You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 14, Issue 4

April 2022 - 25 articles

Cover Story: 41 participants were subjected to different types of training on phishing in an experiment. They were asked to assume a persona and open the inbox of that persona. They were given the task of removing all phishing emails. One group was subjected to contextual training, another to game-based training, and a third was used as a control group. The maximum score was 11, and the contextual group scored the highest (10). The mean score for the game-based group was 9.09, while it was 8.82 for the control group. Only 7.7% of the participants scored 11 points, and all of those were in the contextual group. Two main conclusions be drawn from this research. First, contextual training is superior to the on-demand game-based training used in this experiment. Second, phishing detection is a tough challenge for users, even with training. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (25)

  • Article
  • Open Access
5 Citations
11,251 Views
14 Pages

Creating Honeypots to Prevent Online Child Exploitation

  • Joel Scanlan,
  • Paul A. Watters,
  • Jeremy Prichard,
  • Charlotte Hunn,
  • Caroline Spiranovic and
  • Richard Wortley

14 April 2022

Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. T...

  • Article
  • Open Access
18 Citations
3,435 Views
11 Pages

14 April 2022

In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and effici...

  • Article
  • Open Access
7 Citations
4,691 Views
32 Pages

Future Wireless Networking Experiments Escaping Simulations

  • Sachin Sharma,
  • Saish Urumkar,
  • Gianluca Fontanesi,
  • Byrav Ramamurthy and
  • Avishek Nag

14 April 2022

In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in th...

  • Systematic Review
  • Open Access
38 Citations
13,747 Views
46 Pages

13 April 2022

Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Appl...

  • Review
  • Open Access
118 Citations
17,508 Views
35 Pages

From 5G to 6G—Challenges, Technologies, and Applications

  • Ahmed I. Salameh and
  • Mohamed El Tarhuni

12 April 2022

As the deployment of 5G mobile radio networks gains momentum across the globe, the wireless research community is already planning the successor of 5G. In this paper, we highlight the shortcomings of 5G in meeting the needs of more data-intensive, lo...

  • Review
  • Open Access
95 Citations
15,205 Views
28 Pages

ML-Based 5G Network Slicing Security: A Comprehensive Survey

  • Ramraj Dangi,
  • Akshay Jadhav,
  • Gaurav Choudhary,
  • Nicola Dragoni,
  • Manas Kumar Mishra and
  • Praveen Lalwani

Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broad...

  • Article
  • Open Access
13 Citations
4,726 Views
19 Pages

Ransomware-Resilient Self-Healing XML Documents

  • Mahmoud Al-Dwairi,
  • Ahmed S. Shatnawi,
  • Osama Al-Khaleel and
  • Basheer Al-Duwairi

In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infecte...

  • Article
  • Open Access
12 Citations
4,957 Views
19 Pages

Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing

  • Attila Csaba Marosi,
  • Márk Emodi,
  • Ákos Hajnal,
  • Róbert Lovas,
  • Tamás Kiss,
  • Valerie Poser,
  • Jibinraj Antony,
  • Simon Bergweiler,
  • Hamed Hamzeh and
  • James Deslauriers
  • + 1 author

The use of mature, reliable, and validated solutions can save significant time and cost when introducing new technologies to companies. Reference Architectures represent such best-practice techniques and have the potential to increase the speed and r...

  • Article
  • Open Access
4 Citations
2,827 Views
20 Pages

Analyzing and predicting community evolution has many important applications in criminology, sociology, and other fields. In community evolution prediction, most of the existing research is simply calculating the features of the community, and then p...

  • Article
  • Open Access
9 Citations
3,922 Views
22 Pages

HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds

  • Chrysostomos Symvoulidis,
  • George Marinos,
  • Athanasios Kiourtis,
  • Argyro Mavrogiorgou and
  • Dimosthenis Kyriazis

Over the past few years, increasing attention has been given to the health sector and the integration of new technologies into it. Cloud computing and storage clouds have become essentially state of the art solutions for other major areas and have st...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903