Computer Standards & Interfaces

Papers
(The median citation count of Computer Standards & Interfaces is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Comprehensive survey of UAVs communication networks87
Optimal 5G network slicing using machine learning and deep learning concepts82
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities80
Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.060
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission60
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment53
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses50
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning45
A stream processing architecture for heterogeneous data sources in the Internet of Things44
Perspectives on risks and standards that affect the requirements engineering of blockchain technology43
A systematic literature review on requirement prioritization techniques and their empirical evaluation42
Factory Communications at the Dawn of the Fourth Industrial Revolution42
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications41
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review36
Toward secure distributed data storage with error locating in blockchain enabled edge computing32
A microservice architecture for real-time IoT data processing: A reusable Web of things approach for smart ports31
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications30
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing30
DOA tracking for seamless connectivity in beamformed IoT-based drones28
Designing secure and lightweight user access to drone for smart city surveillance27
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO26
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption26
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient24
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs24
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud24
Trusted data sharing with flexible access control based on blockchain22
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing22
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks22
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA21
Performance evaluation of secured network traffic classification using a machine learning approach20
A new secure arrangement for privacy-preserving data collection20
A taxonomy of attack mechanisms in the automotive domain18
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud17
Accountable outsourcing data storage atop blockchain17
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior17
Blockchain-based verifiable privacy-preserving data classification protocol for medical data17
Software Process Simulation Modeling: Systematic literature review17
Risk management in the software life cycle: A systematic literature review16
Secure deduplication with efficient user revocation in cloud storage16
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing16
Efficient dynamic-power AODV routing protocol based on node density16
Privacy-preserving Byzantine-robust federated learning16
The impact of error control schemes on lifetime of energy harvesting wireless sensor networks in industrial environments16
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack16
Generic server-aided secure multi-party computation in cloud computing15
Privacy-preserving COVID-19 contact tracing solution based on blockchain15
SafeSec Tropos: Joint security and safety requirements elicitation15
Blockchain-empowered security and privacy protection technologies for smart grid14
The trust model of enterprise purchasing for B2B e-marketplaces14
Public-key encryption with bidirectional keyword search and its application to encrypted emails14
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester14
Provable data deletion from efficient data integrity auditing and insertion in cloud storage14
DTMR: An adaptive Distributed Tree-based Multicast Routing protocol for vehicular networks13
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis13
Energy trading scheme based on consortium blockchain and game theory13
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture13
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption12
Predicting the security threats of internet rumors and spread of false information based on sociological principle12
Energy aware algorithm based on actual utilization for periodic tasks in mixed-criticality real-time systems12
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things12
An efficient multivariate threshold ring signature scheme12
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health12
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network12
AgentDSM-Eval: A framework for the evaluation of domain-specific modeling languages for multi-agent systems11
TOTEM: Reconciling multi-level modelling with standard two-level modelling11
Attribute-based proxy re-signature from standard lattices and its applications11
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications10
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems10
Web service reliability prediction based on machine learning10
Securing social platform from misinformation using deep learning10
Energy aware fixed priority scheduling in mixed-criticality systems10
Detection of web service anti-patterns using weighted extreme learning machine10
Lattice-based signcryption with equality test in standard model10
An adaptive access control scheme based on trust degrees for edge computing10
Proposal for a maintenance management system in industrial environments based on ISO 9001 and ISO 14001 standards10
Performance analysis of handover management in 5G small cells10
PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks9
Verifiable database supporting keyword searches with forward security9
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids9
Toward pre-standardization of reputation-based trust models beyond 5G9
Live migration of trans-cloud applications9
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA9
A consensus mechanism based on multi-round concession negotiation8
Self-Adaptive Neighbor Discovery in Wireless Sensor Networks with Sectored-Antennas8
A reference framework for the implementation of data governance systems for industry 4.08
Test usability guidelines and follow conventions. Useful recommendations from web developers8
Generating educational mobile applications using UIDPs identified by artificial intelligence techniques8
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs7
Revocable attribute-based encryption from standard lattices7
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice7
Requirements capture and comparative analysis of open source versus proprietary service oriented architecture7
A novel and efficient index based web service discovery approach6
Full black-box retrievable and accountable identity-based encryption6
Supporting the deployment of ISO-based project management processes with agile metrics6
A robust analysis of adversarial attacks on federated learning environments6
A novel small-scale pedestrian detection method base on residual block group of CenterNet6
Injecting domain knowledge in multi-objective optimization problems: A semantic approach6
Repudiable ring signature: Stronger security and logarithmic-size6
Enhancing differential evolution with a target vector replacement strategy6
Microservice based scalable IoT architecture for device interoperability6
Commodity anti-counterfeiting decision in e-commerce trade based on machine learning and Internet of Things6
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI6
EDALoCo: Enhancing the accessibility of blockchains through a low-code approach to the development of event-driven applications for smart contract management5
Evaluation of the implementation of a subset of ISO/IEC 29110 Software Implementation process in four teams of undergraduate students of Ecuador. An empirical software engineering experiment5
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption5
A process assessment model for big data analytics5
A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain5
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems5
Automated fault tolerance augmentation in model-driven engineering for CPS5
Model-driven approach running route two-level SVD with context information and feature entities in recommender system5
Information technologies exposing children to privacy risks: Domains and children-specific technical controls5
A visual approach for identification and annotation of business process elements in process descriptions5
A BIPMU-based network security situation assessment method for wireless network5
Module learning with rounding based key agreement scheme with modified reconciliation4
A blockchain-based compact audit-enabled deduplication in decentralized storage4
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities4
Efficient public-key authenticated deniable encryption schemes4
Improving transferability of adversarial examples with powerful affine-shear transformation attack4
An intelligent blockchain-based access control framework with federated learning for genome-wide association studies4
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints4
Hybrid unsupervised web-attack detection and classification – A deep learning approach4
Certificateless ring signcryption for multi-source network coding4
An analysis model for detecting misbehaviors in anonymous cryptocurrency4
On the effects of continuous delivery on code quality: A case study in industry4
ANDES: An approach to embed search services on the Web browser4
Public integrity auditing for dynamic group cooperation files with efficient user revocation4
A parallel programming assessment for stream processing applications on multi-core systems4
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis3
Towards a method to quantitatively measure toolchain interoperability in the engineering lifecycle: A case study of digital hardware design3
An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking3
A robust stochastic stability analysis approach for power system considering wind speed prediction error based on Markov model3
Secure cloud file sharing scheme using blockchain and attribute-based encryption3
SLA-Driven modeling and verifying cloud systems: A Bigraphical reactive systems-based approach3
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing3
Packet loss concealment method based on interpolation in packet voice coding3
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property3
Intelligent and trusted metaheuristic optimization model for reliable agricultural network3
Analysis and practical validation of a standard SDN-based framework for IPsec management3
Analysis and evaluation of the riak cluster environment in distributed databases3
Mutual authentication scheme for smart devices in IoT-enabled smart home systems3
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare3
Proofs of retrievability with tag outsourcing based on Goppa codes3
A BERT-Based Sequential POI Recommender system in Social Media3
On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method3
More efficient tightly-secure lattice-based IBE with equality test3
An extended software defined optical networks slicing architecture3
Comparing coverage criteria for dynamic web application: An empirical evaluation3
Video image scaling technology based on adaptive interpolation algorithm and TTS FPGA implementation3
Inclusion of Functional and Non-Functional Parameters for the Prediction of Overall Efforts of Mobile Applications.3
0.035343885421753