Skip Content
You are currently on the new version of our website. Access the old version .

Most Cited

  • Review
  • Open Access
511 Citations
129,096 Views
24 Pages

ChatGPT and Open-AI Models: A Preliminary Review

  • Konstantinos I. Roumeliotis and
  • Nikolaos D. Tselikas

According to numerous reports, ChatGPT represents a significant breakthrough in the field of artificial intelligence. ChatGPT is a pre-trained AI model designed to engage in natural language conversations, utilizing sophisticated techniques from Natu...

  • Review
  • Open Access
462 Citations
79,821 Views
60 Pages

The Power of Generative AI: A Review of Requirements, Models, Input–Output Formats, Evaluation Metrics, and Challenges

  • Ajay Bandi,
  • Pydi Venkata Satya Ramesh Adapa and
  • Yudu Eswar Vinay Pratap Kumar Kuchi

Generative artificial intelligence (AI) has emerged as a powerful technology with numerous applications in various domains. There is a need to identify the requirements and evaluation metrics for generative AI models designed for specific tasks. The...

  • Review
  • Open Access
308 Citations
59,484 Views
15 Pages

24 August 2023

Generative AI (artificial intelligence) refers to algorithms and models, such as OpenAI’s ChatGPT, that can be prompted to generate various types of content. In this narrative review, we present a selection of representative examples of generat...

  • Review
  • Open Access
232 Citations
50,177 Views
31 Pages

A Review of ARIMA vs. Machine Learning Approaches for Time Series Forecasting in Data Driven Networks

  • Vaia I. Kontopoulou,
  • Athanasios D. Panagopoulos,
  • Ioannis Kakkos and
  • George K. Matsopoulos

In the broad scientific field of time series forecasting, the ARIMA models and their variants have been widely applied for half a century now due to their mathematical simplicity and flexibility in application. However, with the recent advances in th...

  • Review
  • Open Access
172 Citations
47,804 Views
36 Pages

Quantum Computing for Healthcare: A Review

  • Raihan Ur Rasool,
  • Hafiz Farooq Ahmad,
  • Wajid Rafique,
  • Adnan Qayyum,
  • Junaid Qadir and
  • Zahid Anwar

27 February 2023

In recent years, the interdisciplinary field of quantum computing has rapidly developed and garnered substantial interest from both academia and industry due to its ability to process information in fundamentally different ways, leading to hitherto u...

  • Review
  • Open Access
152 Citations
17,717 Views
37 Pages

Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods

  • Tehseen Mazhar,
  • Hafiz Muhammad Irfan,
  • Sunawar Khan,
  • Inayatul Haq,
  • Inam Ullah,
  • Muhammad Iqbal and
  • Habib Hamam

19 February 2023

Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by m...

  • Review
  • Open Access
125 Citations
26,533 Views
25 Pages

The Future of the Human–Machine Interface (HMI) in Society 5.0

  • Dimitris Mourtzis,
  • John Angelopoulos and
  • Nikos Panopoulos

27 April 2023

The blending of human and mechanical capabilities has become a reality in the realm of Industry 4.0. Enterprises are encouraged to design frameworks capable of harnessing the power of human and technological resources to enhance the era of Artificial...

  • Review
  • Open Access
109 Citations
34,105 Views
34 Pages

Graph Attention Networks: A Comprehensive Review of Methods and Applications

  • Aristidis G. Vrahatis,
  • Konstantinos Lazaros and
  • Sotiris Kotsiantis

3 September 2024

Real-world problems often exhibit complex relationships and dependencies, which can be effectively captured by graph learning systems. Graph attention networks (GATs) have emerged as a powerful and versatile framework in this direction, inspiring num...

