Journal of Network and Systems Management

Papers
(The median citation count of Journal of Network and Systems Management is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency135
Flow Migration for Service Function Chains: Correctness Criteria and Their Relaxation97
RLSK_US: An Improved Dynamic Virtual Machine Consolidation Model to Optimize Energy and SLA Violations in Cloud Datacenter88
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT64
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis61
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN58
Deterministic Scheduling of Periodic Messages for Low Latency in Cloud RAN55
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)51
Evaluating Cross-Domain Generalisation of Deep Learning Models in Network Traffic Classification: A Statistical and Experimental Analysis of VNF and PNF44
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions43
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices41
A Novel Wavelet-Based Model For Android Malware Detection Utilizing System Calls Features38
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework32
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings29
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures28
4MIDable: Flexible Network Offloading For Security VNFs25
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm24
Defense-in-Depth and Machine Learning-Based Intrusion Detection for Industrial Control Systems24
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis24
Edge Deployment of Optimized 5G Core Network for Efficient Inter-edge Handovers23
A Novel Deep Learning-based Intrusion Detection Model for Cybersecurity in Intelligent Vehicular Ad Hoc Networks22
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance21
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment20
Deployment of Future Services in a Multi-access Edge Computing Environment Using Intelligence at the Edge20
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework20
ARP Overhead Reduction Framework for Software Defined Data Centers18
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)18
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services18
Smart Hospital Patient Monitoring System Aided by Edge-Fog-Cloud Continuum: A Performability Evaluation Focusing on Distinct Sensor Sources18
One Class Density Estimation Approach for Fault Detection and Rootcause Analysis in Computer Networks17
SereWay: Toward SEcurity and REliability Benchmarking for the RailWAY IIoT16
Correction to: Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN16
Deep Learning and Fuzzy Logic Integration for Virtual Network Function Deployment16
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning16
Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing16
Responsible Workload Sequence Anomaly Detection with Bi-View Feature Fusion15
A Hybrid Heuristic Task Offloading Algorithm in Mobile Edge Computing for Joint Optimization of Delay and Energy Consumption15
A Honeynet-Driven Privacy Preserving Incremental Learning Framework for Cyberattack Classification in Industry 4.0 Environments15
QoE Evaluation in Adaptive Streaming: Enhanced MDT with Deep Learning14
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks14
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams14
X-CLNN: A Hybrid Neural Network-Based Approach Combining CNN and RNN for Communication Services Classification14
SDBlock-IoT: A Blockchain-Enabled Software-Defined Multicontroller Architecture to Safeguard OpenFlow Tables14
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives14
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN14
Optimizing Completion Time of Requests in Serverless Computing14
A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications14
LogAnomEX: An Unsupervised Log Anomaly Detection Method Based on Electra-DP and Gated Bilinear Neural Networks14
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring13
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking13
Enabling RPL on the Internet of Underwater Things13
An Adaptable and Agnostic Flow Scheduling Approach for Data Center Networks13
An Efficient and Decentralized Fuzzy Reinforcement Learning Bandwidth Controller for Multitenant Data Centers13
A Survey on the Optimization of Security Components Placement in Internet of Things13
Distributed Maximum Utility Task Offloading for Delay-Sensitive IoT Applications in Cloud and Edge Computing13
PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks13
Distributed AgriFood Supply Chains12
Intent-Driven Network Isolation for the Cloud Computing Continuum12
A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach12
Cross-DistBlock: Blockchain-Enabled Multi-stage Flow Verification in Multi-domain Software-Defined Networks12
Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach11
Policy-Gradient-Based Reinforcement Learning for Maximizing Operator’s Profit in Open-RAN11
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory11
An Deep Ensemble Learning Model with Metaheuristic Hyperparameter Optimization for Smart Grid Intrusion Detection11
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding11
BBNAC: Blockchain Based Network Access Control for IT/OT Infrastructures11
Efficient Task Allocation in Data Center Environments Based on Information Theory10
Customizable Mapping of Virtualized Network Services in Multi-datacenter Environments Based on Genetic Metaheuristics10
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks10
Dynamic Microservice Provisioning in 5G Networks Using Edge–Cloud Continuum10
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency10
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review10
Effect of Messaging Model on the Reliable Data Transfer Latency in a Fog System10
Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN10
MM-DCPR: Dual Controller Optimization for Distributed Control and Energy-Efficient Routing in SDWSNs10
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems9
Link State Estimator for VANETs Using Neural Networks9
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks9
A Load Balancing Strategy Based on Fuzzy Satisfaction Among Multiple Controllers in Software-Defined Networking9
Optimized Feature Selection Using Rough Sets for Intrusion Detection in 802.11 Wireless Networks9
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond9
Machine Learning based Cyber Attack Detection and Classification in O-RAN9
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks8
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach8
Optimized Route Selection in RPL: Static and Dynamic Parent Evaluation for Energy-Efficient IoT Networks8
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency8
Enhancing Performance Models with Intelligent Configuration Space Coverage8
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework8
Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit8
Novel Statistical Modelling and Optimization Techniques of Fading Channel Coefficients for 5G Network Performance8
BoostSec: Adaptive Attack Detection for Vehicular Networks8
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach8
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm8
Service Function Chain Live Migration with Bi-GRU Resource Prediction in Substrate Networks8
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes8
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment8
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)8
Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism8
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks8
Detection of False Data Injection Attacks in Smart Grid Using Bi-LSTM with an Attention Mechanism8
Priority-Aware Resource Reallocation in Edge Computing Using Reinforcement Learning8
SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks8
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks8
Enabling Integrity Measurement for Secure Applications in the Enarx Framework8
SynFloWatch: An Entropy-Based Live Defense System against SYN Spoofing DDoS Attacks in Hybrid SDN8
A Novel Approach to Malware Detection: Converting Hardware Memory Data to 2D Barcodes Using Mobile Networks8
On the Deployment Problem of Multiple Drones in Millimeter Wave Systems8
Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks7
ATENA: Adaptive TEchniques for Network Area Coverage and Routing in IoT-Based Edge Computing7
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches7
Unified Quantitative Evaluation of System Severity: Leveraging Time to Compromise and Cost-Benefit Analysis for Enhanced vulnerability Risk Assessment7
Optimizing Network and Systems Management for Fraud Detection: A High-Performance Approach Using Random Light Gradient-Based CatBoost Ensemble with Enhanced Gold Rush Algorithm7
Machine Learning-Based Network Monitoring for Cybersecurity Threat Detection7
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels7
A Dynamic Context-Aware and Role-Capability Based Access Control Mechanism for Internet of Things7
A WAN Infrastructure Manager Prototype for QoS-based Multi-Site SDN-Enabled NFV Orchestration7
Privacy-Preserving Container Attestation7
MLP-Based Intrusion Detection for Securing IoT Networks7
A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments7
Hi-SAM: A High-Scalable Authentication Model for Satellite-Ground Zero-Trust System Using Mean Field Game7
Performance Analysis of the Multi-connection Tactile Internet Protocol over 5G7
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing7
DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification7
Provisioning Load Balancing in Time-Sensitive Task Allocation for Mobile Crowdsensing6
Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm6
MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things6
LPPIF: Latency-Aware Placement of Parallelized Service Function Chains Through Instance Sharing and Flexible Resource Allocation6
Radio Network Optimization Through Antenna Tilt Adjustment Using Metaheuristic Algorithms and Geographic Information Systems6
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion6
RASH: Resource Allocation for Smart Homes Considering Privacy Sensitivity of IoT Applications6
RAHL: A Residual-based Adaptive Huber Loss for Robust CQI Prediction in 5G Networks6
An Edge Cloud Based Coordination Platform for Multi-user AR Applications6
DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic Algorithms6
SARP: A Secure and Adaptive Machine Learning-Driven Routing Protocol for Dynamic IoT Networks6
Mitigating DoS Attack in MANETs Considering Node Reputation with AI6
Flexible RAN Slicing for Mobile Wireless Networks6
Deep Resource Localization with Traffic Prediction for Adaptive Multi-access Edge Computing Management6
Continuous Distributed Monitoring of Data Streams with Faulty Nodes6
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks6
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites6
Fault Tolerance and Failure Recovery Techniques in Software-Defined Networking: A Comprehensive Approach6
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling5
Burst-Tolerance Design in Time-Sensitive Software-Defined Networking: A Preserve-and-Invoke Method5
Local Cloud-Based Collaborative Learning vs Other IIoT Decentralized AI Solutions: A Systematic Literature Review5
RiskNet: Neural Risk Assessment in Networks of Unreliable Resources5
Enhancing Network Resilience: A Hybrid Meta-Heuristic Intrusion Detection System Leveraging SSA-BOA-CNN5
