Journal of Network and Systems Management

Papers
(The TQCC of Journal of Network and Systems Management is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers121
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder86
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things81
Deep Learning in IoT Intrusion Detection80
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems66
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security59
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques55
Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks50
Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm44
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models41
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques41
Real-Time Task Scheduling Algorithm for IoT-Based Applications in the Cloud–Fog Environment40
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection40
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)32
Energy-Efficient Delay-Aware Task Offloading in Fog-Cloud Computing System for IoT Sensor Applications31
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives30
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach29
Service Function Chain Placement in Distributed Scenarios: A Systematic Review28
An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing Environment27
Machine Learning-Based Multipath Routing for Software Defined Networks27
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems26
Improved Artificial Bee Colony Using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environments25
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion24
Deep Reinforcement Learning Based Active Queue Management for IoT Networks22
Meta-heuristic Approaches for Effective Scheduling in Infrastructure as a Service Cloud: A Systematic Review21
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning20
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture20
Design of a Security and Trust Framework for 5G Multi-domain Scenarios20
Cybersecurity of Smart Home Systems: Sensor Identity Protection19
Hybrid Stochastic Ranking and Opposite Differential Evolution-Based Enhanced Firefly Optimization Algorithm for Extending Network Lifetime Through Efficient Clustering in WSNs19
A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems18
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis17
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework16
Reliability and Survivability Analysis of Long-Term Evolution Vehicular Ad-Hoc Networks: An Analytical Approach14
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach14
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks12
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions12
Collaborative Multi-domain Routing in SDN Environments12
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning11
Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention11
Resolving Load Imbalance State for SDN by Minimizing Maximum Load of Controllers11
MSN: A Playground Framework for Design and Evaluation of MicroServices-Based sdN Controller11
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications10
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment10
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing10
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT10
Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks10
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data10
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network9
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks9
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV9
XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks9
PassMon: A Technique for Password Generation and Strength Estimation9
Special Issue on Cybersecurity Management in the Era of AI9
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm8
Bloccess: Enabling Fine-Grained Access Control Based on Blockchain8
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking8
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks8
Intelligent Wireless Networks: Challenges and Future Research Topics8
A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics8
A Management Architecture for IoT Smart Solutions: Design and Implementation8
Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points7
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning7
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks7
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks7
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing7
A Cost-Aware Management Framework for Placement of Data-Intensive Applications on Federated Cloud7
ML-Based DDoS Detection and Identification Using Native Cloud Telemetry Macroscopic Monitoring7
Towards a Trustful Game-Theoretic Mechanism for Data Trading in the Blockchain-IoT Ecosystem7
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol7
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)7
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach7
Self-organizing Fog Support Services for Responsive Edge Computing6
WebAssembly Orchestration in the Context of Serverless Computing6
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains6
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks6
Knowledge Discovery: Can It Shed New Light on Threshold Definition for Heavy-Hitter Detection?6
Low Latency Low Loss Media Delivery Utilizing In-Network Packet Wash6
Optimal Service Selection and Placement Based on Popularity and Server Load in Multi-access Edge Computing6
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment6
A Multi-criteria Decision Making Approach for Scaling and Placement of Virtual Network Functions6
Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning6
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation6
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN6
0.030822038650513