You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 16, Issue 7

July 2024 - 39 articles

Cover Story: Digital twins, virtual replicas of physical systems, have revolutionized smart manufacturing by enabling advanced simulation and early fault diagnosis. However, these models deteriorate over time due to dynamic data streams. To address this issue, Ragini Gupta and her fellow researchers from Prof. Klara Nahrstedt's lab at the University of Illinois at Urbana-Champaign introduced TWIN-ADAPT, a continuous learning framework for real-time anomaly classification in IoT-driven semiconductor labs, cleanrooms. TWIN-ADAPT uses dual-window strategies to detect and adapt to concept drift and Particle Swarm Optimization for hyperparameter tuning. Tested on cleanroom datasets, it demonstrates superior performance, handling both abrupt and gradual data changes. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (39)

  • Article
  • Open Access
4 Citations
2,264 Views
34 Pages

Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles

  • Mira M. Zarie,
  • Abdelhamied A. Ateya,
  • Mohammed S. Sayed,
  • Mohammed ElAffendi and
  • Mohammad Mahmoud Abdellatif

The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and s...

  • Article
  • Open Access
3 Citations
7,762 Views
22 Pages

Behind the Code: Identifying Zero-Day Exploits in WordPress

  • Mohamed Azarudheen Mohamed Mohideen,
  • Muhammad Shahroz Nadeem,
  • James Hardy,
  • Haider Ali,
  • Umair Ullah Tariq,
  • Fariza Sabrina,
  • Muhammad Waqar and
  • Salman Ahmed

The rising awareness of cybersecurity among governments and the public underscores the importance of effectively managing security incidents, especially zero-day attacks that exploit previously unknown software vulnerabilities. These zero-day attacks...

  • Article
  • Open Access
7 Citations
2,554 Views
15 Pages

Connected devices in IoT systems usually have low computing and storage capacity and lack uniform standards and protocols, making them easy targets for cyberattacks. Implementing security measures like cryptographic authentication, access control, an...

  • Review
  • Open Access
9 Citations
6,425 Views
32 Pages

Human–AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era

  • Rui Yu,
  • Sooyeon Lee,
  • Jingyi Xie,
  • Syed Masum Billah and
  • John M. Carroll

Remote sighted assistance (RSA) has emerged as a conversational technology aiding people with visual impairments (VI) through real-time video chat communication with sighted agents. We conducted a literature review and interviewed 12 RSA users to und...

  • Article
  • Open Access
15 Citations
7,319 Views
29 Pages

A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT

  • Prabu Kaliyaperumal,
  • Sudhakar Periyasamy,
  • Manikandan Thirumalaisamy,
  • Balamurugan Balusamy and
  • Francesco Benedetto

The proliferation of IoT services has spurred a surge in network attacks, heightening cybersecurity concerns. Essential to network defense, intrusion detection and prevention systems (IDPSs) identify malicious activities, including denial of service...

  • Article
  • Open Access
8 Citations
6,286 Views
44 Pages

NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization

  • Oleksandr Kuznetsov,
  • Emanuele Frontoni,
  • Kateryna Kuznetsova,
  • Ruslan Shevchuk and
  • Mikolaj Karpinski

In the rapidly evolving field of digital asset management, centralized and decentralized global registries have become essential tools for organizing, tracking, and distributing digital assets. However, existing systems often face challenges regardin...

  • Article
  • Open Access
1 Citations
1,684 Views
17 Pages

To mitigate the control overhead of Software-Defined Mobile Ad Hoc Networks (SD-MANETs), this paper proposes a novel approach, termed Software-Defined Greedy Perimeter Stateless Routing (SD-GPSR), which integrates geographical location information. S...

  • Review
  • Open Access
4 Citations
5,425 Views
23 Pages

In the rapidly evolving landscape of drone technology, securing unmanned aerial vehicles (UAVs) presents critical challenges and demands unique solutions. This paper offers a thorough examination of the security requirements, threat models, and solut...

  • Article
  • Open Access
2 Citations
1,934 Views
16 Pages

The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI)

  • Álvaro Antón-Sancho,
  • Pablo Fernández-Arias,
  • Edwan Anderson Ariza and
  • Diego Vergara

In recent years, virtual reality (VR) technologies have become one of the teaching tools with the greatest training potential in higher education. Thus, the study of factors that influence the adoption and valuation of VR by the educational agents in...

  • Article
  • Open Access
1 Citations
1,821 Views
25 Pages

Multi-Agent Dynamic Fog Service Placement Approach

  • Nerijus Šatkauskas and
  • Algimantas Venčkauskas

Fog computing as a paradigm was offered more than a decade ago to solve Cloud Computing issues. Long transmission distances, higher data flow, data loss, latency, and energy consumption lead to providing services at the edge of the network. But, fog...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903