You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 14, Issue 8

August 2022 - 28 articles

Cover Story: Life without computers is unimaginable, yet computers remain vulnerable to USD 6 trillion losses as experts believe fool-proof cybersecurity is impossible. Vulnerabilities are inherent in computer design, creating an attack surface that can only be reduced and not obliterated. Zero vulnerability computing (ZVC) challenges the impossible with two new design rules that deliver complete protection against vulnerabilities. ZVC feasibility was tested in a tiny computer-mounted hardware wallet, providing the first evidence of the complete obliteration of an attack surface. Malware failed to infect the ZVC device, and personal data remained hack-free. Further research should explore whether ZVC can secure computers in more complex real-world scenarios signaling a new epoch in the evolution of computers and cybersecurity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
38 Citations
10,038 Views
23 Pages

Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks

  • Gianfranco Lombardo,
  • Mattia Pellegrino,
  • George Adosoglou,
  • Stefano Cagnoni,
  • Panos M. Pardalos and
  • Agostino Poggi

22 August 2022

Predicting corporate bankruptcy is one of the fundamental tasks in credit risk assessment. In particular, since the 2007/2008 financial crisis, it has become a priority for most financial institutions, practitioners, and academics. The recent advance...

  • Article
  • Open Access
11 Citations
3,176 Views
20 Pages

A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees

  • Francesco Buccafurri,
  • Vincenzo De Angelis and
  • Sara Lazzaro 

21 August 2022

Anonymous service delivery has attracted the interest of research and the industry for many decades. To obtain effective solutions, anonymity should be guaranteed against the service provider itself. However, if the full anonymity of users is impleme...

  • Article
  • Open Access
2 Citations
2,145 Views
23 Pages

On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information

  • Georgios Kallitsis,
  • Vasileios Karyotis and
  • Symeon Papavassiliou

17 August 2022

In this paper, we study the potential of using the metric of Age of Information (AoI) for enhancing delay-tolerant routing protocols. The latter have been proposed for alleviating the impact of long roundtrip time in networks operating in harsh envir...

  • Article
  • Open Access
11 Citations
4,726 Views
17 Pages

15 August 2022

The first and foremost task of a phishing-detection mechanism is to confirm the appearance of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL analysis mechanism may lead to conclusions about the genuineness of...

  • Article
  • Open Access
37 Citations
4,995 Views
18 Pages

12 August 2022

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, secu...

  • Article
  • Open Access
11 Citations
5,584 Views
27 Pages

Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks

  • Usman Ali,
  • Giuseppe Caso,
  • Luca De Nardis,
  • Konstantinos Kousias,
  • Mohammad Rajiullah,
  • Özgü Alay,
  • Marco Neri,
  • Anna Brunstrom and
  • Maria-Gabriella Di Benedetto

11 August 2022

The successful rollout of fifth-generation (5G) networks requires a full understanding of the behavior of the propagation channel, taking into account the signal formats and the frequencies standardized by the Third Generation Partnership Project (3G...

  • Article
  • Open Access
3 Citations
4,764 Views
20 Pages

Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis

  • Fazal Raheman,
  • Tejas Bhagat,
  • Brecht Vermeulen and
  • Peter Van Daele

Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”. Third-party permissions resulting in an attack surface (AS) an...

  • Article
  • Open Access
4 Citations
4,463 Views
14 Pages

Digital Qualitative and Quantitative Analysis of Arabic Textbooks

  • Francesca Fallucchi,
  • Bouchra Ghattas,
  • Riem Spielhaus and
  • Ernesto William De Luca

Digital Humanities (DH) provide a broad spectrum of functionalities and tools that enable the enrichment of both quantitative and qualitative research methods in the humanities. It has been widely recognized that DH can help in curating and analysing...

  • Article
  • Open Access
5 Citations
3,572 Views
21 Pages

Imaging through a wavy water–air interface is challenging since light rays are bent by unknown amounts, leading to complex geometric distortions. Considering the restoration of instantaneous distorted images, this paper proposes an image recove...

  • Article
  • Open Access
1 Citations
2,451 Views
18 Pages

At present, the interaction mechanism between the complex indoor environment and pseudolite signals has not been fundamentally resolved, and the stability, continuity, and accuracy of indoor positioning are still technical bottlenecks. In view of the...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903