{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T07:26:59Z","timestamp":1766820419725,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:00:00Z","timestamp":1637971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:00:00Z","timestamp":1637971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10586-021-03472-4","type":"journal-article","created":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T17:02:31Z","timestamp":1638032551000},"page":"71-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing"],"prefix":"10.1007","volume":"26","author":[{"given":"Romany F.","family":"Mansour","sequence":"first","affiliation":[]},{"given":"S.","family":"Abdel-Khalek","sequence":"additional","affiliation":[]},{"given":"In\u00e8s","family":"Hilali-Jaghdam","sequence":"additional","affiliation":[]},{"given":"Jamel","family":"Nebhen","sequence":"additional","affiliation":[]},{"given":"Woong","family":"Cho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5446-288X","authenticated-orcid":false,"given":"Gyanendra Prasad","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,27]]},"reference":[{"key":"3472_CR1","doi-asserted-by":"publisher","first-page":"136119","DOI":"10.1109\/ACCESS.2020.3011477","volume":"8","author":"Y Hou","year":"2020","unstructured":"Hou, Y., Garg, S., Hui, L., Jayakody, D.N.K., Jin, R., Hossain, M.S.: A data security enhanced access control mechanism in mobile edge computing. IEEE Access 8, 136119\u2013136130 (2020)","journal-title":"IEEE Access"},{"key":"3472_CR2","doi-asserted-by":"crossref","unstructured":"Shafiq, M., Tian, Z., Bashir, A.K., Jolfaei, A., Yu, X.: Data mining and machine learning methods for anomaly and intrusion traffic classification: a survey. Sustain. Cities Soc. Elsevier (2020)","DOI":"10.1016\/j.scs.2020.102177"},{"key":"3472_CR3","doi-asserted-by":"crossref","unstructured":"Khan, S., Kifayat, K., Bashir, A.K., Gurtov, A., Hassan. M.: Intelligent intrusion detection system in smart grid using computational intelligence and machine learning. Trans. Emerg. Telecommun. Technol. (2020)","DOI":"10.1002\/ett.4062"},{"key":"3472_CR4","unstructured":"Ma, X.Y.: Research on trusted cooperative mechanism based on edge computing, M.S. thesis, Dept. Abbrev., Beijing Univ. Posts Telecommun., Beijing, China (2019)"},{"key":"3472_CR5","doi-asserted-by":"crossref","unstructured":"Bashir, A.K., Arul, R., Jayaram, R., Arulappan, A., Prathiba, S.B.: An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Transactions on Emerging Telecommunications Technologies, Wiley (2019)","DOI":"10.1002\/ett.3627"},{"key":"3472_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.future.2020.08.037","volume":"115","author":"Z Lv","year":"2021","unstructured":"Lv, Z., Chen, D., Lou, R., Wang, Q.: Intelligent edge computing based on machine learning for smart city. Futur. Gener. Comput. Syst. 115, 90\u201399 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3472_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00303-y","volume":"7","author":"P P\u00e4\u00e4kk\u00f6nen","year":"2020","unstructured":"P\u00e4\u00e4kk\u00f6nen, P., Pakkala, D.: Extending reference architecture of big data systems towards machine learning in edge computing environments. J. Big Data 7, 1\u201329 (2020)","journal-title":"J. Big Data"},{"issue":"5","key":"3472_CR8","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1109\/JIOT.2020.3002255","volume":"8","author":"M Shafiq","year":"2021","unstructured":"Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine learning techniques. IEEE Internet Things J. 8(5), 3242\u20133254 (2021)","journal-title":"IEEE Internet Things J."},{"key":"3472_CR9","doi-asserted-by":"crossref","unstructured":"Cui, G., He, Q., Chen, F., Zhang, Y., Jin, H., Yang, Y.: Interference-aware game-theoretic device allocation for mobile edge computing.\u00a0IEEE Trans Mobile Comput (2021)","DOI":"10.1109\/TMC.2021.3064063"},{"issue":"1","key":"3472_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-021-00232-y","volume":"10","author":"Z Liao","year":"2021","unstructured":"Liao, Z., Peng, J., Xiong, B., Huang, J.: Adaptive offloading in mobile-edge computing for ultra-dense cellular networks based on genetic algorithm. J. Cloud Comput. 10(1), 1\u201316 (2021)","journal-title":"J. Cloud Comput."},{"issue":"2","key":"3472_CR11","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/TII.2019.2938861","volume":"16","author":"T Wang","year":"2019","unstructured":"Wang, T., Ke, H., Zheng, X., Wang, K., Sangaiah, A.K., Liu, A.: Big data cleaning based on mobile edge computing in industrial sensor-cloud. IEEE Trans. Industr. Inf. 16(2), 1321\u20131329 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"12","key":"3472_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCOM.2018.1700910","volume":"56","author":"Z Zhou","year":"2018","unstructured":"Zhou, Z., Yu, H., Xu, C., Chang, Z., Mumtaz, S., Rodriguez, J.: BEGIN: big data enabled energy-efficient vehicular edge computing. IEEE Commun. Mag. 56(12), 82\u201389 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"3472_CR13","doi-asserted-by":"crossref","unstructured":"Barik, R.K., Dubey, H., Mankodiya, K.: November. SOA-FOG: Secure service-oriented edge computing architecture for smart health big