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks5
A Secure IIoT Gateway Architecture based on Trusted Execution Environments5
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks5
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree5
Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach5
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game5
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis5
A Lightweight Anonymous Cross-Domain Authentication Scheme for V2G Networks Integrating Blockchain and PUF5
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks5
Q-Learning-Based Multi-channel ALOHA MAC for LoRaWAN5
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation5
Proactive Fault-Recovery on Distributed Software-Defined Network Controllers5
Overcoming Real-World IoT Deployment Challenges with Enhanced Fuzzy Logic Decision Algorithms5
Blockchain-Enhanced Electronic Health Records: A Kafka-Based Approach for IoMT Integration5
Video Streaming in Healthcare and Multi-path Solutions4
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition4
Towards Resource-Efficient DDoS Detection in IoT: Leveraging Feature Engineering of System and Network Usage Metrics4
A Performance Evaluation of Neural Networks for Botnet Detection in the Internet of Things4
Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System4
Position-Aided Channel Quality Indicator Prediction in V2X Scenarios using Attention-LSTM with Fully Convolutional Networks4
Federated RNN for Intrusion Detection System in IoT Environment Under Adversarial Attack4
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks4
A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics4
FL-DBA: Fuzzy Logic Based Dynamic Bandwidth Allocation Algorithm for Next Generation Passive Optical Network4
Enhanced Traffic Management Approaches in Internet of Vehicles through LSTM-Driven Load Balancing for Mobile Edge Computing4
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning4
Cybersecurity Via Programmable Networks: Are We There Yet?4
A Hybrid Biologically-Inspired Optimization Algorithm for Data Gathering in IoT Sensor Networks4
Enhancing Serverless Function Resilience Against Vulnerabilities with MoFaaS4
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection4
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples4
High Capacity and Resilient Large-Scale Deterministic IP Networks4
QoSentry: A Reinforcement Learning Framework for QoS-Preserving DDoS Mitigation in Software-Defined Networks4
Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain4
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach4
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)4
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios4
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol4
Balancing Act: Navigating Control and Data Plane Responsibilities for Fast Operation in Programmable Networks4
PDRAS: Priority-Based Dynamic Resource Allocation Scheme in 5G Network Slicing4
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks4
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble4
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems4
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks4
Load Balancing With Proactive Traffic Separation in Data Center Network4
Performance Evaluation of Cloud Native Applications: A Systematic Mapping Study4
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation3
Correction to: GORGO: A Reinforcement Learning Model for DoS Vulnerability Analysis on 5G and Beyond Networks3
Tokenized Peer Review: An Adaptive Blockchain Mechanism for Open Source Supply Chains3
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations3
A Novel Mathematical Model with Fairness Constraints for Uninterrupted Network Coverage in Disasters3
A Novel Light Reflection-Random Walk for Smart Sensors Relocation3
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach3
QoS-Aware Approaches in VANETs: A Systematic Review3
S-iNAS: A Performance-Centric SRN Modeling and Analysis of Time and Event Based Scaling Strategies in Ceph-Based Industrial Network-Attached Storage3
Enhancing Cloud Gaming QoE Estimation by Stacking Learning3
An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain3
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning3
Asynchronous Time-Aware Shaper for Time-Sensitive Networking3
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks3
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions3
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment3
Improving the Resource Efficiency in Massive MIMO-NOMA Systems3
Employing Federated Semi-supervised Learning for Network Traffic Classification3
Attention-Based High-Dimensional Offloading with Deep Recurrent Q-Network in a Cloud-Edge Environment3
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring3
Enabling the Rescheduling of Containerized Workloads in an Ad Hoc Cross-Organizational Collaboration3
Efficient Path-Driven Vulnerability Detection for Complex Smart Contracts via Graph Compression3
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity3
Robust CNN-Based Threat Detection in SDN-Enabled IoT Networks3
On Enhancing Delay SLAs in TCP Networks Through Joint Routing and Transport Assistant Deployment3
A Novel Framework for Integrating Blockchain-Driven Federated Learning with Neural Networks in E-Commerce3
High-Precision, Predictable and Low-Latency Networking3
KANAD: Topologically Adaptive Graph Feature Learning for Multimodal Anomaly Detection in Microservice Systems3
ConfExp: Root-Cause Analysis of Service Misconfigurations in Enterprise Systems3
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization3
A Game Theoretic Framework for Distributed Mission Slice Allocation and Management for Tactical Networks3
0.1107189655304