Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 11

2025 November - 50 articles

Cover Story: Bias in SDN security research has led to the trivialization of the security of the SDN data plane, in favor of the control plane. This review addresses this gap by comprehensively surveying existing SDN data plane security research, identifying its main themes, strengths, weaknesses and potential future directions for research. The review demonstrates that SDN data plane security is more diverse and mature than previously supposed. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (50)

  • Article
  • Open Access
372 Views
21 Pages

20 November 2025

The digital age and the rise of Internet of Things technology have led to an explosion of data, including vast amounts of semantic data. In the context of large-scale semantic data graphs, centralized storage struggles to meet the efficiency requirem...

  • Article
  • Open Access
479 Views
21 Pages

A Stateful Extension to P4THLS for Advanced Telemetry and Flow Control

  • Mostafa Abbasmollaei,
  • Tarek Ould-Bachir and
  • Yvon Savaria

20 November 2025

Programmable data planes are increasingly essential for enabling In-band Network Telemetry (INT), fine-grained monitoring, and congestion-aware packet processing. Although the P4 language provides a high-level abstraction to describe such behaviors,...

  • Article
  • Open Access
900 Views
38 Pages

Top-K Feature Selection for IoT Intrusion Detection: Contributions of XGBoost, LightGBM, and Random Forest

  • Brou Médard Kouassi,
  • Abou Bakary Ballo,
  • Kacoutchy Jean Ayikpa,
  • Diarra Mamadou and
  • Minfonga Zié Jérôme Coulibaly

19 November 2025

The rapid growth of the Internet of Things (IoT) has created vast networks of interconnected devices that are increasingly exposed to cyberattacks. Ensuring the security of such distributed systems requires efficient and adaptive intrusion detection...

  • Article
  • Open Access
719 Views
22 Pages

19 November 2025

Wind power plays an increasingly vital role in sustainable energy production, yet the harsh environments in which turbines operate often lead to mechanical or structural degradation. Detecting such faults early is essential to reducing maintenance ex...

  • Article
  • Open Access
1,112 Views
12 Pages

18 November 2025

Conversational text-to-SQL extends the traditional single-turn SQL generation paradigm to multi-turn, dialogue-based scenarios, enabling users to pose and refine database queries interactively, and requiring models to track dialogue context over mult...

  • Article
  • Open Access
362 Views
15 Pages

Edge Caching Strategies for Seamless Handover in SDN-Enabled Connected Cars

  • Kuljaree Tantayakul,
  • Wasimon Panichpattanakul,
  • Adisak Intana and
  • Parin Sornlertlamvanich

18 November 2025

This paper presents an analytical evaluation of three strategies designed to minimize service disruption during handovers in Software-Defined Networking (SDN)-based connected car networks: SDN Mobility with a Caching Policy, cache-miss Content Delive...

  • Article
  • Open Access
525 Views
23 Pages

Optimizing Cloud Service Composition with Cuckoo Optimization Algorithm for Enhanced Resource Allocation and Energy Efficiency

  • Issam AlHadid,
  • Evon Abu-Taieh,
  • Mohammad Al Rawajbeh,
  • Suha Afaneh,
  • Mohammed E. Daghbosheh,
  • Rami S. Alkhawaldeh,
  • Sufian Khwaldeh and
  • Ala’aldin Alrowwad

18 November 2025

The composition of cloud services plays a vital role in optimizing resource allocation, load balancing, task scheduling, and energy management. However, it remains a significant challenge due to the dynamic nature of workloads and the variability in...

  • Article
  • Open Access
441 Views
31 Pages

17 November 2025

In the evolving landscape of Mobile Crowdsourcing (MCS), ensuring the security and privacy of both stored and transmitted multimedia content has become increasingly challenging. Factors such as human mobility, device heterogeneity, dynamic topologies...

  • Article
  • Open Access
537 Views
22 Pages

17 November 2025

Network digital twins (NDTs) are emerging as key enablers of 6G networks integrating artificial Intelligence (AI) techniques. NDT systems offer novel features, including real-time monitoring, simulation, enhanced network planning, autonomous manageme...

