You are currently viewing a new version of our website. To view the old version click .

Information

Information is a scientific, peer-reviewed, open access journal of information science and technology, data, knowledge, and communication, published monthly online by MDPI.
The International Society for the Study of Information (IS4SI) is affiliated with Information and its members receive discounts on the article processing charges.
Quartile Ranking JCR - Q2 (Computer Science, Information Systems)

All Articles (5,482)

Influence maximization is a crucial research domain in social network analysis, playing a vital role in optimizing information dissemination and managing online public opinion. Traditional IM models focus on network topology, often overlooking user heterogeneity and server-driven propagation dynamics, which often leads to limited model adaptability. To overcome these shortcomings, this study proposes the “Social–Interest Hybrid Influence Maximization” (SIHIM) problem, which explicitly models the joint influence of social topology and user interest in server-mediated propagation, aiming to enhance the effectiveness of information propagation by integrating users’ social relationships and interest preferences. To model this problem, we develop a Server-Based Independent Cascading (SB-IC) model that captures the dynamics of influence propagation. Based on this model, we further propose a novel hybrid centrality algorithm named Pascal Centrality (PaC), which integrates both topological and interest-based attributes to efficiently identify key seed nodes while minimizing influence overlap. Experimental evaluations on ten real-world social network datasets demonstrate that PaC improves influence spread by 5.22% under the standard IC model and by 7.04% under the SB-IC model, outperforming nine state-of-the-art algorithms. These findings underscore the effectiveness and adaptability of the proposed algorithm in complex scenarios.

19 December 2025

The propagation process of the SB-IC model. (a) At the initial stage of the propagation process, only the seed node 
  
    v
    1
  
 is in an activated state, while all other nodes are in a non-activated state; (b) In the subsequent time step, the newly activated node 
  
    v
    1
  
 attempts to activate its inactive neighboring nodes 
  
    {
    
      v
      2
    
    ,
    
      v
      3
    
    ,
    
      v
      4
    
    }
  
 with probability 
  
    p
    N
  
, and concurrently, the Servers detect the state change of 
  
    v
    1
  
 and attempt to activate its interest neighboring node 
  
    v
    8
  
 with probability 
  
    p
    I
  
.

Smart contracts are vulnerable to critical, design-level Business Logic Flaws (BLFs) that conventional analysis tools often fail to detect. To address this semantic gap, this study introduces a novel ontological framework that formally models the link between high-level architectural intent and low-level Sui Move code. The methodology employs a rigorous Linked Open Terms (LOT) approach to construct a comprehensive ontology, integrated with a library of secure design patterns and process-aware Object-Centric Dynamic Condition Response (OC-DCR) graphs. Qualitative validation was conducted on four canonical security patterns (Access Control, Circuit Breaker, Time Incentivization, Escapability) drawn from the official Sui Framework, confirming the framework’s representational adequacy and logical consistency. Ultimately, this work contributes the first machine-readable semantic layer for Sui Move, decoupling reasoning from raw code availability, and providing the essential semantic foundation for the future development of pattern-aware auditing tools.

19 December 2025

Super Encryption Standard (SES): A Key-Dependent Block Cipher for Image Encryption

  • Mohammed Abbas Fadhil Al-Husainy,
  • Bassam Al-Shargabi and
  • Omar Sabri

Data encryption is a core mechanism in modern security services for protecting confidential data at rest and in transit. This work introduces the Super Encryption Standard (SES), a symmetric block cipher that follows the overall workflow of the Advanced Encryption Standard (AES) but adopts a key-dependent design to enlarge the effective key space and improve execution efficiency. The SES accepts a user-supplied key file and a selectable block dimension, from which it derives per-block round material and a dynamic substitution box generated using SHA-512. Each round relies only on XOR and a conditional half-byte swap driven by key-derived row and column vectors, enabling lightweight diffusion and confusion with low implementation cost. Experimental evaluation using multiple color images of different sizes shows that the proposed SES algorithm achieves faster encryption than the AES baseline and produces a ciphertext that behaves statistically like random noise. The encrypted images exhibit very low correlation between adjacent pixels, strong sensitivity to even minor changes in the plaintext and in the key, and resistance to standard statistical and differential attacks. Analysis of the SES substitution box also indicates favorable differential and linear properties that are comparable to those of the AES. The SES further supports a very wide key range, scaling well beyond typical fixed-length keys, which substantially increases brute-force difficulty. Therefore, the SES is a promising cipher for image encryption and related data-protection applications.

19 December 2025

Large Language Models (LLMs) have demonstrated significant potential in transforming software testing by automating tasks such as test case generation. In this work, we explore the integration of LLMs within a Model-Driven Engineering (MDE) approach to enhance the automation of test case generation for smart contracts. Our focus lies in the use of Role-Based Access Control (RBAC) models as formal specifications that guide the generation of test scenarios. By leveraging LLMs’ ability to interpret both natural language and model artifacts, we enable the derivation of model-based test cases that align with specified access control policies. These test cases are subsequently translated into executable code in Digital Asset Modeling Language (DAML) targeting blockchain-based smart contract platforms. Building on prior research that established a complete MDE pipeline for DAML smart contract development, we extend the framework with LLM-supported test automation capabilities and implement the necessary tooling to support this integration. Our evaluation demonstrates the feasibility of using LLMs in this context, highlighting their potential to improve testing coverage, reduce manual effort, and ensure conformance with access control specifications in smart contract systems.

19 December 2025

News & Conferences

Issues

Open for Submission

Editor's Choice

Reprints of Collections

Test and Evaluation Methods for Human-Machine Interfaces of Automated Vehicles II
Reprint

Test and Evaluation Methods for Human-Machine Interfaces of Automated Vehicles II

Editors: Frederik Naujoks, Yannick Forster, Andreas Keinath, Nadja Schömig, Sebastian Hergeth, Katharina Wiedemann
Big Data and Artificial Intelligence
Reprint

Big Data and Artificial Intelligence

Volume III
Editors: Miltiadis D. Lytras, Andreea Claudia Serban

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489