{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:34:38Z","timestamp":1772645678793,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04147-2","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:41:14Z","timestamp":1752140474000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CAViaR Snow Leopard Optimization Algorithm for Multi-Objective IoT Service Placement Strategy in Fog Computing"],"prefix":"10.1007","volume":"6","author":[{"given":"A. R.","family":"Gopinath","sequence":"first","affiliation":[]},{"given":"R.","family":"Bhargava","sequence":"additional","affiliation":[]},{"given":"S.","family":"Swathi","sequence":"additional","affiliation":[]},{"given":"Abraham","family":"Rajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"key":"4147_CR1","doi-asserted-by":"publisher","unstructured":"Etemadi M, Ghobaei-Arani M, Shahidinejad A. Resource provisioning for IoT services in the fog computing environment: an autonomic approach. Comput Commun. Sep. 2020;161:109\u201331. https:\/\/doi.org\/10.1016\/J.COMCOM.2020.07.028.","DOI":"10.1016\/J.COMCOM.2020.07.028"},{"key":"4147_CR2","doi-asserted-by":"publisher","unstructured":"Lu S, et al. Resource provisioning in collaborative fog computing for multiple delay-sensitive users. Softw - Pract Exp. Feb. 2023;53(2):243\u201362. https:\/\/doi.org\/10.1002\/SPE.3000;JOURNAL:JOURNAL:1097024X;WGROUP:STRING:PUBLICATION.","DOI":"10.1002\/SPE.3000;JOURNAL:JOURNAL:1097024X;WGROUP:STRING:PUBLICATION"},{"key":"4147_CR3","doi-asserted-by":"publisher","unstructured":"Khosroabadi F, Fotouhi-Ghazvini F, Fotouhi H. SCATTER: Service Placement in Real-Time Fog-Assisted IoT Networks, J. Sens. Actuator Networks 2021, Vol. 10, Page 26, vol. 10, no. 2, p. 26, Apr. 2021. https:\/\/doi.org\/10.3390\/JSAN10020026","DOI":"10.3390\/JSAN10020026"},{"key":"4147_CR4","doi-asserted-by":"publisher","unstructured":"Santos J, Wauters T, Volckaert B, De Turck F. Towards end-to-end resource provisioning in fog computing over low power wide area networks. J Netw Comput Appl. Feb. 2021;175:102915. https:\/\/doi.org\/10.1016\/J.JNCA.2020.102915.","DOI":"10.1016\/J.JNCA.2020.102915"},{"key":"4147_CR5","doi-asserted-by":"publisher","unstructured":"Keshavarz Haddadha P, Rezvani MH, MollaMotalebi M, Shankar A. Machine learning methods for service placement: a systematic review. Artif Intell Rev. Mar. 2024;57(3):1\u201364. https:\/\/doi.org\/10.1007\/S10462-023-10684-0\/TABLES\/12.","DOI":"10.1007\/S10462-023-10684-0\/TABLES\/12"},{"issue":"5","key":"4147_CR6","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/TSC.2021.3075988","volume":"15","author":"H Sami","year":"2022","unstructured":"Sami H, Mourad A, Otrok H, Bentahar J. Demand-Driven deep reinforcement learning for scalable fog and service placement. IEEE Trans Serv Comput. 2022;15(5):2671\u201384. https:\/\/doi.org\/10.1109\/TSC.2021.3075988.","journal-title":"IEEE Trans Serv Comput"},{"key":"4147_CR7","doi-asserted-by":"publisher","unstructured":"Dogani J, Yazdanpanah A, Zare A, Khunjush F. A two-tier multi-objective service placement in container-based fog-cloud computing platforms. Cluster Comput. Jul. 2024;27(4):4491\u2013514. https:\/\/doi.org\/10.1007\/S10586-023-04183-8\/METRICS.","DOI":"10.1007\/S10586-023-04183-8\/METRICS"},{"key":"4147_CR8","doi-asserted-by":"publisher","unstructured":"Engle RF, Manganelli S. CAViaR, J. Bus. Econ. Stat. Oct. 2004;22(4):367\u2013381 https:\/\/doi.org\/10.1198\/073500104000000370","DOI":"10.1198\/073500104000000370"},{"key":"4147_CR9","doi-asserted-by":"publisher","unstructured":"Salaht FA, Desprez F, Lebre A, Prud\u2019Homme C, Abderrahim M. Service placement in fog computing using constraint programming, Proc.