Journal of Network and Systems Management

Papers
(The median citation count of Journal of Network and Systems Management is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings86
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures81
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion80
Dynamic Multi-Method Allocation for Intent-based Security Orchestration71
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis62
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance59
DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic Algorithms50
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond44
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security41
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment41
An Algorithm to Speed up Network Recovery Fault Point Estimation and Recovery Action Recommendation40
4MIDable: Flexible Network Offloading For Security VNFs40
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems32
A Study of Costs and Benefits of Content Sharing in Personal Cloud Storage31
Random Point Evolution-Based Heuristic for Resource Efficiency in OCDMA Networks30
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization29
Networking Data and Intelligent Management in the Post-COVID19 Era: A Report on APNOMS 202128
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks26
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks25
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency24
Securing Software-Defined Networks Through Adaptive Moving Target Defense Capabilities22
Fault Tolerance and Failure Recovery Techniques in Software-Defined Networking: A Comprehensive Approach20
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S20
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems20
Empowering Microservices: A Deep Dive into Intelligent Application Component Placement for Optimal Response Time19
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis19
A Performance Evaluation of Neural Networks for Botnet Detection in the Internet of Things18
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency17
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment16
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices14
Virtual Network Function Development for NG-PON Access Network Architecture12
ALPACA: A PCI Assignment Algorithm Taking Advantage of Weighted ANR12
Enabling Organizations to Participate in the Ad Hoc Scheduling of a Cross-Organizational Data Pipeline12
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites11
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks11
Design of a Security and Trust Framework for 5G Multi-domain Scenarios11
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations11
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)10
Intelligent Wireless Networks: Challenges and Future Research Topics10
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON10
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing10
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions10
Cloud-Native Placement Strategies of Service Function Chains with Dependencies10
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN9
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks9
Mitigating DoS Attack in MANETs Considering Node Reputation with AI9
Towards a Trustful Game-Theoretic Mechanism for Data Trading in the Blockchain-IoT Ecosystem9
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions9
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game9
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm8
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks8
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples8
A Load Balancing Strategy Based on Fuzzy Satisfaction Among Multiple Controllers in Software-Defined Networking8
Online Dynamic Container Rescheduling for Improved Application Service Time8
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks8
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT8
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity7
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data7
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework7
A Secure IIoT Gateway Architecture based on Trusted Execution Environments7
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach7
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things7
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework7
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach7
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques7
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution7
Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing6
A Hybrid Multi-objective Algorithm for Imbalanced Controller Placement in Software-Defined Networks6
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services6
Dynamic Migration of Microservices for End-to-End Latency Control in 5G/6G Networks6
Towards Service and Networking Intelligence for Humanity: A Report on APNOMS 20206
Energy Aware Fuzzy Approach for VNF Placement and Consolidation in Cloud Data Centers6
Transaction Latency Within Permissionless Blockchains: Analysis, Improvement, and Security Considerations6
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory6
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment6
Solutions for the Deployment of Communication Roadside Infrastructure for Streaming Delivery in Vehicular Networks6
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems6
One Class Density Estimation Approach for Fault Detection and Rootcause Analysis in Computer Networks5
Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks5
Network Tomography with Partial Topology Knowledge and Dynamic Routing5
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture5
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement5
Achieving High Utilization by Elastic Chunk Scheduling in DASH Systems5
SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks5
Leveraging Multi-rate Multicast for Content Caching and Transmission Rate Allocation in Cache-Enabled Networks5
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation5
Resolving Load Imbalance State for SDN by Minimizing Maximum Load of Controllers5
Preprocessing-Based Approach for Prompt Intrusion Detection in SDN Networks4
Asynchronous Time-Aware Shaper for Time-Sensitive Networking4
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning4
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation4
Decentralized Distance-based Strategy for Detection of Sybil Attackers and Sybil Nodes in VANET4
ARP Overhead Reduction Framework for Software Defined Data Centers4
Design and Performance Evaluation of a New Traffic Engineering Technique for Software-Defined Network Datacenters4
Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach4
Overcoming Real-World IoT Deployment Challenges with Enhanced Fuzzy Logic Decision Algorithms4
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning4
Deployment of Future Services in a Multi-access Edge Computing Environment Using Intelligence at the Edge4
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis4
A Novel Light Reflection-Random Walk for Smart Sensors Relocation4
BoostSec: Adaptive Attack Detection for Vehicular Networks3
On the Robustness of Controlled Deep Reinforcement Learning for Slice Placement3
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling3
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach3
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis3
Improving VANET Data Dissemination Efficiency with Deep Neural Networks3