  • Article
  • Open Access
84 Citations
11,266 Views
17 Pages

Machine Learning for Data Center Optimizations: Feature Selection Using Shapley Additive exPlanation (SHAP)

  • Yibrah Gebreyesus,
  • Damian Dalton,
  • Sebastian Nixon,
  • Davide De Chiara and
  • Marta Chinnici

21 February 2023

The need for artificial intelligence (AI) and machine learning (ML) models to optimize data center (DC) operations increases as the volume of operations management data upsurges tremendously. These strategies can assist operators in better understand...

  • Review
  • Open Access
77 Citations
16,694 Views
25 Pages

13 September 2023

The trend of the next generation of the internet has already been scrutinized by top analytics enterprises. According to Gartner investigations, it is predicted that, by 2024, 75% of the global population will have their personal data covered under p...

  • Review
  • Open Access
76 Citations
11,029 Views
27 Pages

A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues

  • Panagiotis Gkonis,
  • Anastasios Giannopoulos,
  • Panagiotis Trakadas,
  • Xavi Masip-Bruin and
  • Francesco D’Andria

28 November 2023

The rapid growth in the number of interconnected devices on the Internet (referred to as the Internet of Things—IoT), along with the huge volume of data that are exchanged and processed, has created a new landscape in network design and operati...

  • Systematic Review
  • Open Access
75 Citations
25,232 Views
28 Pages

10 September 2024

Edge computing promising a vision of processing data close to its generation point, reducing latency and bandwidth usage compared with traditional cloud computing architectures, has attracted significant attention lately. The integration of edge comp...

  • Article
  • Open Access
73 Citations
7,236 Views
32 Pages

The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges

  • Carlos Serôdio,
  • José Cunha,
  • Guillermo Candela,
  • Santiago Rodriguez,
  • Xosé Ramón Sousa and
  • Frederico Branco

25 October 2023

The emergence of the sixth generation of cellular systems (6G) signals a transformative era and ecosystem for mobile communications, driven by demands from technologies like the internet of everything (IoE), V2X communications, and factory automation...

  • Article
  • Open Access
72 Citations
11,747 Views
24 Pages

Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron

  • Sheeraz Ahmed,
  • Zahoor Ali Khan,
  • Syed Muhammad Mohsin,
  • Shahid Latif,
  • Sheraz Aslam,
  • Hana Mujlid,
  • Muhammad Adil and
  • Zeeshan Najam

15 February 2023

Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS a...

  • Review
  • Open Access
69 Citations
17,889 Views
21 Pages

Using ChatGPT in Software Requirements Engineering: A Comprehensive Review

  • Nuno Marques,
  • Rodrigo Rocha Silva and
  • Jorge Bernardino

Large language models (LLMs) have had a significant impact on several domains, including software engineering. However, a comprehensive understanding of LLMs’ use, impact, and potential limitations in software engineering is still emerging and...

  • Review
  • Open Access
65 Citations
13,928 Views
52 Pages

A Survey of the Real-Time Metaverse: Challenges and Opportunities

  • Mohsen Hatami,
  • Qian Qu,
  • Yu Chen,
  • Hisham Kholidy,
  • Erik Blasch and
  • Erika Ardiles-Cruz

18 October 2024

The metaverse concept has been evolving from static, pre-rendered virtual environments to a new frontier: the real-time metaverse. This survey paper explores the emerging field of real-time metaverse technologies, which enable the continuous integrat...

  • Review
  • Open Access
65 Citations
10,604 Views
45 Pages

As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have several limitations which complicate the design of effective attack pre...

  • Review
  • Open Access
63 Citations
26,740 Views
47 Pages

A Review on Deep-Learning-Based Cyberbullying Detection

  • Md. Tarek Hasan,
  • Md. Al Emran Hossain,
  • Md. Saddam Hossain Mukta,
  • Arifa Akter,
  • Mohiuddin Ahmed and
  • Salekul Islam

Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying de...

