{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:04:14Z","timestamp":1777651454118,"version":"3.51.4"},"reference-count":76,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project","award":["RSP-2020\/184"],"award-info":[{"award-number":["RSP-2020\/184"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,11,30]]},"abstract":"<jats:p>The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frameworks have been developed for the military. Nonetheless, many of these frameworks fail to maintain a high Quality of Service (QoS) due to the demanding and critical nature of IoBT. This study makes the use of mist computing while leveraging machine learning. Mist computing places computational capabilities on the edge itself (mist nodes), e.g., on end devices, wearables, sensors, and micro-controllers. This way, mist computing not only decreases latency but also saves power consumption and bandwidth as well by eliminating the need to communicate all data acquired, produced, or sensed. A mist-based version of the IoTNetWar framework is also proposed in this study. The mist-based IoTNetWar framework is a four-layer structure that aims at decreasing latency while maintaining QoS. Additionally, to further minimize delays, mist nodes utilize machine learning. Specifically, they use the delay-based K nearest neighbour algorithm for device-to-device communication purposes. The primary research objective of this work is to develop a system that is not only energy, time, and bandwidth-efficient, but it also helps military organizations with time-critical and resources-critical scenarios to monitor troops. By doing so, the system improves the overall decision-making process in a military campaign or battle. The proposed work is evaluated with the help of simulations in the EdgeCloudSim. The obtained results indicate that the proposed framework can achieve decreased network latency of 0.01 s and failure rate of 0.25% on average while maintaining high QoS in comparison to existing solutions.<\/jats:p>","DOI":"10.1145\/3418204","type":"journal-article","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T19:20:07Z","timestamp":1630524007000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Machine Learning-based Mist Computing Enabled Internet of Battlefield Things"],"prefix":"10.1145","volume":"21","author":[{"given":"Huniya","family":"Shahid","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmad","family":"Almogren","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer and InformationSciences, King Saud University, Riyadh, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8198-9265","authenticated-orcid":false,"given":"Hasan Ali","family":"Khattak","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ikram Ud","family":"Din","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Haripur, Haripur, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Asia University Taiwan and Department of Computer Science and Engineering, Thapar University, Patiala, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[{"name":"Warwick Manufacturing Group, University of Warwick, Coventry, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2789437"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936156"},{"key":"e_1_2_1_3_1","first-page":"1","article-title":"A lightweight privacy-aware IoT-based metering scheme for smart industrial ecosystems","volume":"1","author":"Ali Wajahat","year":"2020","unstructured":"Wajahat Ali , Ikram Ud Din , Ahmad Almogren , Mohsen Guizani , and Mansour Zuair . 2020 . A lightweight privacy-aware IoT-based metering scheme for smart industrial ecosystems . IEEE Trans. Industr. Inf. 1 , 1 (2020), 1 \u2013 1 . Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2020. A lightweight privacy-aware IoT-based metering scheme for smart industrial ecosystems. IEEE Trans. Industr. Inf. 1, 1 (2020), 1\u20131.","journal-title":"IEEE Trans. Industr. Inf."},{"key":"e_1_2_1_4_1","first-page":"4049","article-title":"Towards a heterogeneous mist, fog, and cloud based framework for the Internet of Healthcare Things","volume":"6","author":"Asif-Ur-Rahman Md","year":"2018","unstructured":"Md Asif-Ur-Rahman , Fariha Afsana , Mufti Mahmud , M. Shamim Kaiser , Muhammad R. Ahmed , Omprakash Kaiwartya , and Anne James-Taylor . 