Abstract is missing.
- Adaptive Handover Decision Parameters in Femtocell-Macrocell NetworksMaroua Ben Gharbia, Ridha Bouallegue. 1-12 [doi]
- Reliable and Energy-Efficient Clustering Approach for FANETs Using a Fuzzy Logic SystemBadia Bouhdid, Mohamed Aissa. 13-24 [doi]
- Design and Implementation of an Energy-Autonomous IoT Sensor Node for Smart AgricultureAmeni Mersani, Mintoua Toupkandi, Hiba Jouini. 25-34 [doi]
- Smart IoT-Enabled Autonomous Vehicles for Next-Generation Public SafetySwarnamouli Majumdar, Anjali Awasthi, Sonny E. Kirkley, Lorant Andras Szolga, Mayur Srivastava. 35-46 [doi]
- Reconfigurable Intelligent Surfaces in Two-Way NOMA-AF Relaying NetworksRania Jadlaoui, Wided Hadj Alouane, Hatem Boujemaa. 47-58 [doi]
- Analysis of High-Speed Radio Communication in THz Bands: Topological Impacts and Signal Decomposition Using Empirical Mode Decomposition and Marginal Hilbert SpectrumDjamila Talbi, Zoltán Gál. 59-71 [doi]
- Age of Information in Hybrid NOMA/OMA Systems Based on Particle Swarm OptimizationAkram Hamdi, Ammar Bouallegue, Sameh Najeh. 72-85 [doi]
- A Framework for Integrating 5G and Vehicular Delay Tolerant Networks in Smart CitiesEvjola Spaho, Orjola Jaupi. 86-95 [doi]
- ELSA: Energy and Link Stability Aware Routing Protocol for FANETsSourour Dhifaoui, Chiraz Houaidia, Leïla Azouz Saïdane. 96-107 [doi]
- Concept of Performance Monitor for ADS-B in JapanJunichi Honda. 108-118 [doi]
- A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log AnalysisRaffaele Pizzolante, Arcangelo Castiglione, Michele Mastroianni, Francesco Palmieri 0002. 119-129 [doi]
- Proxy-Based Approach for Securing Modbus Communication with Post-quantum Cryptography: A Hydrogen-Based Smart Grid Case StudyManuel Fabiano, Francesco Longo 0001, Giovanni Merlino, Davide Aloisio, Giovanni Brunaccini, Francesco Sergi. 130-139 [doi]
- Epidemic Analysis of the Propagation of Multiple Malware Infectious in Wireless Sensor NetworksLeila Moradi, Eslam Farsimadan, Gianni D'Angelo, Bruno Carpentieri, Francesco Palmieri 0002. 140-148 [doi]
- CTAT: A Blockchain-Driven Conditional Traceable Access Token for Enhancing Performance and Security in the Supply Chain of Sensitive PharmaceuticalsHadis Rezaei, Massimo Ficco, Francesco Palmieri 0002. 149-160 [doi]
- Power Analysis of Post-quantum Cryptography NIST Algorithms in Resource-Constrained MicrocontrollerGennaro Pio Rimoli, Luigi Gallo, Pietro Fusco, Massimo Ficco. 161-169 [doi]
- Mobile Biometrics: Innovations, Challenges, and Emerging TrendsAttaullah Buriro, Flaminia L. Luccio. 170-180 [doi]
- Enhancing Security in E-Sports Events: Approach to Cheating Mitigation Using Kiosk SystemsMassimiliano Rak, Umberto Barbato, Antonio Liberti. 181-190 [doi]
- Biomechanical Data for Activity Recognition in E-Sports and the Metaverse: An Agnostic Model and Analysis FrameworkMassimiliano Rak, Umberto Barbato, Francesco Grimaldi. 191-202 [doi]
- QR Code Scanning as a Highly Available Surrogate of NFC for Verifiable Presentation ExchangeGnana Prakash Goli, Mauro Migliardi, Isil Atabek, Irem Gorksu Celik. 203-212 [doi]
- Enhancing Kubernetes Security: Comprehensive Strategies for a Robust Containerized InfrastructureSahar Ben Yaala, Leonel Feukouo Fosting, Ridha Bouallegue. 213-223 [doi]
- SG-BC: Evaluating Latency Blockchain Enabling SmartGridImen Aouini. 224-233 [doi]
- DDoS Attack Detection in Data PlaneSmriti Smriti, K. Haribabu, Sanyam Garg. 234-244 [doi]
