{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T13:58:30Z","timestamp":1776866310222,"version":"3.51.2"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T00:00:00Z","timestamp":1558656000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T00:00:00Z","timestamp":1558656000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-019-01279-7","type":"journal-article","created":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T09:04:11Z","timestamp":1558688651000},"page":"1265-1268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Editorial: Securing Internet of Things Through Big Data Analytics"],"prefix":"10.1007","volume":"24","author":[{"given":"Muhammad","family":"Alam","sequence":"first","affiliation":[]},{"given":"Ting","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fazl","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Yuanfang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,24]]},"reference":[{"issue":"9","key":"1279_CR1","doi-asserted-by":"publisher","first-page":"4045","DOI":"10.1109\/TII.2018.2825998","volume":"14","author":"P Bartolomeu","year":"2018","unstructured":"Bartolomeu P, Alam M, Ferreira J, Fonseca JA (2018) Supporting deterministic wireless communications in industrial IoT. IEEE Trans Ind Inf 14(9):4045\u20134054. \n                              https:\/\/doi.org\/10.1109\/tii.2018.2825998","journal-title":"IEEE Trans Ind Inf"},{"key":"1279_CR2","doi-asserted-by":"publisher","unstructured":"Fan L, Sun W, Feng G (2018) Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mobile Networks and Applications. \n                              https:\/\/doi.org\/10.1007\/s11036-018-1167-z","DOI":"10.1007\/s11036-018-1167-z"},{"key":"1279_CR3","doi-asserted-by":"publisher","unstructured":"Liu J, Li M, Alam M, Chen Y, Wu T (2019) A game theoretic reward and punishment unwanted traffic control mechanism. Mobile Networks and Applications. \n                              https:\/\/doi.org\/10.1007\/s11036-018-1166-0","DOI":"10.1007\/s11036-018-1166-0"},{"key":"1279_CR4","doi-asserted-by":"publisher","unstructured":"Jan SRU, Jan MA, Khan R, Ullah H, Alam M, Usman M (2018) An energy-efficient and congestion control data-driven approach for cluster-based sensor network. Mobile Networks and Applications. \n                              https:\/\/doi.org\/10.1007\/s11036-018-1169-x","DOI":"10.1007\/s11036-018-1169-x"},{"key":"1279_CR5","doi-asserted-by":"publisher","unstructured":"Khan H, Jan MA, Alam M, Dghais W (2018) A channel borrowing approach for cluster-based hierarchical wireless sensor networks. Mobile Networks and Applications. \n                              https:\/\/doi.org\/10.1007\/s11036-018-1171-3","DOI":"10.1007\/s11036-018-1171-3"},{"key":"1279_CR6","doi-asserted-by":"publisher","unstructured":"Alam M, Rodriguez J (2010) A dual head clustering mechanism for energy efficient WSNs. Mobile Lightweight Wireless Syst, 380\u2013387. \n                              https:\/\/doi.org\/10.1007\/978-3-642-16644-0_33","DOI":"10.1007\/978-3-642-16644-0_33"},{"key":"1279_CR7","doi-asserted-by":"publisher","unstructured":"Hu W, Yao Y, Zhou D, Zheng Q, Choo K-KR (2018) A novel image secret sharing scheme without third-party scrambling method. Mobile Networks and Applications. \n                              https:\/\/doi.org\/10.1007\/s11036-018-1168-y","DOI":"10.1007\/s11036-018-1168-y"},{"key":"1279_CR8","doi-asserted-by":"publisher","unstructured":"Cong G, Lu D, Lv Y, He Y (2018) A novel industrial safety IoTs architecture for external corrosion perception based on infrared. Mobile Networks and Applications. \n                              https:\/\/doi.org\/10.1007\/s11036-018-1170-4","DOI":"10.1007\/s11036-018-1170-4"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01279-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01279-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01279-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T23:13:15Z","timestamp":1590189195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01279-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,24]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1279"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01279-7","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,24]]},"assertion":[{"value":"24 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}