  • Article
  • Open Access
1 Citations
1,019 Views
21 Pages

ReHAb Playground: A DL-Based Framework for Game-Based Hand Rehabilitation

  • Samuele Rasetto,
  • Giorgia Marullo,
  • Ludovica Adamo,
  • Federico Bordin,
  • Francesca Pavesi,
  • Chiara Innocente,
  • Enrico Vezzetti and
  • Luca Ulrich

17 November 2025

Hand rehabilitation requires consistent, repetitive exercises that can often reduce patient motivation, especially in home-based therapy. This study introduces ReHAb Playground, a deep learning-based system that merges real-time gesture recognition w...

  • Article
  • Open Access
881 Views
25 Pages

17 November 2025

Resilient autonomous inter-Unmanned Aerial Vehicle (UAV) communication is critical for applications like drone swarms. While conventional Global Navigation Satellite System (GNSS)-based beamforming is effective at long ranges, it suffers from signifi...

  • Article
  • Open Access
469 Views
18 Pages

HEXADWSN: Explainable Ensemble Framework for Robust and Energy-Efficient Anomaly Detection in WSNs

  • Rahul Mishra,
  • Sudhanshu Kumar Jha,
  • Shiv Prakash and
  • Rajkumar Singh Rathore

15 November 2025

Wireless Sensor Networks (WSNs) have a decisive share in various monitoring and control systems. However, their distributed and resource-constrained nature makes them vulnerable to anomalies caused by factors such as environmental noise, sensor fault...

  • Article
  • Open Access
565 Views
17 Pages

14 November 2025

Scheduling computing is a well-studied area focused on improving task execution by reducing processing time and increasing system efficiency. Divisible Load Theory (DLT) provides a structured analytical framework for distributing partitionable comput...

  • Article
  • Open Access
1 Citations
687 Views
17 Pages

Scalable Generation of Synthetic IoT Network Datasets: A Case Study with Cooja

  • Hrant Khachatrian,
  • Aram Dovlatyan,
  • Greta Grigoryan and
  • Theofanis P. Raptis

13 November 2025

Predicting the behavior of Internet of Things (IoT) networks under irregular topologies and heterogeneous battery conditions remains a significant challenge. Simulation tools can capture these effects but can require high manual effort and computatio...

  • Article
  • Open Access
1,257 Views
33 Pages

Ontology-Driven Multi-Agent System for Cross-Domain Art Translation

  • Viktor Matanski,
  • Anton Iliev,
  • Nikolay Kyurkchiev and
  • Todorka Terzieva

12 November 2025

Generative models can generate art within a single modality with high fidelity. However, translating a work of art from one domain to another (e.g., painting to music or poem to painting) in a meaningful way remains a longstanding, interdisciplinary...

  • Article
  • Open Access
711 Views
22 Pages

12 November 2025

The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorit...

  • Article
  • Open Access
1,510 Views
27 Pages

Social Engineering with AI

  • Alexandru-Raul Matecas,
  • Peter Kieseberg and
  • Simon Tjoa

12 November 2025

The new availability of powerful Artificial Intelligence (AI) as an everyday copilot has instigated a new wave of attack techniques, especially in the area of Social Engineering (SE). The possibility of generating a multitude of different templates w...

  • Article
  • Open Access
439 Views
16 Pages

Dynamic Topology Reconfiguration for Energy-Efficient Operation in 5G NR IAB Systems

  • Vitalii Beschastnyi,
  • Uliana Morozova,
  • Egor Machnev,
  • Darya Ostrikova,
  • Yuliya Gaidamaka and
  • Konstantin Samouylov

10 November 2025

The utilization of high millimeter wave (mmWave, 30–100 GHz) in 5G New Radio (NR) systems and sub-terahertz (sub-THz, 100–300 GHz) in future 6G requires dense deployments of base stations (BSs) to provide uninterrupted connectivity to the...

