Computer Communications

Papers
(The H4-Index of Computer Communications is 58. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Applications of Artificial Intelligence and Machine learning in smart cities337
An exhaustive survey on security and privacy issues in Healthcare 4.0245
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture233
Blockchain platform for industrial healthcare: Vision and future opportunities202
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art186
Drone-surveillance for search and rescue in natural disaster172
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review147
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment145
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey141
Unmanned aerial vehicle for internet of everything: Opportunities and challenges133
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks130
A lightweight authentication and key agreement scheme for Internet of Drones130
Software defined solutions for sensors in 6G/IoE128
Industrial Control Systems: Cyberattack trends and countermeasures128
Machine Learning Models for Secure Data Analytics: A taxonomy and threat model128
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research120
Secure and energy-efficient smart building architecture with emerging technology IoT119
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)113
TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things104
Internet of Things attack detection using hybrid Deep Learning Model104
Edge and fog computing for IoT: A survey on current research activities & future directions101
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems101
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks100
Green communication in IoT networks using a hybrid optimization algorithm100
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare98
A taxonomy of AI techniques for 6G communication networks97
Graph-based deep learning for communication networks: A survey83
A taxonomy of blockchain-enabled softwarization for secure UAV network81
Continuous health monitoring of sportsperson using IoT devices based wearable technology80
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment79
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications78
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review75
Vehicle communication network in intelligent transportation system based on Internet of Things75
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes74
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review73
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks72
Resource provisioning for IoT services in the fog computing environment: An autonomic approach71
Geo-distributed efficient deployment of containers with Kubernetes71
Path extension similarity link prediction method based on matrix algebra in directed networks69
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment68
Big Data analytics and IoT in Operation safety management in Under Water Management68
New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges67
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions67
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment65
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems65
Optimal caching scheme in D2D networks with multiple robot helpers65
EDGF: Empirical dataset generation framework for wireless sensor networks63
Blockchain based integrated security measure for reliable service delegation in 6G communication environment63
Cascading handcrafted features and Convolutional Neural Network for IoT-enabled brain tumor segmentation63
Using data mining techniques to explore security issues in smart living environments in Twitter62
A review of wireless communication using high-altitude platforms for extended coverage and capacity61
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets61
A deep neural networks based model for uninterrupted marine environment monitoring61
Federated Learning for intrusion detection system: Concepts, challenges and future directions60
Efficient resource management and workload allocation in fog–cloud computing paradigm in IoT using learning classifier systems59
Privacy preserving distributed machine learning with federated learning59
Lightweight blockchain assisted secure routing of swarm UAS networking58
SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network58
Using data mining techniques for bike sharing demand prediction in metropolitan city58
Three-factor authentication protocol using physical unclonable function for IoV58
Deep reinforcement learning for computation offloading in mobile edge computing environment58
0.037696123123169