Journal: Future Internet

Volume 11, Issue 3

54 -- 0Giovanni Maria Sacco. SAES: An Introduction to Self-Adapting Exploratory Structures
55 -- 0Sergej Svorobej, Patricia Takako Endo, Malika Bendechache, Christos K. Filelis-Papadopoulos, Konstantinos M. Giannoutakis, George A. Gravvanis, Dimitrios Tzovaras, James Byrne, Theo Lynn. Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges
56 -- 0Luigi Lo Iacono, Hoai Viet Nguyen, Peter Leo Gorski. On the Need for a General REST-Security Framework
57 -- 0Lorenzo Vangelista, Marco Centenaro. Worldwide Connectivity for the Internet of Things Through LoRaWAN
58 -- 0Luis Gomes 0001, Carlos Ramos, Aria Jozi, Bruno Serra, Lucas Paiva, Zita A. Vale. IoH: A Platform for the Intelligence of Home with a Context Awareness and Ambient Intelligence Approach
59 -- 0Mayank Kejriwal, Pedro Szekely. myDIG: Personalized Illicit Domain-Specific Knowledge Discovery with No Programming
60 -- 0Xuan Wang, Bofeng Zhang, Furong Chang. Hot Topic Community Discovery on Cross Social Networks
61 -- 0Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain, Muhammad Qasim Memon. A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs
62 -- 0Alexander Geyda, Igor Lysenko. Modeling of Information Operations Effects: Technological Systems Example
63 -- 0Abel Yeboah-Ofori, Shareeful Islam. Cyber Security Threat Modeling for Supply Chain Organizational Environments
64 -- 0Xin Zheng, Gaocai Wang, Qifei Zhao. A Cache Placement Strategy with Energy Consumption Optimization in Information-Centric Networking
65 -- 0Yang Li, Leyi Shi, Haijie Feng. A Game-Theoretic Analysis for Distributed Honeypots
66 -- 0Samer Jaloudi. Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study
67 -- 0Aikaterini-Georgia Mavroeidi, Angeliki Kitsiou, Christos Kalloniatis, Stefanos Gritzalis. Gamification vs. Privacy: Identifying and Analysing the Major Concerns
68 -- 0Shigeru Kato, Naoki Wada, Ryuji Ito, Takaya Shiozaki, Yudai Nishiyama, Tomomichi Kagawa. Snack Texture Estimation System Using a Simple Equipment and Neural Network Model
69 -- 0Aris Leivadeas, George Kesidis, Mohamed Ibnkahla, Ioannis Lambadaris.
70 -- 0Adnan Mahmood, Wei Emma Zhang, Quan Z. Sheng. Software-Defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges
71 -- 0Vincenzo Eramo, Francesco Giacinto Lavacca, Tiziana Catena, Marco Polverini, Antonio Cianfrani. Effectiveness of Segment Routing Technology in Reducing the Bandwidth and Cloud Resources Provisioning Times in Network Function Virtualization Architectures
72 -- 0Paul J. Croft. Environmental Hazards: A Coverage Response Approach
73 -- 0Hussain Aldawood, Geoffrey Skinner. Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues
74 -- 0Rute C. Sofia, Paulo Mendes 0001. An Overview on Push-Based Communication Models for Information-Centric Networking
75 -- 0Hadar Sufiev, Yoram Haddad 0001, Leonid Barenboim, José Soler. Dynamic SDN Controller Load Balancing
76 -- 0Tomasz Hyla, Jerzy Pejas. eHealth Integrity Model Based on Permissioned Blockchain
77 -- 0Diego Corrales-Garay, Eva-María Mora-Valentín, Marta Ortiz-de-Urbina-Criado. Open Data for Open Innovation: An Analysis of Literature Characteristics
78 -- 0Ioannis Galanis, Iraklis Anagnostopoulos, Priyaa Gurunathan, Dona Burkard. Environmental-Based Speed Recommendation for Future Smart Cars
79 -- 0Xiangfeng Luo, Yawen Yi. Topic-Specific Emotion Mining Model for Online Comments
80 -- 0Joan-Francesc Fondevila-Gascón, Gaspar Berbel, Mònica Muñoz-González. Experimental Study on the Utility and Future of Collaborative Consumption Platforms Offering Tourism Related Services
81 -- 0Ning Zhao, Yuhe Liu, Junjie Shen. Nonlinear Analysis of Built-in Sensor in Smart Device under the Condition of Voice Actuating
82 -- 0Ying Dong, Zhou Lei. An Access Control Model for Preventing Virtual Machine Hopping Attack