Muhammad Adil , Ahmed Farouk , Aitizaz Ali , Houbing Song , Zhanpeng Jin
{"title":"Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions","authors":"Muhammad Adil , Ahmed Farouk , Aitizaz Ali , Houbing Song , Zhanpeng Jin","doi":"10.1016/j.cosrev.2025.100750","DOIUrl":"10.1016/j.cosrev.2025.100750","url":null,"abstract":"<div><div>In the recent past, the increasing use of online applications, from simple food orders to complex banking services, has highlighted the need for strong and reliable network security measures. Traditional password-based authentication schemes have proven vulnerable to various cyber threats, including password guessing, keylogging, phishing, and credential theft, etc. To address these challenges, the research community has turned its attention to biometric technologies as a promising solution for Next-Generation Technologies security. These biometrics technologies use the physiological and behavioral characteristics of humans to verify or confirm their identity in many NGTs such as smartphones, computers, banking systems, and border control systems, etc. However, these NGTs faces several key challenges in the context of biometric systems. This is because the biometrics features change a lot with age, or once someone passes away, compared to the collected data when the person was alive. Therefore, these systems face multidirectional challenges. First, the attackers can use different techniques to compromise the security of an application. Secondly, the disparities inherent in biometric technologies pose significant challenges to their effective implementation because they rely on specific human features such as irises, fingerprints, and faces, etc. Considering that, we conducted a comprehensive survey over the past decade. This survey aimed to identify both the strengths and weaknesses of existing biometric techniques used in NGTs, with the goal of setting the path for future research that can enhance the security of these technologies. Furthermore, it is crucial to address the question of why this paper is necessary, given the presence of several survey papers on the same topic. To answer this question, our work offers several unique contributions based on the undermentioned factors: (i:) Firstly, it familiarizes the reader with the taxonomy of biometrics, followed by enabling technologies and use cases in the context of NGTs, which are ignored in most published papers. (ii:) Secondly, it meticulously examines the reliability of mostly used biometric authentication techniques by highlighting their strong and weak aspects to underscore the research gaps. (iii:) Thirdly, our paper thoroughly explores the requirements of biometric technologies in the context of NGTs to support the literature arguments regarding their inefficiency in meeting the demands of emerging technologies. Moreover, this work provides insights into both the achievements made thus far and the areas that still require attention to enhance the reliability of biometric systems. (iv:) Fourthly, it highlights the open challenges that current biometric methods struggle to overcome in futuristic technologies. (v:) Lastly, we propose research directions with the aim of addressing the highlighted open challenges and maintaining the trust of all stakeholders in biometric technolog","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100750"},"PeriodicalIF":13.3,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143738598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guisheng Liu , Yong Liu , Qian Meng , Ben Wang , Kefei Chen , Zhonghua Shen
{"title":"Traffic load balancing in data center networks: A comprehensive survey","authors":"Guisheng Liu , Yong Liu , Qian Meng , Ben Wang , Kefei Chen , Zhonghua Shen","doi":"10.1016/j.cosrev.2025.100749","DOIUrl":"10.1016/j.cosrev.2025.100749","url":null,"abstract":"<div><div>The rapid growth in scale and complexity of data centers has established effective load balancing as a critical requirement for optimizing network performance, resource utilization, and service quality. This survey provides a comprehensive examination of load balancing strategies in data center networks, addressing challenges, established techniques, and emerging trends. The study begins with fundamental concepts of data center networks, encompassing network topologies, load balancing definitions, granularity considerations, and inherent challenges. A systematic analysis of load balancing schemes follows, categorized into centralized and distributed approaches. Within centralized schemes, the analysis encompasses both machine learning-based approaches and traditional methodologies, while distributed schemes are examined through single-granularity and mixed-granularity implementations. The survey extends beyond previous reviews by offering comparative analyses of load balancing strategies, a systematic evaluation of performance metrics, and an assessment of their applicability across diverse data center scenarios. The discussion further explores future development trends driven by technological innovations across multiple dimensions, including hardware, software, architecture, and algorithms. This comprehensive technical review serves as a foundational resource for researchers and practitioners, facilitating advancements in efficient, scalable, and user-centric load balancing technologies for data center networks.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100749"},"PeriodicalIF":13.3,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143725808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Barral , F. Javier Cardama , Guillermo Díaz-Camacho , Daniel Faílde , Iago F. Llovo , Mariamo Mussa-Juane , Jorge Vázquez-Pérez , Juan Villasuso , César Piñeiro , Natalia Costas , Juan C. Pichel , Tomás F. Pena , Andrés Gómez
