Skip to Content

Future Internet, Volume 17, Issue 4

2025 April - 53 articles

Cover Story: This study employs secrecy energy efficiency (SEE) as a key performance metric to evaluate the trade-off between power consumption and secure communication efficiency. Additionally, a multi-objective improved biogeography-based optimization (MOIBBO) algorithm is utilized to optimize hyperparameters, ensuring an improved balance between convergence speed and model performance. Extensive simulation results demonstrate that the proposed MOIBBO-CNN–LSTM framework achieves superior SEE performance compared to benchmark schemes. These findings confirm that MOIBBO-CNN–LSTM offers an effective solution for optimizing SEE in CF m-MIMO-based IoT networks, paving the way for more energy-efficient and secure IoT communications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (53)

  • Article
  • Open Access
3,188 Views
21 Pages

21 April 2025

Modern large language models (LLMs) achieve state-of-the-art performance through architectural advancements but require high computational costs for inference. Post-training quantization is a widely adopted approach to reduce these costs by quantizin...

  • Article
  • Open Access
1 Citations
941 Views
27 Pages

21 April 2025

Phase wraparound due to large inter-sensor spacings in multi-channel demixing renders the DUET and AdRess source separation algorithms—known for their low computational complexity and effective speech demixing performance—unsuitable for h...

  • Systematic Review
  • Open Access
6 Citations
6,992 Views
41 Pages

Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies

  • Md Kamrul Siam,
  • Bilash Saha,
  • Md Mehedi Hasan,
  • Md Jobair Hossain Faruk,
  • Nafisa Anjum,
  • Sharaban Tahora,
  • Aiasha Siddika and
  • Hossain Shahriar

21 April 2025

Blockchain technology has emerged as a transformative innovation, providing a transparent, immutable, and decentralized platform that underpins critical applications across industries such as cryptocurrencies, supply chain management, healthcare, and...

  • Article
  • Open Access
2 Citations
2,091 Views
24 Pages

21 April 2025

Ultra-reliable and low-latency communication (URLLC) in 6G networks is characterized by very high reliability and very low latency to enable mission-critical applications. The ability of a coding scheme to support diverse use cases requires flexibili...

  • Article
  • Open Access
4 Citations
1,796 Views
31 Pages

Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets

  • Mohammed Salem Atoum,
  • Ala Abdulsalam Alarood,
  • Eesa Alsolami,
  • Adamu Abubakar,
  • Ahmad K. Al Hwaitat and
  • Izzat Alsmadi

21 April 2025

This study examines multi-lexical data sources, utilizing an extracted dataset from an open-source corpus and the Global Terrorism Datasets (GTDs), to predict lexical patterns that are directly linked to terrorism. This is essential as specific patte...

  • Article
  • Open Access
2 Citations
3,488 Views
34 Pages

20 April 2025

E-commerce applications have emerged as key drivers of digital transformation, reshaping consumer behavior and driving demand for seamless online transactions. Despite the growth of smart mobile technologies, existing methods rely on fixed UI content...

  • Article
  • Open Access
17 Citations
10,899 Views
26 Pages

Edge AI for Real-Time Anomaly Detection in Smart Homes

  • Manuel J. C. S. Reis and
  • Carlos Serôdio

18 April 2025

The increasing adoption of smart home technologies has intensified the demand for real-time anomaly detection to improve security, energy efficiency, and device reliability. Traditional cloud-based approaches introduce latency, privacy concerns, and...

  • Article
  • Open Access
1,426 Views
27 Pages

Detecting Disinformation in Croatian Social Media Comments

  • Igor Ljubi,
  • Zdravko Grgić,
  • Marin Vuković and
  • Gordan Gledec

17 April 2025

The frequency with which fake news or misinformation is published on social networks is constantly increasing. Users of social networks are confronted with many different posts every day, often with sensationalist titles and content of dubious veraci...

