Computer Communications

Papers
(The median citation count of Computer Communications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art249
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey204
Secure and energy-efficient smart building architecture with emerging technology IoT181
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review172
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks168
Edge and fog computing for IoT: A survey on current research activities & future directions151
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research148
Internet of Things attack detection using hybrid Deep Learning Model133
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare120
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems117
Graph-based deep learning for communication networks: A survey116
Federated Learning for intrusion detection system: Concepts, challenges and future directions116
A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework113
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment97
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review93
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review87
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment84
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications80
Path extension similarity link prediction method based on matrix algebra in directed networks79
A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network77
EDGF: Empirical dataset generation framework for wireless sensor networks76
A study of LoRaWAN protocol performance for IoT applications in smart agriculture74
A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things72
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks71
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm70
Three-factor authentication protocol using physical unclonable function for IoV68
Privacy preserving distributed machine learning with federated learning68
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)67
Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case67
Using data mining techniques to explore security issues in smart living environments in Twitter66
Optimal caching scheme in D2D networks with multiple robot helpers65
Intelligent workload allocation in IoT–Fog–cloud architecture towards mobile edge computing64
Deep reinforcement learning for computation offloading in mobile edge computing environment63
Lightweight blockchain assisted secure routing of swarm UAS networking63
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks62
Bee optimization based random double adaptive whale optimization model for task scheduling in cloud computing environment59
A survey on continuous authentication methods in Internet of Things environment58
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio58
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey57
Internet of Flying Things (IoFT): A Survey56
IoT enabled HELMET to safeguard the health of mine workers55
Efficient deployment of UAVs for disaster management: A multi-criterion optimization approach54
Deep learning for intelligent IoT: Opportunities, challenges and solutions52
Towards SDN-based smart contract solution for IoT access control52
Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm51
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework51
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT51
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling49
A privacy and session key based authentication scheme for medical IoT networks49
Privacy-preserving using homomorphic encryption in Mobile IoT systems48
Blockchain technology as a Fog computing security and privacy solution: An overview48
Cloud-gaming: Analysis of Google Stadia traffic47
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography47
Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare47
Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks45
A review of Machine Learning-based zero-day attack detection: Challenges and future directions45
Dynamic server placement in edge computing toward Internet of Vehicles44
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning44
Survey on watermarking methods in the artificial intelligence domain and beyond44
Secure Device-to-Device communications for 5G enabled Internet of Things applications43
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks42
Cryptomining makes noise: Detecting cryptojacking via Machine Learning42
A method of two-stage clustering learning based on improved DBSCAN and density peak algorithm42
Optimization of battery swapping infrastructure for e-commerce drone delivery42
Joint routing and scheduling for large-scale deterministic IP networks42
A cooperative resource allocation model for IoT applications in mobile edge computing41
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers41
Result return aware offloading scheme in vehicular edge networks for IoT40
Design and deployment of a practical IoT-based monitoring system for protected cultivations40
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions39
Flow length and size distributions in campus Internet traffic39
Do we need a contact tracing app?39
Energy-efficient computation offloading for vehicular edge computing networks39
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security38
A provably secure authentication scheme for RFID-enabled UAV applications38
Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks37
COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach37
IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems37
Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection36
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review36
A federated calibration scheme for convolutional neural networks: Models, applications and challenges36
A survey on UAV-assisted wireless communications: Recent advances and future trends35
Social media privacy management strategies: A SEM analysis of user privacy behaviors35
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning35
A review on P4-Programmable data planes: Architecture, research efforts, and future directions35
A survey on 360-degree video: Coding, quality of experience and streaming35
BlockTour: A blockchain-based smart tourism platform34
Network intrusion detection based on IE-DBN model33
A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment33
Security on in-vehicle communication protocols: Issues, challenges, and future research directions33
