Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Comprehensive survey of UAVs communication networks90
Optimal 5G network slicing using machine learning and deep learning concepts82
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities82
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission63
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester56
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment55
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses51
A stream processing architecture for heterogeneous data sources in the Internet of Things45
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning45
Factory Communications at the Dawn of the Fourth Industrial Revolution42
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications41
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review36
A microservice architecture for real-time IoT data processing: A reusable Web of things approach for smart ports34
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications33
Toward secure distributed data storage with error locating in blockchain enabled edge computing32
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing31
Designing secure and lightweight user access to drone for smart city surveillance29
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption28
DOA tracking for seamless connectivity in beamformed IoT-based drones28
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO27
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs25
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing25
Trusted data sharing with flexible access control based on blockchain24
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient24
Performance evaluation of secured network traffic classification using a machine learning approach24
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud23
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA22
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks22
A taxonomy of attack mechanisms in the automotive domain20
A new secure arrangement for privacy-preserving data collection20
Privacy-preserving Byzantine-robust federated learning20
Blockchain-empowered security and privacy protection technologies for smart grid18
Blockchain-based verifiable privacy-preserving data classification protocol for medical data18
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud18
Software Process Simulation Modeling: Systematic literature review17
Accountable outsourcing data storage atop blockchain17
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior17
Privacy-preserving COVID-19 contact tracing solution based on blockchain16
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing16
Secure deduplication with efficient user revocation in cloud storage16
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack16
Energy trading scheme based on consortium blockchain and game theory16
Risk management in the software life cycle: A systematic literature review16
Efficient dynamic-power AODV routing protocol based on node density16
SafeSec Tropos: Joint security and safety requirements elicitation16
The impact of error control schemes on lifetime of energy harvesting wireless sensor networks in industrial environments16
Generic server-aided secure multi-party computation in cloud computing15
The trust model of enterprise purchasing for B2B e-marketplaces15
Provable data deletion from efficient data integrity auditing and insertion in cloud storage15
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture15
Public-key encryption with bidirectional keyword search and its application to encrypted emails14
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis14
DTMR: An adaptive Distributed Tree-based Multicast Routing protocol for vehicular networks13
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health12
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network12
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption12
Predicting the security threats of internet rumors and spread of false information based on sociological principle12
Energy aware algorithm based on actual utilization for periodic tasks in mixed-criticality real-time systems12
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things12
An efficient multivariate threshold ring signature scheme12
Verifiable database supporting keyword searches with forward security11
Detection of web service anti-patterns using weighted extreme learning machine11
Attribute-based proxy re-signature from standard lattices and its applications11
Performance analysis of handover management in 5G small cells11
AgentDSM-Eval: A framework for the evaluation of domain-specific modeling languages for multi-agent systems11
Web service reliability prediction based on machine learning11
Securing social platform from misinformation using deep learning10
Proposal for a maintenance management system in industrial environments based on ISO 9001 and ISO 14001 standards10
An adaptive access control scheme based on trust degrees for edge computing10
Energy aware fixed priority scheduling in mixed-criticality systems10
Toward pre-standardization of reputation-based trust models beyond 5G10
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications10
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems10
Lattice-based signcryption with equality test in standard model10
0.033665895462036