Computer Communications

Papers
(The H4-Index of Computer Communications is 49. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art249
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey204
Secure and energy-efficient smart building architecture with emerging technology IoT181
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review172
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks168
Edge and fog computing for IoT: A survey on current research activities & future directions151
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research148
Internet of Things attack detection using hybrid Deep Learning Model133
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare120
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems117
Graph-based deep learning for communication networks: A survey116
Federated Learning for intrusion detection system: Concepts, challenges and future directions116
A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework113
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment97
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review93
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review87
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment84
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications80
Path extension similarity link prediction method based on matrix algebra in directed networks79
A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network77
EDGF: Empirical dataset generation framework for wireless sensor networks76
A study of LoRaWAN protocol performance for IoT applications in smart agriculture74
A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things72
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks71
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm70
Three-factor authentication protocol using physical unclonable function for IoV68
Privacy preserving distributed machine learning with federated learning68
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)67
Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case67
Using data mining techniques to explore security issues in smart living environments in Twitter66
Optimal caching scheme in D2D networks with multiple robot helpers65
Intelligent workload allocation in IoT–Fog–cloud architecture towards mobile edge computing64
Deep reinforcement learning for computation offloading in mobile edge computing environment63
Lightweight blockchain assisted secure routing of swarm UAS networking63
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks62
Bee optimization based random double adaptive whale optimization model for task scheduling in cloud computing environment59
A survey on continuous authentication methods in Internet of Things environment58
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio58
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey57
Internet of Flying Things (IoFT): A Survey56
IoT enabled HELMET to safeguard the health of mine workers55
Efficient deployment of UAVs for disaster management: A multi-criterion optimization approach54
Deep learning for intelligent IoT: Opportunities, challenges and solutions52
Towards SDN-based smart contract solution for IoT access control52
Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm51
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework51
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT51
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling49
A privacy and session key based authentication scheme for medical IoT networks49
0.024523973464966