Computer Networks

Papers
(The H4-Index of Computer Networks is 53. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A compilation of UAV applications for precision agriculture448
Building an efficient intrusion detection system based on feature selection and ensemble classifier330
Campus traffic and e-Learning during COVID-19 pandemic292
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture255
A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges217
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective187
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset172
Machine learning methods for cyber security intrusion detection: Datasets and comparative study165
Clustering objectives in wireless sensor networks: A survey and research direction analysis160
6G networks: Beyond Shannon towards semantic and goal-oriented communications154
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things133
Aerial imagery pile burn detection using deep learning: The FLAME dataset130
Federated learning for malware detection in IoT devices130
Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm129
Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead127
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT122
Machine Learning-based traffic prediction models for Intelligent Transportation Systems121
A survey on IoT platforms: Communication, security, and privacy perspectives118
HealthBlock: A secure blockchain-based healthcare data management system114
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles112
Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions109
Accurate and fast URL phishing detector: A convolutional neural network approach109
In-band Network Telemetry: A Survey99
Dynamic job-shop scheduling in smart manufacturing using deep reinforcement learning96
Towards a deep learning-driven intrusion detection approach for Internet of Things92
A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements91
RETRACTED: Personalized federated learning framework for network traffic anomaly detection91
Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems90
A network traffic forecasting method based on SA optimized ARIMA–BP neural network89
5G In the internet of things era: An overview on security and privacy challenges85
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures84
NOMA and 5G emerging technologies: A survey on issues and solution techniques83
Hybrid approach to intrusion detection in fog-based IoT environments77
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities77
A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems74
Towards smart farming: Systems, frameworks and exploitation of multiple sources73
An effective service-oriented networking management architecture for 5G-enabled internet of things71
Efficient and flexible management for industrial Internet of Things: A federated learning approach68
An SDN architecture for time sensitive industrial IoT66
Secure over-the-air software updates in connected vehicles: A survey65
A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives63
A NSGA2-LR wrapper approach for feature selection in network intrusion detection61
Application of Internet of Things and artificial intelligence for smart fitness: A survey59
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges59
How to exploit the Social Internet of Things: Query Generation Model and Device Profiles’ Dataset59
Deep reinforcement learning for blockchain in industrial IoT: A survey58
An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks58
Cloud based security on outsourcing using blockchain in E-health systems57
User authentication on mobile devices: Approaches, threats and trends57
Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications55
Composite and efficient DDoS attack detection framework for B5G networks55
Quantum Internet protocol stack: A comprehensive survey55
TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT53
Impact of the COVID-19 pandemic on the Internet latency: A large-scale study53
0.03025221824646