Table of Contents Author Guidelines Submit a Manuscript

Citations to this Journal [1,740 citations: 1–100 of 1,113 articles]

Articles published in Mobile Information Systems have been cited 1,740 times. The following is a list of the 1,113 articles that have cited the articles published in Mobile Information Systems.

  • Abhishek Behl, and Pankaj Dutta, “Humanitarian supply chain management: a thematic literature review and future directions of research,” Annals of Operations Research, 2018. View at Publisher · View at Google Scholar
  • Daniela Núñez, Ximena Ferrada, Andrés Neyem, Alfredo Serpell, and Marcos Sepúlveda, “A User-Centered Mobile Cloud Computing Platform for Improving Knowledge Management in Small-to-Medium Enterprises in the Chilean Construction Industry,” Applied Sciences, vol. 8, no. 4, pp. 516, 2018. View at Publisher · View at Google Scholar
  • Jie Zhang, Meng Li, Zhanyong Tang, Xiaoqing Gong, Wei Wang, Dingyi Fang, and Zheng Wang, “Defeat Your Enemy Hiding behind Public WiFi: WiGuard Can Protect Your Sensitive Information from CSI-Based Attack,” Applied Sciences, vol. 8, no. 4, pp. 515, 2018. View at Publisher · View at Google Scholar
  • Naciye Güliz Uğur, and Aykut Hamit Turan, “E-learning adoption of academicians: a proposal for an extended model,” Behaviour & Information Technology, pp. 1–13, 2018. View at Publisher · View at Google Scholar
  • Chao Wang, Qingzhen Xu, Xiuli Lin, and Shouqiang Liu, “Research on data mining of permissions mode for Android malware detection,” Cluster Computing, 2018. View at Publisher · View at Google Scholar
  • S. Uma, and P. Sarasu, “Power orient efficient multi attribute data rate maintenance scheme for QoS development of wireless networks,” Cluster Computing, 2018. View at Publisher · View at Google Scholar
  • K. Kannan, and M. Devaraju, “QoS supported adaptive and multichannel MAC protocol in vehicular ad-hoc network,” Cluster Computing, 2018. View at Publisher · View at Google Scholar
  • M. S. Gowtham, and Kamalraj Subramaniam, “Congestion control and packet recovery for cross layer approach in MANET,” Cluster Computing, 2018. View at Publisher · View at Google Scholar
  • Xin Liu, Yanju Zhou, and Xiaohong Chen, “Mining Outlier Data in Mobile Internet-Based Large Real-Time Databases,” Complexity, vol. 2018, pp. 1–12, 2018. View at Publisher · View at Google Scholar
  • Ahmed M. Khedr, Walid Osamy, and Ahmed Salim, “Distributed Coverage Hole Detection and Recovery Scheme for Heterogeneous Wireless Sensor Networks,” Computer Communications, 2018. View at Publisher · View at Google Scholar
  • Guangshuo Chen, Sahar Hoteit, Aline Carneiro Viana, Marco Fiore, and Carlos Sarraute, “Enriching Sparse Mobility Information in Call Detail Records,” Computer Communications, 2018. View at Publisher · View at Google Scholar
  • Seilendria A. Hadiwardoyo, Enrique Hernández-Orallo, Carlos T. Calafate, Juan Carlos Cano, and Pietro Manzoni, “Experimental Characterization of UAV-to-Car Communications,” Computer Networks, 2018. View at Publisher · View at Google Scholar
  • Iván García-Magariño, Guillermo Palacios-Navarro, Raquel Lacuesta, and Jaime Lloret, “ABSCEV: An agent-based simulation framework about smart transportation for reducing waiting times in charging electric vehicles,” Computer Networks, vol. 138, pp. 119–135, 2018. View at Publisher · View at Google Scholar
  • O. Arana, F. Garcia, J. Gomez, and V. Rangel, “MSP: Providing Location Privacy in WLAN Networks with a MAC Swapping Protocol,” Computer Networks, 2018. View at Publisher · View at Google Scholar