  • Systematic Review
  • Open Access
3 Citations
2,077 Views
47 Pages

17 April 2025

eHealth has transformed transplantation care by enhancing communication between patients and clinics, supporting self-management, and improving adherence to medical advice. However, existing research on eHealth in transplantation remains fragmented,...

  • Article
  • Open Access
1 Citations
2,133 Views
25 Pages

17 April 2025

Moroccan Law 55.19 aims to streamline administrative procedures, fostering trust between citizens and public administrations. To implement this law effectively and enhance public service quality, it is essential to use the Moroccan dialect to involve...

  • Review
  • Open Access
17 Citations
15,291 Views
54 Pages

A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies

  • Abdul Manan Sheikh,
  • Md. Rafiqul Islam,
  • Mohamed Hadi Habaebi,
  • Suriza Ahmad Zabidi,
  • Athaur Rahman Bin Najeeb and
  • Adnan Kabbani

16 April 2025

Edge computing (EC) is a distributed computing approach to processing data at the network edge, either by the device or a local server, instead of centralized data centers or the cloud. EC proximity to the data source can provide faster insights, res...

  • Article
  • Open Access
1,059 Views
40 Pages

15 April 2025

Vehicle-to-Vehicle (V2V) communications technology offers enhanced road safety, traffic efficiency, and connectivity. In V2V, vehicles cooperate by broadcasting safety messages to quickly detect and avoid dangerous situations on time or to avoid and...

  • Article
  • Open Access
9 Citations
4,022 Views
22 Pages

Multimodal Fall Detection Using Spatial–Temporal Attention and Bi-LSTM-Based Feature Fusion

  • Jungpil Shin,
  • Abu Saleh Musa Miah,
  • Rei Egawa,
  • Najmul Hassan,
  • Koki Hirooka and
  • Yoichi Tomioka

15 April 2025

Human fall detection is a significant healthcare concern, particularly among the elderly, due to its links to muscle weakness, cardiovascular issues, and locomotive syndrome. Accurate fall detection is crucial for timely intervention and injury preve...

  • Article
  • Open Access
4 Citations
1,372 Views
37 Pages

Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology

  • Adrian Alexandrescu,
  • Delia-Elena Bărbuță,
  • Cristian Nicolae Buțincu,
  • Alexandru Archip,
  • Silviu-Dumitru Pavăl,
  • Cătălin Mironeanu and
  • Gabriel-Alexandru Scînteie

14 April 2025

Innovation ecosystems often face challenges such as inadequate coordination, insufficient protection of intellectual property, limited access to quality expertise, and inefficient matchmaking between innovators and experts. This paper provides an in-...

  • Article
  • Open Access
2,247 Views
18 Pages

14 April 2025

Traditional command and control (C2) frameworks struggle with evasion, automation, and resilience against modern detection techniques. This paper introduces covert C2 (C3), a novel C2 framework designed to enhance operational security and minimize de...

  • Article
  • Open Access
1 Citations
2,263 Views
37 Pages

Employing Streaming Machine Learning for Modeling Workload Patterns in Multi-Tiered Data Storage Systems

  • Edson Ramiro Lucas Filho,
  • George Savva,
  • Lun Yang,
  • Kebo Fu,
  • Jianqiang Shen and
  • Herodotos Herodotou

11 April 2025

Modern multi-tiered data storage systems optimize file access by managing data across a hybrid composition of caches and storage tiers while using policies whose decisions can severely impact the storage system’s performance. Recently, differen...

  • Article
  • Open Access
8 Citations
2,015 Views
29 Pages

11 April 2025

The Internet of Things (IoT) has revolutionized modern communication systems by enabling seamless connectivity among low-power devices. However, the increasing demand for high-performance wireless networks necessitates advanced frameworks that optimi...

  • Article
  • Open Access
2,432 Views
14 Pages

11 April 2025

Distributed inference in resource-constrained heterogeneous edge clusters is fundamentally limited by disparities in device capabilities and load imbalance issues. Existing methods predominantly focus on optimizing single-pipeline allocation schemes...

