International Journal of Network Management

Papers
(The median citation count of International Journal of Network Management is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure24
A systematic review on distributed denial of service attack defense mechanisms in programmable networks18
A generalized machine learning‐based model for the detection of DDoS attacks17
Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network13
Truthful Decentralized Blockchain Oracles12
Identity and access management using distributed ledger technology: A survey11
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation11
Container placement and migration strategies for cloud, fog, and edge data centers: A survey10
Visualization of Ethereum P2P network topology and peer properties9
Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment9
An access control for IoT based on network community perception and social trust against Sybil attacks9
A blockchain‐enabled security management framework for mobile edge computing8
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges8
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm7
A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation7
Offloading framework for computation service in the edge cloud and core cloud: A case study for face recognition7
Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system7
Industrial control protocols in the Internet core: Dismantling operational practices7
Denial of service detection using dynamic time warping7
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing7
Graph neural network‐based virtual network function deployment optimization6
Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things6
MediTrans—Patient‐centric interoperability through blockchain6
Application layer classification of Internet traffic using ensemble learning models5
Predicting short‐term mobile Internet traffic from Internet activity using recurrent neural networks5
A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks5
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack5
An augmented K‐means clustering approach for the detection of distributed denial‐of‐service attacks5
A federated semi‐supervised learning approach for network traffic classification5
amulog: A general log analysis framework for comparison and combination of diverse template generation methods*5
EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network4
Cost‐effective and accurate flow statistics collection in OpenFlow‐based SDN4
Towards threshold‐agnostic heavy‐hitter classification4
A Value‐of‐Information‐based management framework for fog services4
Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis4
An optimization‐based congestion control for constrained application protocol4
Towards optimal synchronization in NFV‐based environments4
On minimizing flow monitoring costs in large‐scale software‐defined network networks4
Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review3
A security‐enhanced equipment predictive maintenance solution for the ETO manufacturing3
Blockchain‐inspired lightweight trust‐based system in vehicular networks3
Detecting and analyzing border gateway protocol blackholing activity3
Software‐defined content delivery network at the edge for adaptive video streaming3
DockSDN: A hybrid container‐based software‐defined networking emulation tool3
SRv6‐based Time‐Sensitive Networks (TSN) with low‐overhead rerouting3
Load migration in distributed softwarized network controllers3
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard3
Energy‐aware mobility for aerial networks: A reinforcement learning approach3
E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks3
Blockchain and crypto forensics: Investigating crypto frauds2
Veritaa: A distributed public key infrastructure with signature store2
A secure cross‐organizational container deployment approach to enable ad hoc collaborations2
Availability‐aware virtual network function placement based on multidimensional universal generating functions2
A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment2
Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture2
Analysis of network function sharing in Content Delivery Network‐as‐a‐service slicing scenarios2
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA2
vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH2
Topic allocation method on edge servers for latency‐sensitive notification service1
Block diffusion delay attack and its countermeasures in a Bitcoin network1
A batch delivery mechanism of network update in software‐defined wide area networks1
A privacy‐focused approach for anomaly detection in IoT networks1
A novel eviction policy based on shortest remaining time for software defined networking flow tables1
IGXSS: XSS payload detection model based on inductive GCN1
Optimal segments for forwarding table size minimization in segment‐routed SDNs1
Joint service placement and user assignment model in multi‐access edge computing networks against base‐station failure1
An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures1
An optimal hybrid cascade regional convolutional network for cyberattack detection1
BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services1
A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks1
Editorial for the special issue on research trends in network operations and management with selected papers from the ninth edition of the Latin American Network Operations and Management Symposium1
A model‐driven approach for deployment descriptor design in network function virtualization1
Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files1
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study1
