You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 17, Issue 6

June 2025 - 42 articles

Cover Story: Intrusion detection in the Internet of Things (IoT) environments is increasingly critical due to the rapid proliferation of connected devices and the growing sophistication of cyber threats. Traditional detection methods often fall short in identifying multi-class attacks. This paper proposes a novel hybrid intrusion detection framework that integrates transformer networks with generative adversarial networks (GANs), aiming to enhance both detection accuracy and robustness. Experimental results show that our hybrid framework consistently outperforms baseline methods, in both binary and multi-class intrusion detection tasks. The superiority of the proposed model was further validated through statistically significant t-test results, indicating both efficiency and stability. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Article
  • Open Access
544 Views
27 Pages

This paper presents a framework that enables programmers to deploy embedded real-time firmware of Internet of Things (IoT) devices more conveniently than using plain C/C++-language programming, by abstracting away from low-level details and the ad ho...

  • Review
  • Open Access
1,122 Views
19 Pages

A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols

  • Iftikhar Hussain,
  • Manuel J. C. S. Reis,
  • Carlos Serôdio and
  • Frederico Branco

This research examined the domain of intelligent transportation systems (ITS) by analyzing the impact of scholarly work and thematic prevalence, as well as focusing attention on vehicles, their technologies, cybersecurity, and related scholarly techn...

  • Article
  • Open Access
872 Views
35 Pages

Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment

  • Sikha S. Bagui,
  • Germano Correa Silva De Carvalho,
  • Asmi Mishra,
  • Dustin Mink,
  • Subhash C. Bagui and
  • Stephanie Eager

In an era marked by the rapid growth of the Internet of Things (IoT), network security has become increasingly critical. Traditional Intrusion Detection Systems, particularly signature-based methods, struggle to identify evolving cyber threats such a...

  • Article
  • Open Access
778 Views
26 Pages

As digital infrastructure continues to expand, networks, web services, and Internet of Things (IoT) devices become increasingly vulnerable to distributed denial of service (DDoS) attacks. Remarkably, IoT devices have become attracted to DDoS attacks...

  • Article
  • Open Access
2 Citations
1,832 Views
21 Pages

JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs)

  • Jorge Cisneros-González,
  • Natalia Gordo-Herrera,
  • Iván Barcia-Santos and
  • Javier Sánchez-Soriano

This paper explores the application of large language models (LLMs) to automate the evaluation of programming assignments in an undergraduate “Introduction to Programming” course. This study addresses the challenges of manual grading, inc...

  • Article
  • Open Access
1 Citations
664 Views
24 Pages

An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels

  • Yiannis Kiouvrekis,
  • Katerina Gkirtzou,
  • Sotiris Zikas,
  • Dimitris Kalatzis,
  • Theodor Panagiotakopoulos,
  • Zoran Lajic,
  • Dimitris Papathanasiou and
  • Ioannis Filippopoulos

In the evolving landscape of green shipping, the accurate estimation of shaft power is critical for reducing fuel consumption and greenhouse gas emissions. This study presents an explainable machine learning framework for shaft power prediction, util...

  • Article
  • Open Access
1 Citations
503 Views
14 Pages

The rapid integration of the Internet of Medical Things (IoMT) into healthcare systems raises urgent demands for secure communication mechanisms capable of protecting sensitive patient data. Quantum key agreement (QKA), a collaborative approach to ke...

  • Article
  • Open Access
3 Citations
3,167 Views
30 Pages

Healthcare systems are increasingly vulnerable to security threats due to their reliance on digital platforms. Traditional access control models like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) have limitations in mitig...

  • Article
  • Open Access
1 Citations
825 Views
30 Pages

Virtual machine (VM) placement in cloud datacenters is a complex multi-objective challenge involving trade-offs among energy efficiency, carbon emissions, and network performance. This paper proposes NCRA-DP-ACO (Network-, Cost-, and Renewable-Aware...

  • Article
  • Open Access
1 Citations
663 Views
24 Pages

Identifying the source camera of a digital image is a critical task for ensuring image authenticity. In this paper, we propose a novel privacy-preserving distributed source camera identification scheme that jointly exploits both physical-layer finger...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license