  • Article
  • Open Access
2 Citations
1,064 Views
24 Pages

11 April 2025

The ongoing adoption of Robot Operating Systems (ROSs) not only for research-oriented projects but also for industrial applications demands a more thorough assessment of its security than in the past. This paper highlights that a key ROS component&md...

  • Article
  • Open Access
8 Citations
2,104 Views
22 Pages

Adaptive educational systems are essential for addressing the diverse learning needs of students by dynamically adjusting instructional content and user interfaces (UI) based on real-time performance. Traditional adaptive learning environments often...

  • Article
  • Open Access
2 Citations
939 Views
24 Pages

CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks

  • Junchao Wang,
  • Honglin Li,
  • Yan Sun,
  • Chris Phillips,
  • Alexios Mylonas and
  • Dimitris Gritzalis

The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajecto...

  • Article
  • Open Access
7 Citations
3,539 Views
12 Pages

Wireless Sensor Networks (WSNs) play a critical role in environmental monitoring and early forest fire detection. However, they are susceptible to sensor malfunctions and network intrusions, which can compromise data integrity and lead to false alarm...

  • Systematic Review
  • Open Access
22 Citations
7,067 Views
40 Pages

The convergence of Virtual Reality (VR), Artificial Intelligence (AI), and the Internet of Things (IoT) offers transformative potential across numerous sectors. However, existing studies often examine these technologies independently or in limited pa...

  • Article
  • Open Access
5 Citations
2,423 Views
14 Pages

The Internet of Vehicles (IoV) presents complex cybersecurity challenges, particularly against Denial-of-Service (DoS) and spoofing attacks targeting the Controller Area Network (CAN) bus. This study leverages the CICIoV2024 dataset, comprising six d...

  • Review
  • Open Access
1 Citations
1,817 Views
39 Pages

Enabling Green Cellular Networks: A Review and Proposal Leveraging Software-Defined Networking, Network Function Virtualization, and Cloud-Radio Access Network

  • Radheshyam Singh,
  • Line M. P. Larsen,
  • Eder Ollora Zaballa,
  • Michael Stübert Berger,
  • Christian Kloch and
  • Lars Dittmann

The increasing demand for enhanced communication systems, driven by applications such as real-time video streaming, online gaming, critical operations, and Internet-of-Things (IoT) services, has necessitated the optimization of cellular networks to m...

  • Article
  • Open Access
1 Citations
811 Views
26 Pages

With the development of the internet, the incidence of myopia is showing a trend towards younger ages, making routine vision screening increasingly essential. This paper designs an online refractive error screening solution centered on the CFGN (Comp...

  • Systematic Review
  • Open Access
3 Citations
2,274 Views
30 Pages

Internet of Things and Deep Learning for Citizen Security: A Systematic Literature Review on Violence and Crime

  • Chrisbel Simisterra-Batallas,
  • Pablo Pico-Valencia,
  • Jaime Sayago-Heredia and
  • Xavier Quiñónez-Ku

This study conducts a systematic literature review following the PRISMA framework and the guidelines of Kitchenham and Charters to analyze the application of Internet of Things (IoT) technologies and deep learning models in monitoring violent actions...

  • Article
  • Open Access
3 Citations
1,109 Views
17 Pages

A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks

  • Sunan Wang,
  • Rong Song,
  • Xiangyu Zheng,
  • Wanwei Huang and
  • Hongchang Liu

With the rapid growth of Internet applications and network traffic, existing routing algorithms are usually difficult to guarantee the quality of service (QoS) indicators such as delay, bandwidth, and packet loss rate as well as network energy consum...

  • Article
  • Open Access
1,896 Views
24 Pages

The New CAP Theorem on Blockchain Consensus Systems

  • Aristidis G. Anagnostakis and
  • Euripidis Glavas

One of the most emblematic theorems in the theory of distributed databases is Eric Brewer’s CAP theorem. It stresses the tradeoffs between Consistency, Availability, and Partition and states that it is impossible to guarantee all three of them...

