Skip to Content

Future Internet, Volume 17, Issue 12

2025 December - 53 articles

Cover Story: The Internet’s evolution from Web 1.0 to Web 3.0 has expanded the attack surface for cybercriminals, making malware attacks more sophisticated. The use of AI in antivirus solutions challenges traditional detection methods. Research shows that converting malware files into textured images enhances resistance to obfuscation and improves the detection of zero-day threats. This paper explores the use of image quality assessment (IQA) to enhance the curation of visual malware datasets. We propose MalScore, a no-reference IQA algorithm designed to evaluate dataset quality and guide future dataset development. Our evaluation demonstrates that MalScore effectively differentiates dataset quality, with MalNet Tiny scoring 95% and NARAD 50%, highlighting its potential for visual malware detection and the integration of IQA techniques. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (53)

  • Article
  • Open Access
690 Views
21 Pages

Methodology for Detecting Suspicious Claims in Health Insurance Using Supervised Machine Learning

  • Jose Villegas-Ortega,
  • Luis Napoleon Quiroz Aviles,
  • Juan Nazario Arancibia,
  • Wilder Carpio Montenegro,
  • Rosa Delgadillo and
  • David Mauricio

18 December 2025

Health insurance fraud (HIF) places a substantial economic burden on global health systems. While supervised machine learning (SML) offers a promising solution for its detection, most approaches are ad hoc and lack a systematic methodological framewo...

  • Article
  • Open Access
404 Views
33 Pages

17 December 2025

Efficient resource allocation is a central challenge in multi-tenant cloud, fog, and edge environments, where heterogeneous tenants compete for shared resources under dynamic and uncertain workloads. Static or purely heuristic methods often fail to c...

  • Article
  • Open Access
555 Views
38 Pages

Ontology-Driven Emotion Multi-Class Classification and Influence Analysis of User Opinions on Online Travel Agency

  • Putri Utami Rukmana,
  • Muharman Lubis,
  • Hanif Fakhrurroja,
  • Asriana and
  • Alif Noorachmad Muttaqin

17 December 2025

The rise in social media has transformed Online Travel Agencies (OTAs) into platforms where users actively share their experiences and opinions. However, conventional opinion mining approaches often fail to capture nuanced emotional expressions or co...

  • Article
  • Open Access
1,902 Views
32 Pages

17 December 2025

This study examines the role of different factors in supporting the sustainable use of Artificial Intelligence (AI) technologies in higher education, particularly in the context of student interactions with intelligent and human-centered learning too...

  • Article
  • Open Access
480 Views
25 Pages

16 December 2025

Cloud-native microservice architectures offer scalability and resilience but introduce complex interdependencies and new attack surfaces, making them vulnerable to resource-exhaustion Distributed Denial-of-Service (DDoS) attacks. These attacks propag...

  • Article
  • Open Access
578 Views
27 Pages

SatNet-B3: A Lightweight Deep Edge Intelligence Framework for Satellite Imagery Classification

  • Tarbia Hasan,
  • Jareen Anjom,
  • Md. Ishan Arefin Hossain and
  • Zia Ush Shamszaman

16 December 2025

Accurate weather classification plays a vital role in disaster management and minimizing economic losses. However, satellite-based weather classification remains challenging due to high inter-class similarity; the computational complexity of existing...

  • Article
  • Open Access
943 Views
27 Pages

Concurrency Bug Detection via Static Analysis and Large Language Models

  • Zuocheng Feng,
  • Yiming Chen,
  • Kaiwen Zhang,
  • Xiaofeng Li and
  • Guanjun Liu

15 December 2025

Concurrency bugs originate from complex and improper synchronization of shared resources, presenting a significant challenge for detection. Traditional static analysis relies heavily on expert knowledge and frequently fails when code is non-compilabl...

  • Article
  • Open Access
443 Views
22 Pages

Selection of Optimal Cluster Head Using MOPSO and Decision Tree for Cluster-Oriented Wireless Sensor Networks

  • Rahul Mishra,
  • Sudhanshu Kumar Jha,
  • Shiv Prakash and
  • Rajkumar Singh Rathore

15 December 2025

Wireless sensor networks (WSNs) consist of distributed nodes to monitor various physical and environmental parameters. The sensor nodes (SNs) are usually resource constrained such as power source, communication, and computation capacity. In WSN, ener...