2018 . Towards a heterogeneous mist, fog, and cloud based framework for the Internet of Healthcare Things . IEEE IoT J. 6 , 3 (2018), 4049 \u2013 4062 . Md Asif-Ur-Rahman, Fariha Afsana, Mufti Mahmud, M. Shamim Kaiser, Muhammad R. Ahmed, Omprakash Kaiwartya, and Anne James-Taylor. 2018. Towards a heterogeneous mist, fog, and cloud based framework for the Internet of Healthcare Things. IEEE IoT J. 6, 3 (2018), 4049\u20134062.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968948"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.083"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.2"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"e_1_2_1_10_1","volume-title":"Roundup of internet of things forecasts and market estimates","author":"Columbus Louis","year":"2016","unstructured":"Louis Columbus . 2016. Roundup of internet of things forecasts and market estimates , 2016 . Forbes Magazine. Retrieved fromhttps:\/\/www.forbes.com\/sites\/louiscolumbus\/2016\/11\/27\/roundup-ofinternet-of-things-forecasts-and-market-estimates-2016\/#81d22e292d51. Louis Columbus. 2016. Roundup of internet of things forecasts and market estimates, 2016. Forbes Magazine. Retrieved fromhttps:\/\/www.forbes.com\/sites\/louiscolumbus\/2016\/11\/27\/roundup-ofinternet-of-things-forecasts-and-market-estimates-2016\/#81d22e292d51."},{"key":"e_1_2_1_11_1","first-page":"1","article-title":"k-Nearest neighbour classifiers","volume":"34","author":"Cunningham Padraig","year":"2007","unstructured":"Padraig Cunningham and Sarah Jane Delany . 2007 . k-Nearest neighbour classifiers . Mult. Classif. Syst. 34 , 8 (2007), 1 \u2013 17 . Padraig Cunningham and Sarah Jane Delany. 2007. k-Nearest neighbour classifiers. Mult. Classif. Syst. 34, 8 (2007), 1\u201317.","journal-title":"Mult. Classif. Syst."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.245"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2489850.2489855"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.010"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927082"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886601"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.017"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"e_1_2_1_20_1","first-page":"26","article-title":"Security in military cloud computing applications. Sci","volume":"11","author":"Dul\u00edk Miroslav","year":"2016","unstructured":"Miroslav Dul\u00edk and Miroslav Dul\u00edk Junior . 2016 . Security in military cloud computing applications. Sci . Mil. J. 11 , 1 (2016), 26 . Miroslav Dul\u00edk and Miroslav Dul\u00edk Junior. 2016. Security in military cloud computing applications. Sci. Mil. J. 11, 1 (2016), 26.","journal-title":"Mil. J."},{"key":"e_1_2_1_21_1","volume-title":"The Internet of Things: How the Next Evolution of the Internet Is Changing Everything","author":"Evans Dave","year":"2011","unstructured":"Dave Evans . 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything , Cisco Independent Business Scientific Group White paper, Apr. 2011 ; 1\u201311. www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco Independent Business Scientific Group White paper, Apr. 2011; 1\u201311. www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481246"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427537"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16101644"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 6th International Information Security & Cryptology Conference","volume":"9","author":"Goztepe Kerim","unstructured":"Kerim Goztepe , Ismet Cehreli , and S. Eyup Sensoy . 2013. A decision framework for combat cloud computing strategy . In Proceedings of the 6th International Information Security & Cryptology Conference , Vol. 9 . Bildiriler Kitab\u0131, Ankara, Turkey, 28\u201331. Kerim Goztepe, Ismet Cehreli, and S. Eyup Sensoy. 2013. A decision framework for combat cloud computing strategy. In Proceedings of the 6th International Information Security & Cryptology Conference, Vol. 9. Bildiriler Kitab\u0131, Ankara, Turkey, 28\u201331."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_1_27_1","first-page":"42","article-title":"Fog computing pushing intelligence to the edge","volume":"3","author":"Gupta Monika","year":"2017","unstructured":"Monika Gupta . 2017 . Fog computing pushing intelligence to the edge . Int. J. Sci. Technol. Eng. 3 , 8 (2017), 42 \u2013 46 . Monika Gupta. 2017. Fog computing pushing intelligence to the edge. Int. J. Sci. Technol. Eng. 3, 8 (2017), 42\u201346.","journal-title":"Int. J. Sci. Technol. Eng."