Skip to Content

Future Internet, Volume 14, Issue 4

2022 April - 25 articles

Cover Story: 41 participants were subjected to different types of training on phishing in an experiment. They were asked to assume a persona and open the inbox of that persona. They were given the task of removing all phishing emails. One group was subjected to contextual training, another to game-based training, and a third was used as a control group. The maximum score was 11, and the contextual group scored the highest (10). The mean score for the game-based group was 9.09, while it was 8.82 for the control group. Only 7.7% of the participants scored 11 points, and all of those were in the contextual group. Two main conclusions be drawn from this research. First, contextual training is superior to the on-demand game-based training used in this experiment. Second, phishing detection is a tough challenge for users, even with training. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (25)

  • Article
  • Open Access
5 Citations
11,803 Views
14 Pages

Creating Honeypots to Prevent Online Child Exploitation

  • Joel Scanlan,
  • Paul A. Watters,
  • Jeremy Prichard,
  • Charlotte Hunn,
  • Caroline Spiranovic and
  • Richard Wortley

14 April 2022

Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. T...

  • Article
  • Open Access
19 Citations
3,530 Views
11 Pages

14 April 2022

In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and effici...

  • Article
  • Open Access
8 Citations
4,888 Views
32 Pages

Future Wireless Networking Experiments Escaping Simulations

  • Sachin Sharma,
  • Saish Urumkar,
  • Gianluca Fontanesi,
  • Byrav Ramamurthy and
  • Avishek Nag

14 April 2022

In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in th...

  • Systematic Review
  • Open Access
39 Citations
14,381 Views
46 Pages

13 April 2022

Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Appl...

  • Review
  • Open Access
127 Citations
18,271 Views
35 Pages

From 5G to 6G—Challenges, Technologies, and Applications

  • Ahmed I. Salameh and
  • Mohamed El Tarhuni

12 April 2022

As the deployment of 5G mobile radio networks gains momentum across the globe, the wireless research community is already planning the successor of 5G. In this paper, we highlight the shortcomings of 5G in meeting the needs of more data-intensive, lo...

  • Review
  • Open Access
100 Citations
15,733 Views
28 Pages

ML-Based 5G Network Slicing Security: A Comprehensive Survey

  • Ramraj Dangi,
  • Akshay Jadhav,
  • Gaurav Choudhary,
  • Nicola Dragoni,
  • Manas Kumar Mishra and
  • Praveen Lalwani

Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broad...

  • Article
  • Open Access
13 Citations
4,982 Views
19 Pages

Ransomware-Resilient Self-Healing XML Documents

  • Mahmoud Al-Dwairi,
  • Ahmed S. Shatnawi,
  • Osama Al-Khaleel and
  • Basheer Al-Duwairi

In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infecte...

  • Article
  • Open Access
13 Citations
5,126 Views
19 Pages

Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing

  • Attila Csaba Marosi,
  • Márk Emodi,
  • Ákos Hajnal,
  • Róbert Lovas,
  • Tamás Kiss,
  • Valerie Poser,
  • Jibinraj Antony,
  • Simon Bergweiler,
  • Hamed Hamzeh and
  • József Kovács
  • + 1 author

The use of mature, reliable, and validated solutions can save significant time and cost when introducing new technologies to companies. Reference Architectures represent such best-practice techniques and have the potential to increase the speed and r...

  • Article
  • Open Access
4 Citations
2,902 Views
20 Pages

Analyzing and predicting community evolution has many important applications in criminology, sociology, and other fields. In community evolution prediction, most of the existing research is simply calculating the features of the community, and then p...

  • Article
  • Open Access
9 Citations
4,012 Views
22 Pages

HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds

  • Chrysostomos Symvoulidis,
  • George Marinos,
  • Athanasios Kiourtis,
  • Argyro Mavrogiorgou and
  • Dimosthenis Kyriazis

Over the past few years, increasing attention has been given to the health sector and the integration of new technologies into it. Cloud computing and storage clouds have become essentially state of the art solutions for other major areas and have st...

  • Article
  • Open Access
3 Citations
5,258 Views
22 Pages

31 March 2022

Phone of Things (PoT) extends the connectivity options for IoT systems by leveraging the ubiquitous phone network infrastructure, making it part of the IoT architecture. PoT enriches the connectivity options of IoT while promoting its affordability,...

