Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 7

2025 July - 51 articles

Cover Story: The rapid expansion of Edge and Industrial Internet of Things (IIoT) systems has intensified the risk and complexity of cyberattacks. In this study, we propose an optimized hybrid DL framework for robust intrusion detection in Edge and IIoT environments. To enhance the training and convergence of the GAN component, we integrate an improved chimp optimization algorithm (IChOA) for hyperparameter tuning and feature refinement. Extensive experiments are conducted to assess the model’s performance compared to several state-of-the-art techniques and the results demonstrate that the proposed Transformer–GAN–AE framework outperforms all baseline methods, achieving a maximum accuracy of 98.92%, along with superior recall and AUC values. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (51)

  • Article
  • Open Access
1,590 Views
28 Pages

An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec

  • Xinyu Li,
  • Xiaoying Wang,
  • Guoqing Yang,
  • Jinsha Zhang,
  • Chunhui Li,
  • Fangfang Cui and
  • Ruize Gu

The covert nature of DNS covert channels makes them a widely utilized method for data exfiltration by malicious attackers. In response to this challenge, the present study proposes a detection methodology for DNS covert channels that employs a Deep B...

  • Article
  • Open Access
4 Citations
1,473 Views
34 Pages

Advancing Neurodegenerative Disease Management: Technical, Ethical, and Regulatory Insights from the NeuroPredict Platform

  • Marilena Ianculescu,
  • Lidia Băjenaru,
  • Ana-Mihaela Vasilevschi,
  • Maria Gheorghe-Moisii and
  • Cristina-Gabriela Gheorghe

On a worldwide scale, neurodegenerative diseases, including multiple sclerosis, Parkinson’s, and Alzheimer’s, face considerable healthcare challenges demanding the development of novel approaches to early detection and efficient treatment...

  • Review
  • Open Access
10 Citations
4,970 Views
87 Pages

Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions

  • Jean Paul A. Yaacoub,
  • Hassan N. Noura,
  • Ola Salman and
  • Khaled Chahine

The evolution of electrical power systems into smart grids has brought about significant advancements in electricity generation, transmission, and utilization. These cutting-edge grids have shown potential as an effective way to maximize energy effic...

  • Review
  • Open Access
4 Citations
2,435 Views
42 Pages

The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This p...

  • Article
  • Open Access
749 Views
27 Pages

Parallel Agent-Based Framework for Analyzing Urban Agricultural Supply Chains

  • Manuel Ignacio Manríquez,
  • Veronica Gil-Costa and
  • Mauricio Marin

This work presents a parallel agent-based framework designed to analyze the dynamics of vegetable trade within a metropolitan area. The system integrates agent-based and discrete event techniques to capture the complex interactions among farmers, ven...

  • Article
  • Open Access
2 Citations
1,372 Views
31 Pages

A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing

  • Fateme Mazloomi,
  • Shahram Shah Heydari and
  • Khalil El-Khatib

Federated learning (FL) has emerged as a powerful approach for privacy-preserving model training in autonomous vehicle networks, where real-world deployments rely on multiple roadside units (RSUs) serving heterogeneous clients with intermittent conne...

  • Article
  • Open Access
1,220 Views
27 Pages

Telemedicine in emergency contexts presents unique challenges, particularly in multilingual and low-resource settings where accurate, clinical understanding and triage decision support are critical. This paper introduces TriagE-NLU, a novel multiling...

  • Review
  • Open Access
1 Citations
2,226 Views
35 Pages

There is a growing pressure on industry to secure environments and demonstrate their commitment in taking right steps to secure their products. This is because of the growing number of security compromises in the IT industry, Operational Technology e...

  • Article
  • Open Access
2 Citations
2,616 Views
21 Pages

The evolution from 4G to 5G—and eventually to the forthcoming 6G networks—has revolutionized wireless communications by enabling high-speed, low-latency services that support a wide range of applications, including the Internet of Things...