  • Islam Tharwat Abdel-Halim, and Hossam Mahmoud Ahmed Fahmy, “Prediction-based protocols for vehicular Ad Hoc Networks: Survey and taxonomy,” Computer Networks, vol. 130, pp. 34–50, 2018. View at Publisher · View at Google Scholar
  • Karishma Singh, Karan Singh, Le Hoang Son, and Ahmed Aziz, “Congestion Control in Wireless Sensor Networks by Hybrid Multi-Objective Optimization Algorithm,” Computer Networks, 2018. View at Publisher · View at Google Scholar
  • Yaser Baseri, Abdelhakim Hafid, and Soumaya Cherkaoui, “Privacy preserving fine-grained location-based access control for mobile cloud,” Computers & Security, vol. 73, pp. 249–265, 2018. View at Publisher · View at Google Scholar
  • Germán Mendoza-Silva, Philipp Richter, Joaquín Torres-Sospedra, Elena Lohan, and Joaquín Huerta, “Long-Term WiFi Fingerprinting Dataset for Research on Robust Indoor Positioning,” Data, vol. 3, no. 1, pp. 3, 2018. View at Publisher · View at Google Scholar
  • Chien-Huang Lin, and Ming Chen, “The icon matters: how design instability affects download intention of mobile apps under prevention and promotion motivations,” Electronic Commerce Research, 2018. View at Publisher · View at Google Scholar
  • Vishal Sharma, Ilsun You, Giovanni Pau, Mario Collotta, Jae Lim, and Jeong Kim, “LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems,” Energies, vol. 11, no. 3, pp. 573, 2018. View at Publisher · View at Google Scholar
  • Dongming Feng, and Maria Q. Feng, “Computer vision for SHM of civil infrastructure: From dynamic response measurement to damage detection – A review,” Engineering Structures, vol. 156, pp. 105–117, 2018. View at Publisher · View at Google Scholar
  • Minrui Wu, Yanhui Wu, Xiao Liu, Ming Ma, Anfeng Liu, and Ming Zhao, “Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things,” EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, 2018. View at Publisher · View at Google Scholar
  • Jiawei Tan, Anfeng Liu, Ming Zhao, Hailan Shen, and Ming Ma, “Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, 2018. View at Publisher · View at Google Scholar
  • Jinlong Hu, Junjie Liang, Yuezhen Kuang, and Vasant Honavar, “A User Similarity-based Top- N Recommendation Approach for Mobile In-application Advertising,” Expert Systems with Applications, 2018. View at Publisher · View at Google Scholar
  • Iosif Viktoratos, Athanasios Tsadiras, and Nick Bassiliades, “Combining Community-Based Knowledge with Association Rule Mining to Alleviate the Cold Start Problem in Context-Aware Recommender Systems,” Expert Systems with Applications, 2018. View at Publisher · View at Google Scholar
  • Francisco Rodriguez-Montúfar, Bayron Ordoñez-Buitron, Diego Duran, Angela Chantre-Astaiza, and Gustavo Ramirez-Gonzalez, “A structured process to create datasets with nutritional information,” F1000Research, vol. 7, pp. 110, 2018. View at Publisher · View at Google Scholar
  • Pedro Palos-Sanchez, and Jose Saura, “The Effect of Internet Searches on Afforestation: The Case of a Green Search Engine,” Forests, vol. 9, no. 2, pp. 51, 2018. View at Publisher · View at Google Scholar
  • Xin Dai, Chang Choi, YuPeng Wang, and Jason J. Jung, “Performance analysis of smart cultural heritage protection oriented wireless networks,” Future Generation Computer Systems, vol. 81, pp. 593–600, 2018. View at Publisher · View at Google Scholar
  • Bo Zhang, Qian Zhang, Meizi Li, Luqun Li, and Zhenhua Huang, “A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks,” Future Generation Computer Systems, vol. 79, pp. 797–814, 2018. View at Publisher · View at Google Scholar
