{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:48:22Z","timestamp":1762876102760},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T00:00:00Z","timestamp":1557360000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11036-019-01267-x","type":"journal-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T07:13:46Z","timestamp":1557386026000},"page":"1414-1424","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["SAFER: Crowdsourcing Based Disaster Monitoring System Using Software Defined Fog Computing"],"prefix":"10.1007","volume":"24","author":[{"given":"Gunasekaran","family":"Raja","sequence":"first","affiliation":[]},{"given":"Anil","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,9]]},"reference":[{"key":"1267_CR1","unstructured":"UNISDR (2015) Annual report United Nations office of disaster risk reduction. Geneva, Switzerland"},{"key":"1267_CR2","unstructured":"Pu C, Kitsuregawa M (2013) Big data and disaster management: a report from the JST\/NSF joint workshop. Georgia Institute of Technology, CERCS, pp 1\u201328"},{"key":"1267_CR3","doi-asserted-by":"crossref","unstructured":"Uddin MY, Wang H, Saremi F, Qi GJ, Abdelzaher T, Huang T (2011) PhotoNet: a similarity-aware picture delivery service for situation awareness. In: IEEE 32nd real-time systems symposium, pp 317\u2013326","DOI":"10.1109\/RTSS.2011.36"},{"key":"1267_CR4","doi-asserted-by":"crossref","unstructured":"Weinsberg U, Li Q, Taft N, Balachandran A, Sekar V, Iannaccone G, Seshan S (2012) CARE: content aware redundancy elimination for challenged networks. In: Proceedings of the 11th ACM workshop on hot topics in networks, pp 127\u2013132","DOI":"10.1145\/2390231.2390253"},{"key":"1267_CR5","doi-asserted-by":"publisher","unstructured":"Xu Z, Liu Y, Yen NY, Mei L, Luo X, Wei X, Hu C (2018) Crowdsourcing based description of urban emergency events using social media big data. IEEE Transactions on Cloud Computing. \nhttps:\/\/doi.org\/10.1109\/TCC.2016.2517638","DOI":"10.1109\/TCC.2016.2517638"},{"issue":"1","key":"1267_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TPDS.2018.2859930","volume":"30","author":"Pengfei Zuo","year":"2019","unstructured":"Zuo P, Hua Y, Sun Y, Liu X, Wu J, Guo Y, Xia W, Cao S, Feng D (2018) Bandwidth and energy efficient image sharing for situation awareness in disasters. IEEE Transactions on Parallel and Distributed Systems. \nhttps:\/\/doi.org\/10.1109\/tpds.2018.2859930","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1267_CR7","unstructured":"Preiss D (2015) How social media is helping nepal rebuild after two big earthquakes. \nhttps:\/\/goo.gl\/CbIMzT"},{"key":"1267_CR8","unstructured":"MacKenzie D (2013) Social media helps aid efforts after typhoon Haiyan. \nhttps:\/\/goo.gl\/yJMtns"},{"issue":"4","key":"1267_CR9","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1109\/COMST.2017.2717482","volume":"19","author":"AC Baktir","year":"2017","unstructured":"Baktir AC, Ozgovde A, Ersoy C (2017) How can edge computing benefit from software-defined networking: a survey, use cases, and future directions. IEEE Commun Surv Tutor 19(4):2359\u20132391","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"1267_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MCOM.2018.1700908","volume":"56","author":"Y Bi","year":"2018","unstructured":"Bi Y, Han G, Lin C, Deng Q, Guo L, Li F (2018) Mobility support for fog computing: an SDN approach. IEEE Commun Mag 56(5):53\u201359","journal-title":"IEEE Commun Mag"},{"key":"1267_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27\u201342","journal-title":"J Netw Comput Appl"},{"key":"1267_CR12","doi-asserted-by":"crossref","unstructured":"Aazam M, Huh E-N (2015) E-HAMC: leveraging fog computing for emergency alert service. In: IEEE International conference on pervasive computing and communication workshops (PerCom Workshops), pp 518\u2013523","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"1267_CR13","doi-asserted-by":"crossref","unstructured":"Rauniyar A, Engelstad P, Feng B, Thanh DV (2016) Crowdsourcing-based disaster management using fog computing in internet of things paradigm. In: 2016 IEEE 2nd international conference on collaboration and internet computing (CIC), pp 490\u2013494","DOI":"10.1109\/CIC.2016.074"},{"key":"1267_CR14","doi-asserted-by":"crossref","unstructured":"Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: Proceedings of the 2014 federated conference on computer science and information systems, pp 