Editorial Board
Model-based sensitivity analysis of IaaS cloud availability
A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing
Efficient hybrid multicast approach in wireless data center network
LayerMover: Fast virtual machine migration over WAN with three-layer image structure
Serverless computing for container-based architectures
A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds
3D visual discomfort predictor based on subjective perceived-constraint sparse representation in 3D display system
Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments
Matching user accounts based on user generated content across social networks
An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications
A tree search algorithm for low multiplicative complexity logic design
JobPruner: A machine learning assistant for exploring parameter spaces in HPC applications
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions
Research on access control model of social network based on distributed logic
Dynamic metric embedding model for point-of-interest prediction
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
Fog-based storage technology to fight with cyber threat
In-memory big data analytics under space constraints using dynamic programming
AODV routing protocol for Cognitive radio access based Internet of Things (IoT)
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres
HEPart: A balanced hypergraph partitioning algorithm for big data applications
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things
Personalized location prediction for group travellers from spatial–temporal trajectories
DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing
An efficient latency monitoring scheme in software defined networks
Multi-scale image fusion through rolling guidance filter
On security challenges and open issues in Internet of Things
Super-resolution of retinal images using multi-kernel SVR for IoT healthcare applications
Energy-efficient virtual content distribution network provisioning in cloud-based data centers
SocioScope: A framework for understanding Internet of Social Knowledge
Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease
Measurements and security of complex networks and systems: Research advances and challenges
DPRank centrality: Finding important vertices based on random walks with a new defined transition matrix
Correlation of cascade failures and centrality measures in complex networks
Centrality measures for evacuation: Finding agile evacuation routes
QRE: Quick Robustness Estimation for large complex networks
An insertion–deletion–compensation model with Poisson process for scale-free networks
Analyzing the structure of Java software systems by weighted K-core decomposition
A conditional edge connectivity of double-orbit networks
Spectrum bounds for the scattering number, integrity, tenacity of regular graphs
Multipolarization versus unification in community networks
Symmetric graphs and interconnection networks
Model matching of input/output asynchronous sequential machines based on the semi-tensor product of matrices
Rigorous or tolerant: The effect of different reputation attitudes in complex networks
Information reliability in complex multitask networks
Correlation power analysis of modes of encryption in AES and its countermeasures
Hardware design and modeling of lightweight block ciphers for secure communications
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps
Dynamic risk management response system to handle cyber threats
Monitoring of pet animal in smart cities using animal biometrics
Rule acquisition and optimal scale selection in multi-scale formal decision contexts and their applications to smart city
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining
Cloud-assisted secure video transmission and sharing framework for smart cities
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
Real-time secure communication for Smart City in high-speed Big Data environment
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city