You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 15, Issue 7

July 2023 - 28 articles

Cover Story: Cloud applications' data confidentiality is a major concern for operators, as Cloud providers are not always considered reliable. Moreover, the exploitation of third-party software increases the probability of vulnerabilities and attacks. As a countermeasure, Trusted Execution Environments (TEEs) emerged in the Cloud to increase software isolation both from providers and external attackers. We present a methodology and a declarative prototype to support applications deployment in TEEs by exploiting information-flow security to determine safe partitionings of software components. Through a probabilistic cost model, we enable application operators to select the best trade-off partitioning in terms of future re-partitioning costs and the number of domains. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
2 Citations
2,369 Views
16 Pages

Road intersections are shared among several conflicted traffic flows. Stop signs are used to control competing traffic flows at road intersections safely. Then, driving rules are constructed to control the competing traffic flows at these stop sign r...

  • Article
  • Open Access
21 Citations
6,695 Views
28 Pages

A Cyber-Physical System for Wildfire Detection and Firefighting

  • Pietro Battistoni,
  • Andrea Antonio Cantone,
  • Gerardo Martino,
  • Valerio Passamano,
  • Marco Romano,
  • Monica Sebillo and
  • Giuliana Vitiello

The increasing frequency and severity of forest fires necessitate early detection and rapid response to mitigate their impact. This project aims to design a cyber-physical system for early detection and rapid response to forest fires using advanced t...

  • Article
  • Open Access
3 Citations
4,061 Views
18 Pages

Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Michael Plain,
  • Jadarius Hill and
  • Marshall Elam

There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA00...

  • Article
  • Open Access
46 Citations
9,873 Views
21 Pages

Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis

  • Ikram Karabila,
  • Nossayba Darraz,
  • Anas El-Ansari,
  • Nabil Alami and
  • Mostafa El Mallahi

Recommendation systems (RSs) are widely used in e-commerce to improve conversion rates by aligning product offerings with customer preferences and interests. While traditional RSs rely solely on numerical ratings to generate recommendations, these ra...

  • Article
  • Open Access
3 Citations
2,460 Views
18 Pages

Video viewing is currently the primary form of entertainment for modern people due to the rapid development of mobile devices and 5G networks. The combination of pervasive edge devices and adaptive bitrate streaming technologies can lessen the effect...

  • Article
  • Open Access
5 Citations
2,974 Views
20 Pages

Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects

  • Andrea Pinna,
  • Maria Ilaria Lunesu,
  • Stefano Orrù and
  • Roberto Tonelli

Technical debt refers to decisions made during the design and development of software that postpone the resolution of technical problems or the enhancement of the software’s features to a later date. If not properly managed, technical debt can...

  • Article
  • Open Access
6 Citations
3,511 Views
18 Pages

Synonyms, Antonyms and Factual Knowledge in BERT Heads

  • Lorenzo Serina,
  • Luca Putelli,
  • Alfonso Emilio Gerevini and
  • Ivan Serina

In recent years, many studies have been devoted to discovering the inner workings of Transformer-based models, such as BERT, for instance, attempting to identify what information is contained within them. However, little is known about how these mode...

  • Article
  • Open Access
6 Citations
4,695 Views
31 Pages

Hybridizing Fuzzy String Matching and Machine Learning for Improved Ontology Alignment

  • Mohammed Suleiman Mohammed Rudwan and
  • Jean Vincent Fonou-Dombeu

Ontology alignment has become an important process for identifying similarities and differences between ontologies, to facilitate their integration and reuse. To this end, fuzzy string-matching algorithms have been developed for strings similarity de...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903