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks3
CNS-AOM: Design, Implementation and Integration of an Architecture for Orchestration and Management of Cloud-Network Slices3
Bungee-ML: A Cross-Plane Approach for a Collaborative Defense Against DDoS Attacks3
Enabling the Rescheduling of Containerized Workloads in an Ad Hoc Cross-Organizational Collaboration3
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation3
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks3
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach3
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments3
WoS-CoMS: Work Stealing-Based Congestion Management Scheme for SDN Programmable Networks3
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach3
Access Networks Brownfield Investments Based on Characteristic Infrastructure Parameters Optimization3
A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints3
Speedy and Efficient Service Chaining and Function Placement Based on Lagrangian Heuristics for Capacitated Shortest Path Tour Problem3
Smart Hospital Patient Monitoring System Aided by Edge-Fog-Cloud Continuum: A Performability Evaluation Focusing on Distinct Sensor Sources3
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks3
A New Blockchain-Based Auction Method for Resource Allocation in Fog Computing Environment3
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture2
An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain2
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks2
Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm2
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives2
MSN: A Playground Framework for Design and Evaluation of MicroServices-Based sdN Controller2
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications2
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN2
GlobeSnap: An Efficient Globally Consistent Statistics Collection for Software-Defined Networks2
Improving the Resource Efficiency in Massive MIMO-NOMA Systems2
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains2
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion2
Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit2
Intelligent and Resource-Conserving Service Function Chain (SFC) Embedding2
Towards Resource-Efficient DDoS Detection in IoT: Leveraging Feature Engineering of System and Network Usage Metrics2
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks2
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)2
Optimizing Completion Time of Requests in Serverless Computing2
QoE Evaluation in Adaptive Streaming: Enhanced MDT with Deep Learning2
Optimal Service Selection and Placement Based on Popularity and Server Load in Multi-access Edge Computing2
An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks2
Hybrid Stochastic Ranking and Opposite Differential Evolution-Based Enhanced Firefly Optimization Algorithm for Extending Network Lifetime Through Efficient Clustering in WSNs2
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes2
Cybersecurity of Smart Home Systems: Sensor Identity Protection2
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks2
RiskNet: Neural Risk Assessment in Networks of Unreliable Resources2
Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks2
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams2
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree2
Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa2
Enhancing Cloud Gaming QoE Estimation by Stacking Learning2
A Game Theoretic Framework for Distributed Mission Slice Allocation and Management for Tactical Networks2
A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments1
Adaptive UE Handover Management with MAR-Aided Multivariate DQN in Ultra-Dense Networks1
Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty Workloads1
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach1
High Capacity and Resilient Large-Scale Deterministic IP Networks1
A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications1
Regenerating Networked Systems’ Monitoring Traces Using Neural Networks1
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster1
Special Issue on Cybersecurity Management in the Era of AI1
On Ensuring Full Yet Cost-Efficient Survivability of Service Function Chains in NFV Environments1
Deep Learning in IoT Intrusion Detection1
PDRAS: Priority-Based Dynamic Resource Allocation Scheme in 5G Network Slicing1
Improved Artificial Bee Colony Using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environments1
Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks1
ATENA: Adaptive TEchniques for Network Area Coverage and Routing in IoT-Based Edge Computing1
Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System1
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System1
An Efficient and Decentralized Fuzzy Reinforcement Learning Bandwidth Controller for Multitenant Data Centers1
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization1
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges1
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework1
Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning1
Performance of Massive MIMO Aided by Reflective Intelligent Surfaces1
Correction: Assuring Efficient Path Selection in an IntentBased Networking System: a Graph Neural Networks and Deep Reinforcement Learning Approach1
On the Deployment Problem of Multiple Drones in Millimeter Wave Systems1
An Adaptive Method for Identifying Super Nodes from Network-wide View1
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network1
AI-Based Intrusion Detection for a Secure Internet of Things (IoT)1
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing1
2DNCF-PIT: Two-Dimensional Neighbor-Based Cuckoo Filter for Pending Interest Table Lookup in Named Data Networking1
XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks1
An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation1
High-Precision, Predictable and Low-Latency Networking1
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)1
A Survey on the Optimization of Security Components Placement in Internet of Things1
SDBlock-IoT: A Blockchain-Enabled Software-Defined Multicontroller Architecture to Safeguard OpenFlow Tables1
NS-ENFORCER: Enforcing Network Slicing on Radio Access Networks1
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment1
An Efficient Adaptive Meta Learning Model Based VNFs Affinity for Resource Prediction Optimization in Virtualized Networks1
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring1
Deep Reinforcement Learning Based Active Queue Management for IoT Networks1
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble1
A Framework for Dynamic Configuration of TLS Connections Based on Standards1
ConfExp: Root-Cause Analysis of Service Misconfigurations in Enterprise Systems1
A Cost-Aware Management Framework for Placement of Data-Intensive Applications on Federated Cloud1
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks1
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning1
An Adaptable and Agnostic Flow Scheduling Approach for Data Center Networks1
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking1
Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks1
Enhancing the Capabilities of Mobile Backhaul: A User Plane Perspective1
Joint Policy for Virtual Network Embedding in Distributed SDN-Enabled Cloud1
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol1
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection1
0.043592929840088