  • Article
  • Open Access
2 Citations
5,400 Views
23 Pages

Modern database systems are critical for storing sensitive information but are increasingly targeted by cyber threats, including SQL injection (SQLi) attacks. This research proposes a robust security framework leveraging Docker-based virtualisation t...

  • Article
  • Open Access
3 Citations
1,664 Views
19 Pages

31 March 2025

For efficient radio network planning, empirical path loss (PL) prediction models are utilized to predict signal attenuation in different environments. Alternatively, machine learning (ML) models are proposed to predict path loss. While empirical mode...

  • Article
  • Open Access
4 Citations
3,038 Views
19 Pages

31 March 2025

Due to the widespread applicability of generative artificial intelligence, we have seen it adopted across many areas of education, providing universities with new opportunities, particularly in cybersecurity education. With the industry facing a skil...

  • Article
  • Open Access
9 Citations
8,406 Views
26 Pages

Practical Comparison Between the CI/CD Platforms Azure DevOps and GitHub

  • Vladislav Manolov,
  • Daniela Gotseva and
  • Nikolay Hinov

31 March 2025

Continuous integration and delivery are essential for modern software development, enabling teams to automate testing, streamline deployments, and deliver high-quality software more efficiently. As DevOps adoption grows, selecting the right CI/CD pla...

  • Article
  • Open Access
9 Citations
8,747 Views
26 Pages

GDPR and Large Language Models: Technical and Legal Obstacles

  • Georgios Feretzakis,
  • Evangelia Vagena,
  • Konstantinos Kalodanis,
  • Paraskevi Peristera,
  • Dimitris Kalles and
  • Athanasios Anastasiou

28 March 2025

Large Language Models (LLMs) have revolutionized natural language processing but present significant technical and legal challenges when confronted with the General Data Protection Regulation (GDPR). This paper examines the complexities involved in r...

  • Article
  • Open Access
4 Citations
1,734 Views
18 Pages

GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering

  • Danial Ahmadzadeh,
  • Mehrdad Jalali,
  • Reza Ghaemi and
  • Maryam Kheirabadi

28 March 2025

Community detection in complex networks remains a significant challenge due to noise, outliers, and the dependency on predefined clustering parameters. This study introduces GraphDBSCAN, an adaptive community detection framework that integrates an op...

  • Article
  • Open Access
1 Citations
1,418 Views
19 Pages

A Cross-Chain-Based Access Control Framework for Cloud Environment

  • Saad Belcaid,
  • Mostapha Zbakh,
  • Siham Aouad,
  • Abdellah Touhafi and
  • An Braeken

27 March 2025

Cloud computing presents itself as one of the leading technologies in the IT solutions field, providing a variety of services and capabilities. Meanwhile, blockchain-based solutions emerge as advantageous as they permit data immutability, transaction...

  • Article
  • Open Access
1 Citations
1,090 Views
25 Pages

27 March 2025

With the increasing predominance of public cloud computing, managing the cost of usage for end users has become vital in importance. Task scheduling has emerged as an important target of research in this area. The present work considers the problem o...

  • Article
  • Open Access
2 Citations
1,307 Views
24 Pages

26 March 2025

Pediatric appendicitis remains a challenging condition to diagnose accurately due to its varied clinical presentations and the non-specific nature of symptoms, particularly in younger patients. Traditional diagnostic approaches often result in delaye...

  • Article
  • Open Access
1 Citations
1,414 Views
23 Pages

Integration of a Digital Twin Framework for Trajectory Control of a 2RRR Planar Parallel Manipulator Using ROS/Gazebo and MATLAB

  • Carlos Andrés Mesa-Montoya,
  • Néstor Iván Marín Peláez,
  • Kevin David Ortega-Quiñones,
  • German Andrés Holguín-Londoño,
  • Libardo Vicente Vanegas-Useche,
  • Gian Carlo Daraviña-Peña,
  • Edwan Anderson Ariza-Echeverri and
  • Diego Vergara

26 March 2025

Digital twin (DT) technology is transforming industrial automation by enabling the real-time simulation, predictive control, and optimization of complex systems. This study presents a DT-based kinematic control method designed for trajectory planning...

