Editorial Board
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic
Fast energy estimation framework for long-running applications
Energy and performance improvements in stencil computations on multi-node HPC systems with different network and communication topologies
Cross-MapReduce: Data transfer reduction in geo-distributed MapReduce
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers
ASiMOV: A self-protecting control application for the smart factory
Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis
Improving malicious PDF classifier with feature engineering: A data-driven approach
Improving I/O performance in distributed file systems for flash-based SSDs by access pattern reshaping
NDN-based IoT with Edge computing
LEChain: A blockchain-based lawful evidence management scheme for digital forensics
Time–frequency analysis of keystroke dynamics for user authentication
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures
Applying k-vertex cardinality constraints on a Neo4j graph database
Functional-realistic CT image super-resolution for early-stage pulmonary nodule detection
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment
Efficient verifiable databases with additional insertion and deletion operations in cloud computing
Enforcing situation-aware access control to build malware-resilient file systems
RIOMS: An intelligent system for operation and maintenance of urban roads using spatio-temporal data in smart cities
Unified programming concepts for unobtrusive integration of cloud-based and local parallel computing
Knowledge hypergraph-based approach for data integration and querying: Application to Earth Observation
Ontology based recommender system using social network data
A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing
Finding rising stars through hot topics detection
Designing large quantum key distribution networks via medoid-based algorithms
Reliability in volunteer computing micro-blogging services
Configurable DSI partitioned approximate multiplier
Multiple cloud storage mechanism based on blockchain in smart homes
Adaptive and aggressive transport protocol to provide QoS in cloud data exchange over Long Fat Networks
Editorial for FGCS special issue: Computation Intelligence for Energy Internet
An automatic multi-view disease detection system via Collective Deep Region-based Feature Representation
Estimation of laryngeal closure duration during swallowing without invasive X-rays
Alzheimer’s disease progression detection model based on an early fusion of cost-effective multimodal data
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework
Resilient composition of drone services for delivery
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS
TagSNP-set selection for genotyping using integrated data
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare
LoRaMoto: A communication system to provide safety awareness among civilians after an earthquake
Intelligent edge computing based on machine learning for smart city
Information flow perception modeling and optimization of Internet of Things for cloud services
Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities
Autonomous mitigation of cyber risks in the Cyber–Physical Systems
Design and Implementation of Self-Protecting systems: A Formal Approach
Susceptible user search for defending opinion manipulation
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection
Internet of things forensic data analysis using machine learning to identify roots of data scavenging
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network
Intelligent human hand gesture recognition by local–global fusing quality-aware features
How opinion distortion appears in super-influencer dominated social network
The application research of neural network and BP algorithm in stock price pattern classification and prediction
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields
SDN-based cyber defense: A survey
An architecture to manage security operations for digital service chains
Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms
A novel Machine Learning-based approach for the detection of SSH botnet infection
Predictive methods in cyber defense: Current experience and research challenges
A survey on security and privacy of federated learning
Event prediction based on evolutionary event ontology knowledge
EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization
Mutual teaching for graph convolutional networks