  • Article
  • Open Access
672 Views
19 Pages

Smart IoT-Based Temperature-Sensing Device for Energy-Efficient Glass Window Monitoring

  • Vaclav Mach,
  • Jiri Vojtesek,
  • Milan Adamek,
  • Pavel Drabek,
  • Pavel Stoklasek,
  • Stepan Dlabaja,
  • Lukas Kopecek and
  • Ales Mizera

15 December 2025

This paper presents the development and validation of an IoT-enabled temperature-sensing device for real-time monitoring of the thermal insulation properties of glass windows. The system integrates contact and non-contact temperature sensors into a c...

  • Systematic Review
  • Open Access
2 Citations
1,938 Views
26 Pages

15 December 2025

Higher education institutions (HEIs) are increasingly becoming vulnerable to cyberattacks as they adopt digital technologies to support their administrative, research and academic activities. These institutions, which typically operate in open and de...

  • Article
  • Open Access
821 Views
30 Pages

Edge-to-Cloud Continuum Orchestrator Based on Heterogeneous Nodes for Urban Traffic Monitoring

  • Pietro Ruiu,
  • Andrea Lagorio,
  • Claudio Rubattu,
  • Matteo Anedda,
  • Michele Sanna and
  • Mauro Fadda

13 December 2025

This paper presents an edge-to-cloud orchestrator capable of supporting services running at the edge on heterogeneous nodes based on general-purpose processing units and Field Programmable Gate Array (FPGA) platform (i.e., AMD Kria K26 SoM) in an urb...

  • Article
  • Open Access
313 Views
14 Pages

Cross-Gen: An Efficient Generator Network for Adversarial Attacks on Cross-Modal Hashing Retrieval

  • Chao Hu,
  • Li Chen,
  • Sisheng Li,
  • Yin Yi,
  • Yu Zhan,
  • Chengguang Liu,
  • Jianling Liu and
  • Ronghua Shi

13 December 2025

Research on deep neural network (DNN)-based multi-dimensional data visualization has thoroughly explored cross-modal hash retrieval (CMHR) systems, yet their vulnerability to malicious adversarial examples remains evident. Recent work improves the ro...

  • Article
  • Open Access
424 Views
20 Pages

A Conceptual Model of a Digital Twin Driven Co-Pilot for Speed Coordination in Congested Urban Traffic

  • Adrian Vasile Olteanu,
  • Maximilian Nicolae,
  • Bianca Alexe and
  • Stefan Mocanu

13 December 2025

Digital Twins (DTs) are increasingly used to support real-time decision making in connected mobility systems, where network latency and uncertainty limit the effectiveness of conventional control strategies. This paper proposes a conceptual model for...

  • Article
  • Open Access
897 Views
31 Pages

A Digital Health Platform for Remote and Multimodal Monitoring in Neurodegenerative Diseases

  • Adrian-Victor Vevera,
  • Marilena Ianculescu and
  • Adriana Alexandru

13 December 2025

Continuous and personalized monitoring are beneficial for patients suffering from neurodegenerative diseases such as Alzheimer’s disease, Parkinson’s disease and multiple sclerosis. However, such levels of monitoring are seldom ensured by...

  • Article
  • Open Access
412 Views
18 Pages

12 December 2025

Many countries around the world repeatedly suffer from natural disasters such as earthquakes, tsunamis, floods, and hurricanes due to geographical factors, including plate boundaries, tropical cyclone zones, and coastal regions. Representative exampl...

  • Article
  • Open Access
1,089 Views
24 Pages

High-Degree Connectivity Sensor Networks: Applications in Pastured Cow Herd Monitoring

  • Geunho Lee,
  • Teruyuki Yamane,
  • Kota Okabe,
  • Fumiaki Sugino and
  • Yeunwoong Kyung

12 December 2025

This paper explores the application of mobile sensor networks in cow herds, focusing on the challenge of achieving local communication under minimal computational constraints such as restricted locality, limited memory, and implicit coordination. To...

  • Article
  • Open Access
525 Views
22 Pages

11 December 2025

Unmanned Aerial Vehicles have become essential mobile sensing nodes in Internet of Things ecosystems, with applications ranging from disaster monitoring to traffic surveillance. However, wireless bandwidth is severely strained when sending enormous a...

  • Article
  • Open Access
453 Views
29 Pages

Fog-Aware Hierarchical Autoencoder with Density-Based Clustering for AI-Driven Threat Detection in Smart Farming IoT Systems

  • Manikandan Thirumalaisamy,
  • Sumendra Yogarayan,
  • Md Shohel Sayeed,
  • Siti Fatimah Abdul Razak and
  • Ramesh Shunmugam

10 December 2025

Smart farming relies heavily on IoT automation and data-driven decision making, but this growing connectivity also increases exposure to cyberattacks. Flow-based unsupervised intrusion detection is a privacy-preserving alternative to signature and pa...