  • Article
  • Open Access
3 Citations
5,767 Views
14 Pages

29 March 2022

Although deep learning has proven to be tremendously successful, the main issue is the dependency of its performance on the quality and quantity of training datasets. Since the quality of data can be affected by biases, a novel deep learning method b...

  • Article
  • Open Access
7 Citations
4,638 Views
25 Pages

TalkRoBots: A Middleware for Robotic Systems in Industry 4.0

  • Marwane Ayaida,
  • Nadhir Messai,
  • Frederic Valentin and
  • Dimitri Marcheras

29 March 2022

This paper proposes a middleware called TalkRoBots that handles interoperability issues, which could be encountered in Industry 4.0. The latter proposes a unified communication approach facilitating the collaboration between heterogeneous equipment w...

  • Article
  • Open Access
36 Citations
10,581 Views
18 Pages

29 March 2022

Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated f...

  • Article
  • Open Access
3 Citations
3,741 Views
28 Pages

27 March 2022

The prominence of Machine-to-Machine (M2M) communications in the future wide area communication networks place various challenges to the cellular technologies such as the Long Term Evolution (LTE) standard, owing to the large number of M2M devices ge...

  • Article
  • Open Access
3 Citations
3,504 Views
15 Pages

25 March 2022

As a new network architecture, information-centric networking (ICN) decouples the identifiers and locators of network entities and makes full use of in-network cache technology to improve the content distribution efficiency. For reliable multicast, I...

  • Article
  • Open Access
22 Citations
8,959 Views
16 Pages

Evaluation of Contextual and Game-Based Training for Phishing Detection

  • Joakim Kävrestad,
  • Allex Hagberg,
  • Marcus Nohlberg,
  • Jana Rambusch,
  • Robert Roos and
  • Steven Furnell

25 March 2022

Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typ...

  • Article
  • Open Access
1 Citations
3,771 Views
17 Pages

24 March 2022

The significance of research on public opinion monitoring of social network emergencies is becoming increasingly important. As a platform for users to communicate and share information online, social networks are often the source of public opinion ab...

  • Article
  • Open Access
58 Citations
8,961 Views
17 Pages

24 March 2022

Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short a...

  • Article
  • Open Access
8 Citations
4,368 Views
16 Pages

Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network

  • Subhra Sankha Sarma,
  • Ranjay Hazra and
  • Peter Han Joo Chong

24 March 2022

Enabling D2D communication in the mmWave band has many obstacles that must be mitigated. The primary concern is the introduction of interference from various sources. Thus, we focused our work on the performance of decode-and-forward (DF) relay-assis...

  • Article
  • Open Access
3 Citations
4,281 Views
16 Pages

Deep Regression Neural Networks for Proportion Judgment

  • Mario Milicevic,
  • Vedran Batos,
  • Adriana Lipovac and
  • Zeljka Car

23 March 2022

Deep regression models are widely employed to solve computer vision tasks, such as human age or pose estimation, crowd counting, object detection, etc. Another possible area of application, which to our knowledge has not been systematically explored...

  • Article
  • Open Access
12 Citations
3,944 Views
17 Pages

Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators

  • Peter Krammer,
  • Marcel Kvassay,
  • Ján Mojžiš,
  • Martin Kenyeres,
  • Miloš Očkay,
  • Ladislav Hluchý,
  • Ľuboš Pavlov and
  • Ľuboš Skurčák

This paper addresses the regression modeling of local environmental pollution levels for electric power industry needs, which is fundamental for the proper design and maintenance of high-voltage transmission lines and insulators in order to prevent v...

  • Article
  • Open Access
7 Citations
5,867 Views
24 Pages

Bitcoin as a Safe Haven during COVID-19 Disease

  • Luisanna Cocco,
  • Roberto Tonelli and
  • Michele Marchesi

In this paper, we investigate the role of Bitcoin as a safe haven against the stock market losses during the spread of COVID-19. The performed analysis was based on a regression model with dummy variables defined around some crucial dates of the pand...

  • Article
  • Open Access
51 Citations
19,383 Views
16 Pages

Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut

  • Kim Ferres,
  • Timo Schloesser and
  • Peter A. Gloor

This paper describes an emotion recognition system for dogs automatically identifying the emotions anger, fear, happiness, and relaxation. It is based on a previously trained machine learning model, which uses automatic pose estimation to differentia...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903