  • Review
  • Open Access
61 Citations
23,339 Views
34 Pages

18 November 2023

Edge AI, an interdisciplinary technology that enables distributed intelligence with edge devices, is quickly becoming a critical component in early health prediction. Edge AI encompasses data analytics and artificial intelligence (AI) using machine l...

  • Article
  • Open Access
60 Citations
16,569 Views
26 Pages

13 October 2023

Historically, mastery of writing was deemed essential to human progress. However, recent advances in generative AI have marked an inflection point in this narrative, including for scientific writing. This article provides a comprehensive analysis of...

  • Article
  • Open Access
59 Citations
11,094 Views
44 Pages

Enhancing Urban Resilience: Smart City Data Analyses, Forecasts, and Digital Twin Techniques at the Neighborhood Level

  • Andreas F. Gkontzis,
  • Sotiris Kotsiantis,
  • Georgios Feretzakis and
  • Vassilios S. Verykios

30 January 2024

Smart cities, leveraging advanced data analytics, predictive models, and digital twin techniques, offer a transformative model for sustainable urban development. Predictive analytics is critical to proactive planning, enabling cities to adapt to evol...

  • Review
  • Open Access
54 Citations
19,964 Views
29 Pages

9 October 2023

Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such...

  • Article
  • Open Access
52 Citations
14,046 Views
26 Pages

22 February 2024

With the advent of Industry 5.0 (I5.0), healthcare is undergoing a profound transformation, integrating human capabilities with advanced technologies to promote a patient-centered, efficient, and empathetic healthcare ecosystem. This study aims to ex...

  • Review
  • Open Access
50 Citations
20,600 Views
29 Pages

A Review on Decentralized Finance Ecosystems

  • Andry Alamsyah,
  • Gede Natha Wijaya Kusuma and
  • Dian Puteri Ramadhani

26 February 2024

The future of the internet is moving toward decentralization, with decentralized networks and blockchain technology playing essential roles in different sectors. Decentralized networks offer equality, accessibility, and security at a societal level,...

  • Article
  • Open Access
49 Citations
10,187 Views
21 Pages

Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis

  • Ikram Karabila,
  • Nossayba Darraz,
  • Anas El-Ansari,
  • Nabil Alami and
  • Mostafa El Mallahi

Recommendation systems (RSs) are widely used in e-commerce to improve conversion rates by aligning product offerings with customer preferences and interests. While traditional RSs rely solely on numerical ratings to generate recommendations, these ra...

  • Article
  • Open Access
48 Citations
16,712 Views
25 Pages

8 August 2024

This study uses deep learning methods to explore the Internet of Things (IoT) network intrusion detection method based on the CIC-IoT-2023 dataset. This dataset contains extensive data on real-life IoT environments. Based on this, this study proposes...

  • Review
  • Open Access
47 Citations
15,777 Views
23 Pages

AI chatbots have emerged as powerful tools for providing text-based solutions to a wide range of everyday challenges. Selecting the appropriate chatbot is crucial for optimising outcomes. This paper presents a comprehensive comparative analysis of fi...

  • Review
  • Open Access
43 Citations
11,248 Views
42 Pages

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

  • Hassan Khazane,
  • Mohammed Ridouani,
  • Fatima Salahdine and
  • Naima Kaabouch

19 January 2024

With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are...

  • Review
  • Open Access
43 Citations
14,600 Views
38 Pages

A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

  • Paul Scalise,
  • Matthew Boeding,
  • Michael Hempel,
  • Hamid Sharif,
  • Joseph Delloiacovo and
  • John Reed

20 February 2024

With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology....

  • Article
  • Open Access
42 Citations
8,071 Views
29 Pages

TinyML Algorithms for Big Data Management in Large-Scale IoT Systems

  • Aristeidis Karras,
  • Anastasios Giannaros,
  • Christos Karras,
  • Leonidas Theodorakopoulos,
  • Constantinos S. Mammassis,
  • George A. Krimpas and
  • Spyros Sioutas

25 January 2024

In the context of the Internet of Things (IoT), Tiny Machine Learning (TinyML) and Big Data, enhanced by Edge Artificial Intelligence, are essential for effectively managing the extensive data produced by numerous connected devices. Our study introdu...