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102043"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054155"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20092468"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20072081"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700322"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.059"},{"key":"e_1_2_1_34_1","volume-title":"Mohsen Guizani, and Ayman Altameem.","author":"Islam Naveed","year":"2019","unstructured":"Naveed Islam , Khalid Haseeb , Ahmad Almogren , Ikram Ud Din , Mohsen Guizani, and Ayman Altameem. 2019 . A framework for topological based map building: A solution to autonomous robot navigation in smart cities. Fut. Gener. Comput. Syst . 100 (10 2019), 1\u201324. DOI:https:\/\/doi.org\/10.1016\/j.future.2019.10.036 Naveed Islam, Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Mohsen Guizani, and Ayman Altameem. 2019. A framework for topological based map building: A solution to autonomous robot navigation in smart cities. Fut. Gener. Comput. Syst. 100 (10 2019), 1\u201324. DOI:https:\/\/doi.org\/10.1016\/j.future.2019.10.036"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800512"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2018.8398690"},{"key":"e_1_2_1_37_1","first-page":"2620","article-title":"Perspective of decoy technique using mobile fog computing with effect to wireless environment","volume":"4","author":"Karekar Siddhesh P.","year":"2015","unstructured":"Siddhesh P. Karekar and Sachin M. Vaidya . 2015 . Perspective of decoy technique using mobile fog computing with effect to wireless environment . Int. J. Sci. Eng. Technol. Res. 4 , 14 (2015), 2620 \u2013 2626 . Siddhesh P. Karekar and Sachin M. Vaidya. 2015. Perspective of decoy technique using mobile fog computing with effect to wireless environment. Int. J. Sci. Eng. Technol. Res. 4, 14 (2015), 2620\u20132626.","journal-title":"Int. J. Sci. Eng. Technol. Res."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.054"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1395-3"},{"key":"e_1_2_1_40_1","volume-title":"Keromytis","author":"Kontaxis Georgios","year":"2014","unstructured":"Georgios Kontaxis , Michalis Polychronakis , and Angelos D . Keromytis . 2014 . Computational decoys for cloud security. In Secure Cloud Computing. Springer , New York, NY, 261\u2013270. Georgios Kontaxis, Michalis Polychronakis, and Angelos D. Keromytis. 2014. Computational decoys for cloud security. In Secure Cloud Computing. Springer, New York, NY, 261\u2013270."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.355"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010515"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.10.001"},{"key":"e_1_2_1_44_1","first-page":"310","article-title":"Coalition games for spatio-temporal big data in Internet of Vehicles environment: A comparative analysis","volume":"2","author":"Kumar Neeraj","year":"2015","unstructured":"Neeraj Kumar , Sudip Misra , Joel J. P. C. Rodrigues , and Mohammad S. Obaidat . 2015 . Coalition games for spatio-temporal big data in Internet of Vehicles environment: A comparative analysis . IEEE IoT J. 2 , 4 (2015), 310 \u2013 320 . Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, and Mohammad S. Obaidat. 2015. Coalition games for spatio-temporal big data in Internet of Vehicles environment: A comparative analysis. IEEE IoT J. 2, 4 (2015), 310\u2013320.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600228CM"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.014"},{"key":"e_1_2_1_47_1","first-page":"8887","article-title":"Application of fog computing in military operations","volume":"975","author":"Lanka Divya","year":"2017","unstructured":"Divya Lanka , Ch Lakshmi Veenadhari , and D. Suryanarayana . 2017 . Application of fog computing in military operations . Int. J. Comput. Appl. 975 (2017), 8887 . Divya Lanka, Ch Lakshmi Veenadhari, and D. Suryanarayana. 2017. Application of fog computing in military operations. Int. J. Comput. Appl. 975 (2017), 8887.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201900)","volume":"3","author":"Lin Ying-Dar","year":"2000","unstructured":"Ying-Dar Lin and Yu-Ching Hsu . 