You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 17, Issue 12

December 2025 - 53 articles

Cover Story: The Internet’s evolution from Web 1.0 to Web 3.0 has expanded the attack surface for cybercriminals, making malware attacks more sophisticated. The use of AI in antivirus solutions challenges traditional detection methods. Research shows that converting malware files into textured images enhances resistance to obfuscation and improves the detection of zero-day threats. This paper explores the use of image quality assessment (IQA) to enhance the curation of visual malware datasets. We propose MalScore, a no-reference IQA algorithm designed to evaluate dataset quality and guide future dataset development. Our evaluation demonstrates that MalScore effectively differentiates dataset quality, with MalNet Tiny scoring 95% and NARAD 50%, highlighting its potential for visual malware detection and the integration of IQA techniques. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (53)

  • Article
  • Open Access
349 Views
21 Pages

Methodology for Detecting Suspicious Claims in Health Insurance Using Supervised Machine Learning

  • Jose Villegas-Ortega,
  • Luis Napoleon Quiroz Aviles,
  • Juan Nazario Arancibia,
  • Wilder Carpio Montenegro,
  • Rosa Delgadillo and
  • David Mauricio

18 December 2025

Health insurance fraud (HIF) places a substantial economic burden on global health systems. While supervised machine learning (SML) offers a promising solution for its detection, most approaches are ad hoc and lack a systematic methodological framewo...

  • Article
  • Open Access
236 Views
33 Pages

17 December 2025

Efficient resource allocation is a central challenge in multi-tenant cloud, fog, and edge environments, where heterogeneous tenants compete for shared resources under dynamic and uncertain workloads. Static or purely heuristic methods often fail to c...

  • Article
  • Open Access
373 Views
38 Pages

Ontology-Driven Emotion Multi-Class Classification and Influence Analysis of User Opinions on Online Travel Agency

  • Putri Utami Rukmana,
  • Muharman Lubis,
  • Hanif Fakhrurroja,
  • Asriana and
  • Alif Noorachmad Muttaqin

17 December 2025

The rise in social media has transformed Online Travel Agencies (OTAs) into platforms where users actively share their experiences and opinions. However, conventional opinion mining approaches often fail to capture nuanced emotional expressions or co...

  • Article
  • Open Access
514 Views
32 Pages

17 December 2025

This study examines the role of different factors in supporting the sustainable use of Artificial Intelligence (AI) technologies in higher education, particularly in the context of student interactions with intelligent and human-centered learning too...

  • Article
  • Open Access
218 Views
25 Pages

16 December 2025

Cloud-native microservice architectures offer scalability and resilience but introduce complex interdependencies and new attack surfaces, making them vulnerable to resource-exhaustion Distributed Denial-of-Service (DDoS) attacks. These attacks propag...

  • Article
  • Open Access
360 Views
27 Pages

SatNet-B3: A Lightweight Deep Edge Intelligence Framework for Satellite Imagery Classification

  • Tarbia Hasan,
  • Jareen Anjom,
  • Md. Ishan Arefin Hossain and
  • Zia Ush Shamszaman

16 December 2025

Accurate weather classification plays a vital role in disaster management and minimizing economic losses. However, satellite-based weather classification remains challenging due to high inter-class similarity; the computational complexity of existing...

  • Article
  • Open Access
399 Views
27 Pages

Concurrency Bug Detection via Static Analysis and Large Language Models

  • Zuocheng Feng,
  • Yiming Chen,
  • Kaiwen Zhang,
  • Xiaofeng Li and
  • Guanjun Liu

15 December 2025

Concurrency bugs originate from complex and improper synchronization of shared resources, presenting a significant challenge for detection. Traditional static analysis relies heavily on expert knowledge and frequently fails when code is non-compilabl...

  • Article
  • Open Access
271 Views
22 Pages

Selection of Optimal Cluster Head Using MOPSO and Decision Tree for Cluster-Oriented Wireless Sensor Networks

  • Rahul Mishra,
  • Sudhanshu Kumar Jha,
  • Shiv Prakash and
  • Rajkumar Singh Rathore

15 December 2025

Wireless sensor networks (WSNs) consist of distributed nodes to monitor various physical and environmental parameters. The sensor nodes (SNs) are usually resource constrained such as power source, communication, and computation capacity. In WSN, ener...

  • Article
  • Open Access
293 Views
19 Pages

Smart IoT-Based Temperature-Sensing Device for Energy-Efficient Glass Window Monitoring

  • Vaclav Mach,
  • Jiri Vojtesek,
  • Milan Adamek,
  • Pavel Drabek,
  • Pavel Stoklasek,
  • Stepan Dlabaja,
  • Lukas Kopecek and
  • Ales Mizera

15 December 2025

This paper presents the development and validation of an IoT-enabled temperature-sensing device for real-time monitoring of the thermal insulation properties of glass windows. The system integrates contact and non-contact temperature sensors into a c...

  • Systematic Review
  • Open Access
550 Views
26 Pages

15 December 2025

Higher education institutions (HEIs) are increasingly becoming vulnerable to cyberattacks as they adopt digital technologies to support their administrative, research and academic activities. These institutions, which typically operate in open and de...

of 6

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903