Skip Content
You are currently on the new version of our website. Access the old version .

Most Recent

  • Article
  • Open Access

Rethinking the Security Assurances of MTD: A Gap Analysis for Network Defense

  • Łukasz Jalowski,
  • Marek Zmuda,
  • Mariusz Rawski and
  • Paulina Rekosz
Future Internet2026, 18(2), 89;https://doi.org/10.3390/fi18020089 
(registering DOI)

7 February 2026

Moving Target Defense (MTD) is a paradigm that has the potential to revolutionize the approach to network security. Although a significant number of papers have been published on the topic, there are still no standards or any dominant implementations...

  • Article
  • Open Access

6 February 2026

AI-driven network security relies increasingly on Large Language Models (LLMs) to detect sophisticated threats; however, their deployment on resource-constrained edge devices is severely hindered by immense parameter scales. While unstructured prunin...

  • Article
  • Open Access

6 February 2026

Integrating Software-Defined Networking (SDN) to enhance mobility management in Vehicular Ad Hoc Networks (VANETs) comes with an additional critical risk. Because centralized controllers are single points of failure, they create the risk that the net...

  • Article
  • Open Access

5 February 2026

Efficient retrieval of mathematical and structural similarities in System Dynamics models remains a significant challenge for traditional lexical systems, which often fail to capture the contextual dependencies of simulation processes. This paper pre...

  • Article
  • Open Access
33 Views
24 Pages

5 February 2026

Deep learning has become an important approach for automated software vulnerability detection. However, due to domain shift, existing models often suffer from significant performance degradation when applied to unseen projects. To address this issue,...

  • Article
  • Open Access
162 Views
27 Pages

User Perceptions of Virtual Consultations and Artificial Intelligence Assistance: A Mixed Methods Study

  • Pranavsingh Dhunnoo,
  • Karen McGuigan,
  • Vicky O’Rourke,
  • Bertalan Meskó and
  • Michael McCann

4 February 2026

Background: In recent years, virtual consultations have emerged as a crucial approach for continuity of chronic care provision, indicating a promising avenue for the future of smart healthcare systems. However, reversions to in-person care highlight...

  • Review
  • Open Access
116 Views
69 Pages

Next-Gen Explainable AI (XAI) for Federated and Distributed Internet of Things Systems: A State-of-the-Art Survey

  • Aristeidis Karras,
  • Anastasios Giannaros,
  • Natalia Amasiadi and
  • Christos Karras

4 February 2026

Background: Explainable Artificial Intelligence (XAI) is deployed in Internet of Things (IoT) ecosystems for smart cities and precision agriculture, where opaque models can compromise trust, accountability, and regulatory compliance. Objective: This...

  • Systematic Review
  • Open Access
158 Views
22 Pages

From IoT to AIoT: Evolving Agricultural Systems Through Intelligent Connectivity in Low-Income Countries

  • Selain K. Kasereka,
  • Alidor M. Mbayandjambe,
  • Ibsen G. Bazie,
  • Heriol F. Zeufack,
  • Okurwoth V. Ocama,
  • Esteve Hassan,
  • Kyandoghere Kyamakya and
  • Tasho Tashev

3 February 2026

The convergence of Artificial Intelligence and the Internet of Things has given rise to the Artificial Intelligence of Things (AIoT), which enables connected systems to operate with greater autonomy, adaptability, and contextual awareness. In agricul...

  • Article
  • Open Access
110 Views
23 Pages

TLOA: A Power-Adaptive Algorithm Based on Air–Ground Cooperative Jamming

  • Wenpeng Wu,
  • Zhenhua Wei,
  • Haiyang You,
  • Zhaoguang Zhang,
  • Chenxi Li,
  • Jianwei Zhan and
  • Shan Zhao

2 February 2026

Air–ground joint jamming enables three-dimensional, distributed jamming configurations, making it effective against air–ground communication networks with complex, dynamically adjustable links. Once the jamming layout is fixed, dynamic ja...

  • Article
  • Open Access
88 Views
26 Pages

LoRa/LoRaWAN Time Synchronization: A Comprehensive Analysis, Performance Evaluation, and Compensation of Frame Timestamping

  • Stefano Rinaldi,
  • Elia Mondini,
  • Paolo Ferrari,
  • Alessandra Flammini and
  • Emiliano Sisinni

2 February 2026

This paper examines precise timestamping of LoRaWAN messages (particularly beacons) to enable wide-area synchronization for end devices without GNSS. The need for accuracy demands hardware-level timestamping architectures, possibly using time-domain...

