You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 14, Issue 8

August 2025 - 48 articles

Cover Story: This paper provides a comprehensive survey of the ENF as an environmental fingerprint for enhancing Metaverse security, reviewing its characteristics, sensing methods, limitations, and applications in threat modeling and the CIA triad (confidentiality, integrity, and availability). By capturing the ENF as having a unique signature that is timestamped, this method strengthens security by directly correlating physical grid behavior and virtual interactions, effectively combating threats such as deepfake manipulations. Building upon recent developments in signal processing, this strategy reinforces the integrity of digital environments, delivering robust protection against evolving cyber–physical risks and facilitating secure, scalable virtual infrastructures. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (48)

  • Article
  • Open Access
1 Citations
1,149 Views
28 Pages

In the recommendation system (RS) literature, a distinction exists between studies dedicated to fully operational (known users/items) and cold-start (new users/items) RSs. The warm-up phase—the transition between the two—is not widely res...

  • Article
  • Open Access
1 Citations
3,092 Views
30 Pages

A Hybrid Approach Using Graph Neural Networks and LSTM for Attack Vector Reconstruction

  • Yelizaveta Vitulyova,
  • Tetiana Babenko,
  • Kateryna Kolesnikova,
  • Nikolay Kiktev and
  • Olga Abramkina

The escalating complexity of cyberattacks necessitates advanced strategies for their detection and mitigation. This study presents a hybrid model that integrates Graph Neural Networks (GNNs) with Long Short-Term Memory (LSTM) networks to reconstruct...

  • Article
  • Open Access
1 Citations
851 Views
37 Pages

Integrating blockchain into healthcare devices offers the potential for improved data control but faces significant usability and acceptance challenges. This study addresses this gap by evaluating CipherPal, an improved blockchain-enabled Smart Fidge...

  • Review
  • Open Access
2 Citations
3,671 Views
25 Pages

EEG-Based Biometric Identification and Emotion Recognition: An Overview

  • Miguel A. Becerra,
  • Carolina Duque-Mejia,
  • Andres Castro-Ospina,
  • Leonardo Serna-Guarín,
  • Cristian Mejía and
  • Eduardo Duque-Grisales

This overview examines recent advancements in EEG-based biometric identification, focusing on integrating emotional recognition to enhance the robustness and accuracy of biometric systems. By leveraging the unique physiological properties of EEG sign...

  • Review
  • Open Access
2 Citations
2,714 Views
37 Pages

Deep Learning Techniques for Retinal Layer Segmentation to Aid Ocular Disease Diagnosis: A Review

  • Oliver Jonathan Quintana-Quintana,
  • Marco Antonio Aceves-Fernández,
  • Jesús Carlos Pedraza-Ortega,
  • Gendry Alfonso-Francia and
  • Saul Tovar-Arriaga

Age-related ocular conditions like macular degeneration (AMD), diabetic retinopathy (DR), and glaucoma are leading causes of irreversible vision loss globally. Optical coherence tomography (OCT) provides essential non-invasive visualization of retina...

  • Article
  • Open Access
2 Citations
1,957 Views
25 Pages

The increasing complexity of cybersecurity risks highlights the critical need for novel teaching techniques that provide students with the necessary skills and information. Traditional on-premises laboratory setups frequently lack the scalability, fl...

  • Article
  • Open Access
665 Views
14 Pages

This paper looks at and describes the potential of using artificial intelligence in smart environments. Various environments such as houses and residential and commercial buildings are becoming smarter through the use of various technologies, i.e., v...

  • Article
  • Open Access
1,186 Views
15 Pages

Dark web traffic classification is an important research direction in cybersecurity; however, traditional classification methods have many limitations. Although deep learning architectures like CNN and LSTM, as well as multi-structural fusion framewo...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X