Journal of Network and Systems Management

Papers
(The TQCC of Journal of Network and Systems Management is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency114
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis91
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)75
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN71
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices53
Defense-in-Depth and Machine Learning-Based Intrusion Detection for Industrial Control Systems52
Flow Migration for Service Function Chains: Correctness Criteria and Their Relaxation52
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis49
4MIDable: Flexible Network Offloading For Security VNFs47
Deterministic Scheduling of Periodic Messages for Low Latency in Cloud RAN38
A Novel Wavelet-Based Model For Android Malware Detection Utilizing System Calls Features36
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework34
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures34
RLSK_US: An Improved Dynamic Virtual Machine Consolidation Model to Optimize Energy and SLA Violations in Cloud Datacenter32
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings31
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance29
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm27
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT24
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment23
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework22
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions19
Deployment of Future Services in a Multi-access Edge Computing Environment Using Intelligence at the Edge19
ARP Overhead Reduction Framework for Software Defined Data Centers18
One Class Density Estimation Approach for Fault Detection and Rootcause Analysis in Computer Networks18
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning17
Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing17
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)17
Correction to: Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN17
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture16
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory16
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services16
Smart Hospital Patient Monitoring System Aided by Edge-Fog-Cloud Continuum: A Performability Evaluation Focusing on Distinct Sensor Sources15
X-CLNN: A Hybrid Neural Network-Based Approach Combining CNN and RNN for Communication Services Classification15
Responsible Workload Sequence Anomaly Detection with Bi-View Feature Fusion15
A Hybrid Heuristic Task Offloading Algorithm in Mobile Edge Computing for Joint Optimization of Delay and Energy Consumption15
Optimizing Completion Time of Requests in Serverless Computing15
CNS-AOM: Design, Implementation and Integration of an Architecture for Orchestration and Management of Cloud-Network Slices14
QoE Evaluation in Adaptive Streaming: Enhanced MDT with Deep Learning14
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN14
LogAnomEX: An Unsupervised Log Anomaly Detection Method Based on Electra-DP and Gated Bilinear Neural Networks14
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams13
Enabling RPL on the Internet of Underwater Things13
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks13
SDBlock-IoT: A Blockchain-Enabled Software-Defined Multicontroller Architecture to Safeguard OpenFlow Tables13
An Efficient and Decentralized Fuzzy Reinforcement Learning Bandwidth Controller for Multitenant Data Centers12
PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks12
A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications12
A Survey on the Optimization of Security Components Placement in Internet of Things12
An Adaptable and Agnostic Flow Scheduling Approach for Data Center Networks12
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking12
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring12
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives12
Distributed AgriFood Supply Chains11
Distributed Maximum Utility Task Offloading for Delay-Sensitive IoT Applications in Cloud and Edge Computing11
On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events11
A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach10
Explora-VR: Content Prefetching for Tile-Based Immersive Video Streaming Applications10
Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach10
Intent-Driven Network Isolation for the Cloud Computing Continuum10
A Management Architecture for IoT Smart Solutions: Design and Implementation10
Policy-Gradient-Based Reinforcement Learning for Maximizing Operator’s Profit in Open-RAN10
Cross-DistBlock: Blockchain-Enabled Multi-stage Flow Verification in Multi-domain Software-Defined Networks10
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding10
Effect of Messaging Model on the Reliable Data Transfer Latency in a Fog System9
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory9
Efficient Task Allocation in Data Center Environments Based on Information Theory9
Dynamic Microservice Provisioning in 5G Networks Using Edge–Cloud Continuum9
Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN9
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency9
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks8
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency8
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review8
Link State Estimator for VANETs Using Neural Networks8
A Load Balancing Strategy Based on Fuzzy Satisfaction Among Multiple Controllers in Software-Defined Networking8
Customizable Mapping of Virtualized Network Services in Multi-datacenter Environments Based on Genetic Metaheuristics8
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks8
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond8
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems8
Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme8
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach7
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach7
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes7
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework7
Energy Aware Fuzzy Approach for VNF Placement and Consolidation in Cloud Data Centers7
SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks7
Enabling Integrity Measurement for Secure Applications in the Enarx Framework7
BoostSec: Adaptive Attack Detection for Vehicular Networks7
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks7
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm7
Priority-Aware Resource Reallocation in Edge Computing Using Reinforcement Learning7
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach7
Machine Learning-Based Network Monitoring for Cybersecurity Threat Detection6
Long Boosted Memory Algorithm for Intelligent Spectrum Sensing in 5G and Beyond Systems6
Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit6
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment6
SynFloWatch: An Entropy-Based Live Defense System against SYN Spoofing DDoS Attacks in Hybrid SDN6
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks6
Special Issue on Cybersecurity Management in the Era of AI6
MLP-Based Intrusion Detection for Securing IoT Networks6
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches6
Optimizing Network and Systems Management for Fraud Detection: A High-Performance Approach Using Random Light Gradient-Based CatBoost Ensemble with Enhanced Gold Rush Algorithm6
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)6
A Novel Approach to Malware Detection: Converting Hardware Memory Data to 2D Barcodes Using Mobile Networks6
Enhancing Performance Models with Intelligent Configuration Space Coverage6
Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks6
A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments6
ATENA: Adaptive TEchniques for Network Area Coverage and Routing in IoT-Based Edge Computing6
A Framework for Dynamic Configuration of TLS Connections Based on Standards6
Novel Statistical Modelling and Optimization Techniques of Fading Channel Coefficients for 5G Network Performance6
Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism6
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks6
On the Deployment Problem of Multiple Drones in Millimeter Wave Systems6
Privacy-Preserving Container Attestation6
0.23254323005676