Journal of Network and Systems Management

Papers
(The TQCC of Journal of Network and Systems Management is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers88
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things65
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems59
Deep Learning in IoT Intrusion Detection58
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder56
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security44
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques41
Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm38
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models36
Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks35
Energy-Efficient Data Transmission and Aggregation Protocol in Periodic Sensor Networks Based Fog Computing34
Immersive Interconnected Virtual and Augmented Reality: A 5G and IoT Perspective31
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques30
QoS-DPSO: QoS-aware Task Scheduling for Cloud Computing System30
Toward a Machine Learning and Software Defined Network Approaches to Manage Miners’ Reputation in Blockchain28
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection27
Energy-Efficient Delay-Aware Task Offloading in Fog-Cloud Computing System for IoT Sensor Applications27
Service Function Chain Placement in Distributed Scenarios: A Systematic Review26
Real-Time Task Scheduling Algorithm for IoT-Based Applications in the Cloud–Fog Environment26
Bayesian Decision Network-Based Security Risk Management Framework25
Machine Learning-Based Multipath Routing for Software Defined Networks23
Service Selection Using Multi-criteria Decision Making: A Comprehensive Overview23
A Robust Energy Optimization and Data Reduction Scheme for IoT Based Indoor Environments Using Local Processing Framework21
Distributed Network Coding-Aware Routing Protocol Incorporating Fuzzy-Logic-Based Forwarders in Wireless Ad hoc Networks21
Modified Dragonfly Algorithm for Optimal Virtual Machine Placement in Cloud Computing21
Fuzzy, Dynamic and Trust Based Routing Protocol for IoT21
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach20
Improved Artificial Bee Colony Using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environments20
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)20
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion19
A Responsible Internet to Increase Trust in the Digital World19
Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks18
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives18
An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing Environment18
Meta-heuristic Approaches for Effective Scheduling in Infrastructure as a Service Cloud: A Systematic Review17
A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems17
Deep Reinforcement Learning Based Active Queue Management for IoT Networks16
Performance and Availability Trade-Offs in Fog–Cloud IoT Environments16
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems16
Big Spatial Data Management for the Internet of Things: A Survey15
Hybrid Stochastic Ranking and Opposite Differential Evolution-Based Enhanced Firefly Optimization Algorithm for Extending Network Lifetime Through Efficient Clustering in WSNs15
Decomposition Based Cloud Resource Demand Prediction Using Extreme Learning Machines14
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture14
Cybersecurity of Smart Home Systems: Sensor Identity Protection14
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis14
Detecting and Mitigating DDoS Attack in Named Data Networking13
Monte Carlo Tree Search with Last-Good-Reply Policy for Cognitive Optimization of Cloud-Ready Optical Networks12
Collaborative Multi-domain Routing in SDN Environments10
PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDN10
Design of a Security and Trust Framework for 5G Multi-domain Scenarios10
Optimized Sampling Strategies to Model the Performance of Virtualized Network Functions10
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing10
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications10
Reliability and Survivability Analysis of Long-Term Evolution Vehicular Ad-Hoc Networks: An Analytical Approach10
ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks10
MSN: A Playground Framework for Design and Evaluation of MicroServices-Based sdN Controller10
A Two-Stream Network Based on Capsule Networks and Sliced Recurrent Neural Networks for DGA Botnet Detection10
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for a Hyperconnected World: Challenges, Applications, and Major Advancements10
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning9
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning9
Resolving Load Imbalance State for SDN by Minimizing Maximum Load of Controllers9
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT8
Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks8
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data8
Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention7
PassMon: A Technique for Password Generation and Strength Estimation7
Intelligent Wireless Networks: Challenges and Future Research Topics7
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network7
An Unsupervised Approach to Infer Quality of Service for Large-Scale Wireless Networking7
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV7
A Management Architecture for IoT Smart Solutions: Design and Implementation7
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions7
0.019313097000122