You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 14, Issue 7

July 2022 - 27 articles

Cover Story: Unmanned aerial vehicles (UAVs), commonly known as drones, are an emerging facilitator of several smart city services, such as observing weather phenomena, aerial photography, product delivery and surveillance. However, drones can be compromised by an adversary, causing altered flight routes and possible sabotage. In this article, a systematic framework for identifying malicious drone behavior through the use of a deep analysis of routine (normal) drone operations is presented. Normal drone flight behavior is reverse-engineered and malicious drone behavior is synthesized for hijacking, GPS signal jamming and DoS attacks. Subsequently, machine learning techniques are adopted to identify malicious drone activity for the study. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (27)

  • Review
  • Open Access
57 Citations
7,178 Views
48 Pages

Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges

  • Yehia Ibrahim Alzoubi,
  • Ahmad Al-Ahmad,
  • Hasan Kahtan and
  • Ashraf Jaradat

The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environme...

  • Article
  • Open Access
25 Citations
5,034 Views
15 Pages

Unlike price fluctuations, the temporal structure of cryptocurrency trading has seldom been a subject of systematic study. In order to fill this gap, we analyse detrended correlations of the price returns, the average number of trades in time unit, a...

  • Article
  • Open Access
2 Citations
2,841 Views
24 Pages

Opportunistic ad hoc networks are characterized by intermittent and infrastructure-less connectivity among mobile nodes. Because of the lack of up-to-date network topology information and frequent link failures, geographic routing utilizes location i...

  • Article
  • Open Access
12 Citations
2,744 Views
26 Pages

A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks

  • Thiago C. Jesus,
  • Daniel G. Costa,
  • Paulo Portugal and
  • Francisco Vasques

Wireless visual sensor networks have been adopted in different contexts to provide visual information in a more flexible and distributed way, supporting the development of different innovative applications. Although visual data may be central for a c...

  • Article
  • Open Access
2 Citations
3,348 Views
21 Pages

In recent years, artworks have been increasingly digitized and built into databases, and such databases have become convenient tools for researchers. Researchers who retrieve artwork are not only researchers of humanities, but also researchers of mat...

  • Article
  • Open Access
5 Citations
2,707 Views
11 Pages

Due to the expansion of the internet, we encounter various types of big data such as web documents or sensing data. Compared to traditional small data such as experimental samples, big data provide more chances to find hidden and novel patterns with...

  • Article
  • Open Access
8 Citations
4,033 Views
24 Pages

Blockchain for Doping Control Applications in Sports: A Conceptual Approach

  • Flavio Pinto,
  • Yogachandran Rahulamathavan and
  • James Skinner

Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizati...

  • Article
  • Open Access
11 Citations
3,377 Views
15 Pages

N-Trans: Parallel Detection Algorithm for DGA Domain Names

  • Cheng Yang,
  • Tianliang Lu,
  • Shangyi Yan,
  • Jianling Zhang and
  • Xingzhan Yu

Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against...

  • Article
  • Open Access
2 Citations
9,302 Views
23 Pages

Analytical Modeling and Empirical Analysis of Binary Options Strategies

  • Gurdal Ertek,
  • Aysha Al-Kaabi and
  • Aktham Issa Maghyereh

This study analyzes binary option investment strategies by developing mathematical formalism and formulating analytical models. The binary outcome of binary options represents either an increase or a decrease in a parameter, typically an asset or der...

  • Article
  • Open Access
1 Citations
2,556 Views
18 Pages

Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites

  • Hengfei Cheng,
  • Zhaobin Xu,
  • Xiaoxu Guo,
  • Jia Yang,
  • Kedi Xu,
  • Shuqin Liu,
  • Zhonghe Jin and
  • Xiaojun Jin

Low-orbit micro-satellite technology has developed rapidly in recent years due to its advantages of low time delay, low cost and short research period. However, among the existing inter-satellite routing algorithms, the classical flooding and greedy...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903