\u2013\u20092019 IEEE Int. Conf. Serv. Comput. SCC 2019 - Part 2019 IEEE World Congr. Serv. Jul. 2019;19\u201327 https:\/\/doi.org\/10.1109\/SCC.2019.00017","DOI":"10.1109\/SCC.2019.00017"},{"key":"4147_CR10","doi-asserted-by":"publisher","unstructured":"Vadde U, Kompalli VS. Energy efficient service placement in fog computing, PeerJ Comput. Sci. Jul. 2022;8:e1035 https:\/\/doi.org\/10.7717\/PEERJ-CS.1035\/SUPP-1","DOI":"10.7717\/PEERJ-CS.1035\/SUPP-1"},{"key":"4147_CR11","doi-asserted-by":"publisher","unstructured":"Apat HK, Sahoo B, Goswami V, Barik RK. A hybrid meta-heuristic algorithm for multi-objective IoT service placement in fog computing environments, Decis. Anal. J. Mar. 2024;10 https:\/\/doi.org\/10.1016\/J.DAJOUR.2023.100379","DOI":"10.1016\/J.DAJOUR.2023.100379"},{"key":"4147_CR12","doi-asserted-by":"publisher","unstructured":"Azizi S, Farzin P, Shojafar M, Rana O. A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. J Supercomput. Jan. 2024;80(1):1109\u201336. https:\/\/doi.org\/10.1007\/S11227-023-05520-9\/METRICS.","DOI":"10.1007\/S11227-023-05520-9\/METRICS"},{"key":"4147_CR13","doi-asserted-by":"publisher","unstructured":"Zare M, Elmi Sola Y, Hasanpour H. Towards distributed and autonomous IoT service placement in fog computing using asynchronous advantage actor-critic algorithm. J King Saud Univ - Comput Inf Sci. Jan. 2023;35(1):368\u201381. https:\/\/doi.org\/10.1016\/J.JKSUCI.2022.12.006.","DOI":"10.1016\/J.JKSUCI.2022.12.006"},{"key":"4147_CR14","doi-asserted-by":"publisher","unstructured":"Faraji-Mehmandar M, Ghobaei-Arani M, Shakarami A. A cost-aware IoT application deployment approach in fog computing. Cluster Comput. Jun. 2025;28(3):1\u201324. https:\/\/doi.org\/10.1007\/S10586-024-04873-X\/METRICS.","DOI":"10.1007\/S10586-024-04873-X\/METRICS"},{"key":"4147_CR15","doi-asserted-by":"publisher","unstructured":"Toghyani M, Khorsand R, Khaksar H. QoS-SLA-aware optimization framework for IoT-Service placement in integrated Fog-Cloud computing. J Grid Comput. Mar. 2025;23(1):1\u201337. https:\/\/doi.org\/10.1007\/S10723-024-09787-X\/METRICS.","DOI":"10.1007\/S10723-024-09787-X\/METRICS"},{"key":"4147_CR16","doi-asserted-by":"publisher","unstructured":"Wang M. Applications of deep learning techniques for predicting dynamic service location enhanced scheduling algorithm in foggy computing environment. Alexandria Eng J. Apr. 2025;117:183\u201392. https:\/\/doi.org\/10.1016\/J.AEJ.2024.12.092.","DOI":"10.1016\/J.AEJ.2024.12.092"},{"key":"4147_CR17","doi-asserted-by":"publisher","unstructured":"Pakpahan MSM, Nugroho LE, Widyawan. Comparative analysis of rule-based heuristic algorithms for microservice chain placement in fog computing. Results Eng. Mar. 2025;25:104299. https:\/\/doi.org\/10.1016\/J.RINENG.2025.104299.","DOI":"10.1016\/J.RINENG.2025.104299"},{"key":"4147_CR18","doi-asserted-by":"publisher","unstructured":"Baskar R, Mohanraj E, Saradha M, Monika R. Hybrid Prairie Dog and Dwarf Mongoose optimization algorithm-based application placement and resource scheduling technique for fog computing environment, Sci. Rep. Dec. 2025;15(1):1\u201325 https:\/\/doi.org\/10.1038\/S41598-025-85142-8","DOI":"10.1038\/S41598-025-85142-8"},{"key":"4147_CR19","doi-asserted-by":"publisher","unstructured":"Zhang SH, Wang JS, Zhang SW, Xing YX, Sui XF. Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning. Cluster Comput. Feb. 2025;28(1):1\u201322. https:\/\/doi.org\/10.1007\/S10586-024-04766-Z\/METRICS.","DOI":"10.1007\/S10586-024-04766-Z\/METRICS"},{"key":"4147_CR20","doi-asserted-by":"publisher","unstructured":"Coufal P, Hub\u00e1lovsk\u00fd \u0160, Hub\u00e1lovsk\u00e1 M, Balogh Z. Snow Leopard optimization algorithm: A new Nature-Based optimization algorithm for solving optimization problems. Math 2021. Nov. 2021;9(21):2832. https:\/\/doi.org\/10.3390\/MATH9212832. Page 2832.","DOI":"10.3390\/MATH9212832"},{"key":"4147_CR21","doi-asserted-by":"publisher","unstructured":"Natesha BV, Guddeti RMR. Adopting elitism-based genetic algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment. J Netw Comput Appl. Mar. 2021;178:102972. https:\/\/doi.org\/10.1016\/J.JNCA.2020.102972.","DOI":"10.1016\/J.JNCA.2020.102972"},{"key":"4147_CR22","doi-asserted-by":"publisher","unstructured":"Amgothu S, Koppu S. COVID-19 prediction using caviar squirrel jellyfish search optimization technique in fog-cloud based architecture. PLoS ONE. 2023;18. https:\/\/doi.org\/10.1371\/JOURNAL.PONE.0295599. 12 December, Dec.","DOI":"10.1371\/JOURNAL.PONE.0295599"},{"key":"4147_CR23","doi-asserted-by":"publisher","unstructured":"Hazra A, Rana P, Adhikari M, Amgoth T. Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges. Comput Sci Rev. May 2023;48:100549. https:\/\/doi.org\/10.1016\/J.COSREV.2023.100549.","DOI":"10.1016\/J.COSREV.2023.100549"},{"key":"4147_CR24","doi-asserted-by":"publisher","first-page":"33584","DOI":"10.1109\/ACCESS.2023.3262614","volume":"11","author":"I Gulatas","year":"2023","unstructured":"Gulatas I, Kilinc HH, Zaim AH, Aydin MA. Malware threat on edge\/fog computing environments from internet of things devices perspective. IEEE Access. 2023;11:33584\u2013606. https:\/\/doi.org\/10.1109\/ACCESS.2023.3262614.","journal-title":"IEEE Access"},{"key":"4147_CR25","doi-asserted-by":"publisher","unstructured":"Sharma P, Gupta PK. Optimization of IoT-Fog network path and fault tolerance in fog computing based environment. Procedia Comput Sci. Jan. 2023;218:2494\u2013503. https:\/\/doi.org\/10.1016\/J.PROCS.2023.01.224.","DOI":"10.1016\/J.PROCS.2023.01.224"},{"key":"4147_CR26","doi-asserted-by":"publisher","unstructured":"Pan S, Huang C, Fan J, Shi Z, Tong J, Wang H. Optimizing Internet of Things Fog Computing: Through Lyapunov-Based Long Short-Term Memory Particle Swarm Optimization Algorithm for Energy Consumption Optimization, Sensors 2024. Feb. 2024;24(1165) https:\/\/doi.org\/10.3390\/S24041165","DOI":"10.3390\/S24041165"},{"key":"4147_CR27","doi-asserted-by":"publisher","unstructured":"Yakubu IZ, Murali M. An efficient meta-heuristic resource allocation with load balancing in IoT-Fog-cloud computing environment, J. Ambient Intell. Humaniz. Comput. Mar. 2023;14(3):2981\u20132992 https:\/\/doi.org\/10.1007\/S12652-023-04544-6","DOI":"10.1007\/S12652-023-04544-6"},{"key":"4147_CR28","doi-asserted-by":"publisher","unstructured":"Hosseini SM, Shirvani MH, Motameni H. Multi-objective discrete cuckoo search algorithm for optimization of bag-of-tasks scheduling in fog computing environment. Comput Electr Eng. Oct. 2024;119:109480. https:\/\/doi.org\/10.1016\/J.COMPELECENG.2024.109480.","DOI":"10.1016\/J.COMPELECENG.2024.109480"},{"key":"4147_CR29","doi-asserted-by":"publisher","unstructured":"Sharma A, Thangaraj V. Intelligent service placement algorithm based on DDQN and prioritized experience replay in IoT-Fog computing environment. Internet Things. Apr. 2024;25:101112. https:\/\/doi.org\/10.1016\/J.IOT.2024.101112.","DOI":"10.1016\/J.IOT.2024.101112"},{"key":"4147_CR30","doi-asserted-by":"publisher","first-page":"41517","DOI":"10.1109\/ACCESS.2024.3377236","volume":"12","author":"SE Chafi","year":"2024","unstructured":"Chafi SE, Balboul Y, Fattah M, Mazer S, Bekkali ME. Novel PSO-Based algorithm for workflow time and energy optimization in a heterogeneous fog computing environment. IEEE Access. 