1\u20138","DOI":"10.15439\/2014F503"},{"key":"1267_CR15","doi-asserted-by":"crossref","unstructured":"Truong NB, Lee GM, Ghamri-Doudane Y (2015) Software defined networking-based vehicular Adhoc network with fog computing. In: IFIP\/IEEE international symposium on integrated network management (IM), pp 1202\u20131207","DOI":"10.1109\/INM.2015.7140467"},{"issue":"10","key":"1267_CR16","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TMM.2018.2855107","volume":"20","author":"B Poblete","year":"2018","unstructured":"Poblete B, Guzman J, Maldonado J, Tobar F (2018) Robust detection of extreme events using twitter: worldwide earthquake monitoring. IEEE Trans Multimed 20(10):2551\u20132561","journal-title":"IEEE Trans Multimed"},{"key":"1267_CR17","doi-asserted-by":"crossref","unstructured":"Lambrinos L (2015) On combining the internet of things with crowdsourcing in managing emergency situations. In: IEEE International conference on communications (ICC), pp 598\u2013603","DOI":"10.1109\/ICC.2015.7248387"},{"issue":"1-2","key":"1267_CR18","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1007\/s10479-018-2884-1","volume":"283","author":"Shuihua Han","year":"2018","unstructured":"Han S, Huang H, Luo Z, Foropon C (2018) Harnessing the power of crowdsourcing and Internet of Things in disaster response. Annals of Operations Research. \nhttps:\/\/doi.org\/10.1007\/s10479-018-2884-1","journal-title":"Annals of Operations Research"},{"issue":"5","key":"1267_CR19","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/JIOT.2015.2415035","volume":"2","author":"A Jian","year":"2015","unstructured":"Jian A, Xiaolin G, Zhehao W, Jianwei Y, Xin H (2015) A crowdsourcing assignment model based on mobile crowd sensing in the internet of things. IEEE Internet Things J 2(5):358\u201369","journal-title":"IEEE Internet Things J"},{"key":"1267_CR20","doi-asserted-by":"crossref","unstructured":"Avvenuti M, Cresci S, Marchetti A, Meletti C, Tesconi M (2014) EARS (earthquake alert and report system). In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining - KDD, pp 1749\u20131758","DOI":"10.1145\/2623330.2623358"},{"key":"1267_CR21","doi-asserted-by":"crossref","unstructured":"Modarresi A, Gangadhar S, Sterbenz JP (2017) A framework for improving network resilience using SDN and fog nodes. In: 9th International workshop on resilient networks design and modeling (RNDM), pp 1\u20137","DOI":"10.1109\/RNDM.2017.8093036"},{"key":"1267_CR22","doi-asserted-by":"crossref","unstructured":"Hakiri A, Sellami B, Patil P, Berthou P, Gokhale A (2017) Managing wireless fog networks using software-defined networking. In: IEEE\/ACS 14th international conference on computer systems and applications (AICCSA), pp 1149\u20131156","DOI":"10.1109\/AICCSA.2017.9"},{"key":"1267_CR23","doi-asserted-by":"crossref","unstructured":"Huang L, Li G, Wu J, Li L, Li J, Morello R (2016) Software-defined QoS provisioning for fog computing advanced wireless sensor networks. IEEE Sensors, pp 1\u20133","DOI":"10.1109\/ICSENS.2016.7808814"},{"issue":"6","key":"1267_CR24","first-page":"1","volume":"14","author":"J Howe","year":"2006","unstructured":"Howe J (2006) The rise of crowdsourcing. Wired Mag 14(6):1\u20134","journal-title":"Wired Mag"},{"issue":"5","key":"1267_CR25","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3390\/geosciences8050165","volume":"8","author":"M Yu","year":"2018","unstructured":"Yu M, Yang C, Li Y (2018) Big data in natural disaster management: a review. Geosciences 8(5):165","journal-title":"Geosciences"},{"key":"1267_CR26","doi-asserted-by":"crossref","unstructured":"Meier P (2012) Crisis mapping in action: how open source software and global volunteer networks are changing the World, one map at a time. Journal of Map & Geography Libraries: Advances in Geospatial Information, Collections & Archives","DOI":"10.1080\/15420353.2012.663739"},{"issue":"4","key":"1267_CR27","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/s12083-018-0689-2","volume":"12","author":"Anil Thomas","year":"2018","unstructured":"Anil T, Gunasekaran R (2018) FINDER: a D2D based critical communications framework for disaster management in 5G. Peer-to-Peer Netw Appl. \nhttps:\/\/doi.org\/10.1007\/s12083-018-0689-2","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1267_CR28","doi-asserted-by":"crossref","unstructured":"Havlik D, Egly M, Huber H, Kutschera P, Falgenhauer M, Cizek M (2013) Robust and trusted crowd-sourcing and crowd-tasking in the future internet. IFIP Advances in Information and Communication