Slicing Wi‐Fi links based on QoE video streaming fairness1
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network1
Placement of virtual network functions for network services1
Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges1
The next phase of identifying illicit activity in Bitcoin1
1
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network1
FGLB: A fine‐grained hardware intra‐server load balancer based on 100 G FPGA SmartNIC1
A cost‐effective and load‐balanced controller placement method in software‐defined networks1
Reducing the propagation delay of compact block in Bitcoin network1
A comprehensive review of blockchain integration in remote patient monitoring for E‐health1
Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases1
Security, Privacy, and Trust Management on Decentralized Systems and Networks0
Issue Information0
0
0
Workload prediction based on improved error correlation logistic regression algorithm and Cross‐TRCN of spatiotemporal neural network0
SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things‐enabled wireless sensor networks0
0
Editorial for special issue on “Towards service and networking intelligence for humanity”0
Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment0
An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks0
Issue Information0
Issue Information0
0
Issue Information0
Performance of security options for message protocols: A comparative analysis0
0
Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain0
Topology analysis of the Ripple transaction network0
Massive Data HBase Storage Method for Electronic Archive Management0
0
Issue Information0
Accelerating network softwarization in the cognitive age0
Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions0
0
Innovations in Blockchain for Crypto Assets and Exchanges0
0
0
Construction of Metaphorical Maps of Cyberspace Resources Based on Point‐Cluster Feature Generalization0
A secure and light‐weight patient survival prediction in Internet of Medical Things framework0
A novel data streaming method for detecting abnormal flows in distributed monitoring systems0
An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing0
Blockchain‐Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy0
Issue Information0
0
0
0
A distributed algorithm with network‐independent step‐size and event‐triggered mechanism for economic dispatch problem0
Duo‐H: An Effectual Consensus Algorithm Using Two‐Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection0
Transaction fee mechanisms with farsighted miners0
Issue Information0
Issue Information0
Optimal network‐aware virtual data center embedding0
0
Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks0
Athena: Smart order routing on centralized crypto exchanges using a unified order book0
Issue Information0
Issue Information0
Issue Information0
Risk‐Aware SDN Defense Framework Against Anti‐Honeypot Attacks Using Safe Reinforcement Learning0
Topics from networks management and operations0
Issue Information0
No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation0
Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS)0
Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things0
Issue Information0
0
Autonomous Attack Mitigation Through Firewall Reconfiguration0
Dynamic management network system of automobile detection applying edge computing0
RNN‐EdgeQL: An auto‐scaling and placement approach for SFC0
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning0
Privacy‐preserving and efficient user matching based on attribute encryption in mobile social networks0
0
Issue Information0
Issue Information0
Intrusion Detection for Blockchain‐Based Internet of Things Using Gaussian Mixture–Fully Convolutional Variational Autoencoder Model0
0
Issue Information0
Graph neural network‐based virtual network function deployment optimization0
Out‐of‐band transaction pool sync for large dynamic blockchain networks0
Characterizing the Bitcoin network topology with Node‐Probe0
Audit‐based correction mechanism for malicious statistics information of data plane0
Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 “Advancing Blockchain and Cryptocurrency”0
Privacy‐protected object detection through trustworthy image fusion0
CNSM 2019 special issue: Embracing the new wave of artificial intelligence0
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity0
ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing0
0
0
0
Modeling and accomplishing the BEREC network neutrality policy0
Lightweight Flow‐Based Policy Enforcement for SDN‐Based Multi‐Domain Communication0
0
Privacy‐preserving data aggregation achieving completeness of data queries in smart grid0
Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions0
Leveraging Ponzi‐like designs in stablecoins0
Data sharing mode of dispatching automation system based on distributed machine learning0
A Blockchain‐Based Proxy Re‐Encryption Scheme With Cryptographic Reverse Firewall for IoV0
Issue Information0
0
0
Issue Information0
Load balancing clustering and routing for IoT‐enabled wireless sensor networks0
0
Issue Information0
An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network0
Issue Information0
Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse0
Editorial for special issue on security and trust on networked systems0
Issue Information0
Issue Information0
Issue Information0
ASMTP: Anonymous secure messaging token‐based protocol assisted data security in swarm of unmanned aerial vehicles0
DELTA: A Modular, Transparent, and Efficient Synchronization of DLTs and Databases0
Issue Information0
0
Issue Information0
A Fast Cross‐Chain Protocol Based on Trusted Notary Group for Metaverse0
The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens0
0.030470132827759