  • Review
  • Open Access
42 Citations
7,925 Views
23 Pages

Non-fungible tokens (NFT) represent one of the most important technologies in the space of Web3. Thanks to NFTs, digital or physical assets can be tokenised to represent their ownership through the usage of smart contracts and blockchains. The first...

  • Review
  • Open Access
41 Citations
7,542 Views
27 Pages

Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures

  • Spyridon Daousis,
  • Nikolaos Peladarinos,
  • Vasileios Cheimaras,
  • Panagiotis Papageorgas,
  • Dimitrios D. Piromalis and
  • Radu Adrian Munteanu

21 January 2024

This paper highlights the crucial role of wireless sensor networks (WSNs) in the surveillance and administration of critical infrastructures (CIs), contributing to their reliability, security, and operational efficiency. It starts by detailing the in...

  • Review
  • Open Access
41 Citations
9,174 Views
30 Pages

Task Allocation Methods and Optimization Techniques in Edge Computing: A Systematic Review of the Literature

  • Vasilios Patsias,
  • Petros Amanatidis,
  • Dimitris Karampatzakis,
  • Thomas Lagkas,
  • Kalliopi Michalakopoulou and
  • Alexandros Nikitas

Task allocation in edge computing refers to the process of distributing tasks among the various nodes in an edge computing network. The main challenges in task allocation include determining the optimal location for each task based on the requirement...

  • Article
  • Open Access
40 Citations
11,100 Views
28 Pages

16 December 2023

Despite its status as one of the most ancient sectors worldwide, agriculture continues to be a fundamental cornerstone of the global economy. Nevertheless, it faces obstacles such as a lack of trust, difficulties in tracking, and inefficiencies in ma...

  • Review
  • Open Access
40 Citations
14,480 Views
43 Pages

Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions

  • Shrouk A. Ali,
  • Shaimaa Ahmed Elsaid,
  • Abdelhamied A. Ateya,
  • Mohammed ElAffendi and
  • Ahmed A. Abd El-Latif

9 December 2023

The concept of smart cities, which aim to enhance the quality of urban life through innovative technologies and policies, has gained significant momentum in recent years. As we approach the era of next-generation smart cities, it becomes crucial to e...

  • Review
  • Open Access
40 Citations
8,184 Views
18 Pages

Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomw...

  • Review
  • Open Access
39 Citations
20,496 Views
29 Pages

Large Language Models Meet Next-Generation Networking Technologies: A Review

  • Ching-Nam Hang,
  • Pei-Duo Yu,
  • Roberto Morabito and
  • Chee-Wei Tan

7 October 2024

The evolution of network technologies has significantly transformed global communication, information sharing, and connectivity. Traditional networks, relying on static configurations and manual interventions, face substantial challenges such as comp...

  • Article
  • Open Access
39 Citations
13,490 Views
55 Pages

The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning

  • Leyli Nouraei Yeganeh,
  • Nicole Scarlett Fenty,
  • Yu Chen,
  • Amber Simpson and
  • Mohsen Hatami

4 February 2025

Modern education faces persistent challenges, including disengagement, inequitable access to learning resources, and the lack of personalized instruction, particularly in virtual environments. In this perspective, we envision a transformative Metaver...

  • Review
  • Open Access
37 Citations
12,919 Views
57 Pages

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

  • Mahmud Hossain,
  • Golam Kayas,
  • Ragib Hasan,
  • Anthony Skjellum,
  • Shahid Noor and
  • S. M. Riazul Islam

24 January 2024

Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used...

  • Article
  • Open Access
37 Citations
6,783 Views
18 Pages

Recently, the advent of blockchain (BC) has sparked a digital revolution in different fields, such as finance, healthcare, and supply chain. It is used by smart healthcare systems to provide transparency and control for personal medical records. Howe...