{"title":"Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing","authors":"David Barral , F. Javier Cardama , Guillermo Díaz-Camacho , Daniel Faílde , Iago F. Llovo , Mariamo Mussa-Juane , Jorge Vázquez-Pérez , Juan Villasuso , César Piñeiro , Natalia Costas , Juan C. Pichel , Tomás F. Pena , Andrés Gómez","doi":"10.1016/j.cosrev.2025.100747","DOIUrl":"10.1016/j.cosrev.2025.100747","url":null,"abstract":"<div><div>The emerging field of quantum computing has shown it might change how we process information by using the unique principles of quantum mechanics. As researchers continue to push the boundaries of quantum technologies to unprecedented levels, distributed quantum computing raises as an obvious path to explore with the aim of boosting the computational power of current quantum systems. This paper presents a comprehensive survey of the current state of the art in the distributed quantum computing field, exploring its foundational principles, landscape of achievements, challenges, and promising directions for further research. From quantum communication protocols to entanglement-based distributed algorithms, each aspect contributes to the mosaic of distributed quantum computing, making it an attractive approach to address the limitations of classical computing. Our objective is to offer a comprehensive review that serves both experts in the field and researchers or enthusiasts in quantum computing looking for a starting point to explore the area of distributed quantum computing.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100747"},"PeriodicalIF":13.3,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143679142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Milad Taleby Ahvanooey , Wojciech Mazurczyk , Jun Zhao , Luca Caviglione , Kim-Kwang Raymond Choo , Max Kilger , Mauro Conti , Rafael Misoczki
{"title":"Future of cyberspace: A critical review of standard security protocols in the post-quantum era","authors":"Milad Taleby Ahvanooey , Wojciech Mazurczyk , Jun Zhao , Luca Caviglione , Kim-Kwang Raymond Choo , Max Kilger , Mauro Conti , Rafael Misoczki","doi":"10.1016/j.cosrev.2025.100738","DOIUrl":"10.1016/j.cosrev.2025.100738","url":null,"abstract":"<div><div>Over the past three decades, standardizing organizations (e.g., the National Institute of Standards and Technology and Internet Engineering Task Force) have investigated the efficiency of cryptographic algorithms and provided (technical) guidelines for practitioners. For example, the (Datagram) Transport Layer Security “(D)TLS” 1.2/1.3 was designed to help industries implement and integrate such methods through underpinning infrastructures of Internet of Everything (IoE) environments with efficiency and efficacy in mind. The main goal underpinning such protocols is to protect the Internet connections between IoE machines from malicious activities such as unauthorized eavesdropping, monitoring, and tampering with messages. In theory, these protocols are supposed to be secure. Still, most existing implementations partially follow the standard features of (D)TLS 1.2/3, leaving them vulnerable to risks such as side-channel and network attacks. In this paper, we critically review the standard protocols deployed for the security management of data and connected machines, and also examine the recently discovered vulnerabilities that lead to successful zero-day attacks in IoE environments. Then, we discuss various potential countermeasures in the form of organizational policy enforcement strategies and mitigation approaches that can be used by cybersecurity practitioners, decision- and policy-makers. Finally, we identify both proactive and reactive solutions for further consideration and study, as well as propose alternative mechanisms and e-governance policies for standardizing organizations and engineers in future solution designs.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100738"},"PeriodicalIF":13.3,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143642212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterising harmful API uses and repair techniques: Insights from a systematic review","authors":"Lina Ochoa , Muhammad Hammad , Görkem Giray , Önder Babur , Kwabena Bennin","doi":"10.1016/j.cosrev.2025.100732","DOIUrl":"10.1016/j.cosrev.2025.100732","url":null,"abstract":"<div><div>API use has become prevalent in current times and its purposeful management is of foremost importance to avoid undesired effects on client code. A plethora of studies focusing on the isolated investigation of different types of harmful API uses (e.g., API misuse and security vulnerabilities) have been conducted before. However, a comprehensive overview of possible harmful API uses is required to help both library