  • Review
  • Open Access
2 Citations
2,534 Views
55 Pages

A Deep Learning Framework for Enhanced Detection of Polymorphic Ransomware

  • Mazen Gazzan,
  • Bader Alobaywi,
  • Mohammed Almutairi and
  • Frederick T. Sheldon

Ransomware, a significant cybersecurity threat, encrypts files and causes substantial damage, making early detection crucial yet challenging. This paper introduces a novel multi-phase framework for early ransomware detection, designed to enhance accu...

  • Review
  • Open Access
5 Citations
3,179 Views
40 Pages

Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV)

  • Isra Mahmoudi,
  • Djallel Eddine Boubiche,
  • Samir Athmani,
  • Homero Toral-Cruz and
  • Freddy I. Chan-Puc

The increasing complexity and scale of Internet of Vehicles (IoV) networks pose significant security challenges, necessitating the development of advanced intrusion detection systems (IDS). Traditional IDS approaches, such as rule-based and signature...

  • Article
  • Open Access
1 Citations
4,007 Views
47 Pages

Leveraging Blockchain for Ethical AI: Mitigating Digital Threats and Strengthening Societal Resilience

  • Chibuzor Udokwu,
  • Roxana Voicu-Dorobanțu,
  • Abiodun Afolayan Ogunyemi,
  • Alex Norta,
  • Nata Sturua and
  • Stefan Craß

This position paper proposes a conceptual framework (CF-BIAI-SXT) for integrating blockchain with AI to enhance ethical governance, transparency, and privacy in high-risk AI applications that ensure societal resilience through the mitigation of sexua...

  • Review
  • Open Access
2 Citations
7,960 Views
39 Pages

Federated learning (FL) is an advanced distributed machine learning method that effectively solves the data silo problem. With the increasing popularity of federated learning and the growing importance of privacy protection, federated learning method...

  • Article
  • Open Access
1 Citations
962 Views
23 Pages

Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate....

  • Article
  • Open Access
1,438 Views
14 Pages

Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City

  • Gabriel Sepúlveda-Cervantes,
  • Eduardo Vega-Alvarado,
  • Edgar Alfredo Portilla-Flores and
  • Eduardo Vivanco-Rodríguez

Cyber-physical systems such as Supervisory Control and Data Acquisition (SCADA) have been applied in industrial automation and infrastructure management for decades. They are hybrid tools for administration, monitoring, and continuous control of real...

  • Article
  • Open Access
1 Citations
1,408 Views
19 Pages

Attack Surface Score for Software Systems

  • Yudeep Rajbhandari,
  • Rokin Maharjan,
  • Sakshi Shrestha and
  • Tomas Cerny

Software attack surfaces define the external boundaries—entry points, communication channels, and sensitive data stores through which adversaries may compromise a system. This paper introduces a scoring mechanism that produces a normalized atta...

  • Article
  • Open Access
1 Citations
948 Views
17 Pages

In next-generation Low-Earth-Orbit (LEO) satellite networks, securing inter-satellite communication links (ISLs) through strong authentication is essential due to the network’s dynamic and distributed structure. Traditional authentication syste...

  • Article
  • Open Access
1 Citations
3,185 Views
19 Pages

A Case Study on Monolith to Microservices Decomposition with Variational Autoencoder-Based Graph Neural Network

  • Rokin Maharjan,
  • Korn Sooksatra,
  • Tomas Cerny,
  • Yudeep Rajbhandari and
  • Sakshi Shrestha

Microservice is a popular architecture for developing cloud-native applications. However, decomposing a monolithic application into microservices remains a challenging task. This complexity arises from the need to account for factors such as componen...

  • Article
  • Open Access
1,135 Views
22 Pages

Intelligent transport systems are a major component of smart cities because their deployment should result in reduced journey times, less traffic congestion and a significant reduction in road deaths, which will greatly improve the quality of life of...