  • Article
  • Open Access
37 Citations
12,642 Views
17 Pages

Digital Art and the Metaverse: Benefits and Challenges

  • William Hurst,
  • Orestis Spyrou,
  • Bedir Tekinerdogan and
  • Caspar Krampe

As a concept that is somewhat under emergence, the notion of the Metaverse varies across different academic articles. Yet there is a shared view on the benefits to its ongoing implementation, particularly for digital art, where the technology can pro...

  • Article
  • Open Access
37 Citations
5,018 Views
28 Pages

The Internet of Things (IoT) continues to attract attention in the context of computational resource growth. Various disciplines and fields have begun to employ IoT integration technologies in order to enable smart applications. The main difficulty i...

  • Review
  • Open Access
36 Citations
22,705 Views
29 Pages

A Survey on the Use of Large Language Models (LLMs) in Fake News

  • Eleftheria Papageorgiou,
  • Christos Chronis,
  • Iraklis Varlamis and
  • Yassine Himeur

19 August 2024

The proliferation of fake news and fake profiles on social media platforms poses significant threats to information integrity and societal trust. Traditional detection methods, including rule-based approaches, metadata analysis, and human fact-checki...

  • Article
  • Open Access
36 Citations
11,315 Views
17 Pages

Machine Learning for Network Intrusion Detection—A Comparative Study

  • Mustafa Al Lail,
  • Alejandro Garcia and
  • Saul Olivo

Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential el...

  • Article
  • Open Access
36 Citations
5,036 Views
21 Pages

DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs

  • Juergen Mangler,
  • Joscha Grüger,
  • Lukas Malburg,
  • Matthias Ehrendorfer,
  • Yannis Bertrand,
  • Janik-Vasily Benzin,
  • Stefanie Rinderle-Ma,
  • Estefania Serral Asensio and
  • Ralph Bergmann

14 March 2023

The Internet of Things (IoT) has been shown to be very valuable for Business Process Management (BPM), for example, to better track and control process executions. While IoT actuators can automatically trigger actions, IoT sensors can monitor the cha...

  • Article
  • Open Access
36 Citations
5,355 Views
21 Pages

Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)

  • Anand Singh Rajawat,
  • S. B. Goyal,
  • Pradeep Bedi,
  • Tony Jan,
  • Md Whaiduzzaman and
  • Mukesh Prasad

15 August 2023

Internet of Medical Things (IoMT) is an ecosystem composed of connected electronic items such as small sensors/actuators and other cyber-physical devices (CPDs) in medical services. When these devices are linked together, they can support patients th...

  • Review
  • Open Access
35 Citations
11,213 Views
25 Pages

28 September 2023

Traditional information security risk assessment (RA) methodologies and standards, adopted by information security management systems and frameworks as a foundation stone towards robust environments, face many difficulties in modern environments wher...

  • Article
  • Open Access
35 Citations
9,496 Views
36 Pages

Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies

  • José Cunha,
  • Pedro Ferreira,
  • Eva M. Castro,
  • Paula Cristina Oliveira,
  • Maria João Nicolau,
  • Iván Núñez,
  • Xosé Ramon Sousa and
  • Carlos Serôdio

The rapid development of 5G networks and the anticipation of 6G technologies have ushered in an era of highly customizable network environments facilitated by the innovative concept of network slicing. This technology allows the creation of multiple...

  • Article
  • Open Access
35 Citations
5,200 Views
24 Pages

Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey

  • Abubakar Ahmad Musa,
  • Adamu Hussaini,
  • Weixian Liao,
  • Fan Liang and
  • Wei Yu

Cyber-physical systems (CPS) refer to systems that integrate communication, control, and computational elements into physical processes to facilitate the control of physical systems and effective monitoring. The systems are designed to interact with...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903