  • Shouzhi Xu, Huan Zhou, Changzhi Wu, Chung-Ming Huang, and Sungkon Moon, “Spatial Signal Attenuation Model of Active RFID Tags,” IEEE Access, vol. 6, pp. 6947–6960, 2018. View at Publisher · View at Google Scholar
  • Xiu Zhang, Xin Zhang, Liang Han, and Ruiqing Xing, “Utilization-Oriented Spectrum Allocation in an Underlay Cognitive Radio Network,” IEEE Access, vol. 6, pp. 12905–12912, 2018. View at Publisher · View at Google Scholar
  • Jose Luis Canovas Sanchez, Jorge Bernal Bernabe, and Antonio F. Skarmeta, “Integration of Anonymous Credential Systems in IoT Constrained Environments,” IEEE Access, vol. 6, pp. 4767–4778, 2018. View at Publisher · View at Google Scholar
  • Ketyllen C. Silva, Zdenek Becvar, and Carlos R. L. Frances, “Adaptive Hysteresis Margin Based on Fuzzy Logic for Handover in Mobile Networks with Dense Small Cells,” IEEE Access, pp. 1–1, 2018. View at Publisher · View at Google Scholar
  • Nadim K. M. Madi, Zurina Binti Mohd Hanapi, Mohamed Othman, and Shamala Subramaniam, “Link Adaptive Power Control and Allocation for Energy–Efficient Downlink Transmissions in LTE Systems,” IEEE Access, vol. 6, pp. 18469–18483, 2018. View at Publisher · View at Google Scholar
  • Dejun Mu, Lantian Guo, Xiaoyan Cai, and Fei Hao, “Query-Focused Personalized Citation Recommendation With Mutually Reinforced Ranking,” IEEE Access, vol. 6, pp. 3107–3119, 2018. View at Publisher · View at Google Scholar
  • Ray-Guang Cheng, Zdenek Becvar, and Ping-Hsun Yang, “Modeling of Distributed Queueing-Based Random Access for Machine Type Communications in Mobile Networks,” IEEE Communications Letters, vol. 22, no. 1, pp. 129–132, 2018. View at Publisher · View at Google Scholar
  • Xuxun Liu, and Peiyu Zhang, “Data Drainage: A Novel Load Balancing Strategy for Wireless Sensor Networks,” IEEE Communications Letters, vol. 22, no. 1, pp. 125–128, 2018. View at Publisher · View at Google Scholar
  • Tie Qiu, Xize Liu, Keqiu Li, Qing Hu, Arun Kumar Sangaiah, and Ning Chen, “Community-Aware Data Propagation with Small World Feature for Internet of Vehicles,” IEEE Communications Magazine, vol. 56, no. 1, pp. 86–91, 2018. View at Publisher · View at Google Scholar
  • Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, and Stefan Mangard, “Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 465–488, 2018. View at Publisher · View at Google Scholar
  • Ning Yu, Xiaohong Zhan, Shengnan Zhao, Yinfeng Wu, and Renjian Feng, “A Precise Dead Reckoning Algorithm Based on Bluetooth and Multiple Sensors,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 336–351, 2018. View at Publisher · View at Google Scholar
  • Alessio Martinelli, Han Gao, Paul D. Groves, and Simone Morosi, “Probabilistic Context-Aware Step Length Estimation for Pedestrian Dead Reckoning,” IEEE Sensors Journal, vol. 18, no. 4, pp. 1600–1611, 2018. View at Publisher · View at Google Scholar
  • Huma Ghafoor, and Insoo Koo, “CR-SDVN: A Cognitive Routing Protocol for Software-Defined Vehicular Networks,” IEEE Sensors Journal, vol. 18, no. 4, pp. 1761–1772, 2018. View at Publisher · View at Google Scholar
  • Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, and Roy A. Maxion, “Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 48–62, 2018. View at Publisher · View at Google Scholar
  • Katharina Hausmair, Per N. Landin, Ulf Gustavsson, Christian Fager, and Thomas Eriksson, “Digital Predistortion for Multi-Antenna Transmitters Affected by Antenna Crosstalk,” IEEE Transactions on Microwave Theory and Techniques, vol. 66, no. 3, pp. 1524–1535, 2018. View at Publisher · View at Google Scholar