  • Article
  • Open Access
86 Views
29 Pages

Building a Regional Platform for Monitoring Air Quality

  • Stanimir Nedyalkov Stoyanov,
  • Boyan Lyubomirov Belichev,
  • Veneta Veselinova Tabakova-Komsalova,
  • Yordan Georgiev Todorov,
  • Angel Atanasov Golev,
  • Georgi Kostadinov Maglizhanov,
  • Ivan Stanimirov Stoyanov and
  • Asya Georgieva Stoyanova-Doycheva

2 February 2026

This paper presents PLAM (Plovdiv Air Monitoring)—a regional multi-agent platform for air quality monitoring, semantic reasoning, and forecasting. The platform uses a hybrid architecture that combines two types of intelligent agents: classic BD...

  • Article
  • Open Access
109 Views
26 Pages

2 February 2026

Autonomous Underwater Vehicles (AUVs) play a central role in marine observation, inspection, and monitoring missions, where effective trajectory planning is essential for ensuring safe operation, reliable sensing, and efficient data transfer. In real...

  • Review
  • Open Access
352 Views
39 Pages

Research on Intelligent Resource Management Solutions for Green Cloud Computing

  • Amirmohammad Parhizkar,
  • Ehsan Arianyan and
  • Pejman Goudarzi

1 February 2026

Cloud computing utilization has experienced progressive expansion over the last decade, which has raised concerns and challenges regarding efficient resource allocation and energy efficiency. The burgeoning increase in the number of cloud computing u...

  • Article
  • Open Access
134 Views
19 Pages

Aerial Image Analysis: When LLMs Assist (And When Not)

  • Salvatore Calcagno,
  • Erika Scaletta,
  • Emiliano Tramontana and
  • Gabriella Verga

1 February 2026

Large language models (LLMs) have shown remarkable results when tasked with the analysis and production of texts or images and for captioning images. Aerial images differ from other images since they exhibit many natural objects that have a highly va...

  • Article
  • Open Access
350 Views
32 Pages

Towards Trustworthy AI Agents in Geriatric Medicine: A Secure and Assistive Architectural Blueprint

  • Elena-Anca Paraschiv,
  • Adrian Victor Vevera,
  • Carmen Elena Cîrnu,
  • Lidia Băjenaru,
  • Andreea Dinu and
  • Gabriel Ioan Prada

1 February 2026

As artificial intelligence (AI) continues to expand across clinical environments, healthcare is transitioning from static decision-support tools to dynamic, autonomous agents capable of reasoning, coordination, and continuous interaction. In the cont...

  • Article
  • Open Access
158 Views
35 Pages

DACCA: Distributed Adaptive Cloud Continuum Architecture

  • Nektarios Deligiannakis,
  • Vassilis Papataxiarhis,
  • Michalis Loukeris,
  • Stathes Hadjiefthymiades,
  • Marios Touloupou,
  • Syed Mafooq Ul Hassan,
  • Herodotos Herodotou,
  • Thanasis Moustakas,
  • Emmanouil Bampis and
  • Pablo Strasser
  • + 8 authors

1 February 2026

Recently, the need for unified orchestration frameworks that can manage extremely heterogeneous, distributed, and resource-constrained environments has emerged due to the rapid development of cloud, edge, and IoT computing. Kubernetes and other tradi...

  • Viewpoint
  • Open Access
175 Views
18 Pages

1 February 2026

Generative AI (GenAI) now produces text, images, audio, and video that can be perceptually convincing at scale and at negligible marginal cost. While public debate often frames the associated harms as “deepfakes” or incremental extensions...

  • Article
  • Open Access
152 Views
38 Pages

31 January 2026

The fast-paced utilization of innovative Internet of Things (IoT) applications emphasizes the critical role that routing protocols play in designing an efficient communication system between network nodes. In this context, the lack of adaptive routin...

  • Article
  • Open Access
179 Views
41 Pages

Cross Layer Optimization Using AI/ML-Assisted Federated Edge Learning in 6G Networks

  • Spyridon Louvros,
  • AnupKumar Pandey,
  • Brijesh Shah and
  • Yashesh Buch

30 January 2026

This paper introduces a novel methodology that integrates 6G wireless Federated Edge Learning (FEEL) frameworks with MAC to PHY cross layer optimization strategies. In the context of mobile edge computing, typically ensuring robust channel estimation...

