Journal of Network and Systems Management

Papers
(The median citation count of Journal of Network and Systems Management is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers121
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder86
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things81
Deep Learning in IoT Intrusion Detection80
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems66
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security59
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques55
Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks50
Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm44
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models41
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques41
Real-Time Task Scheduling Algorithm for IoT-Based Applications in the Cloud–Fog Environment40
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection40
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)32
Energy-Efficient Delay-Aware Task Offloading in Fog-Cloud Computing System for IoT Sensor Applications31
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives30
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach29
Service Function Chain Placement in Distributed Scenarios: A Systematic Review28
An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing Environment27
Machine Learning-Based Multipath Routing for Software Defined Networks27
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems26
Improved Artificial Bee Colony Using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environments25
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion24
Deep Reinforcement Learning Based Active Queue Management for IoT Networks22
Meta-heuristic Approaches for Effective Scheduling in Infrastructure as a Service Cloud: A Systematic Review21
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning20
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture20
Design of a Security and Trust Framework for 5G Multi-domain Scenarios20
Cybersecurity of Smart Home Systems: Sensor Identity Protection19
Hybrid Stochastic Ranking and Opposite Differential Evolution-Based Enhanced Firefly Optimization Algorithm for Extending Network Lifetime Through Efficient Clustering in WSNs19
A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems18
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis17
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework16
Reliability and Survivability Analysis of Long-Term Evolution Vehicular Ad-Hoc Networks: An Analytical Approach14
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach14
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks12
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions12
Collaborative Multi-domain Routing in SDN Environments12
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning11
Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention11
Resolving Load Imbalance State for SDN by Minimizing Maximum Load of Controllers11
MSN: A Playground Framework for Design and Evaluation of MicroServices-Based sdN Controller11
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications10
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment10
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing10
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT10
Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks10
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data10
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network9
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks9
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV9
XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks9
PassMon: A Technique for Password Generation and Strength Estimation9
Special Issue on Cybersecurity Management in the Era of AI9
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm8
Bloccess: Enabling Fine-Grained Access Control Based on Blockchain8
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking8
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks8
Intelligent Wireless Networks: Challenges and Future Research Topics8
A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics8
A Management Architecture for IoT Smart Solutions: Design and Implementation8
Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points7
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning7
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks7
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks7
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing7
A Cost-Aware Management Framework for Placement of Data-Intensive Applications on Federated Cloud7
ML-Based DDoS Detection and Identification Using Native Cloud Telemetry Macroscopic Monitoring7
Towards a Trustful Game-Theoretic Mechanism for Data Trading in the Blockchain-IoT Ecosystem7
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol7
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)7
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach7
Self-organizing Fog Support Services for Responsive Edge Computing6
WebAssembly Orchestration in the Context of Serverless Computing6
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains6
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks6
Knowledge Discovery: Can It Shed New Light on Threshold Definition for Heavy-Hitter Detection?6
Low Latency Low Loss Media Delivery Utilizing In-Network Packet Wash6
Optimal Service Selection and Placement Based on Popularity and Server Load in Multi-access Edge Computing6
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment6
A Multi-criteria Decision Making Approach for Scaling and Placement of Virtual Network Functions6
Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning6
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation6
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN6
An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks5
An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation5
On Ensuring Full Yet Cost-Efficient Survivability of Service Function Chains in NFV Environments5
A Secure IIoT Gateway Architecture based on Trusted Execution Environments5
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System5
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes5
Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty Workloads5
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples5
Intelligent and Resource-Conserving Service Function Chain (SFC) Embedding5
A Novel Cooperative Micro-Caching Algorithm Based on Fuzzy Inference Through NFV in Ultra-Dense IoT Networks5
An Intrusion Detection System Using Extended Kalman Filter and Neural Networks for IoT Networks4
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges4
Solutions for the Deployment of Communication Roadside Infrastructure for Streaming Delivery in Vehicular Networks4
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions4
A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems4
Intelligent Multi-connectivity Based Energy-Efficient Framework for Smart City4
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks4
A Hybrid Multi-objective Algorithm for Imbalanced Controller Placement in Software-Defined Networks4
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON4
Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game4
Joint Reliability-Aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme4
Speedy and Efficient Service Chaining and Function Placement Based on Lagrangian Heuristics for Capacitated Shortest Path Tour Problem4
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems4
Improving Network Delay Predictions Using GNNs3
Data Transfers Using Bandwidth Reservation Through Multiple Disjoint Paths of Dynamic HPNs3
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network3
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity3
Design and Performance Evaluation of a New Traffic Engineering Technique for Software-Defined Network Datacenters3
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks3
Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme3
Intelligent Secure Networking in In-band Full-duplex Dynamic Access Networks: Spectrum Management and Routing Protocol3
SD-RAN Interactive Management Using In-band Network Telemetry in IEEE 802.11 Networks3
Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System3
On the Robustness of Controlled Deep Reinforcement Learning for Slice Placement3
Asynchronous Time-Aware Shaper for Time-Sensitive Networking3
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S3
Minimizing Resource Allocation for Cloud-Native Microservices3
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation3
Customizable Deployment of NFV Services3
Enhancing the Capabilities of Mobile Backhaul: A User Plane Perspective3
Dynamic Migration of Microservices for End-to-End Latency Control in 5G/6G Networks3
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory3
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond3
Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis3
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory3
Edge Computing Systems: Modeling and Resource Optimization for Augmented Reality and Soft Real-time Applications2
A Blackout Aware Handover Mechanism for Ultra Dense Networks2
An Efficient and Decentralized Fuzzy Reinforcement Learning Bandwidth Controller for Multitenant Data Centers2
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks2
Energy Aware Fuzzy Approach for VNF Placement and Consolidation in Cloud Data Centers2
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment2
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing2
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations2
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices2
Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN2
AAC: Adaptively Adjusting Concurrency by Exploiting Path Diversity in Datacenter Networks2
A Protection System Against HTTP Flood Attacks Using Software Defined Networking2
Explora-VR: Content Prefetching for Tile-Based Immersive Video Streaming Applications2
A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments2
QoE Evaluation in Adaptive Streaming: Enhanced MDT with Deep Learning2
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks2
Towards Service and Networking Intelligence for Humanity: A Report on APNOMS 20202
Cloud-Native Placement Strategies of Service Function Chains with Dependencies2
ALPACA: A PCI Assignment Algorithm Taking Advantage of Weighted ANR2
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review2
Peripheral Diagnosis for Propagated Network Faults2
Security Evaluation of Authentication Requirements in IoT Gateways2
Link State Estimator for VANETs Using Neural Networks2
Innovative Fitness Functions for Robust Energy Management in WSNs2
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification2
High Capacity and Resilient Large-Scale Deterministic IP Networks2
Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa2
ARP Overhead Reduction Framework for Software Defined Data Centers2
Securing Software-Defined Networks Through Adaptive Moving Target Defense Capabilities2
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites2
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks2
Optimal and Efficient Sensor Design for 5G-Based Internet-of-Body Healthcare Monitoring Network2
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks2
0.054512023925781