  • Article
  • Open Access
1,111 Views
31 Pages

10 November 2025

The rapid evolution of cyber threats requires intelligence sharing between organizations while ensuring data privacy and contributor credibility. Existing centralized cyber threat intelligence (CTI) systems suffer from single points of failure, priva...

  • Article
  • Open Access
821 Views
23 Pages

Machine Learning Pipeline for Early Diabetes Detection: A Comparative Study with Explainable AI

  • Yas Barzegar,
  • Atrin Barzegar,
  • Francesco Bellini,
  • Fabrizio D'Ascenzo,
  • Irina Gorelova and
  • Patrizio Pisani

10 November 2025

The use of Artificial Intelligence (AI) in healthcare has significantly advanced early disease detection, enabling timely diagnosis and improved patient outcomes. This work proposes an end-to-end machine learning (ML) model for predicting diabetes ba...

  • Article
  • Open Access
4,316 Views
24 Pages

Privacy Concerns in ChatGPT Data Collection and Its Impact on Individuals

  • Leena Mohammad Alzamil,
  • Alawiayyah Mohammed Alhasani and
  • Suhair Alshehri

10 November 2025

With the rapid adoption of generative AI technologies across various sectors, it has become increasingly important to understand how these systems handle personal data. The study examines users’ awareness of the types of data collected, the ris...

  • Article
  • Open Access
1,131 Views
19 Pages

5 November 2025

Cultural heritage conservation faces escalating challenges from environmental threats and resource constraints, necessitating innovative preservation strategies that balance predictive accuracy with interpretability. This study presents a hybrid neur...

  • Article
  • Open Access
906 Views
14 Pages

5 November 2025

Speech Emotion Recognition (SER) is important for applications such as Human–Computer Interaction (HCI) and emotion-aware services. Traditional SER models rely on utterance-level labels, aggregating frame-level representations through pooling o...

  • Article
  • Open Access
2,455 Views
33 Pages

4 November 2025

The aviation industry operates as a complex, dynamic system generating vast volumes of data from aircraft sensors, flight schedules, and external sources. Managing this data is critical for mitigating disruptive and costly events such as mechanical f...

  • Article
  • Open Access
833 Views
28 Pages

Distributing Quantum Computations, Shot-Wise

  • Giuseppe Bisicchia,
  • Giuseppe Clemente,
  • Jose Garcia-Alonso,
  • Juan Manuel Murillo,
  • Massimo D’Elia and
  • Antonio Brogi

4 November 2025

NISQ (Noisy Intermediate-Scale Quantum) era constraints, high sensitivity to noise and limited qubit count, impose significant barriers on the usability of QPUs (Quantum Process Units) capabilities. To overcome these challenges, researchers are explo...

  • Article
  • Open Access
860 Views
16 Pages

4 November 2025

Efficient and secure inter-task communication (ITC) is critical in real-time embedded systems, particularly in security-sensitive architectures. Traditional ITC mechanisms in Real-Time Operating Systems (RTOSs) often incur high latency from kernel tr...

  • Article
  • Open Access
954 Views
37 Pages

3 November 2025

Federated learning (FL) is a foundational technology for enabling collaborative intelligence in vehicular edge computing (VEC). However, the volatile network topology caused by high vehicle mobility and the profound security risks of model poisoning...

  • Article
  • Open Access
887 Views
34 Pages

3 November 2025

In data visualization, users’ scanning patterns are as crucial as their reading patterns in text-based media. Yet, no systematic attempt exists to characterize this activity with basic features, such as reading speed and scanpaths, nor to relat...

  • Review
  • Open Access
2,187 Views
62 Pages

Securing the SDN Data Plane in Emerging Technology Domains: A Review

  • Travis Quinn,
  • Faycal Bouhafs and
  • Frank den Hartog

3 November 2025

Over the last decade, Software-Defined Networking (SDN) has garnered increasing research interest for networking and security. This interest stems from the programmability and dynamicity offered by SDN, as well as the growing importance of SDN as a f...

