliorate the increasing demand for telehealth and prompt healthcare delivery. Moreover, indoor ocalization using different technologies and approaches have greatly contri...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903