data analytics. In\u00a02017 IEEE global conference on signal and information processing (GlobalSIP), pp. 477\u2013481. IEEE (2017)","DOI":"10.1109\/GlobalSIP.2017.8308688"},{"key":"3472_CR14","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.future.2018.12.055","volume":"95","author":"X Xu","year":"2019","unstructured":"Xu, X., Liu, Q., Luo, Y., Peng, K., Zhang, X., Meng, S., Qi, L.: A computation offloading method over big data for IoT-enabled cloud-edge computing. Futur. Gener. Comput. Syst. 95, 522\u2013533 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3472_CR15","doi-asserted-by":"crossref","unstructured":"Hosseini, M.P., Tran, T.X., Pompili, D., Elisevich, K. Soltanian-Zadeh, H.: Deep learning with edge computing for localization of epileptogenicity using multimodal rs-fMRI and EEG big data. In\u00a02017 IEEE international conference on autonomic computing (ICAC), pp. 83\u201392. IEEE (2017)","DOI":"10.1109\/ICAC.2017.41"},{"issue":"3","key":"3472_CR16","doi-asserted-by":"publisher","first-page":"222","DOI":"10.26599\/BDMA.2018.9020020","volume":"1","author":"Q Meng","year":"2018","unstructured":"Meng, Q., Wang, K., He, X., Guo, M.: QoE-driven big data management in pervasive edge computing environment. Big Data Min. Anal. 1(3), 222\u2013233 (2018)","journal-title":"Big Data Min. Anal."},{"issue":"4","key":"3472_CR17","doi-asserted-by":"publisher","first-page":"2620","DOI":"10.1109\/TNSE.2020.3016569","volume":"7","author":"J Xu","year":"2020","unstructured":"Xu, J., Ota, K., Dong, M.: Big data on the Fly: UAV-mounted mobile edge computing for disaster management. IEEE Trans. Netw. Sci. Eng. 7(4), 2620\u20132630 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"3472_CR18","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s10586-020-03114-1","volume":"23","author":"DVK Vengala","year":"2020","unstructured":"Vengala, D.V.K., Kavitha, D., Kumar, A.S.: Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Clust. Comput. 23(3), 1683\u20131696 (2020)","journal-title":"Clust. Comput."},{"key":"3472_CR19","doi-asserted-by":"crossref","unstructured":"Mishra, S.K., Manjula, R.: A meta-heuristic based multi objective optimization for load distribution in cloud data center under varying workloads. Cluster Comput. 1\u201315 (2020)","DOI":"10.1007\/s10586-020-03071-9"},{"key":"3472_CR20","doi-asserted-by":"crossref","unstructured":"Subramanian, E.K., Tamilselvan, L.: Elliptic curve diffie\u2013hellman cryptosystem in big data cloud security. Cluster Comput. 1\u201311 (2020)","DOI":"10.1007\/s10586-020-03069-3"},{"issue":"2","key":"3472_CR21","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TBDATA.2016.2599926","volume":"6","author":"Z Zhang","year":"2016","unstructured":"Zhang, Z., Barbary, K., Nothaft, F.A., Sparks, E.R., Zahn, O., Franklin, M.J., Patterson, D.A., Perlmutter, S.: Kira: processing astronomy imagery using big data technology. IEEE Trans. Big Data 6(2), 369\u2013381 (2016)","journal-title":"IEEE Trans. Big Data"},{"issue":"2","key":"3472_CR22","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s00521-012-0939-9","volume":"23","author":"M Neshat","year":"2013","unstructured":"Neshat, M., Sepidnam, G., Sargolzaei, M.: Swallow swarm optimization algorithm: a new method to optimization. Neural Comput. Appl. 23(2), 429\u2013454 (2013)","journal-title":"Neural Comput. Appl."},{"key":"3472_CR23","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.compstruc.2014.07.012","volume":"143","author":"A Kaveh","year":"2014","unstructured":"Kaveh, A., Bakhshpoori, T., Afshari, E.: An efficient hybrid particle swarm and swallow swarm optimization algorithm. Comput. Struct. 143, 40\u201359 (2014)","journal-title":"Comput. Struct."},{"issue":"3","key":"3472_CR24","doi-asserted-by":"publisher","first-page":"578","DOI":"10.20965\/jaciii.2006.p0578","volume":"10","author":"HR Tizhoosh","year":"2006","unstructured":"Tizhoosh, H.R.: Opposition-based reinforcement learning. J. Adv. Comput. Intell Intell Inform. 10(3), 578\u2013585 (2006)","journal-title":"J. Adv. Comput. Intell Intell Inform."},{"issue":"7","key":"3472_CR25","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.3390\/s19071486","volume":"19","author":"A Gebrehiwot","year":"2019","unstructured":"Gebrehiwot, A., Hashemi-Beni, L., Thompson, G., Kordjamshidi, P., Langan, T.E.: Deep convolutional neural network for flood extent mapping using unmanned aerial vehicles data. Sensors 19(7), 1486 (2019)","journal-title":"Sensors"},{"key":"3472_CR26","unstructured":"UCI machine learning repository: Data sets, https:\/\/archive.ics.uci.edu\/ml\/datasets.php"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03472-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03472-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03472-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T14:12:42Z","timestamp":1677507162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03472-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,27]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3472"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03472-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2021,11,27]]},"assertion":[{"value":"5 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}}]}}