  • Review
  • Open Access
11 Citations
9,438 Views
32 Pages

The Role of AI-Based Chatbots in Public Health Emergencies: A Narrative Review

  • Francesco Branda,
  • Massimo Stella,
  • Cecilia Ceccarelli,
  • Federico Cabitza,
  • Giancarlo Ceccarelli,
  • Antonello Maruotti,
  • Massimo Ciccozzi and
  • Fabio Scarpa

26 March 2025

The rapid emergence of infectious disease outbreaks has underscored the urgent need for effective communication tools to manage public health crises. Artificial Intelligence (AI)-based chatbots have become increasingly important in these situations,...

  • Article
  • Open Access
1 Citations
1,273 Views
22 Pages

Knowledge Sharing in Security-Sensitive Communities

  • Yonit Rusho,
  • Daphne Ruth Raban,
  • David Simantov and
  • Gilad Ravid

26 March 2025

Collective intelligence inherently relies on knowledge sharing. In security-sensitive organizations, tension arises between the need to develop collective knowledge and organizational culture, which requires secrecy. Drawing on the effects of trust o...

  • Article
  • Open Access
3 Citations
2,002 Views
20 Pages

25 March 2025

In recent years, advancements in artificial intelligence, speech, and natural language processing technology have enhanced spoken dialogue systems (SDSs), enabling natural, voice-based human–computer interaction. However, discrete, token-based...

  • Review
  • Open Access
3 Citations
3,256 Views
21 Pages

25 March 2025

Fifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capabili...

  • Article
  • Open Access
4 Citations
1,927 Views
20 Pages

Enhancing IoT Scalability and Interoperability Through Ontology Alignment and FedProx

  • Chaimae Kanzouai,
  • Soukaina Bouarourou,
  • Abderrahim Zannou,
  • Abdelhak Boulaalam and
  • El Habib Nfaoui

25 March 2025

The rapid expansion of IoT devices has introduced major challenges in ensuring data interoperability, enabling real-time processing, and achieving scalability, especially in decentralized edge computing environments. In this paper, an advanced framew...

  • Editorial
  • Open Access
724 Views
4 Pages

25 March 2025

With the advent of the Internet of Things (IoT), the centralized cloud computing service delivery paradigm has been gradually transformed into a cloud continuum that includes edge and fog computing and heterogeneous IoT devices with varying computing...

  • Article
  • Open Access
3 Citations
1,716 Views
28 Pages

24 March 2025

This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks...

  • Article
  • Open Access
1 Citations
2,657 Views
27 Pages

24 March 2025

Large language models (LLMs) hold the potential to significantly enhance data annotation for free-text healthcare records. However, ensuring their accuracy and reliability is critical, especially in clinical research applications requiring the extrac...

  • Article
  • Open Access
1,293 Views
15 Pages

On Microservice-Based Architecture for Digital Forensics Applications: A Competition Policy Perspective

  • Fragkiskos Ninos,
  • Konstantinos Karalas,
  • Dimitrios Dechouniotis and
  • Michael Polemis

23 March 2025

Digital forensics systems are complex applications consisting of numerous individual components that demand substantial computing resources. By adopting the concept of microservices, forensics applications can be divided into smaller, independently m...

  • Article
  • Open Access
9 Citations
2,491 Views
25 Pages

Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms

  • Ali Zaman,
  • Salman A. Khan,
  • Nazeeruddin Mohammad,
  • Abdelhamied A. Ateya,
  • Sadique Ahmad and
  • Mohammed A. ElAffendi

22 March 2025

A software-defined network (SDN) is a new architecture approach for constructing and maintaining networks with the main goal of making the network open and programmable. This allows the achievement of specific network behavior by updating and install...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903