and client developers on the management of implemented and used APIs. Moreover, repairing such harmful uses remains a significant challenge in software development, yet recent studies indicate its widespread prevalence despite efforts to develop automatic repair techniques. This paper presents the first systematic review of 35 peer-reviewed studies on harmful API uses and their corresponding (semi-)automatic repair techniques. We categorise common types of harmful API uses in terms of the origin and root cause of events triggering the undesired use and the type of harm incurred on the client. We further analyse their repair approaches, assessing their strengths and weaknesses. Additionally, we investigate the evaluation processes and metrics employed in the outlined repair techniques. Our study contributes to advancing the state-of-the-art in harmful API repair research, by addressing open research problems and paving the way to improve and develop new repair techniques and tool capabilities.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100732"},"PeriodicalIF":13.3,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143578907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent visual analytics for food safety: A comprehensive review","authors":"Qinghui Zhang , Yi Chen , Xue Liang","doi":"10.1016/j.cosrev.2025.100739","DOIUrl":"10.1016/j.cosrev.2025.100739","url":null,"abstract":"<div><div>The emergence of food safety big data poses a huge challenge to data analysis and the application of technology. Intelligent visual analytics combines the advantages of artificial intelligence and visual analytics methods to process complex information more efficiently and accurately, providing technical support for intelligent food safety supervision. In this paper, we review the development and application of intelligent visual analytics for food safety over the past decade. First, we explore food safety data sources, data characteristics, and analytical tasks. Second, artificial intelligence methods and visualization techniques in food safety are presented respectively. Third, in-depth insights and applications of intelligent visual analytics methods from the perspective of food safety data characterization are provided, and typical cases are given. Finally, opportunities and challenges in intelligent visual analytics for food safety are proposed, including emerging technologies such as few-shot learning, automatic visualization generation, and large language models. The review aims to encourage researchers to propose more practical intelligent visual analytics solutions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100739"},"PeriodicalIF":13.3,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143550020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sang-Woong Lee , Amir Haider , Amir Masoud Rahmani , Bahman Arasteh , Farhad Soleimanian Gharehchopogh , Shengda Tang , Zhe Liu , Khursheed Aurangzeb , Mehdi Hosseinzadeh
{"title":"A survey of Beluga whale optimization and its variants: Statistical analysis, advances, and structural reviewing","authors":"Sang-Woong Lee , Amir Haider , Amir Masoud Rahmani , Bahman Arasteh , Farhad Soleimanian Gharehchopogh , Shengda Tang , Zhe Liu , Khursheed Aurangzeb , Mehdi Hosseinzadeh","doi":"10.1016/j.cosrev.2025.100740","DOIUrl":"10.1016/j.cosrev.2025.100740","url":null,"abstract":"<div><div>Optimization, as a fundamental pillar in engineering, computer science, economics, and many other fields, plays a decisive role in improving the performance of systems and achieving desired goals. Optimization problems involve many variables, various constraints, and nonlinear objective functions. Among the challenges of complex optimization problems is the extensive search space with local optima that prevents reaching the global optimal solution. Therefore, intelligent and collective methods are needed to solve problems, such as searching for large problem spaces and identifying near-optimal solutions. Metaheuristic algorithms are a successful method for solving complex optimization problems. Usually, metaheuristic algorithms, inspired by natural and social phenomena, try to find optimal or near-optimal solutions by using random searches and intelligent explorations in the problem space. Beluga Whale Optimization (BWO) is one of the metaheuristic algorithms for solving optimization problems that has attracted the attention of researchers in recent years. The BWO algorithm tries to optimize the search space and achieve optimal solutions by simulating the collective behavior of whales. A study and review of published articles on the BWO algorithm show that this algorithm has been used in various fields, including optimization of mathematical functions, engineering problems, and even problems related to artificial intelligence. In this article, the BWO algorithm is classified according to four categories (combination, improvement, variants, and optimization). An analysis of 151 papers shows that the BWO algorithm has the highest percentage (49%) in the improvement field. The combination, variants, and optimization fields comprise 12%, 7%, and 32%, respectively.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100740"},"PeriodicalIF":13.3,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143529171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diptadip Maiti , Madhuchhanda Basak , Debashis Das
