Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 15, Issue 7

2023 July - 28 articles

Cover Story: Cloud applications' data confidentiality is a major concern for operators, as Cloud providers are not always considered reliable. Moreover, the exploitation of third-party software increases the probability of vulnerabilities and attacks. As a countermeasure, Trusted Execution Environments (TEEs) emerged in the Cloud to increase software isolation both from providers and external attackers. We present a methodology and a declarative prototype to support applications deployment in TEEs by exploiting information-flow security to determine safe partitionings of software components. Through a probabilistic cost model, we enable application operators to select the best trade-off partitioning in terms of future re-partitioning costs and the number of domains. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
7 Citations
12,735 Views
21 Pages

Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities...

  • Article
  • Open Access
9 Citations
2,702 Views
16 Pages

A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network

  • Yang Hu,
  • Liangliang Gong,
  • Xinyang Li,
  • Hui Li,
  • Ruoxin Zhang and
  • Rentao Gu

When applying 5G network slicing technology, the operator’s network resources in the form of mutually isolated logical network slices provide specific service requirements and quality of service guarantees for smart grid communication services....

  • Article
  • Open Access
3,444 Views
19 Pages

An Accurate Platform for Investigating TCP Performance in Wi-Fi Networks

  • Shunji Aoyagi,
  • Yuki Horie,
  • Do Thi Thu Hien,
  • Thanh Duc Ngo,
  • Duy-Dinh Le,
  • Kien Nguyen and
  • Hiroo Sekiya

An increasing number of devices are connecting to the Internet via Wi-Fi networks, ranging from mobile phones to Internet of Things (IoT) devices. Moreover, Wi-Fi technology has undergone gradual development, with various standards and implementation...

  • Article
  • Open Access
5 Citations
3,463 Views
16 Pages

An IoT System and MODIS Images Enable Smart Environmental Management for Mekong Delta

  • Vu Hien Phan,
  • Danh Phan Hong Pham,
  • Tran Vu Pham,
  • Kashif Naseer Qureshi and
  • Cuong Pham-Quoc

The smart environmental management system proposed in this work offers a new approach to environmental monitoring by utilizing data from IoT stations and MODIS satellite imagery. The system is designed to be deployed in vast regions, such as the Meko...

  • Review
  • Open Access
26 Citations
11,167 Views
42 Pages

Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools

  • Obinna Johnphill,
  • Ali Safaa Sadiq,
  • Feras Al-Obeidat,
  • Haider Al-Khateeb,
  • Mohammed Adam Taheir,
  • Omprakash Kaiwartya and
  • Mohammed Ali

The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical...

  • Article
  • Open Access
36 Citations
11,258 Views
17 Pages

Machine Learning for Network Intrusion Detection—A Comparative Study

  • Mustafa Al Lail,
  • Alejandro Garcia and
  • Saul Olivo

Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential el...

  • Article
  • Open Access
3 Citations
1,968 Views
13 Pages

In this paper, the reasons for the bandwidth and wavelength utilization in future next-generation passive optical networks are presented, and the possibilities for realization and utilization of extended dynamic wavelength and bandwidth algorithms fo...

  • Article
  • Open Access
19 Citations
9,029 Views
17 Pages

Analysis of ICS and SCADA Systems Attacks Using Honeypots

  • Mohamed Mesbah,
  • Mahmoud Said Elsayed,
  • Anca Delia Jurcut and
  • Marianne Azer

Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operatio...

  • Article
  • Open Access
5 Citations
4,006 Views
20 Pages

The global satellite navigation signal works well in open areas outdoors. However, due to its weakness, it is challenging to position continuously and reliably indoors. In this paper, we developed a hybrid system that combines radio signals and acous...

  • Article
  • Open Access
2 Citations
3,540 Views
27 Pages

Motivated by the distinction between semantics and pragmatics as sub-disciplines of linguistics, shortly after Tim Berners-Lee introduced the Semantic Web in 2001, there have been works on its extension to the “pragmatic level”. Twenty ye...

  • Article
  • Open Access
2 Citations
2,458 Views
16 Pages

Road intersections are shared among several conflicted traffic flows. Stop signs are used to control competing traffic flows at road intersections safely. Then, driving rules are constructed to control the competing traffic flows at these stop sign r...

  • Article
  • Open Access
21 Citations
6,949 Views
28 Pages

A Cyber-Physical System for Wildfire Detection and Firefighting

  • Pietro Battistoni,
  • Andrea Antonio Cantone,
  • Gerardo Martino,
  • Valerio Passamano,
  • Marco Romano,
  • Monica Sebillo and
  • Giuliana Vitiello

The increasing frequency and severity of forest fires necessitate early detection and rapid response to mitigate their impact. This project aims to design a cyber-physical system for early detection and rapid response to forest fires using advanced t...

  • Article
  • Open Access
4 Citations
4,250 Views
18 Pages

Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Michael Plain,
  • Jadarius Hill and
  • Marshall Elam

There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA00...