2024;12:41517\u201330. https:\/\/doi.org\/10.1109\/ACCESS.2024.3377236.","journal-title":"IEEE Access"},{"key":"4147_CR31","doi-asserted-by":"publisher","unstructured":"Sulimani H, et al. Reinforcement optimization for decentralized service placement policy in IoT-centric fog environment. Trans Emerg Telecommun Technol. Nov. 2023;34(11):e4650. https:\/\/doi.org\/10.1002\/ETT.4650.","DOI":"10.1002\/ETT.4650"},{"key":"4147_CR32","doi-asserted-by":"publisher","unstructured":"Corthis PB, Ramesh GP, Garc\u00eda-Torres M, Ru\u00edz R. Effective identification and authentication of healthcare IoT using fog computing with hybrid cryptographic algorithm. Symmetry 2024. Jun. 2024;16(6):726. https:\/\/doi.org\/10.3390\/SYM16060726.","DOI":"10.3390\/SYM16060726"},{"key":"4147_CR33","doi-asserted-by":"publisher","unstructured":"Taghizadeh J, Ghobaei-Arani M, Shahidinejad A. An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment. J Ambient Intell Humaniz Comput. Apr. 2023;14(4):3691\u2013711. https:\/\/doi.org\/10.1007\/S12652-021-03495-0\/FIGURES\/6.","DOI":"10.1007\/S12652-021-03495-0\/FIGURES\/6"},{"key":"4147_CR34","doi-asserted-by":"publisher","unstructured":"Saad M, Enam RN, Qureshi R. Optimizing multi-objective task scheduling in fog computing with GA-PSO algorithm for big data application. Front Big Data. Feb. 2024;7:1358486. https:\/\/doi.org\/10.3389\/FDATA.2024.1358486\/BIBTEX.","DOI":"10.3389\/FDATA.2024.1358486\/BIBTEX"},{"key":"4147_CR35","doi-asserted-by":"publisher","unstructured":"Premkumar N, Santhosh R. Pelican optimization algorithm with blockchain for secure load balancing in fog computing. Multimed Tools Appl. May 2024;83(18):53417\u201339. https:\/\/doi.org\/10.1007\/S11042-023-17632-8\/METRICS.","DOI":"10.1007\/S11042-023-17632-8\/METRICS"},{"key":"4147_CR36","doi-asserted-by":"publisher","unstructured":"Bebortta S, Tripathy SS, Modibbo UM, Ali I. An optimal fog-cloud offloading framework for big data optimization in heterogeneous IoT networks. Decis Anal J. Sep. 2023;8:100295. https:\/\/doi.org\/10.1016\/J.DAJOUR.2023.100295.","DOI":"10.1016\/J.DAJOUR.2023.100295"},{"key":"4147_CR37","doi-asserted-by":"publisher","unstructured":"Mundada MR, Supreeth S, Gardiner B. Computer network and information security, 4, pp. 84\u201395, 2023, https:\/\/doi.org\/10.5815\/ijcnis.2023.04.08","DOI":"10.5815\/ijcnis.2023.04.08"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04147-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04147-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04147-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:41:15Z","timestamp":1752140475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04147-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,9]]},"references-count":37,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4147"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04147-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,9]]},"assertion":[{"value":"18 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"624"}}