Editorial Board
CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms
System delay optimization for Mobile Edge Computing
A game-theoretic approach for cost-aware load balancing in distributed systems
A knowledge-based deep learning method for ECG signal delineation
Desynchronization in distributed Ant Colony Optimization in HPC environment
Economic feasibility of virtual operators in 5G via network slicing
An effective random statistical method for Indoor Positioning System using WiFi fingerprinting
Detection of time series patterns and periodicity of cloud computing workloads
An accurate and efficient web service QoS prediction model with wide-range awareness
Adaptive learning of aggregate analytics under dynamic workloads
Grouping sentences as better language unit for extractive text summarization
A new approach in reject inference of using ensemble learning based on global semi-supervised framework
Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios
On Byzantine fault tolerance in multi-master Kubernetes clusters
A methodology for the design and deployment of distributed cyber–physical systems for smart environments
Deep reinforcement learning for traffic signal control under disturbances: A case study on Sunway city, Malaysia
A methodology for conducting efficient sanitization of HTTP training datasets
MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot
IoT device location information storage system based on blockchain
Task optimization and scheduling of distributed cyber–physical system based on improved ant colony algorithm
Path prediction in IoT systems through Markov Chain algorithm
A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics
Automated classification of social network messages into Smart Cities dimensions
A hybrid model-free approach for the near-optimal intrusion response control of non-stationary systems
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Analysis of healthcare big data
Sleep staging by bidirectional long short-term memory convolution neural network
A network-based method with privacy-preserving for identifying influential providers in large healthcare service systems
IoMT-based computational approach for detecting brain tumor
G-SEAP: Analyzing and characterizing soft-error aware approximation in GPGPUs
Feature data processing: Making medical data fit deep neural networks
Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme
An efficient data integrity auditing protocol for cloud computing
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging
Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control
Community-Centric Brokerage-Aware Access Control for Online Social Networks
Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm
Optimization of privacy-utility trade-offs under informational self-determination
Smart vehicle forensics: Challenges and case study
Private collaborative filtering under untrusted recommender server
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks
iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone
MR-I MaxMin-scalable two-phase border based knowledge hiding technique using MapReduce
Fine-grained access control based on Trusted Execution Environment
Find my trustworthy fogs: A fuzzy-based trust evaluation framework
A novel trust mechanism based on Fog Computing in Sensor–Cloud System
A parallelized disjunctive query based searchable encryption scheme for big data
SneakLeak+: Large-scale klepto apps analysis
QASEC: A secured data communication scheme for mobile Ad-hoc networks
Petri net-based methods for analyzing structural security in e-commerce business processes
Content-based multi-source encrypted image retrieval in clouds with privacy preservation
Hidden the true identity and dating characteristics based on quick private matching in mobile social networks
Special Issue on High Performance Services Computing and Internet Technologies
Smart heating in collaborative and reasoning-enabled housing units
Cloud toolkit for Provider assessment, optimized Application Cloudification and deployment on IaaS
Mission possible: Unify HPC and Big Data stacks towards application-defined blobs at the storage layer
Seamless computing in industrial systems using container orchestration
Enhancing performance of IoT applications with load prediction and cloud elasticity
Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention
Special Issue on Fog and Cloud Computing for Cooperative Information System Management: Challenges and Opportunities
Cognitive-inspired Computing: Advances and Novel Applications
Special Issue: Intelligent Edge, Fog and Internet of Things (IoT)-based Services