Skip to Content

Future Internet, Volume 14, Issue 8

2022 August - 28 articles

Cover Story: Life without computers is unimaginable, yet computers remain vulnerable to USD 6 trillion losses as experts believe fool-proof cybersecurity is impossible. Vulnerabilities are inherent in computer design, creating an attack surface that can only be reduced and not obliterated. Zero vulnerability computing (ZVC) challenges the impossible with two new design rules that deliver complete protection against vulnerabilities. ZVC feasibility was tested in a tiny computer-mounted hardware wallet, providing the first evidence of the complete obliteration of an attack surface. Malware failed to infect the ZVC device, and personal data remained hack-free. Further research should explore whether ZVC can secure computers in more complex real-world scenarios signaling a new epoch in the evolution of computers and cybersecurity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
41 Citations
10,543 Views
23 Pages

Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks

  • Gianfranco Lombardo,
  • Mattia Pellegrino,
  • George Adosoglou,
  • Stefano Cagnoni,
  • Panos M. Pardalos and
  • Agostino Poggi

22 August 2022

Predicting corporate bankruptcy is one of the fundamental tasks in credit risk assessment. In particular, since the 2007/2008 financial crisis, it has become a priority for most financial institutions, practitioners, and academics. The recent advance...

  • Article
  • Open Access
11 Citations
3,340 Views
20 Pages

A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees

  • Francesco Buccafurri,
  • Vincenzo De Angelis and
  • Sara Lazzaro 

21 August 2022

Anonymous service delivery has attracted the interest of research and the industry for many decades. To obtain effective solutions, anonymity should be guaranteed against the service provider itself. However, if the full anonymity of users is impleme...

  • Article
  • Open Access
3 Citations
2,217 Views
23 Pages

On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information

  • Georgios Kallitsis,
  • Vasileios Karyotis and
  • Symeon Papavassiliou

17 August 2022

In this paper, we study the potential of using the metric of Age of Information (AoI) for enhancing delay-tolerant routing protocols. The latter have been proposed for alleviating the impact of long roundtrip time in networks operating in harsh envir...

  • Article
  • Open Access
11 Citations
5,049 Views
17 Pages

15 August 2022

The first and foremost task of a phishing-detection mechanism is to confirm the appearance of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL analysis mechanism may lead to conclusions about the genuineness of...

  • Article
  • Open Access
41 Citations
5,220 Views
18 Pages

12 August 2022

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, secu...

  • Article
  • Open Access
12 Citations
5,953 Views
27 Pages

Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks

  • Usman Ali,
  • Giuseppe Caso,
  • Luca De Nardis,
  • Konstantinos Kousias,
  • Mohammad Rajiullah,
  • Özgü Alay,
  • Marco Neri,
  • Anna Brunstrom and
  • Maria-Gabriella Di Benedetto

11 August 2022

The successful rollout of fifth-generation (5G) networks requires a full understanding of the behavior of the propagation channel, taking into account the signal formats and the frequencies standardized by the Third Generation Partnership Project (3G...

  • Article
  • Open Access
5 Citations
5,002 Views
20 Pages

Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis

  • Fazal Raheman,
  • Tejas Bhagat,
  • Brecht Vermeulen and
  • Peter Van Daele

Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”. Third-party permissions resulting in an attack surface (AS) an...

  • Article
  • Open Access
4 Citations
4,802 Views
14 Pages

Digital Qualitative and Quantitative Analysis of Arabic Textbooks

  • Francesca Fallucchi,
  • Bouchra Ghattas,
  • Riem Spielhaus and
  • Ernesto William De Luca

Digital Humanities (DH) provide a broad spectrum of functionalities and tools that enable the enrichment of both quantitative and qualitative research methods in the humanities. It has been widely recognized that DH can help in curating and analysing...

  • Article
  • Open Access
5 Citations
3,862 Views
21 Pages

Imaging through a wavy water–air interface is challenging since light rays are bent by unknown amounts, leading to complex geometric distortions. Considering the restoration of instantaneous distorted images, this paper proposes an image recove...

  • Article
  • Open Access
2 Citations
2,567 Views
18 Pages

At present, the interaction mechanism between the complex indoor environment and pseudolite signals has not been fundamentally resolved, and the stability, continuity, and accuracy of indoor positioning are still technical bottlenecks. In view of the...

  • Article
  • Open Access
9 Citations
2,836 Views
19 Pages

To address the shortcomings of existing deep learning models and the characteristics of microblog speech, we propose the DCCMM model to improve the effectiveness of microblog sentiment analysis. The model employs WOBERT Plus and ALBERT to dynamically...

  • Article
  • Open Access
16 Citations
4,587 Views
23 Pages

Hybrid Sensing Platform for IoT-Based Precision Agriculture

  • Hamid Bagha,
  • Ali Yavari and
  • Dimitrios Georgakopoulos

Precision agriculture (PA) is the field that deals with the fine-tuned management of crops to increase crop yield, augment profitability, and conserve the environment. Existing Internet of Things (IoT) solutions for PA are typically divided in terms...

  • Article
  • Open Access
7 Citations
3,305 Views
18 Pages

Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol

  • Despoina Chochtoula,
  • Aristidis Ilias,
  • Yannis C. Stamatiou and
  • Christos Makris

SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA syst...

