{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:24:52Z","timestamp":1759134292800},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T00:00:00Z","timestamp":1510531200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13638-017-0972-6","type":"journal-article","created":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T06:59:32Z","timestamp":1510556372000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A brief overview of intelligent mobility management for future wireless mobile networks"],"prefix":"10.1186","volume":"2017","author":[{"given":"Ilsun","family":"You","sequence":"first","affiliation":[]},{"given":"Yuh-Shyan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,13]]},"reference":[{"issue":"1","key":"972_CR1","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1186\/s13638-016-0759-1","volume":"2016","author":"J Song","year":"2016","unstructured":"J Song, H Zhou, W Quan, et al., Modeling link quality for high-speed railway wireless networks based on hidden Markov chain. EURASIP J. Wirel. Commun. Netw. 2016(1), 263 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1186\/s13638-016-0732-z","volume":"2016","author":"X Su","year":"2016","unstructured":"X Su, H Yu, W Kim, et al., Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks. EURASIP J. Wirel. Commun. Netw. 2016(1), 231 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR3","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1186\/s13638-016-0728-8","volume":"2016","author":"Y Cao","year":"2016","unstructured":"Y Cao, Q Liu, Y Zuo, et al., Receiver-assisted cellular\/wifi handover management for efficient multipath multimedia delivery in heterogeneous wireless networks. EURASIP J. Wirel. Commun. Netw. 2016(1), 229 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR4","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1186\/s13638-016-0714-1","volume":"2016","author":"T Kung","year":"2016","unstructured":"T Kung, Y Teng, C Lin, et al., A localized fault detection algorithm for mobility management in the strongly t-diagnosable wireless ad hoc network under the comparison model. EURASIP J. Wirel. Commun. Netw. 2016(1), 218 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR5","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1186\/s13638-017-0843-1","volume":"2017","author":"B Cha","year":"2017","unstructured":"B Cha, J Kim, H Moon, et al., Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks. EURASIP J. Wirel. Commun. Netw. 2017(1), 63 (2017)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR6","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1186\/s13638-016-0767-1","volume":"2016","author":"Z Chen","year":"2016","unstructured":"Z Chen, H Kang, S Yin, et al., An efficient privacy protection in mobility social network services with novel clustering-based anonymization. EURASIP J. Wirel. Commun. Netw. 2016(1), 275 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR7","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1186\/s13638-016-0776-0","volume":"2016","author":"G Lai","year":"2016","unstructured":"G Lai, Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2016(1), 274 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR8","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1186\/s13638-016-0729-7","volume":"2016","author":"G Kim","year":"2016","unstructured":"G Kim, J Lim, J Kim, Secure user authentication based on the trusted platform for mobile devices. EURASIP J. Wirel. Commun. Netw. 2016(1), 233 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR9","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1186\/s13638-016-0705-2","volume":"2016","author":"Z Guan","year":"2016","unstructured":"Z Guan, J Li, Y Zhang, et al., An efficient traceable access control scheme with reliable key delegation in mobile cloud computing. EURASIP J. Wirel. Commun. Netw. 2016(1), 208 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR10","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1186\/s13638-016-0687-0","volume":"2016","author":"L Nkenyereye","year":"2016","unstructured":"L Nkenyereye, Y Park, K Rhee, A secure billing protocol over attribute-based encryption in vehicular cloud computing. EURASIP J. Wirel. Commun. Netw. 2016(1), 196 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR11","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1186\/s13638-016-0691-4","volume":"2016","author":"M Khan","year":"2016","unstructured":"M Khan, M Khan, S Malik, et al., MATF: A multi-attribute trust framework for MANETs. EURASIP J. Wirel. Commun. Netw. 2016(1), 197 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR12","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1186\/s13638-016-0685-2","volume":"2016","author":"T Gao","year":"2016","unstructured":"T Gao, F Peng, N Guo, Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J. Wirel. Commun. Netw. 2016(1), 193 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR13","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1186\/s13638-016-0731-0","volume":"2016","author":"B S\u00e1nchez","year":"2016","unstructured":"B S\u00e1nchez, R Alcarria, D Rivera, et al., Predictive algorithms for mobility and device lifecycle management in cyber-physical systems. EURASIP J. Wirel. Commun. Netw. 2016(1), 228 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR14","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1186\/s13638-016-0707-0","volume":"2016","author":"S Yang","year":"2016","unstructured":"S Yang, C Ke, Y Lin, et al., Mobility management through access network discovery and selection function for load balancing and power saving in software-defined networking environment. EURASIP J. Wirel. Commun. Netw. 2016(1), 204 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR15","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1186\/s13638-016-0746-6","volume":"2016","author":"J Lee","year":"2016","unstructured":"J Lee, T Kwon, Secure dissemination of software updates for intelligent mobility in future wireless networks. EURASIP J. Wirel. Commun. Netw. 2016(1), 250 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR16","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1186\/s13638-016-0688-z","volume":"2016","author":"W Quan","year":"2016","unstructured":"W Quan, Y Liu, X Jiang, et al., Intelligent popularity-aware content caching and retrieving in highway vehicular networks. EURASIP J. Wirel. Commun. Netw. 2016(1), 200 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR17","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1186\/s13638-016-0719-9","volume":"2016","author":"S Yao","year":"2016","unstructured":"S Yao, J Guan, H Zhang, Survivable strategy set design for malicious attack propagation in NEMO scenario. EURASIP J. Wirel. Commun. Netw. 2016(1), 234 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR18","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1186\/s13638-016-0720-3","volume":"2016","author":"J Lim","year":"2016","unstructured":"J Lim, J Yi, Structural analysis of packing schemes for extracting hidden codes in mobile malware. EURASIP J. Wirel. Commun. Netw. 2016(1), 221 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR19","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1186\/s13638-016-0744-8","volume":"2016","author":"T Andrysiak","year":"2016","unstructured":"T Andrysiak, \u0141 Saganowski, W Mazurczyk, Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average. EURASIP J. Wirel. Commun. Netw. 2016(1), 245 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR20","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1186\/s13638-016-0725-y","volume":"2016","author":"G Wang","year":"2016","unstructured":"G Wang, R Gu, H Li, et al., Efficient resource allocation for passive optical fronthaul-based coordinated multipoint transmission. EURASIP J. Wirel. Commun. Netw. 2016(1), 225 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"972_CR21","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1186\/s13638-016-0715-0","volume":"2016","author":"B Feng","year":"2016","unstructured":"B Feng, H Zhou, Q Xu, Mobility support in named data networking: A survey. EURASIP J. Wirel. Commun. Netw. 2016(1), 220 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-017-0972-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-017-0972-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-017-0972-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T06:59:35Z","timestamp":1510556375000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-017-0972-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,13]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["972"],"URL":"https:\/\/doi.org\/10.1186\/s13638-017-0972-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,13]]},"article-number":"188"}}