  • Article
  • Open Access
220 Views
19 Pages

27 January 2026

Cloud storage continues to experience recurring provider-side breaches, raising concerns about the confidentiality and recoverability of user data. This study addresses this challenge by introducing an Artificial Intelligence (AI)-driven hybrid archi...

  • Article
  • Open Access
243 Views
42 Pages

Socially Grounded IoT Protocol for Reliable Computer Vision in Industrial Applications

  • Gokulnath Chidambaram,
  • Shreyanka Subbarayappa and
  • Sai Baba Magapu

27 January 2026

The Social Internet of Things (SIoT) enables collaborative service provisioning among interconnected devices by leveraging socially inspired trust relationships. This paper proposes a socially driven SIoT protocol for trust-aware service selection, e...

  • Article
  • Open Access
252 Views
32 Pages

Utilizing AIoT to Achieve Sustainable Agricultural Systems in a Climate-Change-Affected Environment

  • Mohamed Naeem,
  • Mohamed A. El-Khoreby,
  • Hussein M. ELAttar and
  • Mohamed Aboul-Dahab

26 January 2026

Smart agricultural systems are continually evolving to provide high-quality planting and defend against threats such as climate change, which necessitate improved adaptation and resource allocation. IoT technology offers a cost-effective approach to...

  • Article
  • Open Access
268 Views
19 Pages

Video Deepfake Detection Based on Multimodality Semantic Consistency Fusion

  • Fang Sun,
  • Xiaoxuan Guo,
  • Tong Zhang,
  • Yang Liu and
  • Jing Zhang

23 January 2026

Deepfake detection in video data typically relies on mining deep embedded representations across multiple modalities to obtain discriminative fused features and thereby improve detection accuracy. However, existing approaches predominantly focus on h...

  • Article
  • Open Access
219 Views
36 Pages

21 January 2026

This paper introduces a cybersecurity framework that combines a deception-based ransomware detection system, called the Intrusion and Ransomware Detection System for Cloud (IRDS4C), with a blockchain-enabled Cyber Threat Intelligence platform (CTIB)....

  • Article
  • Open Access
130 Views
22 Pages

21 January 2026

Mobile crowdsensing (MCS) is an emerging paradigm that enables cost-effective, large-scale, and participatory data collection through mobile devices. However, the open nature of MCS raises significant privacy and trust challenges. Existing reputation...

  • Article
  • Open Access
220 Views
30 Pages

21 January 2026

Autonomous UAV/UGV swarms increasingly operate in contested environments where purely digital control architectures are vulnerable to cyber compromise, communication denial, and timing faults. This paper presents Guarded Swarms, a hybrid framework th...

  • Review
  • Open Access
385 Views
37 Pages

Synthetizing 6G KPIs for Diverse Future Use Cases: A Comprehensive Review of Emerging Standards, Technologies, and Societal Needs

  • Shujat Ali,
  • Asma Abu-Samah,
  • Mohammed H. Alsharif,
  • Rosdiadee Nordin,
  • Nauman Saqib,
  • Mohammed Sani Adam,
  • Umawathy Techanamurthy,
  • Manzareen Mustafa and
  • Nor Fadzilah Abdullah

21 January 2026

The anticipated transition from 5G to 6G is driven not by incremental performance demands but by a widening mismatch between emerging application requirements and the capabilities of existing cellular systems. Despite rapid progress across 3GPP Relea...

  • Article
  • Open Access
182 Views
24 Pages

21 January 2026

The Transport Layer Security (TLS) protocol is widely used nowadays to create secure communications over TCP/IP networks. Its purpose is to ensure confidentiality, authentication, and data integrity for messages exchanged between two endpoints. In or...

  • Article
  • Open Access
137 Views
32 Pages

Adaptive Assistive Technologies for Learning Mexican Sign Language: Design of a Mobile Application with Computer Vision and Personalized Educational Interaction

  • Carlos Hurtado-Sánchez,
  • Ricardo Rosales Cisneros,
  • José Ricardo Cárdenas-Valdez,
  • Andrés Calvillo-Téllez and
  • Everardo Inzunza-Gonzalez

21 January 2026

Integrating people with hearing disabilities into schools is one of the biggest problems that Latin American societies face. Mexican Sign Language (MSL) is the main language and culture of the deaf community in Mexico. However, its use in formal educ...