  • Article
  • Open Access
1,118 Views
32 Pages

Explainability, Safety Cues, and Trust in GenAI Advisors: A SEM–ANN Hybrid Study

  • Stefanos Balaskas,
  • Ioannis Stamatiou and
  • George Androulakis

9 December 2025

“GenAI” assistants are gradually being integrated into daily tasks and learning, but their uptake is no less contingent on perceptions of credibility or safety than on their capabilities per se. The current study hypothesizes and tests it...

  • Article
  • Open Access
663 Views
41 Pages

6 December 2025

This paper proposes a transmission-path selection algorithm with joint computation and communication resource allocation for sixth-generation (6G) mobile edge computing (MEC) networks enhanced by helper-assisted device-to-device (D2D) communication a...

  • Article
  • Open Access
395 Views
18 Pages

5 December 2025

The Proof of Stake (PoS) consensus mechanism is increasingly used in blockchain systems; however, resource allocation for PoS-based mobile blockchain networks remains underexplored, particularly given the constraints of mobile devices. This work intr...

  • Article
  • Open Access
1,128 Views
41 Pages

STREAM: A Semantic Transformation and Real-Time Educational Adaptation Multimodal Framework in Personalized Virtual Classrooms

  • Leyli Nouraei Yeganeh,
  • Yu Chen,
  • Nicole Scarlett Fenty,
  • Amber Simpson and
  • Mohsen Hatami

5 December 2025

Most adaptive learning systems personalize around content sequencing and difficulty adjustment rather than transforming instructional material within the lesson itself. This paper presents the STREAM (Semantic Transformation and Real-Time Educational...

  • Article
  • Open Access
963 Views
48 Pages

Evaluating Synthetic Malicious Network Traffic Generated by GAN and VAE Models: A Data Quality Perspective

  • Nikolaos Peppes,
  • Theodoros Alexakis,
  • Emmanouil Daskalakis and
  • Evgenia Adamopoulou

4 December 2025

The limited availability and imbalance of labeled malicious network traffic data remain major obstacles in developing effective AI-driven cybersecurity solutions. To mitigate these challenges, this study investigates the use of deep generative models...

  • Article
  • Open Access
768 Views
33 Pages

Artificial Intelligence for Pneumonia Detection: A Federated Deep Learning Approach in Smart Healthcare

  • Ana-Mihaela Vasilevschi,
  • Călin-Alexandru Coman,
  • Marilena Ianculescu and
  • Oana Andreia Coman

4 December 2025

Artificial Intelligence (AI) plays an important role in driving innovation in smart healthcare by providing accurate, scalable, and privacy-preserving diagnostic options. Pneumonia is still a major global health issue, and early detection is key to i...

  • Article
  • Open Access
556 Views
20 Pages

Hybrid PON–RoF LTE Video Transmission with Experimental BLER Analysis and Amplifier Trade-Off

  • Berenice Arguero,
  • Mateo Leiva,
  • Kevin Christopher Pozo Guerrero,
  • Germán V. Arévalo,
  • Miltón N. Tipán,
  • Christian Tipantuña and
  • Michela Meo

4 December 2025

This study evaluates the performance of a hybrid passive optical network–radio over fiber (PON–RoF) architecture for long-term evolution (LTE)-based video transmission, focusing on the analysis of the block error rate (BLER) with and with...

  • Article
  • Open Access
2,082 Views
22 Pages

Understanding Generation Z’s Tourism Purchasing Decisions Through Internet Technologies: The Case of Influencer Marketing

  • Petra Vašaničová,
  • Zuzana Kosťová,
  • Ivana Hodorová,
  • Natália Kolková,
  • Viliam Obšut and
  • Michal Češkovič

3 December 2025

In the era of rapidly evolving Internet technologies, influencer marketing has emerged as a transformative force in digital tourism, reshaping how travelers discover, evaluate, and choose destinations and accommodations. This study investigates the r...

  • Article
  • Open Access
593 Views
27 Pages

3 December 2025

Extracting 3D skeletons from point clouds is a challenging task in computer vision. Most existing deep learning methods rely heavily on supervised data requiring extensive manual annotation. Consequently, re-labeling is often necessary for cross-cate...

  • Article
  • Open Access
693 Views
26 Pages

A Context-Aware Lightweight Framework for Source Code Vulnerability Detection

  • Yousef Sanjalawe,
  • Budoor Allehyani and
  • Salam Al-E’mari

3 December 2025

As software systems grow increasingly complex and interconnected, detecting vulnerabilities in source code has become a critical and challenging task. Traditional static analysis methods often fall short in capturing deep, context-dependent vulnerabi...