  • Xiaodong Xu, Chunjing Yuan, Wenwan Chen, Xiaofeng Tao, and Yan Sun, “Adaptive Cell Zooming and Sleeping for Green Heterogeneous Ultradense Networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1612–1621, 2018. View at Publisher · View at Google Scholar
  • Francois Quitin, Philippe De Doncker, Francois Horlin, and Wee Peng Tay, “Virtual Multiantenna Array for Estimating the Direction of a Transmitter: System, Bounds, and Experimental Results,” IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1510–1520, 2018. View at Publisher · View at Google Scholar
  • Haipeng Dai, Yunhuai Liu, Guihai Chen, Xiaobing Wu, Tian He, Alex X. Liu, and Yang Zhao, “SCAPE: Safe Charging With Adjustable Power,” IEEE/ACM Transactions on Networking, vol. 26, no. 1, pp. 520–533, 2018. View at Publisher · View at Google Scholar
  • Amirul Islam, Md Tanvir Hossan, and Yeong Min Jang, “Convolutional neural networkscheme–based optical camera communication system for intelligent Internet of vehicles,” International Journal of Distributed Sensor Networks, vol. 14, no. 4, pp. 155014771877015, 2018. View at Publisher · View at Google Scholar
  • Jose Saura, Pedro Palos-Sanchez, and Miguel Rios Martin, “Attitudes Expressed in Online Comments about Environmental Factors in the Tourism Sector: An Exploratory Study,” International Journal of Environmental Research and Public Health, vol. 15, no. 3, pp. 553, 2018. View at Publisher · View at Google Scholar
  • Yuxiu Chen, Jian Yu, Li Li, Linlin Li, Long Li, Jie Zhou, Sang-Bing Tsai, and Quan Chen, “An Empirical Study of the Impact of the Air Transportation Industry Energy Conservation and Emission Reduction Projects on the Local Economy in China,” International Journal of Environmental Research and Public Health, vol. 15, no. 4, pp. 812, 2018. View at Publisher · View at Google Scholar
  • Wei Liu, Hong-Bo Shi, Zhe Zhang, Sang-Bing Tsai, Yuming Zhai, Quan Chen, and Jiangtao Wang, “The Development Evaluation of Economic Zones in China,” International Journal of Environmental Research and Public Health, vol. 15, no. 1, pp. 56, 2018. View at Publisher · View at Google Scholar
  • Jinfei Yang, Jiajia Li, and Qingzhen Xu, “A Highly Efficient Big Data Mining Algorithm Based on Stock Market,” International Journal of Grid and High Performance Computing, vol. 10, no. 2, pp. 14–33, 2018. View at Publisher · View at Google Scholar
  • Mohamed Belhassen, Amine Dhraief, Abdelfettah Belghith, and Hassan Mathkour, “ALOE: autonomic locating of obstructing entities in MANETs,” Journal of Ambient Intelligence and Humanized Computing, 2018. View at Publisher · View at Google Scholar
  • Macarena Espinilla, Javier Medina, Josef Hallberg, and Chris Nugent, “A new approach based on temporal sub-windows for online sensor-based activity recognition,” Journal of Ambient Intelligence and Humanized Computing, 2018. View at Publisher · View at Google Scholar
  • Xindong You, Yeli Li, Zhenyang Zhu, Lifeng Yu, and Dawei Sun, “QGLG Automatic Energy Gear-Shifting Mechanism with Flexible QoS Constraint in Cyber-Physical Systems,” Journal of Database Management, vol. 29, no. 1, pp. 43–65, 2018. View at Publisher · View at Google Scholar
  • Christian Gentner, Siwei Zhang, and Thomas Jost, “Log-PF: Particle Filtering in Logarithm Domain,” Journal of Electrical and Computer Engineering, vol. 2018, pp. 1–11, 2018. View at Publisher · View at Google Scholar