  • Article
  • Open Access
49 Citations
10,159 Views
21 Pages

Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis

  • Ikram Karabila,
  • Nossayba Darraz,
  • Anas El-Ansari,
  • Nabil Alami and
  • Mostafa El Mallahi

Recommendation systems (RSs) are widely used in e-commerce to improve conversion rates by aligning product offerings with customer preferences and interests. While traditional RSs rely solely on numerical ratings to generate recommendations, these ra...

  • Article
  • Open Access
3 Citations
2,599 Views
18 Pages

Video viewing is currently the primary form of entertainment for modern people due to the rapid development of mobile devices and 5G networks. The combination of pervasive edge devices and adaptive bitrate streaming technologies can lessen the effect...

  • Article
  • Open Access
5 Citations
3,144 Views
20 Pages

Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects

  • Andrea Pinna,
  • Maria Ilaria Lunesu,
  • Stefano Orrù and
  • Roberto Tonelli

Technical debt refers to decisions made during the design and development of software that postpone the resolution of technical problems or the enhancement of the software’s features to a later date. If not properly managed, technical debt can...

  • Article
  • Open Access
8 Citations
3,710 Views
18 Pages

Synonyms, Antonyms and Factual Knowledge in BERT Heads

  • Lorenzo Serina,
  • Luca Putelli,
  • Alfonso Emilio Gerevini and
  • Ivan Serina

In recent years, many studies have been devoted to discovering the inner workings of Transformer-based models, such as BERT, for instance, attempting to identify what information is contained within them. However, little is known about how these mode...

  • Article
  • Open Access
6 Citations
4,960 Views
31 Pages

Hybridizing Fuzzy String Matching and Machine Learning for Improved Ontology Alignment

  • Mohammed Suleiman Mohammed Rudwan and
  • Jean Vincent Fonou-Dombeu

Ontology alignment has become an important process for identifying similarities and differences between ontologies, to facilitate their integration and reuse. To this end, fuzzy string-matching algorithms have been developed for strings similarity de...

  • Article
  • Open Access
17 Citations
4,407 Views
26 Pages

KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments

  • Giorgio Dell’Immagine,
  • Jacopo Soldani and
  • Antonio Brogi

As microservice-based architectures are increasingly adopted, microservices security has become a crucial aspect to consider for IT businesses. Starting from a set of “security smells” for microservice applications that were recently prop...

  • Article
  • Open Access
27 Citations
6,853 Views
29 Pages

Due to the similarities in symptomatology between COVID-19 and other respiratory infections, diagnosis of these diseases can be complicated. To address this issue, a web application was developed that employs a chatbot and artificial intelligence to...

  • Article
  • Open Access
10 Citations
8,134 Views
18 Pages

Cloud services provided by Microsoft are growing rapidly in number and importance. Azure Active Directory (AAD) is becoming more important due to its role in facilitating identity management for cloud-based services. However, several risks and securi...

  • Article
  • Open Access
4 Citations
2,744 Views
34 Pages

An Ontology for Spatio-Temporal Media Management and an Interactive Application

  • Takuro Sone,
  • Shin Kato,
  • Ray Atarashi,
  • Jin Nakazato,
  • Manabu Tsukada and
  • Hiroshi Esaki

In addition to traditional viewing media, metadata that record the physical space from multiple perspectives will become extremely important in realizing interactive applications such as Virtual Reality (VR) and Augmented Reality (AR). This paper pro...

  • Article
  • Open Access
1 Citations
2,136 Views
38 Pages

Secure Partitioning of Cloud Applications, with Cost Look-Ahead

  • Alessandro Bocci,
  • Stefano Forti,
  • Roberto Guanciale,
  • Gian-Luigi Ferrari and
  • Antonio Brogi

The security of Cloud applications is a major concern for application developers and operators. Protecting users’ data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted...

  • Article
  • Open Access
18 Citations
3,300 Views
16 Pages

Heart DT: Monitoring and Preventing Cardiac Pathologies Using AI and IoT Sensors

  • Roberta Avanzato,
  • Francesco Beritelli,
  • Alfio Lombardo and
  • Carmelo Ricci

Today’s healthcare facilities require new digital tools to cope with the rapidly increasing demand for technology that can support healthcare operators. The advancement of technology is leading to the pervasive use of IoT devices in daily life,...

  • Article
  • Open Access
4 Citations
3,802 Views
18 Pages

Providing accurate and real-time bus travel time information is crucial for both passengers and public transportation managers. However, in the traditional bus travel time prediction model, due to the lack of consideration of the influence of differe...

  • Article
  • Open Access
5 Citations
3,388 Views
23 Pages

Cache-Enabled Adaptive Video Streaming: A QoE-Based Evaluation Study

  • Eirini Liotou,
  • Dionysis Xenakis,
  • Vasiliki Georgara,
  • Georgios Kourouniotis and
  • Lazaros Merakos

Dynamic Adaptive Streaming over HTTP (DASH) has prevailed as the dominant way of video transmission over the Internet. This technology is based on receiving small sequential video segments from a server. However, one challenge that has not been adequ...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903