  • Article
  • Open Access
378 Views
25 Pages

3 December 2025

Big players in information and communication technologies are investing in the metaverse for their businesses. Meta, as the main player in social media worldwide, is massively developing its “social” metaverse as a new paradigm by depicti...

  • Article
  • Open Access
1 Citations
416 Views
15 Pages

Optimizing LoRaWAN Performance Through Learning Automata-Based Channel Selection

  • Luka Aime Atadet,
  • Richard Musabe,
  • Eric Hitimana and
  • Omar Gatera

2 December 2025

The rising demand for long-range, low-power wireless communication in applications such as monitoring, smart metering, and wide-area sensor networks has emphasized the critical need for efficient spectrum utilization in LoRaWAN (Long Range Wide Area...

  • Article
  • Open Access
553 Views
18 Pages

1 December 2025

The Internet has been progressively more integrated into daily life through its evolutionary stages, ranging from web1.0 to the current development of web3.0. These continued integrations broaden the attack surface that cybercriminals aim to exploit....

  • Article
  • Open Access
370 Views
26 Pages

Iron Ore Image Recognition Through Multi-View Evolutionary Deep Fusion Method

  • Di Zhang,
  • Xiaolong Qian,
  • Chenyang Shi,
  • Yuang Zhang,
  • Yining Qian and
  • Shengyue Zhou

1 December 2025

Iron ore image classification is essential for achieving high production efficiency and classification precision in mineral processing. However, real industrial environments face classification challenges due to small samples, inter-class similarity,...

  • Review
  • Open Access
714 Views
36 Pages

Robotic Motion Techniques for Socially Aware Navigation: A Scoping Review

  • Jesus Eduardo Hermosilla-Diaz,
  • Ericka Janet Rechy-Ramirez and
  • Antonio Marin-Hernandez

1 December 2025

The increasing inclusion of robots in social areas requires continuous improvement of behavioral strategies that robots must follow. Although behavioral strategies mainly focus on operational efficiency, other aspects should be considered to provide...

  • Article
  • Open Access
1 Citations
1,076 Views
28 Pages

A Blockchain-Based Framework for OSINT Evidence Collection and Identification

  • Han-Wen Huang,
  • Chih-Hung Shih,
  • Chen-Yu Li and
  • Hao-Yung Teng

30 November 2025

The rapid advancement of social media and the exponential increase in online information have made open-source intelligence an essential component of modern criminal investigations. However, existing digital forensics standards mainly focus on eviden...

  • Systematic Review
  • Open Access
1,842 Views
25 Pages

The AI-Powered Healthcare Ecosystem: Bridging the Chasm Between Technical Validation and Systemic Integration—A Systematic Review

  • Babiker Mohamed Rahamtalla,
  • Isameldin Elamin Medani,
  • Mohammed Eltahir Abdelhag,
  • Sara Ahmed Eltigani,
  • Sudha K. Rajan,
  • Essam Falgy,
  • Nazik Mubarak Hassan,
  • Marwa Elfatih Fadailu,
  • Hayat Ahmad Khudhayr and
  • Abuzar Abdalla

29 November 2025

Artificial intelligence (AI) is increasingly positioned as a transformative force in healthcare. The translation of AI from technical validation to real-world clinical impact remains a critical challenge. This systematic review aims to synthesize the...

  • Review
  • Open Access
1,923 Views
29 Pages

IoT Applications and Challenges in Global Healthcare Systems: A Comprehensive Review

  • Fadele Ayotunde Alaba,
  • Alvaro Rocha,
  • Hakeem Adewale Sulaimon and
  • Owamoyo Najeem

29 November 2025

The Internet of Things (IoT) has influenced the healthcare industry by enabling real-time monitoring, data-driven decision-making, and automation of medical activities. IoT in healthcare comprises a network of interconnected medical devices, sensors,...

  • Review
  • Open Access
1,256 Views
43 Pages

Defending the Distributed Skies: A Comprehensive Literature Review of the Arena of Multi-Cloud Environment

  • Labib Hasan Bayzid,
  • Tonny Shekha Kar,
  • Mohammad Tariqul Islam,
  • Md. Shabiul Islam and
  • Firoz Ahmed

28 November 2025

The rapid implementation of multi-cloud architectures, such as the integration of services from multiple cloud providers, gives organizations enhanced flexibility, resilience, and vendor independence. However, the multi-cloud model presents complicat...

