{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:07:24Z","timestamp":1773950844985,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T00:00:00Z","timestamp":1561766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T00:00:00Z","timestamp":1561766400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-019-01314-7","type":"journal-article","created":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T07:15:13Z","timestamp":1561792513000},"page":"1135-1138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Editorial: Mobile Networks in the Era of Big Data"],"prefix":"10.1007","volume":"24","author":[{"given":"Vijayakumar","family":"Varadarajan","sequence":"first","affiliation":[]},{"given":"Venkataraman","family":"Neelanarayanan","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Doyle","sequence":"additional","affiliation":[]},{"given":"Imad Fakhri","family":"Al-Shaikhli","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Groppe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"1314_CR1","doi-asserted-by":"publisher","unstructured":"Preethi GA, Gauthamarayathirumal P, Chandrasekar C (2019) Vertical handover analysis using modified MADM method in LTE. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01251-5","DOI":"10.1007\/s11036-019-01251-5"},{"key":"1314_CR2","doi-asserted-by":"publisher","unstructured":"Lavanya S, SaravanaKumar NM, Vijayakumar V, Thilagam S (2019) Secure key management scheme for multicast network using graphical password. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01252-4","DOI":"10.1007\/s11036-019-01252-4"},{"key":"1314_CR3","doi-asserted-by":"publisher","unstructured":"Prabha MS, Sarojini B (2019) Online healthcare information adoption assessment using text mining techniques. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01253-3","DOI":"10.1007\/s11036-019-01253-3"},{"key":"1314_CR4","doi-asserted-by":"publisher","unstructured":"Rajkumar S, Malathi G (2019) Impact of image artifact and solution to the image quality issues in real time SAR images. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01254-2","DOI":"10.1007\/s11036-019-01254-2"},{"key":"1314_CR5","doi-asserted-by":"publisher","unstructured":"Bharathiraja S, Rajesh Kanna B (2019) Anti-forensics contrast enhancement detection (AFCED) technique in images based on laplace derivative histogram. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01255-1","DOI":"10.1007\/s11036-019-01255-1"},{"key":"1314_CR6","doi-asserted-by":"publisher","unstructured":"Md AQ, Varadarajan V, Mandal K (2019) Efficient algorithm for identification and cache based discovery of cloud services. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01256-0","DOI":"10.1007\/s11036-019-01256-0"},{"key":"1314_CR7","doi-asserted-by":"publisher","unstructured":"Md AQ, Varadarajan V, Mandal K (2019) Correction to: efficient algorithm for identification and cache based discovery of cloud services. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01280-0","DOI":"10.1007\/s11036-019-01280-0"},{"key":"1314_CR8","doi-asserted-by":"publisher","unstructured":"Joshua CJ, Duraisamy R, Varadarajan V (2019) A reputation based weighted clustering protocol in VANET: a multi-objective firefly approach. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01257-z","DOI":"10.1007\/s11036-019-01257-z"},{"key":"1314_CR9","doi-asserted-by":"publisher","unstructured":"Klug N, Chauhan A, V V, Ragala R (2019) K-RNN: extending NN-heuristics for the TSP. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01258-y","DOI":"10.1007\/s11036-019-01258-y"},{"key":"1314_CR10","doi-asserted-by":"publisher","unstructured":"J P, Venkataraman N (2019) Threshold based multi-objective memetic optimized round Robin scheduling for resource efficient load balancing in cloud. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01259-x","DOI":"10.1007\/s11036-019-01259-x"},{"key":"1314_CR11","doi-asserted-by":"publisher","unstructured":"Ravi L, Subramaniyaswamy V, Vijayakumar V, Chen S, Karmel A, Devarajan M (2019) Hybrid location-based recommender system for mobility and travel planning. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01260-4","DOI":"10.1007\/s11036-019-01260-4"},{"key":"1314_CR12","doi-asserted-by":"publisher","unstructured":"Joseph L, Mukesh R (2019) Securing and self recovery of virtual machines in cloud with an autonomic approach using snapshots. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01261-3","DOI":"10.1007\/s11036-019-01261-3"},{"key":"1314_CR13","doi-asserted-by":"publisher","unstructured":"Ajay DM, Umamaheswari E (2019) Packet encryption for securing real-time Mobile cloud applications. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01263-1","DOI":"10.1007\/s11036-019-01263-1"},{"key":"1314_CR14","doi-asserted-by":"publisher","unstructured":"Ali MNM, Rahman MMH, Nor RM, Behera DK, Sembok TMT, Miura Y, Inoguchi Y (2019) SCCN: a time-effective hierarchical interconnection network for network-on-Chip. Mob Netw Appl. \n                              https:\/\/doi.org\/10.1007\/s11036-019-01262-2","DOI":"10.1007\/s11036-019-01262-2"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01314-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01314-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01314-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T23:14:00Z","timestamp":1593299640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01314-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,29]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1314"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01314-7","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,29]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}