  • Article
  • Open Access
719 Views
14 Pages

ABMS-Driven Reinforcement Learning for Dynamic Resource Allocation in Mass Casualty Incidents

  • Ionuț Murarețu,
  • Alexandra Vultureanu-Albiși,
  • Sorin Ilie and
  • Costin Bădică

3 November 2025

This paper introduces a novel framework that integrates reinforcement learning with declarative modeling and mathematical optimization for dynamic resource allocation during mass casualty incidents. Our approach leverages Mesa as an agent-based model...

  • Article
  • Open Access
873 Views
20 Pages

31 October 2025

We developed a machine vision-based robotic system to address automation challenges in pharmaceutical pill sorting and packaging. The hardware platform integrates a high-resolution industrial camera with an HSR-CR605 robotic arm. Image processing lev...

  • Article
  • Open Access
894 Views
26 Pages

Eavesdropper Detection in Six-State Protocol Against Partial Intercept–Resend Attack

  • Francesco Fiorini,
  • Rosario Giuseppe Garroppo,
  • Michele Pagano and
  • Rostyslav Schiavini Yadzhak

31 October 2025

This work presents and evaluates two threshold-based detection methods for the Six-State quantum key distribution protocol, considering a realistic scenario involving partial intercept–resend attack and channel noise. The statistical properties...

  • Article
  • Open Access
541 Views
22 Pages

A Three-Party Evolutionary Game Model and Stability Analysis for Network Defense Strategy Selection

  • Zhenghao Qian,
  • Fengzheng Liu,
  • Mingdong He,
  • Bo Li,
  • Xuewu Li,
  • Chuangye Zhao,
  • Gehua Fu and
  • Yifan Hu

31 October 2025

Traditional cyber attack-defense strategies have traditionally focused solely on the attacker and defender, while neglecting the role of government-led system administrators. To address strategic selection challenges in cyber warfare, this study empl...

  • Article
  • Open Access
509 Views
20 Pages

30 October 2025

This paper proposes an efficient sparse channel estimation method for millimeter wave (mmWave) hybrid multiple-input multiple-output (MIMO) systems. The performance of orthogonal matching pursuit (OMP) and its advanced variants—generalized OMP...

  • Article
  • Open Access
4 Citations
1,213 Views
19 Pages

RL-Based Resource Allocation in SDN-Enabled 6G Networks

  • Ivan Radosavljević,
  • Petar D. Bojović and
  • Živko Bojović

29 October 2025

Dynamic and efficient resource allocation is critical for Software-Defined Networking (SDN) enabled sixth-generation (6G) networks to ensure adaptability and optimized utilization of network resources. This paper proposes a reinforcement learning (RL...

  • Systematic Review
  • Open Access
1 Citations
2,355 Views
30 Pages

29 October 2025

Modular monolithic architecture (MMA) has recently emerged as a hybrid architecture that is positioned between traditional monoliths and microservices. It combines operational simplicity with modularity and maintainability. Although industry adoption...

  • Article
  • Open Access
567 Views
23 Pages

Sparse Regularized Autoencoders-Based Radiomics Data Augmentation for Improved EGFR Mutation Prediction in NSCLC

  • Muhammad Asif Munir,
  • Reehan Ali Shah,
  • Urooj Waheed,
  • Muhammad Aqeel Aslam,
  • Zeeshan Rashid,
  • Mohammed Aman,
  • Muhammad I. Masud and
  • Zeeshan Ahmad Arfeen

29 October 2025

Lung cancer (LC) remains a leading cause of cancer mortality worldwide, where accurate and early identification of gene mutations such as epidermal growth factor receptor (EGFR) is critical for precision treatment. However, machine learning-based rad...

  • Review
  • Open Access
1,456 Views
40 Pages

28 October 2025

Tactile Internet (TI) is an innovative paradigm for emerging generations of communication systems that support ultra-low latency and highly robust transmission of haptics, actuation, and immersive communication in real time. It is considered a critic...

  • Article
  • Open Access
826 Views
30 Pages

27 October 2025

Industrial Internet of Things (IIoT) systems face severe security and trust challenges, particularly under cross-domain data sharing and federated orchestration. We present QuantumTrust-FedChain, a cyber-resilient federated learning framework integra...