  • Bo Qian, Guolei Zheng, and Yongxin Feng, “A Detection Algorithm for the BOC Signal Based on Quadrature Channel Correlation,” Journal of Electrical and Computer Engineering, vol. 2018, pp. 1–10, 2018. View at Publisher · View at Google Scholar
  • Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, Antonios Argyriou, and Dimitrios Kosmanos, “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications, vol. 101, pp. 55–82, 2018. View at Publisher · View at Google Scholar
  • Adrián Sánchez-Carmona, Frédéric Guidec, Pascale Launay, Yves Mahéo, and Sergi Robles, “Filling in the Missing Link between Simulation and Application in Opportunistic Networking,” Journal of Systems and Software, 2018. View at Publisher · View at Google Scholar
  • Chien-Hao Kao, Chia-Chun Chen, Wei-Yi Jhu, Yu-Tza Tsai, Shinn-Horng Chen, Chao-Ming Hsu, and Cheng-Yi Chen, “Novel digital glove design for virtual reality applications,” Microsystem Technologies, 2018. View at Publisher · View at Google Scholar
  • Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell, “Cryptocurrency Networks: A New P2P Paradigm,” Mobile Information Systems, vol. 2018, pp. 1–16, 2018. View at Publisher · View at Google Scholar
  • Pedro R. Palos-Sanchez, Jose Ramon Saura, and Felipe Debasa, “The Influence of Social Networks on the Development of Recruitment Actions that Favor User Interface Design and Conversions in Mobile Applications Powered by Linked Data,” Mobile Information Systems, vol. 2018, pp. 1–11, 2018. View at Publisher · View at Google Scholar
  • Halikul Lenando, and Mohamad Alrfaay, “EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network,” Mobile Information Systems, vol. 2018, pp. 1–8, 2018. View at Publisher · View at Google Scholar
  • Ki-Wook Kim, Sung-Gi Min, and Youn-Hee Han, “In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane,” Mobile Information Systems, vol. 2018, pp. 1–9, 2018. View at Publisher · View at Google Scholar
  • Wernhuar Tarng, Kuo-Liang Ou, Yun-Chen Lu, Yi-Syuan Shih, and Hsin-Hun Liou, “A Sun Path Observation System Based on Augment Reality and Mobile Learning,” Mobile Information Systems, vol. 2018, pp. 1–10, 2018. View at Publisher · View at Google Scholar
  • Samantha Yasivee Carrizales-Villagómez, Marco Aurelio Nuño-Maganda, and Javier Rubio-Loyola, “A Platform for e-Health Control and Location Services for Wandering Patients,” Mobile Information Systems, vol. 2018, pp. 1–18, 2018. View at Publisher · View at Google Scholar
  • Md. Tanvir Hossan, Mostafa Zaman Chowdhury, Moh. Khalid Hasan, Md. Shahjalal, Trang Nguyen, Nam Tuan Le, and Yeong Min Jang, “A New Vehicle Localization Scheme Based on Combined Optical Camera Communication and Photogrammetry,” Mobile Information Systems, vol. 2018, pp. 1–14, 2018. View at Publisher · View at Google Scholar
  • Nhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Sungrae Cho, Chihyun Cho, and Hyunbum Kim, “Pattern-Identified Online Task Scheduling in Multitier Edge Computing for Industrial IoT Services,” Mobile Information Systems, vol. 2018, pp. 1–9, 2018. View at Publisher · View at Google Scholar
  • Yousheng Zhou, Siling Liu, Min Xiao, Shaojiang Deng, and Xiaojun Wang, “An Efficient V2I Authentication Scheme for VANETs,” Mobile Information Systems, vol. 2018, pp. 1–11, 2018. View at Publisher · View at Google Scholar
  • Kriangkrai Maneerat, and Kamol Kaemarungsi, “Robust System Design Using BILP for Wireless Indoor Positioning Systems,” Mobile Information Systems, vol. 2018, pp. 1–19, 2018. View at Publisher · View at Google Scholar
  • Luca Casati, and Andrea Visconti, “The Dangers of Rooting: Data Leakage Detection in Android Applications,” Mobile Information Systems, vol. 2018, pp. 1–9, 2018. View at Publisher · View at Google Scholar
