You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 14, Issue 8

August 2022 - 28 articles

Cover Story: Life without computers is unimaginable, yet computers remain vulnerable to USD 6 trillion losses as experts believe fool-proof cybersecurity is impossible. Vulnerabilities are inherent in computer design, creating an attack surface that can only be reduced and not obliterated. Zero vulnerability computing (ZVC) challenges the impossible with two new design rules that deliver complete protection against vulnerabilities. ZVC feasibility was tested in a tiny computer-mounted hardware wallet, providing the first evidence of the complete obliteration of an attack surface. Malware failed to infect the ZVC device, and personal data remained hack-free. Further research should explore whether ZVC can secure computers in more complex real-world scenarios signaling a new epoch in the evolution of computers and cybersecurity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
9 Citations
2,719 Views
19 Pages

To address the shortcomings of existing deep learning models and the characteristics of microblog speech, we propose the DCCMM model to improve the effectiveness of microblog sentiment analysis. The model employs WOBERT Plus and ALBERT to dynamically...

  • Article
  • Open Access
16 Citations
4,428 Views
23 Pages

Hybrid Sensing Platform for IoT-Based Precision Agriculture

  • Hamid Bagha,
  • Ali Yavari and
  • Dimitrios Georgakopoulos

Precision agriculture (PA) is the field that deals with the fine-tuned management of crops to increase crop yield, augment profitability, and conserve the environment. Existing Internet of Things (IoT) solutions for PA are typically divided in terms...

  • Article
  • Open Access
6 Citations
3,127 Views
18 Pages

Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol

  • Despoina Chochtoula,
  • Aristidis Ilias,
  • Yannis C. Stamatiou and
  • Christos Makris

SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA syst...

  • Article
  • Open Access
9 Citations
3,391 Views
18 Pages

Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET

  • Siti-Aisyah Zali,
  • Shahbe Mat-Desa,
  • Zarina Che-Embi and
  • Wan-Noorshahida Mohd-Isa

Shadows in drone images commonly appear in various shapes, sizes, and brightness levels, as the images capture a wide view of scenery under many conditions, such as varied flying height and weather. This property of drone images leads to a major prob...

  • Article
  • Open Access
11 Citations
4,276 Views
23 Pages

Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks

  • Sisay Tadesse Arzo,
  • Zeinab Akhavan,
  • Mona Esmaeili,
  • Michael Devetsikiotis and
  • Fabrizio Granelli

Recently, a multi-agent based network automation architecture has been proposed. The architecture is named multi-agent based network automation of the network management system (MANA-NMS). The architectural framework introduced atomized network funct...

  • Article
  • Open Access
34 Citations
5,027 Views
18 Pages

CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning

  • Jimmy Moedjahedy,
  • Arief Setyanto,
  • Fawaz Khaled Alarfaj and
  • Mohammed Alreshoodi

Internet users are continually exposed to phishing as cybercrime in the 21st century. The objective of phishing is to obtain sensitive information by deceiving a target and using the information for financial gain. The information may include a login...

  • Article
  • Open Access
9 Citations
6,255 Views
15 Pages

Automatic Detection of Sensitive Data Using Transformer- Based Classifiers

  • Michael Petrolini,
  • Stefano Cagnoni and
  • Monica Mordonini

The General Data Protection Regulation (GDPR) has allowed EU citizens and residents to have more control over their personal data, simplifying the regulatory environment affecting international business and unifying and homogenising privacy legislati...

  • Article
  • Open Access
5 Citations
3,142 Views
17 Pages

Research on Urban Traffic Incident Detection Based on Vehicle Cameras

  • Zhuofei Xia,
  • Jiayuan Gong,
  • Hailong Yu,
  • Wenbo Ren and
  • Jingnan Wang

Situational detection in the traffic system is of great significance to traffic management and even urban management. Traditional detection methods are generally based on roadside equipment monitoring roads, and it is difficult to support large-scale...

  • Article
  • Open Access
6 Citations
2,575 Views
19 Pages

Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning

  • Zhiqiang Dai,
  • Gaochao Xu,
  • Ziqi Liu,
  • Jiaqi Ge and
  • Wei Wang

Unmanned aerial vehicles (UAVs) have the characteristics of portability, safety, and strong adaptability. In the case of a maritime disaster, they can be used for personnel search and rescue, real-time monitoring, and disaster assessment. However, th...

  • Article
  • Open Access
1 Citations
3,777 Views
16 Pages

Analysis and Visualization of New Energy Vehicle Battery Data

  • Wenbo Ren,
  • Xinran Bian,
  • Jiayuan Gong,
  • Anqing Chen,
  • Ming Li,
  • Zhuofei Xia and
  • Jingnan Wang

In order to safely and efficiently use their power as well as to extend the life of Li-ion batteries, it is important to accurately analyze original battery data and quickly predict SOC. However, today, most of them are analyzed directly for SOC, and...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903