  • Article
  • Open Access
2 Citations
1,573 Views
20 Pages

Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks

  • Kenan Honore Robacky Mbongo,
  • Kanwal Ahmed,
  • Orken Mamyrbayev,
  • Guanghui Wang,
  • Fang Zuo,
  • Ainur Akhmediyarova,
  • Nurzhan Mukazhanov and
  • Assem Ayapbergenova

Wireless Sensor Networks (WSNs) consist of distributed sensor nodes that collect and transmit environmental data, often in resource-constrained and unsecured environments. These characteristics make WSNs highly vulnerable to various security threats....

  • Article
  • Open Access
3 Citations
1,164 Views
19 Pages

In the UAV-assisted mobile edge computing (MEC) communication system, the UAV receives the data offloaded by multiple ground user devices as an aerial base station. Among them, due to the limited battery storage of a UAV, energy saving is a key issue...

  • Article
  • Open Access
4 Citations
1,311 Views
25 Pages

Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection

  • Ma Viet Duc,
  • Pham Minh Dang,
  • Tran Thu Phuong,
  • Truong Duc Truong,
  • Vu Hai and
  • Nguyen Huu Thanh

Domain Generation Algorithms (DGAs) remain a persistent technique used by modern malware to establish stealthy command-and-control (C&C) channels, thereby evading traditional blacklist-based defenses. Detecting such evolving threats is especially...

  • Article
  • Open Access
1,646 Views
24 Pages

Internet of Things (IoT) technology in healthcare has enabled innovative services that enhance patient monitoring, diagnostics and medical data management. However, securing sensitive health data while maintaining system efficiency of resource-constr...

  • Article
  • Open Access
1 Citations
781 Views
21 Pages

The experimentation of agricultural robots has been increasing in recent years, both in greenhouses and open fields. While agricultural robots are inherently useful for automating various farming tasks, their presence can also be leveraged to collect...

  • Article
  • Open Access
1,160 Views
25 Pages

There are workloads that do not need the total data ordering enforced by the Transmission Control Protocol (TCP). For example, Virtual Network Computing (VNC) has a sequence of pixel-based updates in which the order of rectangles can be relaxed. Howe...

  • Article
  • Open Access
629 Views
22 Pages

FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments

  • Bruno Ramos-Cruz,
  • Francisco J. Quesada-Real,
  • Javier Andreu-Pérez and
  • Jessica Zaqueros-Martinez

In the rapidly evolving landscape of the Internet of Things (IoT), managing the vast volumes of data generated by connected devices presents significant challenges, particularly in B5G IoT environments. One key issue is data redundancy, where identic...

  • Article
  • Open Access
723 Views
24 Pages

ICRSSD: Identification and Classification for Railway Structured Sensitive Data

  • Yage Jin,
  • Hongming Chen,
  • Rui Ma,
  • Yanhua Wu and
  • Qingxin Li

The rapid growth of the railway industry has resulted in the accumulation of large structured data that makes data security a critical component of reliable railway system operations. However, existing methods for identifying and classifying often su...

  • Article
  • Open Access
1 Citations
1,049 Views
22 Pages

Efficient and timely data collection in Underwater Acoustic Sensor Networks (UASNs) for Internet of Underwater Things (IoUT) applications remains a significant challenge due to the inherent limitations of the underwater environment. This paper presen...

  • Article
  • Open Access
2,492 Views
28 Pages

Pneumothorax is a potentially life-threatening condition defined as the collapse of the lung due to air leakage into the chest cavity. Delays in the diagnosis of pneumothorax can lead to severe complications and even mortality. A significant challeng...

  • Article
  • Open Access
2 Citations
1,850 Views
20 Pages

To address the fact that changes in network topology can have an impact on the performance of routing, this paper proposes an Elastic Routing Algorithm based on Multi-Agent Deep Deterministic Policy Gradient (ERA-MADDPG), which is implemented within...

