International Journal of Network Management

Papers
(The median citation count of International Journal of Network Management is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
OpenBNG: Central office network functions on programmable data plane hardware18
An analysis of the fees and pending time correlation in Ethereum14
A systematic review on distributed denial of service attack defense mechanisms in programmable networks13
Next generation of microservices for the 5G Service‐Based Architecture12
De‐anonymizing Ethereum blockchain smart contracts through code attribution12
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure12
Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network12
Decision Tree‐Based Entries Reduction scheme using multi‐match attributes to prevent flow table overflow in SDN environment10
Identity and access management using distributed ledger technology: A survey9
Truthful Decentralized Blockchain Oracles9
Clustering method in protocol reverse engineering for industrial protocols9
A generalized machine learning‐based model for the detection of DDoS attacks9
An access control for IoT based on network community perception and social trust against Sybil attacks8
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation8
Classification and evaluation of IoT brokers: A methodology8
Visualization of Ethereum P2P network topology and peer properties7
SDN‐based teleprotection and control power systems: A study of available controllers and their suitability6
VNF‐Consensus: A virtual network function for maintaining a consistent distributed software‐defined network control plane6
Container placement and migration strategies for cloud, fog, and edge data centers: A survey6
Industrial control protocols in the Internet core: Dismantling operational practices6
Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment6
Offloading framework for computation service in the edge cloud and core cloud: A case study for face recognition5
Denial of service detection using dynamic time warping5
Predicting short‐term mobile Internet traffic from Internet activity using recurrent neural networks5
Graph neural network‐based virtual network function deployment optimization5
A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation5
MediTrans—Patient‐centric interoperability through blockchain5
A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks5
A framework for multi‐provider virtual private networks in software‐defined federated networks4
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing4
An optimization‐based congestion control for constrained application protocol4
Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis4
EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network4
Wireless‐Fog Mesh: A framework for in‐network computing of microservices in semipermanent smart environments4
A Value‐of‐Information‐based management framework for fog services3
Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things3
Trustful ad hoc cross‐organizational data exchanges based on the Hyperledger Fabric framework3
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges3
An efficient neural network optimized by fruit fly optimization algorithm for user equipment association in software‐defined wireless sensor network3
Load migration in distributed softwarized network controllers3
On accounting for screen resolution in adaptive video streaming: QoE‐driven bandwidth sharing framework3
An augmented K‐means clustering approach for the detection of distributed denial‐of‐service attacks3
Energy‐aware mobility for aerial networks: A reinforcement learning approach3
A blockchain‐enabled security management framework for mobile edge computing3
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack3
Software‐defined content delivery network at the edge for adaptive video streaming3
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard3
amulog: A general log analysis framework for comparison and combination of diverse template generation methods*3
E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks3
Application layer classification of Internet traffic using ensemble learning models3
On minimizing flow monitoring costs in large‐scale software‐defined network networks3
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm3
A message keyword extraction approach by accurate identification of field boundaries2
Graph theoretical approach for automated IP lifecycle management in telco networks2
Veritaa: A distributed public key infrastructure with signature store2
Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis2
Towards distributed emergency flow prioritization in software‐defined networks2
A cost‐efficient QoS‐aware analytical model of future software content delivery networks2
Counselors network for intrusion detection2
Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture2
Detecting and analyzing border gateway protocol blackholing activity2
Towards optimal synchronization in NFV‐based environments2
Cost‐effective and accurate flow statistics collection in OpenFlow‐based SDN2
A federated semi‐supervised learning approach for network traffic classification2
vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH2
A secure cross‐organizational container deployment approach to enable ad hoc collaborations2
A privacy‐focused approach for anomaly detection in IoT networks1
DockSDN: A hybrid container‐based software‐defined networking emulation tool1
Optimal segments for forwarding table size minimization in segment‐routed SDNs1