  • Article
  • Open Access
9 Citations
3,578 Views
18 Pages

Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET

  • Siti-Aisyah Zali,
  • Shahbe Mat-Desa,
  • Zarina Che-Embi and
  • Wan-Noorshahida Mohd-Isa

Shadows in drone images commonly appear in various shapes, sizes, and brightness levels, as the images capture a wide view of scenery under many conditions, such as varied flying height and weather. This property of drone images leads to a major prob...

  • Article
  • Open Access
11 Citations
4,442 Views
23 Pages

Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks

  • Sisay Tadesse Arzo,
  • Zeinab Akhavan,
  • Mona Esmaeili,
  • Michael Devetsikiotis and
  • Fabrizio Granelli

Recently, a multi-agent based network automation architecture has been proposed. The architecture is named multi-agent based network automation of the network management system (MANA-NMS). The architectural framework introduced atomized network funct...

  • Article
  • Open Access
35 Citations
5,304 Views
18 Pages

CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning

  • Jimmy Moedjahedy,
  • Arief Setyanto,
  • Fawaz Khaled Alarfaj and
  • Mohammed Alreshoodi

Internet users are continually exposed to phishing as cybercrime in the 21st century. The objective of phishing is to obtain sensitive information by deceiving a target and using the information for financial gain. The information may include a login...

  • Article
  • Open Access
9 Citations
6,604 Views
15 Pages

Automatic Detection of Sensitive Data Using Transformer- Based Classifiers

  • Michael Petrolini,
  • Stefano Cagnoni and
  • Monica Mordonini

The General Data Protection Regulation (GDPR) has allowed EU citizens and residents to have more control over their personal data, simplifying the regulatory environment affecting international business and unifying and homogenising privacy legislati...

  • Article
  • Open Access
6 Citations
3,390 Views
17 Pages

Research on Urban Traffic Incident Detection Based on Vehicle Cameras

  • Zhuofei Xia,
  • Jiayuan Gong,
  • Hailong Yu,
  • Wenbo Ren and
  • Jingnan Wang

Situational detection in the traffic system is of great significance to traffic management and even urban management. Traditional detection methods are generally based on roadside equipment monitoring roads, and it is difficult to support large-scale...

  • Article
  • Open Access
6 Citations
2,701 Views
19 Pages

Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning

  • Zhiqiang Dai,
  • Gaochao Xu,
  • Ziqi Liu,
  • Jiaqi Ge and
  • Wei Wang

Unmanned aerial vehicles (UAVs) have the characteristics of portability, safety, and strong adaptability. In the case of a maritime disaster, they can be used for personnel search and rescue, real-time monitoring, and disaster assessment. However, th...

  • Article
  • Open Access
1 Citations
3,963 Views
16 Pages

Analysis and Visualization of New Energy Vehicle Battery Data

  • Wenbo Ren,
  • Xinran Bian,
  • Jiayuan Gong,
  • Anqing Chen,
  • Ming Li,
  • Zhuofei Xia and
  • Jingnan Wang

In order to safely and efficiently use their power as well as to extend the life of Li-ion batteries, it is important to accurately analyze original battery data and quickly predict SOC. However, today, most of them are analyzed directly for SOC, and...

  • Article
  • Open Access
4 Citations
2,579 Views
18 Pages

The German manufacturing industry has been carrying out new developments towards the next industrial revolution, focusing on smart manufacturing environments. Our work emphasizes human-centered control rooms in the context of production plants. Incre...

  • Article
  • Open Access
27 Citations
3,079 Views
11 Pages

A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior

  • Muhsen Alkhalidy,
  • Atalla Fahed Al-Serhan,
  • Ayoub Alsarhan and
  • Bashar Igried

Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may i...

  • Article
  • Open Access
43 Citations
6,375 Views
28 Pages

An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services

  • Farhad Ahamed,
  • Farnaz Farid,
  • Basem Suleiman,
  • Zohaib Jan,
  • Luay A. Wahsheh and
  • Seyed Shahrestani

With the advent of modern technologies, the healthcare industry is moving towards a more personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence (AI). These technologies collect and...

  • Article
  • Open Access
8 Citations
2,990 Views
19 Pages

Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development

  • Marco Ferretti,
  • Ugo Fiore,
  • Francesca Perla,
  • Marcello Risitano and
  • Salvatore Scognamiglio

Accurate forecasts of containerised freight volumes are unquestionably important for port terminal operators to organise port operations and develop business plans. They are also relevant for port authorities, regulators, and governmental agencies de...

  • Article
  • Open Access
8 Citations
7,615 Views
26 Pages

Raspberry Pi (Pi) is a versatile general-purpose embedded computing device that can be used for both machine learning (ML) and deep learning (DL) inference applications such as face detection. This study trials the use of a Pi Spark cluster for distr...

  • Article
  • Open Access
26 Citations
8,548 Views
35 Pages

With the emerging Internet of Things (IoT) technologies, the smart city paradigm has become a reality. Wireless low-power communication technologies (LPWAN) are widely used for device connection in smart homes, smart lighting, mitering, and so on. Th...

  • Article
  • Open Access
20 Citations
4,422 Views
17 Pages

Massive open online courses (MOOCs) have exploded in popularity; course reviews are important sources for exploring learners’ perceptions about different factors associated with course design and implementation. This study aims to investigate t...

  • Article
  • Open Access
33 Citations
7,915 Views
15 Pages

Detection of Obfuscated Malicious JavaScript Code

  • Ammar Alazab,
  • Ansam Khraisat,
  • Moutaz Alazab and
  • Sarabjot Singh

Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903