  • Article
  • Open Access
1,601 Views
14 Pages

27 October 2025

The rapid proliferation of devices on the Internet of Things (IoT) in smart city environments enables autonomous decision-making, but introduces challenges of scalability, coordination, and privacy. Existing reinforcement learning (RL) methods, such...

  • Article
  • Open Access
893 Views
38 Pages

Towards Fair Medical Risk Prediction Software

  • Wolfram Luther and
  • Ekaterina Auer

27 October 2025

This article examines the role of fairness in software across diverse application contexts, with a particular emphasis on healthcare, and introduces the concept of algorithmic (individual) meta-fairness. We argue that attaining a high degree of fairn...

  • Article
  • Open Access
1,134 Views
21 Pages

26 October 2025

The integration of artificial intelligence (AI) and edge computing gives rise to edge intelligence (EI), which offers effective solutions to the limitations of traditional cloud-based AI; however, deploying models across distributed edge platforms ra...

  • Article
  • Open Access
972 Views
21 Pages

25 October 2025

Image classification is central to computer vision, supporting applications from autonomous driving to medical imaging, yet state-of-the-art convolutional neural networks remain constrained by heavy floating-point operations (FLOPs) and parameter cou...

  • Article
  • Open Access
1 Citations
698 Views
30 Pages

24 October 2025

This paper introduces TRIDENT-DE, a novel ensemble-based variant of Differential Evolution (DE) designed to tackle complex continuous global optimization problems. The algorithm leverages three complementary trial vector generation strategies best/1/...

  • Article
  • Open Access
2,021 Views
26 Pages

24 October 2025

In response to the persistent failures of traditional election polling, this study introduces the Decentralized Prediction Market Voter Framework (DPMVF), a novel tool to empirically test and quantify the predictive capabilities of Decentralized Pred...

  • Article
  • Open Access
555 Views
17 Pages

Class-Level Feature Disentanglement for Multi-Label Image Classification

  • Yingduo Tong,
  • Zhenyu Lu,
  • Yize Dong and
  • Yonggang Lu

23 October 2025

Generally, the interpretability of deep neural networks is categorized into a priori and a posteriori interpretability. A priori interpretability involves improving model transparency through deliberate design prior to training. Feature disentangleme...

  • Review
  • Open Access
1,530 Views
26 Pages

23 October 2025

Private fifth generation (5G) networks have emerged as a cornerstone for ultra-reliable, low-latency connectivity across mission-critical domains such as industrial automation, healthcare, and smart cities. Compared to conventional technologies like...

  • Article
  • Open Access
506 Views
21 Pages

SFC-GS: A Multi-Objective Optimization Service Function Chain Scheduling Algorithm Based on Matching Game

  • Shi Kuang,
  • Moshu Niu,
  • Sunan Wang,
  • Haoran Li,
  • Siyuan Liang and
  • Rui Chen

22 October 2025

Service Function Chain (SFC) is a framework that dynamically orchestrates Virtual Network Functions (VNFs) and is essential to enhancing resource scheduling efficiency. However, traditional scheduling methods face several limitations, such as low mat...

  • Article
  • Open Access
663 Views
18 Pages

22 October 2025

Container-based virtualization has become pivotal in cloud computing, and resource fragmentation is inevitable due to the frequency of container deployment/termination and the heterogeneous nature of IoT tasks. In queuing cloud systems, resource defr...

  • Article
  • Open Access
843 Views
24 Pages

BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability

  • Justin Li Ting Lau,
  • Ying Han Pang,
  • Charilaos Zarakovitis,
  • Heng Siong Lim,
  • Dionysis Skordoulis,
  • Shih Yin Ooi,
  • Kah Yoong Chan and
  • Wai Leong Pang

22 October 2025

The transition to 5G networks brings unprecedented speed, ultra-low latency, and massive connectivity. Nevertheless, it introduces complex traffic patterns and broader attack surfaces that render traditional intrusion detection systems (IDSs) ineffec...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903