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study1
Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases1
Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review1
Topic allocation method on edge servers for latency‐sensitive notification service1
1
A model‐driven approach for deployment descriptor design in network function virtualization1
Secure grid‐based density peaks clustering on hybrid cloud for industrial IoT1
Dynamic credit reservation for online charging of regular Internet of things traffic1
Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system1
1
Towards threshold‐agnostic heavy‐hitter classification1
A batch delivery mechanism of network update in software‐defined wide area networks1
Blockchain‐inspired lightweight trust‐based system in vehicular networks1
A cost‐effective and load‐balanced controller placement method in software‐defined networks1
Slicing Wi‐Fi links based on QoE video streaming fairness1
A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment1
Minimizing protection switching time in transport networks with shared mesh protection1
Editorial for the special issue on research trends in network operations and management with selected papers from the ninth edition of the Latin American Network Operations and Management Symposium1
0
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity0
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network0
Graph neural network‐based virtual network function deployment optimization0
Issue Information0
Issue Information0
Blockchain and crypto forensics: Investigating crypto frauds0
Optimal network‐aware virtual data center embedding0
Placement of virtual network functions for network services0
0
0
The next phase of identifying illicit activity in Bitcoin0
Issue Information0
An optimal hybrid cascade regional convolutional network for cyberattack detection0
Availability‐aware virtual network function placement based on multidimensional universal generating functions0
Topics from networks management and operations0
Athena: Smart order routing on centralized crypto exchanges using a unified order book0
Issue Information0
Issue Information0
IGXSS: XSS payload detection model based on inductive GCN0
Issue Information0
RNN‐EdgeQL: An auto‐scaling and placement approach for SFC0
0
Block diffusion delay attack and its countermeasures in a Bitcoin network0
Issue Information0
Editorial for special issue on “challenges and opportunities of Blockchain and Cryptocurrency”0
Issue Information0
Editorial for special issue on security and trust on networked systems0
Issue Information0
0
Issue Information0
Issue Information0
Audit‐based correction mechanism for malicious statistics information of data plane0
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network0
Issue Information0
0
Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS)0
Joint service placement and user assignment model in multi‐access edge computing networks against base‐station failure0
0
Modeling and accomplishing the BEREC network neutrality policy0
Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment0
Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files0
0
0
Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions0
0
A security‐enhanced equipment predictive maintenance solution for the ETO manufacturing0
0
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA0
Issue Information0
Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks0
IJNM Special Issue—International Journal of Network Management: QoE‐centric analysis and management of communication networks0
Issue Information0
Issue Information0
Reducing the propagation delay of compact block in Bitcoin network0
Issue Information0
0
Issue Information0
Dynamic management network system of automobile detection applying edge computing0
0
0
0
Out‐of‐band transaction pool sync for large dynamic blockchain networks0
A novel data streaming method for detecting abnormal flows in distributed monitoring systems0
Analysis of network function sharing in Content Delivery Network‐as‐a‐service slicing scenarios0
A novel eviction policy based on shortest remaining time for software defined networking flow tables0
Issue Information0
CNSM 2019 special issue: Embracing the new wave of artificial intelligence0
0
Characterizing the Bitcoin network topology with Node‐Probe0
Issue Information0
0
Load balancing clustering and routing for IoT‐enabled wireless sensor networks0
Editorial for special issue on “Towards service and networking intelligence for humanity”0
0
Topology analysis of the Ripple transaction network0
Issue Information0
CL‐MIPv6: A cross‐layer approach for fast‐internetwork‐mobility support in 6LoWPAN wireless sensor networks0
0
FGLB: A fine‐grained hardware intra‐server load balancer based on 100 G FPGA SmartNIC0
0
A comprehensive review of blockchain integration in remote patient monitoring for E‐health0
Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges0
Accelerating network softwarization in the cognitive age0
BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services0
0
Issue Information0
An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures0
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning0
0
Privacy‐preserving and efficient user matching based on attribute encryption in mobile social networks0
SRv6‐based Time‐Sensitive Networks (TSN) with low‐overhead rerouting0
Issue Information0
Issue Information0
Issue Information0
0.030900001525879