  • Malik Qasaimeh, Raad S. Al-Qassas, and Sara Tedmori, “Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security,” Multimedia Tools and Applications, 2018. View at Publisher · View at Google Scholar
  • Jia Xu, Wei Lu, Lijie Xu, Dejun Yang, and Tao Li, “Incentive mechanisms for mobile crowd sensing based on supply-demand relationship,” Peer-to-Peer Networking and Applications, 2018. View at Publisher · View at Google Scholar
  • Haider Mshali, Tayeb Lemlouma, and Damien Magoni, “Adaptive monitoring system for e-health smart homes,” Pervasive and Mobile Computing, vol. 43, pp. 1–19, 2018. View at Publisher · View at Google Scholar
  • Kyoung-Don Kang, “Enhancing timeliness and saving power in real-time databases,” Real-Time Systems, 2018. View at Publisher · View at Google Scholar
  • Sang-Bing Tsai, Jian Yu, Feng Luo, Jie Zhou, Quan Chen, Lei Xu, and Li Ma, “A study on solving the production process problems of the photovoltaic cell industry,” Renewable and Sustainable Energy Reviews, vol. 82, pp. 3546–3553, 2018. View at Publisher · View at Google Scholar
  • Sang-Bing Tsai, “Using the DEMATEL model to explore the job satisfaction of research and development professionals in china's photovoltaic cell industry,” Renewable and Sustainable Energy Reviews, vol. 81, pp. 62–68, 2018. View at Publisher · View at Google Scholar
  • Lixia Zhang, and Jianliang Gao, “Incremental Graph Pattern Matching Algorithm for Big Graph Data,” Scientific Programming, vol. 2018, pp. 1–8, 2018. View at Publisher · View at Google Scholar
  • Jiawei Tang, Anfeng Liu, Ming Zhao, and Tian Wang, “An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks,” Security and Communication Networks, vol. 2018, pp. 1–30, 2018. View at Publisher · View at Google Scholar
  • Miao Yu, Yongzheng Zhang, Tianning Zang, Yipeng Wang, and Yijing Wang, “Information Propagation Prediction Based on Key Users Authentication in Microblogging,” Security and Communication Networks, vol. 2018, pp. 1–7, 2018. View at Publisher · View at Google Scholar
  • Lu Ou, Hui Yin, Zheng Qin, Sheng Xiao, Guangyi Yang, and Yupeng Hu, “An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme,” Security and Communication Networks, vol. 2018, pp. 1–11, 2018. View at Publisher · View at Google Scholar
  • Michele Chincoli, and Antonio Liotta, “Self-Learning Power Control in Wireless Sensor Networks,” Sensors, vol. 18, no. 2, pp. 375, 2018. View at Publisher · View at Google Scholar
  • Dang-Nhac Lu, Duc-Nhan Nguyen, Thi-Hau Nguyen, and Ha-Nam Nguyen, “Vehicle Mode and Driving Activity Detection Based on Analyzing Sensor Data of Smartphones,” Sensors, vol. 18, no. 4, pp. 1036, 2018. View at Publisher · View at Google Scholar
  • Juan Guerrero-Ibáñez, Sherali Zeadally, and Juan Contreras-Castillo, “Sensor Technologies for Intelligent Transportation Systems,” Sensors, vol. 18, no. 4, pp. 1212, 2018. View at Publisher · View at Google Scholar
  • Jose de Fuentes, Lorena Gonzalez-Manzano, and Arturo Ribagorda, “Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors,” Sensors, vol. 18, no. 4, pp. 1219, 2018. View at Publisher · View at Google Scholar
  • Xingpo Ma, Xingjian Liu, Junbin Liang, Yin Li, Ran Li, Wenpeng Ma, and Chuanda Qi, “A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks,” Sensors, vol. 18, no. 3, pp. 871, 2018. View at Publisher · View at Google Scholar