  • Systematic Review
  • Open Access
1,663 Views
24 Pages

Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review

  • Juan Ochoa-Aldeán,
  • Carlos Silva-Cárdenas,
  • Renato Torres,
  • Jorge Ivan Gonzalez and
  • Sergio Fortes

Background: Machine learning methods are increasingly being used in mobile network optimization systems, especially next-generation mobile networks. The need for enhanced radio resource allocation schemes, improved user mobility and increased through...

  • Article
  • Open Access
3 Citations
1,553 Views
33 Pages

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing

  • Hisham Ali,
  • William J. Buchanan,
  • Jawad Ahmad,
  • Marwan Abubakar,
  • Muhammad Shahbaz Khan and
  • Isam Wadhaj

We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture suppo...

  • Article
  • Open Access
1,192 Views
27 Pages

Empirical Investigation on Practical Robustness of Keystroke Recognition Using WiFi Sensing for Future IoT Applications

  • Haoming Wang,
  • Aryan Sharma,
  • Deepak Mishra,
  • Aruna Seneviratne and
  • Eliathamby Ambikairajah

The widespread use of WiFi Internet-of-Things (IoT) devices has rendered them valuable tools for detecting information about the physical environment. Recent studies have demonstrated that WiFi Channel State Information (CSI) can detect physical even...

  • Article
  • Open Access
1 Citations
1,359 Views
27 Pages

Cross-Lingual Cross-Domain Transfer Learning for Rumor Detection

  • Eliana Providel,
  • Marcelo Mendoza and
  • Mauricio Solar

This study introduces a novel method that merges propagation-based transfer learning with word embeddings for rumor detection. This approach aims to use data from languages with abundant resources to enhance performance in languages with limited avai...

  • Article
  • Open Access
1,394 Views
18 Pages

Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks

  • Matthew Boeding,
  • Paul Scalise,
  • Michael Hempel,
  • Hamid Sharif and
  • Juan Lopez

The convergence of Operational Technology (OT) and Information Technology (IT) networks has become increasingly prevalent with the growth of Industrial Internet of Things (IIoT) applications. This shift, while enabling enhanced automation, remote mon...

  • Article
  • Open Access
1 Citations
2,218 Views
22 Pages

AI-Based Learning Recommendations: Use in Higher Education

  • Prabin Dahal,
  • Saptadi Nugroho,
  • Claudia Schmidt and
  • Volker Sänger

We propose the extension for Artificial Intelligence (AI)-supported learning recommendations within higher education, focusing on enhancing the widely-used Moodle Learning Management System (LMS) and extending it to the Learning eXperience Platform (...

  • Article
  • Open Access
2,177 Views
30 Pages

Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector

  • Germán Rodríguez-Galán,
  • Eduardo Benavides-Astudillo,
  • Daniel Nuñez-Agurto,
  • Pablo Puente-Ponce,
  • Sonia Cárdenas-Delgado and
  • Mauricio Loachamín-Valencia

This study presents a system for automatic cookie collection using bots that simulate user browsing behavior. Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple...

  • Systematic Review
  • Open Access
3 Citations
2,462 Views
33 Pages

The metaverse is a multidimensional reality space that represents the evolving interface between humans, digital systems, and spatial computing. This research aims to provide a comprehensive synthesis of metaverse definitions and architectural framew...

  • Review
  • Open Access
4 Citations
1,228 Views
24 Pages

As cyber systems increasingly converge with physical infrastructure and social processes, they give rise to Complex Cyber–Physical–Social Systems (C-CPSS), whose emergent behaviors pose unique risks to security and mission assurance. Trad...

  • Article
  • Open Access
2 Citations
2,258 Views
23 Pages

This paper explores the broad area of Smart City services and how the evolving Cloud-Edge-IoT continuum can support application deployment in Smart Cities. We initially introduce a range of Smart City services and highlight their computational needs....

  • Article
  • Open Access
1,321 Views
31 Pages

Measurement of the Functional Size of Web Analytics Implementation: A COSMIC-Based Case Study Using Machine Learning

  • Ammar Abdallah,
  • Alain Abran,
  • Munthir Qasaimeh,
  • Malik Qasaimeh and
  • Bashar Abdallah

To fully leverage Google Analytics and derive actionable insights, web analytics practitioners must go beyond standard implementation and customize the setup for specific functional requirements, which involves additional web development efforts. Pre...

