{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:23:34Z","timestamp":1761805414626},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T00:00:00Z","timestamp":1555977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00607-019-00719-2","type":"journal-article","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T08:04:34Z","timestamp":1556093074000},"page":"725-727","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Special issue \u201cInternet of Things (IoT)-based Services\u201d"],"prefix":"10.1007","volume":"101","author":[{"given":"Fatos","family":"Xhafa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,23]]},"reference":[{"key":"719_CR1","doi-asserted-by":"publisher","unstructured":"Zhang P, Durresi M, Durresi A (2018) Multi-access edge computing aided mobility for privacy protection in internet of things. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0639-0","DOI":"10.1007\/s00607-018-0639-0"},{"key":"719_CR2","doi-asserted-by":"publisher","unstructured":"Kayes ASM, Rahayu W, Dillon T (2018) Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0654-1","DOI":"10.1007\/s00607-018-0654-1"},{"key":"719_CR3","doi-asserted-by":"publisher","unstructured":"Wang XA, Liu Y, Sangaiah AK, Zhang J (2018) Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0641-6","DOI":"10.1007\/s00607-018-0641-6"},{"key":"719_CR4","doi-asserted-by":"publisher","unstructured":"Alshehri MD, Hussain FK (2018) A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT). Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0685-7","DOI":"10.1007\/s00607-018-0685-7"},{"key":"719_CR5","doi-asserted-by":"publisher","unstructured":"Amato F, Cozzolino G, Mazzeo A, Moscato F (2018) Detect and correlate information system events through verbose logging messages analysis. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0662-1","DOI":"10.1007\/s00607-018-0662-1"},{"key":"719_CR6","doi-asserted-by":"publisher","unstructured":"Khan ZA, Latif G, Sher A, Usman I, Ashraf M, Ilahi M, Javaid N (2019) Efficient routing for corona based underwater wireless sensor networks. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0690-x","DOI":"10.1007\/s00607-018-0690-x"},{"key":"719_CR7","doi-asserted-by":"publisher","unstructured":"Bosmans S, Mercelis S, Denil J, Hellinckx P (2018) Testing IoT systems using a hybrid simulation based testing approach. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0650-5","DOI":"10.1007\/s00607-018-0650-5"},{"key":"719_CR8","doi-asserted-by":"publisher","unstructured":"de Hoog J, Janssens A, Mercelis S, Hellinckx P (2018) Towards a distributed real-time hybrid simulator for autonomous vehicles. Computing. \n                    https:\/\/doi.org\/10.1007\/s00607-018-0649-y","DOI":"10.1007\/s00607-018-0649-y"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00719-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-019-00719-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00719-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T23:27:59Z","timestamp":1587511679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-019-00719-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,23]]},"references-count":8,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["719"],"URL":"https:\/\/doi.org\/10.1007\/s00607-019-00719-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,23]]},"assertion":[{"value":"23 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}