{"title":"A review on fingerprint based authentication-its challenges and applications","authors":"Diptadip Maiti , Madhuchhanda Basak , Debashis Das","doi":"10.1016/j.cosrev.2025.100735","DOIUrl":"10.1016/j.cosrev.2025.100735","url":null,"abstract":"<div><div>In digital era, human authentication and identification mostly relies on biometric traits of an individual. Amongst different biometrics, fingerprint has been playing a crucial role and employing as fundamental evidence due to some of its inherent properties. Moreover, it establishes itself as the strongest verification component in several applications like – court of law, criminal and forensic investigations. In the present study we primarily focus on various application domains of fingerprint based identification systems. We also highlight the different challenges and security threats that the system may encounter during its implementation. The review analyses the state of the art methods with its technical details along with their implementation and security issues which lead to a thematic analysis of the literature. To facilitate a better comprehension towards the system, we also provide a few fundamental knowledge on fingerprint datasets and system performance measures. Finally, the future prospects of fingerprint biometric in the identification system are highlighted.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100735"},"PeriodicalIF":13.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143487843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan P. Martinez-Esteso, Francisco J. Castellanos, Jorge Calvo-Zaragoza, Antonio Javier Gallego
{"title":"Maritime search and rescue missions with aerial images: A survey","authors":"Juan P. Martinez-Esteso, Francisco J. Castellanos, Jorge Calvo-Zaragoza, Antonio Javier Gallego","doi":"10.1016/j.cosrev.2025.100736","DOIUrl":"10.1016/j.cosrev.2025.100736","url":null,"abstract":"<div><div>The speed of response by search and rescue teams at sea is of vital importance, as survival may depend on it. Recent technological advancements have led to the development of more efficient systems for locating individuals involved in a maritime incident, such as the use of Unmanned Aerial Vehicles (UAVs) equipped with cameras and other integrated sensors. Over the past decade, several researchers have contributed to the development of automatic systems capable of detecting people using aerial images, particularly by leveraging the advantages of deep learning. In this article, we provide a comprehensive review of the existing literature on this topic. We analyze the methods proposed to date, including both traditional techniques and more advanced approaches based on machine learning and neural networks. Additionally, we take into account the use of synthetic data to cover a wider range of scenarios without the need to deploy a team to collect data, which is one of the major obstacles for these systems. Overall, this paper situates the reader in the field of detecting people at sea using aerial images by quickly identifying the most suitable methodology for each scenario, as well as providing an in-depth discussion and direction for future trends.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100736"},"PeriodicalIF":13.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143487844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design practices in visualization driven data exploration for non-expert audiences","authors":"Natasha Tylosky, Antti Knutas, Annika Wolff","doi":"10.1016/j.cosrev.2025.100731","DOIUrl":"10.1016/j.cosrev.2025.100731","url":null,"abstract":"<div><div>Data exploration is increasingly relevant to the average person in our data-driven world, as data is now often open source and available to the general public and other non-expert users via open data portals and other similar data sources. This has introduced the need for data exploration tools, methods and techniques to engage non-expert users in data exploration, and thus a proliferation of new research in the field of Human Computer Interaction (HCI) that relates to engaging non-expert audiences with data. In particular data exploration that contains a data visualization component can be useful for making data understandable and engaging for non-expert audiences.</div><div>Currently, the range of design practices most commonly used in the field of HCI to engage non-expert audiences in data exploration that includes a visualization component has yet to be formalized or given a comprehensive overview. This paper is a systematic mapping study (SMS) which aims to fill that gap by analyzing design trends engaging non-expert audiences in visualization driven data exploration via interactive systems, providing an overview of existing design practices and engagement methods, as well as set of three recommendations for how future designers can best engage non-expert audiences in visualization driven data exploration.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100731"},"PeriodicalIF":13.3,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143387411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}