International Journal of Network Management

Papers
(The TQCC of International Journal of Network Management is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
OpenBNG: Central office network functions on programmable data plane hardware18
An analysis of the fees and pending time correlation in Ethereum14
A systematic review on distributed denial of service attack defense mechanisms in programmable networks13
Next generation of microservices for the 5G Service‐Based Architecture12
De‐anonymizing Ethereum blockchain smart contracts through code attribution12
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure12
Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network12
Decision Tree‐Based Entries Reduction scheme using multi‐match attributes to prevent flow table overflow in SDN environment10
Identity and access management using distributed ledger technology: A survey9
Truthful Decentralized Blockchain Oracles9
Clustering method in protocol reverse engineering for industrial protocols9
A generalized machine learning‐based model for the detection of DDoS attacks9
An access control for IoT based on network community perception and social trust against Sybil attacks8
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation8
Classification and evaluation of IoT brokers: A methodology8
Visualization of Ethereum P2P network topology and peer properties7
SDN‐based teleprotection and control power systems: A study of available controllers and their suitability6
VNF‐Consensus: A virtual network function for maintaining a consistent distributed software‐defined network control plane6
Container placement and migration strategies for cloud, fog, and edge data centers: A survey6
Industrial control protocols in the Internet core: Dismantling operational practices6
Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment6
Offloading framework for computation service in the edge cloud and core cloud: A case study for face recognition5
Denial of service detection using dynamic time warping5
Predicting short‐term mobile Internet traffic from Internet activity using recurrent neural networks5
Graph neural network‐based virtual network function deployment optimization5
A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation5
MediTrans—Patient‐centric interoperability through blockchain5
A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks5
A framework for multi‐provider virtual private networks in software‐defined federated networks4
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing4
An optimization‐based congestion control for constrained application protocol4
Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis4
EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network4
Wireless‐Fog Mesh: A framework for in‐network computing of microservices in semipermanent smart environments4
A Value‐of‐Information‐based management framework for fog services3
Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things3
Trustful ad hoc cross‐organizational data exchanges based on the Hyperledger Fabric framework3
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges3
An efficient neural network optimized by fruit fly optimization algorithm for user equipment association in software‐defined wireless sensor network3
Load migration in distributed softwarized network controllers3
On accounting for screen resolution in adaptive video streaming: QoE‐driven bandwidth sharing framework3
An augmented K‐means clustering approach for the detection of distributed denial‐of‐service attacks3
Energy‐aware mobility for aerial networks: A reinforcement learning approach3
A blockchain‐enabled security management framework for mobile edge computing3
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack3
Software‐defined content delivery network at the edge for adaptive video streaming3
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard3
amulog: A general log analysis framework for comparison and combination of diverse template generation methods*3
E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks3
Application layer classification of Internet traffic using ensemble learning models3
On minimizing flow monitoring costs in large‐scale software‐defined network networks3
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm3
0.023530006408691