  • Article
  • Open Access
192 Views
17 Pages

Unsupervised Detection of SOC Spoofing in OCPP 2.0.1 EV Charging Communication Protocol Using One-Class SVM

  • Aisha B. Rahman,
  • Md Sadman Siraj,
  • Eirini Eleni Tsiropoulou,
  • Georgios Fragkos,
  • Ryan Sullivant,
  • Yung Ryn Choe,
  • Jhaell Jimenez,
  • Junghwan Rhee and
  • Kyu Hyung Lee

21 January 2026

The electric vehicles (EVs) market keeps growing globally; thus, it is critical to secure the EV charging communication protocols in order to guarantee reliable and fair charging operations among the customers. The Open Charge Point Protocol (OCPP) 2...

  • Article
  • Open Access
143 Views
25 Pages

Edge-Enhanced YOLOV8 for Spacecraft Instance Segmentation in Cloud-Edge IoT Environments

  • Ming Chen,
  • Wenjie Chen,
  • Yanfei Niu,
  • Ping Qi and
  • Fucheng Wang

20 January 2026

The proliferation of smart devices and the Internet of Things (IoT) has led to massive data generation, particularly in complex domains such as aerospace. Cloud computing provides essential scalability and advanced analytics for processing these vast...

  • Article
  • Open Access
148 Views
22 Pages

20 January 2026

Container-based cloud platforms enable flexible and lightweight application deployment, yet container scheduling remains challenged by resource fragmentation, load imbalance, excessive energy consumption, and service-level agreement (SLA) violations....

  • Article
  • Open Access
159 Views
26 Pages

Performance Evaluation of MongoDB and RavenDB in IIoT-Inspired Data-Intensive Mobile and Web Applications

  • Mădălina Ciumac,
  • Cornelia Aurora Győrödi,
  • Robert Ștefan Győrödi and
  • Felicia Mirabela Costea

20 January 2026

The exponential growth of data generated by modern digital applications, including systems inspired by Industrial Internet of Things (IIoT) requirements, has accelerated the adoption of NoSQL databases due to their scalability, flexibility, and perfo...

  • Article
  • Open Access
135 Views
30 Pages

20 January 2026

The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an al...

  • Article
  • Open Access
234 Views
31 Pages

Digital Learning Hubs: Evaluating Their Role in Fostering Complex and Computational Thinking

  • Inés Alvarez-Icaza,
  • Luis Magdiel Oliva-Córdova,
  • Rasikh Tariq and
  • José Luis Martín-Núñez

19 January 2026

Digital Learning Hubs and educational repositories are key tools to offer innovative educational experiences in the context of the digital transformation of education. However, their evaluation has often been approached from fragmented perspectives,...

  • Article
  • Open Access
162 Views
26 Pages

An Unsupervised Cloud-Centric Intrusion Diagnosis Framework Using Autoencoder and Density-Based Learning

  • Suresh K. S,
  • Thenmozhi Elumalai,
  • Radhakrishnan Rajamani,
  • Anubhav Kumar,
  • Balamurugan Balusamy,
  • Sumendra Yogarayan and
  • Kaliyaperumal Prabu

19 January 2026

Cloud computing environments generate high-dimensional, large-scale, and highly dynamic network traffic, making intrusion diagnosis challenging due to evolving attack patterns, severe traffic imbalance, and limited availability of labeled data. To ad...

  • Article
  • Open Access
251 Views
29 Pages

Benchmarking SQL and NoSQL Persistence in Microservices Under Variable Workloads

  • Nenad Pantelic,
  • Ljiljana Matic,
  • Lazar Jakovljevic,
  • Stefan Eric,
  • Milan Eric,
  • Miladin Stefanović and
  • Aleksandar Djordjevic

15 January 2026

This paper presents a controlled comparative evaluation of SQL and NoSQL persistence mechanisms in containerized microservice architectures under variable workload conditions. Three persistence configurations—SQL with indexing, SQL without inde...

  • Article
  • Open Access
245 Views
21 Pages

Cyber Approach for DDoS Attack Detection Using Hybrid CNN-LSTM Model in IoT-Based Healthcare

  • Mbarka Belhaj Mohamed,
  • Dalenda Bouzidi,
  • Manar Khalid Ibraheem,
  • Abdullah Ali Jawad Al-Abadi and
  • Ahmed Fakhfakh

15 January 2026

Healthcare has been fundamentally changed by the expansion of IoT, which enables advanced diagnostics and continuous monitoring of patients outside clinical settings. Frequently interconnected medical devices often encounter resource limitations and...