  • Article
  • Open Access
6 Citations
2,516 Views
34 Pages

The rapid expansion of Edge and Industrial Internet of Things (IIoT) systems has intensified the risk and complexity of cyberattacks. Detecting advanced intrusions in these heterogeneous and high-dimensional environments remains challenging. As the I...

  • Article
  • Open Access
2,099 Views
23 Pages

SatScope: A Data-Driven Simulator for Low-Earth-Orbit Satellite Internet

  • Qichen Wang,
  • Guozheng Yang,
  • Yongyu Liang,
  • Chiyu Chen,
  • Qingsong Zhao and
  • Sugai Chen

The rapid development of low-Earth-orbit (LEO) satellite constellations has not only provided global users with low-latency and unrestricted high-speed data services but also presented researchers with the challenge of understanding dynamic changes i...

  • Article
  • Open Access
1,101 Views
35 Pages

Intelligent Transmission Control Scheme for 5G mmWave Networks Employing Hybrid Beamforming

  • Hazem (Moh’d Said) Hatamleh,
  • As’ad Mahmoud As’ad Alnaser,
  • Roba Mahmoud Ali Aloglah,
  • Tomader Jamil Bani Ata,
  • Awad Mohamed Ramadan and
  • Omar Radhi Aqeel Alzoubi

Hybrid beamforming plays a critical role in evaluating wireless communication technology, particularly for millimeter-wave (mmWave) multiple-input multiple-out (MIMO) communication. Several hybrid beamforming systems are investigated for millimeter-w...

  • Article
  • Open Access
1 Citations
945 Views
30 Pages

Current tourism route recommendation systems often overemphasize popular destinations, thereby overlooking geographical accessibility between attractions and the experiential coherence of the journey. Leveraging multidimensional attribute perceptions...

  • Article
  • Open Access
3 Citations
1,528 Views
35 Pages

Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks

  • Abdul Manan Sheikh,
  • Md. Rafiqul Islam,
  • Mohamed Hadi Habaebi,
  • Suriza Ahmad Zabidi,
  • Athaur Rahman Bin Najeeb and
  • Adnan Kabbani

Edge computing (EC) faces unique security threats due to its distributed architecture, resource-constrained devices, and diverse applications, making it vulnerable to data breaches, malware infiltration, and device compromise. The mitigation strategi...

  • Article
  • Open Access
2 Citations
2,507 Views
28 Pages

Accessible IoT Dashboard Design with AI-Enhanced Descriptions for Visually Impaired Users

  • George Alex Stelea,
  • Livia Sangeorzan and
  • Nicoleta Enache-David

The proliferation of the Internet of Things (IoT) has led to an abundance of data streams and real-time dashboards in domains such as smart cities, healthcare, manufacturing, and agriculture. However, many current IoT dashboards emphasize complex vis...

  • Article
  • Open Access
1 Citations
2,690 Views
34 Pages

An Experimental Tethered UAV-Based Communication System with Continuous Power Supply

  • Veronica Rodriguez,
  • Christian Tipantuña,
  • Diego Reinoso,
  • Jorge Carvajal-Rodriguez,
  • Carlos Egas Acosta,
  • Pablo Proaño and
  • Xavier Hesselbach

Ensuring reliable communication in remote or disaster-affected areas is a technical challenge due to unplanned deployment and mobilization, meaning placement difficulties and high operation costs of conventional telecommunications infrastructures. To...

  • Article
  • Open Access
1 Citations
1,229 Views
28 Pages

This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional me...

  • Article
  • Open Access
1,355 Views
16 Pages

This research presents an IoT-empowered adaptive mobility framework that integrates high-dimensional gesture recognition with edge-cloud orchestration for safety-critical human–machine interaction. The system architecture establishes a three-ti...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903