2000 . Multihop cellular: A new architecture for wireless communications . In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201900) , Vol. 3 . IEEE, 1273\u20131282. Ying-Dar Lin and Yu-Ching Hsu. 2000. Multihop cellular: A new architecture for wireless communications. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201900), Vol. 3. IEEE, 1273\u20131282."},{"key":"e_1_2_1_50_1","first-page":"1","article-title":"Lanchester combat models","volume":"42","author":"MacKay Niall J.","year":"2006","unstructured":"Niall J. MacKay . 2006 . Lanchester combat models . Bull. Inst. Math. Appl. 42 , 170 (2006), 1 \u2013 8 . Niall J. MacKay. 2006. Lanchester combat models. Bull. Inst. Math. Appl. 42, 170 (2006), 1\u20138.","journal-title":"Bull. Inst. Math. Appl."},{"key":"e_1_2_1_51_1","unstructured":"Duncan McFarlane. 2015. The Origin of the Internet of Things. Retrieved from https:\/\/www.redbite.com\/the-origin-of-the-internet-of-things\/.  Duncan McFarlane. 2015. The Origin of the Internet of Things. Retrieved from https:\/\/www.redbite.com\/the-origin-of-the-internet-of-things\/."},{"key":"e_1_2_1_52_1","first-page":"19","article-title":"Machine learning","volume":"13","author":"Michie Donald","year":"1994","unstructured":"Donald Michie , David J. Spiegelhalter , C. C. Taylor , et\u00a0al. 1994 . Machine learning . Neural Stat. Class. 13 (1994), 19 \u2013 22 . Donald Michie, David J. Spiegelhalter, C. C. Taylor, et\u00a0al. 1994. Machine learning. Neural Stat. Class. 13 (1994), 19\u201322.","journal-title":"Neural Stat. Class."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767181"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.207"},{"key":"e_1_2_1_55_1","first-page":"25","article-title":"Application security using blockchain in cyber physical system","volume":"41","author":"Railkar Poonam N.","year":"2012","unstructured":"Poonam N. Railkar , Sandesh Mahamure , and Parikshit N. Mahalle . 2012 . Application security using blockchain in cyber physical system . CSI Commun. 41 , 9 (2012), 25 \u2013 28 . Poonam N. Railkar, Sandesh Mahamure, and Parikshit N. Mahalle. 2012. Application security using blockchain in cyber physical system. CSI Commun. 41, 9 (2012), 25\u201328.","journal-title":"CSI Commun."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2015.7475314"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.Companion.2012.145"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355184"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.landusepol.2017.12.015"},{"key":"e_1_2_1_60_1","first-page":"1","article-title":"Big data analytics","volume":"19","author":"\u00a0al Philip Russom","year":"2011","unstructured":"Philip Russom et \u00a0al . 2011 . Big data analytics . TDWI Best Pract. Rep. Fourth Quart. 19 , 4 (2011), 1 \u2013 34 . Philip Russom et\u00a0al. 2011. Big data analytics. TDWI Best Pract. Rep. Fourth Quart. 19, 4 (2011), 1\u201334.","journal-title":"TDWI Best Pract. Rep. Fourth Quart."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(00)00040-6"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40173-2_25"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.023"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963797"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983103"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288286"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2017.7962674"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3493"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18113868"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2016.7496574"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.010"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.3390\/en12132630"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00054"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427538"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.14445\/23488387\/IJCSE-V4I7P104"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3418204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3418204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:36Z","timestamp":1750195896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3418204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":76,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,11,30]]}},"alternative-id":["10.1145\/3418204"],"URL":"https:\/\/doi.org\/10.1145\/3418204","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9]]},"assertion":[{"value":"2020-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}