- A Theoretical Framework for Decentralized Intrusion Detection in Smart Networks Using Blockchain and Machine LearningMoinul Alam, Mostafa Hasan, Arvil Nath Akash, Md Junayed Hossain, Ashraful Islam, Sanzar Adnan Alam. 245-256 [doi]
- A Layered Framework for Blockchain Security: Classification of Threats and the Quantum Computing ImpactKaustubh Dwivedi, Ankit Agrawal 0003, Ashutosh Bhatia, Kamlesh Tiwari. 257-269 [doi]
- Hybrid Deep Learning Model-Based Intrusion Detection System to Improve Artificial Internet of Things Against Cyber AttacksShayma Wail Nourildean, Wafa Mefteh, Ali Mohsen Frihida. 270-280 [doi]
- Layered Blockchain-Based Mobile CrowdSensing Architecture: Exploring Privacy and Scalability Challenges Across LayersAnkit Agrawal 0003, Aditi Bansal, Ashutosh Bhatia, Kamlesh Tiwari. 281-292 [doi]
- Optimizing Supply Chain Coordination and Information Sharing Using Blockchain TechnologyNaser Abbas Hussein, Jihene Khoualdi, Hella Kaffel Ben Ayed. 293-304 [doi]
- Collusion Attacks in the Internet of Drones: A Fog Computing Approach for Detection and PreventionA. Hedfi, Aida Ben Chehida, Ryma Abassi, Mohamed Aymen Chalouf, Omessaad Hamdi. 305-316 [doi]
- CHC-DDoS: A DDoS Attacks Detection Scheme Using Host-Connection Graph Representation and GCNAhmed Saidane, Ali El Kamel, Habib Youssef. 317-325 [doi]
- Model-Based Security Assurance Cases for Open and Adaptive Cyber-Physical SystemsLuís Nascimento, André Luíz de Oliveira, Regina Villela 0001, Edelberto Franco Silva, Ran Wei, Richard Hawkins, Tim Kelly. 326-340 [doi]
- Prediction of Water Quality Using Machine Learning Models in IoT EnvironmentMarwa Faydi, Amira Zrelli, Tahar Ezzedine. 341-352 [doi]
- The Simulation of a Service Orchestration Engine for the Smart City Internet of ThingsCathryn Peoples, Bibin Babu, Joseph Rafferty, Adrian Moore 0001, Nektarios Georgalas. 353-362 [doi]
- Autonomous Management of IoT Devices in Smart Homes Using Semi-Markov ModelsDongwei Wang, Sally I. McClean, Ian R. McChesney, Zeeshan Tariq. 363-373 [doi]
- Security Focus Areas for Digital Twin Development ProjectsSergey Butakov. 374-384 [doi]
- ReenactFaces: A Specialized Dataset for Reenactment-Based Deepfake DetectionVazgken Vanian, Georgios Petmezas, Konstantinos Konstantoudakis, Dimitrios Zarpalas. 385-394 [doi]
- A Text Mining Approach to Sentiment-Based Fake News Detection Using Finite AutomataAlberto Postiglione. 395-406 [doi]
- Mel Spectrogram-Based CNN Framework for Explainable Audio Deepfake DetectionMuhammad Khurram Zahur Bajwa, Aniello Castiglione, Chiara Pero. 407-416 [doi]
- NLP-Driven Analysis of Users' Reaction for Estimation of Information Disorder PropagationGennaro Junior Pezzullo, Alba Amato, Beniamino Di Martino, Daniele Granata, Massimiliano Rak, Salvatore Venticinque. 417-425 [doi]
- Comparative Evaluation of Synthetic Image Detectors: Insights from Generative Adversarial Networks and Stable Diffusion GeneratorsAndrea F. Abate, Lucia Cimmino, Matteo Polsinelli. 426-436 [doi]
- Telemedicine in MCPS: A Proposed Design and Implementation of a Secure and Transparent Healthcare Blockchain Application to Ensure Data Security and IntegrityBéatrix-May Balaban, Ioan Stefan Sacala, Claudia Alina Petrescu-Nita. 437-449 [doi]
- Detecting Manipulated Digital Entities Through Real-World AnchorsRonghua Xu, Xinyun Liu, Deeraj Nagothu, Qian Qu, Yu Chen 0002. 450-461 [doi]