You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 15, Issue 7

July 2023 - 28 articles

Cover Story: Cloud applications' data confidentiality is a major concern for operators, as Cloud providers are not always considered reliable. Moreover, the exploitation of third-party software increases the probability of vulnerabilities and attacks. As a countermeasure, Trusted Execution Environments (TEEs) emerged in the Cloud to increase software isolation both from providers and external attackers. We present a methodology and a declarative prototype to support applications deployment in TEEs by exploiting information-flow security to determine safe partitionings of software components. Through a probabilistic cost model, we enable application operators to select the best trade-off partitioning in terms of future re-partitioning costs and the number of domains. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
6 Citations
11,306 Views
21 Pages

Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities...

  • Article
  • Open Access
9 Citations
2,442 Views
16 Pages

A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network

  • Yang Hu,
  • Liangliang Gong,
  • Xinyang Li,
  • Hui Li,
  • Ruoxin Zhang and
  • Rentao Gu

When applying 5G network slicing technology, the operator’s network resources in the form of mutually isolated logical network slices provide specific service requirements and quality of service guarantees for smart grid communication services....

  • Article
  • Open Access
2,821 Views
19 Pages

An Accurate Platform for Investigating TCP Performance in Wi-Fi Networks

  • Shunji Aoyagi,
  • Yuki Horie,
  • Do Thi Thu Hien,
  • Thanh Duc Ngo,
  • Duy-Dinh Le,
  • Kien Nguyen and
  • Hiroo Sekiya

An increasing number of devices are connecting to the Internet via Wi-Fi networks, ranging from mobile phones to Internet of Things (IoT) devices. Moreover, Wi-Fi technology has undergone gradual development, with various standards and implementation...

  • Article
  • Open Access
4 Citations
3,063 Views
16 Pages

An IoT System and MODIS Images Enable Smart Environmental Management for Mekong Delta

  • Vu Hien Phan,
  • Danh Phan Hong Pham,
  • Tran Vu Pham,
  • Kashif Naseer Qureshi and
  • Cuong Pham-Quoc

The smart environmental management system proposed in this work offers a new approach to environmental monitoring by utilizing data from IoT stations and MODIS satellite imagery. The system is designed to be deployed in vast regions, such as the Meko...

  • Review
  • Open Access
24 Citations
10,010 Views
42 Pages

Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools

  • Obinna Johnphill,
  • Ali Safaa Sadiq,
  • Feras Al-Obeidat,
  • Haider Al-Khateeb,
  • Mohammed Adam Taheir,
  • Omprakash Kaiwartya and
  • Mohammed Ali

The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical...

  • Article
  • Open Access
35 Citations
9,568 Views
17 Pages

Machine Learning for Network Intrusion Detection—A Comparative Study

  • Mustafa Al Lail,
  • Alejandro Garcia and
  • Saul Olivo

Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential el...

  • Article
  • Open Access
3 Citations
1,824 Views
13 Pages

In this paper, the reasons for the bandwidth and wavelength utilization in future next-generation passive optical networks are presented, and the possibilities for realization and utilization of extended dynamic wavelength and bandwidth algorithms fo...

  • Article
  • Open Access
16 Citations
8,047 Views
17 Pages

Analysis of ICS and SCADA Systems Attacks Using Honeypots

  • Mohamed Mesbah,
  • Mahmoud Said Elsayed,
  • Anca Delia Jurcut and
  • Marianne Azer

Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operatio...

  • Article
  • Open Access
3 Citations
3,338 Views
20 Pages

The global satellite navigation signal works well in open areas outdoors. However, due to its weakness, it is challenging to position continuously and reliably indoors. In this paper, we developed a hybrid system that combines radio signals and acous...

  • Article
  • Open Access
2 Citations
3,283 Views
27 Pages

Motivated by the distinction between semantics and pragmatics as sub-disciplines of linguistics, shortly after Tim Berners-Lee introduced the Semantic Web in 2001, there have been works on its extension to the “pragmatic level”. Twenty ye...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license