  • Article
  • Open Access
186 Views
25 Pages

15 January 2026

The complexity and interconnectivity of modern automotive systems are rapidly increasing, particularly with the rise of distributed and cooperative driving functions. These developments increase exposure to a range of disruptions, from technical fail...

  • Article
  • Open Access
374 Views
37 Pages

Highly Efficient Software Development Using DevOps and Microservices: A Comprehensive Framework

  • David Barbosa,
  • Vítor Santos,
  • Maria Clara Silveira,
  • Arnaldo Santos and
  • Henrique S. Mamede

14 January 2026

With the growing popularity of DevOps culture among companies and the corresponding increase in Microservices architecture development—both known to boost productivity and efficiency in software development—an increasing number of organiz...

  • Correction
  • Open Access
138 Views
2 Pages

14 January 2026

The author requested to add some new content and cite a new reference in Section 2 after the sentence “The empirical work presented in this paper is particularly needed now because, despite the rapid spread of open-weight models, empirical rese...

  • Article
  • Open Access
292 Views
35 Pages

13 January 2026

This study evaluates whether an AI-built DeFi website case can match professionally developed DeFi platforms in digital marketing performance, innovation-related strategic behavior, and entrepreneurial impact. Using a multi-method design, we compare...

  • Article
  • Open Access
208 Views
32 Pages

12 January 2026

A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are c...

  • Review
  • Open Access
791 Views
64 Pages

Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers

  • Phil Steadman,
  • Paul Jenkins,
  • Rajkumar Singh Rathore and
  • Chaminda Hewage

12 January 2026

The proliferation of Internet of Things (IoT) devices has significantly expanded the threat landscape for malicious software (malware), rendering traditional signature-based detection methods increasingly ineffective in coping with the volume and evo...

  • Article
  • Open Access
564 Views
44 Pages

9 January 2026

The increasing demand for rapid and sustainable parcel delivery has motivated the exploration of innovative logistics systems that integrate drones with traditional ground vehicles. Among these, the single-truck, multiple-drone last-mile delivery con...

  • Article
  • Open Access
368 Views
25 Pages

Using Traffic Management Approaches to Assess Digital Infrastructure Disruptions: Insights from a Signal Tampering Case Study

  • Chrysostomos Mylonas,
  • Apostolos Vouitsis,
  • Evangelos Mitsakis and
  • Konstantinos Kepaptsoglou

9 January 2026

This paper introduces a methodological framework for assessing the impacts of digital infrastructure disruptions in urban traffic networks, using traffic signal tampering as a case study. A readily quantifiable indicator, the Average Flow Reduction M...

  • Article
  • Open Access
286 Views
26 Pages

9 January 2026

With the advancement of 6G networks, terrestrial centralized network architectures are evolving toward integrated space–air–ground network frameworks, imposing higher requirements on the efficiency of computation offloading and multi-obje...

  • Article
  • Open Access
420 Views
14 Pages

9 January 2026

The rapid integration of connectivity and automation in modern vehicles has significantly expanded the attack surface of in-vehicle networks, particularly the Controller Area Network (CAN) bus, which lacks native security mechanisms. This study inves...

  • Article
  • Open Access
454 Views
18 Pages

AnonymAI: An Approach with Differential Privacy and Intelligent Agents for the Automated Anonymization of Sensitive Data

  • Marcelo Nascimento Oliveira Soares,
  • Leonardo Barbosa Oliveira,
  • Antonio João Gonçalves Azambuja,
  • Jean Phelipe de Oliveira Lima and
  • Anderson Silva Soares

9 January 2026

Data governance for responsible AI systems remains challenged by the lack of automated tools that can apply robust privacy-preserving techniques without destroying analytical value. We propose AnonymAI, a novel methodological framework that integrate...

  • Article
  • Open Access
425 Views
28 Pages

Adaptive and Sustainable Smart Environments Using Predictive Reasoning and Context-Aware Reinforcement Learning

  • Abderrahim Lakehal,
  • Boubakeur Annane,
  • Adel Alti,
  • Philippe Roose and
  • Soliman Aljarboa

8 January 2026

Smart environments play a key role in improving user comfort, energy efficiency, and sustainability through intelligent automation. Nevertheless, real-world deployments still face major challenges, including network instability, delayed responsivenes...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903