  • Article
  • Open Access
1 Citations
3,075 Views
39 Pages

28 November 2025

Permissionless blockchains have evolved beyond cryptocurrency into foundations for Web3 applications, decentralized finance (DeFi), and digital asset ownership, yet this rapid expansion has intensified privacy vulnerabilities. This study provides a c...

  • Article
  • Open Access
1,544 Views
26 Pages

28 November 2025

The proliferation of disinformation on social media platforms poses a significant challenge to the reliability of online information ecosystems and the protection of public discourse. This study investigates the role of emotional sequences in detecti...

  • Review
  • Open Access
1 Citations
1,351 Views
49 Pages

28 November 2025

Federated Learning (FL) offers a promising way to train machine learning models collaboratively on decentralized edge devices, addressing key privacy, communication, and regulatory challenges in smart city environments. This survey adopts a narrative...

  • Article
  • Open Access
625 Views
21 Pages

27 November 2025

Post-5G and 6G telecommunication infrastructures face critical information security challenges due to increasing network complexity and sophisticated cyberattacks. Traditional intrusion detection systems based on statistical traffic analysis struggle...

  • Systematic Review
  • Open Access
747 Views
24 Pages

27 November 2025

Effective web service selection and recommendation are critical for ensuring high-quality performance in distributed and service-oriented systems. Recent research has increasingly explored the use of BERT (Bidirectional Encoder Representations from T...

  • Article
  • Open Access
1 Citations
600 Views
28 Pages

27 November 2025

The sixth-generation (6G) system has been attracting increasing attention from both industry and academia, with the space–air–ground integrated network (SAGIN) identified as one of its key applications. This study investigates a SAGIN fra...

  • Systematic Review
  • Open Access
1,383 Views
16 Pages

Artificial Intelligence-Enabled Facial Expression Analysis for Mental Health Assessment in Older Adults: A Systematic Review and Research Agenda

  • Fernando M. Runzer-Colmenares,
  • Nelson Luis Cahuapaza-Gutierrez,
  • Cielo Cinthya Calderon-Hernandez and
  • Christian Loret de Mola

26 November 2025

Facial expression analysis using artificial intelligence (AI) represents an emerging approach for assessing mental health, particularly in neurocognitive disorders. This study encompassed observational investigations that assessed facial expressions...

  • Systematic Review
  • Open Access
675 Views
31 Pages

25 November 2025

Among indoor positioning technologies, Wi-Fi fingerprinting using the Received Signal Strength Indicator (RSSI) is the most convenient and cost-effective method for indoor positioning. Instability and interference in wireless signal transmission caus...

  • Article
  • Open Access
671 Views
30 Pages

25 November 2025

To address the issues of privacy-utility imbalance, insufficient incentives, and lack of verifiable computation in current medical data sharing, this paper proposes a blockchain-based fair verification and adaptive differential privacy mechanism. The...

  • Article
  • Open Access
476 Views
20 Pages

25 November 2025

To enable remote and automatic monitoring of the farmland soil information, this paper has developed a soil monitoring system based on the Internet of Things (IoT), which mainly involves the development of a gateway server node, wireless sensor nodes...

  • Review
  • Open Access
2,208 Views
43 Pages

Survey of Intra-Node GPU Interconnection in Scale-Up Network: Challenges, Status, Insights, and Future Directions

  • Xiaoyong Song,
  • Danyuan Zhou,
  • Kai Li,
  • Jiayuan Chen,
  • Hao Zhang,
  • Xiaoguang Zhang and
  • Xuxia Zhong

24 November 2025

Nowadays, driven by the exponential growth of parameters and training data of AI applications and Large Language Models, a single GPU is no longer sufficient in terms of computing power and storage capacity. Building high-performance multi-GPU system...

  • Review
  • Open Access
1 Citations
2,262 Views
33 Pages

24 November 2025

In 2024, a total of 361 billion emails were sent and received by businesses and consumers each day. Email remains the preferred method of communication for work-related matters, with knowledge workers spending two to five hours a day managing their i...

  • Article
  • Open Access
633 Views
19 Pages

LLMs in Staging: An Orchestrated LLM Workflow for Structured Augmentation with Fact Scoring

  • Giuseppe Trimigno,
  • Gianfranco Lombardo,
  • Michele Tomaiuolo,
  • Stefano Cagnoni and
  • Agostino Poggi

24 November 2025

Retrieval-augmented generation (RAG) enriches prompts with external knowledge, but it often relies on additional infrastructure that may be impractical in resource-constrained or offline settings. In addition, updating the internal knowledge of a lan...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903