Technology, Environmental Software Systems Fostering Information Sharing, pp 164\u2013176","DOI":"10.1007\/978-3-642-41151-9_16"},{"key":"1267_CR29","unstructured":"UN-SPIDER (2014) Glossary, disaster management, \nhttp:\/\/www.un-spider.org\/glossary\/disaster-management-cycle"},{"key":"1267_CR30","first-page":"261","volume-title":"Lecture Notes in Computer Science","author":"Marta Poblet","year":"2014","unstructured":"Poblet M, Garc\u00eda-Cuesta E, Casanovas P (2014) Crowdsourcing tools for disaster management: a review of platforms and methods. Lecture Notes in Computer Science AI Approaches to the Complexity of Legal Systems, pp 261\u2013274"},{"key":"1267_CR31","doi-asserted-by":"crossref","unstructured":"Cameron MA, Power R, Robinson B, Yin J (2012) Emergency situation awareness from twitter for crisis management. In: Proceedings of the 21st international conference companion on World Wide Web - WWW 12 Companion, pp 695\u2013698","DOI":"10.1145\/2187980.2188183"},{"issue":"10","key":"1267_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0045924","volume":"7","author":"V Naroditskiy","year":"2012","unstructured":"Naroditskiy V, Rahwan I, Cebrian M, Jennings NR (2012) Verification in referral-based crowdsourcing. PLoS ONE 7(10):1\u20137","journal-title":"PLoS ONE"},{"issue":"4","key":"1267_CR33","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1924421.1924441","volume":"54","author":"JC Tang","year":"2011","unstructured":"Tang JC, Cebrian M, Giacobe NA, Kim HW, Kim T, Wickert DB (2011) Reflecting on the DARPA red balloon challenge. Commun ACM 54(4):78\u201385","journal-title":"Commun ACM"},{"key":"1267_CR34","unstructured":"Rameshwar D, Zongwei L, Meiling X, Samuel FW (2015) Developing an integration framework for crowdsourcing and internet of things with applications for disaster response. In: IEEE International conference on data science and data intensive systems. Sydney, pp 520\u2013524"},{"issue":"1","key":"1267_CR35","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TCSVT.2016.2564898","volume":"27","author":"R Gargees","year":"2017","unstructured":"Gargees R, Morago B, Pelapur R, Chemodanov D, Calyam P, Oraibi Z, Duan Y, Seetharaman G, Palaniappan K (2017) Incident-supporting visual cloud computing utilizing software-defined networking. IEEE Trans. Circ. Syst Video Technol 27(1):182\u2013 197","journal-title":"IEEE Trans. Circ. Syst Video Technol"},{"key":"1267_CR36","doi-asserted-by":"publisher","unstructured":"Sudha A, Dhananjay K, Mercy FJ, Gunasekaran R, Waleed E, Ali KB (2017) SDN-assisted efficient LTE-WiFi aggregation in next generation IoT networks. Future Generation Computer Systems. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.12.013","DOI":"10.1016\/j.future.2017.12.013"},{"key":"1267_CR37","unstructured":"Gupta H, Nath SB, Chakraborty S, Ghosh SK (2016) Sdfog: a software defined computing architecture for qos aware service orchestration over edge devices. arXiv:\n1609.01190"},{"issue":"1","key":"1267_CR38","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11277-016-3845-0","volume":"92","author":"S Tomovic","year":"2017","unstructured":"Tomovic S, Yoshigoe K, Maljevic I, Radusinovic I (2017) Software-defined fog network architecture for IoT. Wirel Pers Commun 92(1):181\u201396","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"1267_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MWC.2013.6549280","volume":"20","author":"L Gkatzikis","year":"2013","unstructured":"Gkatzikis L, Koutsopoulos I (2013) Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems. IEEE Wireless Commun 20(3):1\u20130","journal-title":"IEEE Wireless Commun"},{"key":"1267_CR40","doi-asserted-by":"crossref","unstructured":"Lantz B, Heller B, McKeown N (2010) A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM workshop on hot topics in networks, p 19","DOI":"10.1145\/1868447.1868466"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01267-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01267-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01267-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T23:15:40Z","timestamp":1588893340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01267-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,9]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["1267"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01267-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,9]]},"assertion":[{"value":"9 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}