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS32
A secure and lightweight authentication scheme for next generation IoT infrastructure32
A comparative study on consensus mechanism with security threats and future scopes: Blockchain32
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems31
Physical-layer security based mobile edge computing for emerging cyber physical systems31
Subjective logic-based trust model for fog computing30
WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks30
3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks30
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks30
Task offloading in vehicular edge computing networks via deep reinforcement learning30
Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm29
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network29
Weighted utility aware computational overhead minimization of wireless power mobile edge cloud28
A new GSO based method for SDN controller placement28
A sustainable deep learning framework for fault detection in 6G Industry 4.0 heterogeneous data environments27
Deep reinforcement learning-based joint task and energy offloading in UAV-aided 6G intelligent edge networks27
On deep reinforcement learning security for Industrial Internet of Things26
NRflex: Enforcing network slicing in 5G New Radio26
Classification of flower image based on attention mechanism and multi-loss attention network26
A hybrid trust management framework for a multi-service social IoT network26
An ultra light weight and secure RFID batch authentication scheme for IoMT26
Joint task offloading and resource allocation in vehicle-assisted multi-access edge computing25
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network25
Deep reinforcement learning-based multi-objective edge server placement in Internet of Vehicles25
A security framework for Ethereum smart contracts25
Time-optimal trajectory planning of manipulator with simultaneously searching the optimal path25
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm25
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network25
Distributed task offloading strategy to low load base stations in mobile edge computing environment24
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things24
A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams24
Controller placements for latency minimization of both primary and backup paths in SDNs24
Multi-algorithm UWB-based localization method for mixed LOS/NLOS environments24
Multi-criteria handover mobility management in 5G cellular network24
A privacy-preserving and verifiable federated learning method based on blockchain24
A survey on TCP over mmWave24
A privacy-preserving mutual authentication scheme for group communication in VANET23
Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy23
A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions23
Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks23
Certificateless signature schemes in Industrial Internet of Things: A comparative survey23
Air quality assessment system based on self-driven drone and LoRaWAN network23
A blockchain-based access control and intrusion detection framework for satellite communication systems23
Blockchain-based Mobility-aware Offloading mechanism for Fog computing services23
A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors23
A user-centric privacy-preserving authentication protocol for IoT-AmI environments22
An IoT based forest fire detection system using integration of cat swarm with LSTM model22
Multiple intersection selection routing protocol based on road section connectivity probability for urban VANETs22
Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT)22
Classification And Regression Tree (CART) based resource allocation scheme for Wireless Sensor Networks22
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations22
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks22
A survey on improving the wireless communication with adaptive antenna selection by intelligent method22
Fast and lean encrypted Internet traffic classification22
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes22
URLLC in UAV-enabled multicasting systems: A dual time and energy minimization problem using UAV speed, altitude and beamwidth21
A deep learning based non-intrusive household load identification for smart grid in China21
Towards security automation in Software Defined Networks21
Protocol Reverse-Engineering Methods and Tools: A Survey21
SecDH: Security of COVID-19 images based on data hiding with PCA21
MRT-LoRa: A multi-hop real-time communication protocol for industrial IoT applications over LoRa networks21
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach21
Performance evaluation of Attribute-Based Encryption on constrained IoT devices21
FoT-Stream: A Fog platform for data stream analytics in IoT21
A resilient Trust Management framework towards trust related attacks in the Social Internet of Things21
FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks21
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living21
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT21
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things20
Towards high quality mobile crowdsensing: Incentive mechanism design based on fine-grained ability reputation20
Performance evaluation of mobile RPL-based IoT networks under version number attack20
RDP-based Lateral Movement detection using Machine Learning20
Green computing in IoT: Time slotted simultaneous wireless information and power transfer20
5G heterogeneous network selection and resource allocation optimization based on cuckoo search algorithm20
D2D communication channel allocation and resource optimization in 5G network based on game theory20
Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review20
Spatial Reuse in IEEE 802.11ax WLANs20
Increasing energy efficiency of Massive-MIMO network via base stations switching using reinforcement learning and radio environment maps20
Traveling salesman problem with drone under recharging policy19
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism19
Sieve: A flow scheduling framework in SDN based data center networks19
Application of data mining technology in alarm analysis of communication network19
An improved OIF Elman neural network based on CSO algorithm and its applications19
GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks19
Privacy-preserving compression model for efficient IoMT ECG sharing19
Edge-based platoon control19
A robust and distributed architecture for 5G-enabled networks in the smart blockchain era19
An intelligent parking sharing system for green and smart cities based IoT18
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment18
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles18
Blockchain-empowered secure federated learning system: Architecture and applications18
Blockchain based secure and reliable Cyber Physical ecosystem for vaccine supply chain18
Public key encryption supporting equality test and flexible authorization without bilinear pairings18
Data tampering attacks diagnosis in dynamic wireless sensor networks18
Defect identification for oil and gas pipeline safety based on autonomous deep learning network18
Ambient intelligence approach: Internet of Things based decision performance analysis for intrusion detection18
A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems18
Auto-scaling techniques in container-based cloud and edge/fog computing: Taxonomy and survey18
Node localization algorithm for detecting malicious nodes to prevent connection failures and improve end-to-end delay18
Congestion-aware WiFi offload algorithm for 5G heterogeneous wireless networks17
A big data based architecture for collaborative networks: Supply chains mixed-network17
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations17
Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization17
State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review17
A closed-loop control architecture of UAV and WSN for traffic surveillance on highways17
iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System17
A decentralized framework for device authentication and data security in the next generation internet of medical things17
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey17
An energy efficient cluster head selection approach for performance improvement in network-coding-based wireless sensor networks with multiple sinks17
Towards an energy balancing solution for wireless sensor network with mobile sink node17
Cooperative Cellular UAV-to-Everything (C-U2X) communication based on 5G sidelink for UAV swarms17
Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks17
Mask-RCNN with spatial attention for pedestrian segmentation in cyber–physical systems17
A survey on vital signs monitoring based on Wi-Fi CSI data17
A bio-inspired approach: Firefly algorithm for Multi-Depot Vehicle Routing Problem with Time Windows16
deepBF: Malicious URL detection using learned Bloom Filter and evolutionary deep learning16
A fast calibration algorithm for Non-Dispersive Infrared single channel carbon dioxide sensor based on deep learning16
On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting16
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions16
Deep Q-learning enabled joint optimization of mobile edge computing multi-level task offloading16
A cost-effective trilateration-based radio localization algorithm using machine learning and sequential least-square programming optimization16
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network16
Towards AI-enabled traffic management in multipath TCP: A survey16
Overlapping community detection on complex networks with Graph Convolutional Networks16
A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment16
Performance evaluation methodologies for Smart Grid Substation Communication Networks: A survey16
Hybrid fog/cloud computing resource allocation: Joint consideration of limited communication resources and user credibility16
Market-based dynamic resource allocation in Mobile Edge Computing systems with multi-server and multi-user16
A survey on the role of UAVs in the communication process: A technological perspective16
LoRa support for long-range real-time inter-cluster communications over Bluetooth Low Energy industrial networks16
SLICES, a scientific instrument for the networking community16
Detection of DDoS attacks in D2D communications using machine learning approach16
Internet connected vehicle platoon system modeling and linear stability analysis16
Network traffic anomaly detection method based on multi-scale residual classifier16
Enabling Ambient Intelligence of Things (AIoT) healthcare system architectures16
A mutual information based federated learning framework for edge computing networks16
An improved routing protocol for raw data collection in multihop wireless sensor networks15
Hybrid beamforming NOMA for mmWave half-duplex UAV relay-assisted B5G/6G IoT networks15
Investigating the difference between trolls, social bots, and humans on Twitter15
Improving transaction success rate in cryptocurrency payment channel networks15
Privacy-preserving searchable encryption in the intelligent edge computing15
A secure blockchain system for Internet of Vehicles based on 6G-enabled Network in Box15
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud15
An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system15
Blockchain-based group key agreement protocol for vehicular ad hoc networks15
Optimization scheme for intrusion detection scheme GBDT in edge computing center15
Planning Fog networks for time-critical IoT requests15
Attention-based federated incremental learning for traffic classification in the Internet of Things15
ADMS: An online attack detection and mitigation system for LDoS attacks via SDN15
Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge15
A delay-sensitive resource allocation algorithm for container cluster in edge computing environment15
How does the traffic behavior change by using SUMO traffic generation tools15
Toward native explainable and robust AI in 6G networks: Current state, challenges and road ahead15
Keyword search over encrypted cloud data based on blockchain in smart medical applications15
Big data-driven scheduling optimization algorithm for Cyber–Physical Systems based on a cloud platform15
Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings14
Floating Nodes Assisted Cluster-Based Routing for Efficient Data Collection in Underwater Acoustic Sensor Networks14
Blockchain based resource allocation in cloud and distributed edge computing: A survey14
System reliability evaluation using budget constrained real d-MC se14
Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context14
0.069841861724854