  • Weimin Li, Bin Wang, Jinfang Sheng, Ke Dong, Zitong Li, and Yixiang Hu, “A Resource Service Model in the Industrial IoT System Based on Transparent Computing,” Sensors, vol. 18, no. 4, pp. 981, 2018. View at Publisher · View at Google Scholar
  • Ji-Young Jung, Dong-Yoon Seo, and Jung-Ryun Lee, “Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks,” Sensors, vol. 18, no. 1, pp. 120, 2018. View at Publisher · View at Google Scholar
  • Cristhian Iza-Paredes, Ahmad Mezher, Mónica Aguilar Igartua, and Jordi Forné, “Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs,” Sensors, vol. 18, no. 1, pp. 294, 2018. View at Publisher · View at Google Scholar
  • Jose Celaya-Padilla, Carlos Galván-Tejada, F. López-Monteagudo, O. Alonso-González, Arturo Moreno-Báez, Antonio Martínez-Torteya, Jorge Galván-Tejada, Jose Arceo-Olague, Huizilopoztli Luna-García, and Hamurabi Gamboa-Rosales, “Speed Bump Detection Using Accelerometric Features: A Genetic Algorithm Approach,” Sensors, vol. 18, no. 2, pp. 443, 2018. View at Publisher · View at Google Scholar
  • Joaquín Torres-Sospedra, Antonio Jiménez, Adriano Moreira, Tomás Lungenstrass, Wei-Chung Lu, Stefan Knauth, Germán Mendoza-Silva, Fernando Seco, Antoni Pérez-Navarro, Maria Nicolau, António Costa, Filipe Meneses, Joaquín Farina, Juan Morales, Wen-Chen Lu, Ho-Ti Cheng, Shi-Shen Yang, Shih-Hau Fang, Ying-Ren Chien, and Yu Tsao, “Off-Line Evaluation of Mobile-Centric Indoor Positioning Systems: The Experiences from the 2017 IPIN Competition,” Sensors, vol. 18, no. 2, pp. 487, 2018. View at Publisher · View at Google Scholar
  • Marcus Lemos, Raimir Filho, Ricardo Rabêlo, Carlos de Carvalho, Douglas Mendes, and Valney Costa, “An Energy-Efficient Approach to Enhance Virtual Sensors Provisioning in Sensor Clouds Environments,” Sensors, vol. 18, no. 3, pp. 689, 2018. View at Publisher · View at Google Scholar
  • Jiafu Su, Chi Li, Sang-Bing Tsai, Hui Lu, Aijun Liu, and Quan Chen, “A Sustainable Closed-Loop Supply Chain Decision Mechanism in the Electronic Sector,” Sustainability, vol. 10, no. 4, pp. 1295, 2018. View at Publisher · View at Google Scholar
  • Lei Yang, Meng Chen, Yiji Cai, and Sang-Bing Tsai, “Manufacturer’s Decision as Consumers’ Low-Carbon Preference Grows,” Sustainability, vol. 10, no. 4, pp. 1284, 2018. View at Publisher · View at Google Scholar
  • Wei Song, Zhiya Chen, Aijun Liu, Qiuyun Zhu, Wei Zhao, Sang-Bing Tsai, and Hui Lu, “A Study on Green Supplier Selection in Dynamic Environment,” Sustainability, vol. 10, no. 4, pp. 1226, 2018. View at Publisher · View at Google Scholar
  • Abdullah Mohammed Baabdullah, “Consumer adoption of Mobile Social Network Games (M-SNGs) in Saudi Arabia: The role of social influence, hedonic motivation and trust,” Technology in Society, 2018. View at Publisher · View at Google Scholar
  • Pawel Laka, and Wojciech Mazurczyk, “User perspective and security of a new mobile authentication method,” Telecommunication Systems, 2018. View at Publisher · View at Google Scholar
  • Jieren Cheng, Jinghe Zhou, Qiang Liu, Xiangyan Tang, and Yanxiang Guo, “A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence,” The Computer Journal, 2018. View at Publisher · View at Google Scholar
  • Muhammad Shafiq, Xiangzhan Yu, Ali Kashif Bashir, Hassan Nazeer Chaudhry, and Dawei Wang, “A machine learning approach for feature selection traffic classification using security analysis,” The Journal of Supercomputing, 2018. View at Publisher · View at Google Scholar
  • Ermeson Andrade, and Bruno Nogueira, “Dependability evaluation of a disaster recovery solution for IoT infrastructures,” The Journal of Supercomputing, 2018. View at Publisher · View at Google Scholar