You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 14, Issue 8

August 2022 - 28 articles

Cover Story: Life without computers is unimaginable, yet computers remain vulnerable to USD 6 trillion losses as experts believe fool-proof cybersecurity is impossible. Vulnerabilities are inherent in computer design, creating an attack surface that can only be reduced and not obliterated. Zero vulnerability computing (ZVC) challenges the impossible with two new design rules that deliver complete protection against vulnerabilities. ZVC feasibility was tested in a tiny computer-mounted hardware wallet, providing the first evidence of the complete obliteration of an attack surface. Malware failed to infect the ZVC device, and personal data remained hack-free. Further research should explore whether ZVC can secure computers in more complex real-world scenarios signaling a new epoch in the evolution of computers and cybersecurity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
3 Citations
2,467 Views
18 Pages

The German manufacturing industry has been carrying out new developments towards the next industrial revolution, focusing on smart manufacturing environments. Our work emphasizes human-centered control rooms in the context of production plants. Incre...

  • Article
  • Open Access
25 Citations
2,863 Views
11 Pages

A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior

  • Muhsen Alkhalidy,
  • Atalla Fahed Al-Serhan,
  • Ayoub Alsarhan and
  • Bashar Igried

Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may i...

  • Article
  • Open Access
41 Citations
5,961 Views
28 Pages

An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services

  • Farhad Ahamed,
  • Farnaz Farid,
  • Basem Suleiman,
  • Zohaib Jan,
  • Luay A. Wahsheh and
  • Seyed Shahrestani

With the advent of modern technologies, the healthcare industry is moving towards a more personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence (AI). These technologies collect and...

  • Article
  • Open Access
6 Citations
2,828 Views
19 Pages

Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development

  • Marco Ferretti,
  • Ugo Fiore,
  • Francesca Perla,
  • Marcello Risitano and
  • Salvatore Scognamiglio

Accurate forecasts of containerised freight volumes are unquestionably important for port terminal operators to organise port operations and develop business plans. They are also relevant for port authorities, regulators, and governmental agencies de...

  • Article
  • Open Access
7 Citations
7,030 Views
26 Pages

Raspberry Pi (Pi) is a versatile general-purpose embedded computing device that can be used for both machine learning (ML) and deep learning (DL) inference applications such as face detection. This study trials the use of a Pi Spark cluster for distr...

  • Article
  • Open Access
26 Citations
7,947 Views
35 Pages

With the emerging Internet of Things (IoT) technologies, the smart city paradigm has become a reality. Wireless low-power communication technologies (LPWAN) are widely used for device connection in smart homes, smart lighting, mitering, and so on. Th...

  • Article
  • Open Access
19 Citations
4,112 Views
17 Pages

Massive open online courses (MOOCs) have exploded in popularity; course reviews are important sources for exploring learners’ perceptions about different factors associated with course design and implementation. This study aims to investigate t...

  • Article
  • Open Access
31 Citations
7,251 Views
15 Pages

Detection of Obfuscated Malicious JavaScript Code

  • Ammar Alazab,
  • Ansam Khraisat,
  • Moutaz Alazab and
  • Sarabjot Singh

Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903