Journal of Network and Computer Applications

Papers
(The H4-Index of Journal of Network and Computer Applications is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
The rise of machine learning for detection and classification of malware: Research developments, trends and challenges267
Machine learning based solutions for security of Internet of Things (IoT): A survey254
Blockchain for 5G and beyond networks: A state of the art survey229
UAV assistance paradigm: State-of-the-art in applications and challenges225
Survey on blockchain based smart contracts: Applications, opportunities and challenges198
A systematic review of IoT in healthcare: Applications, techniques, and trends179
Deep learning methods in network intrusion detection: A survey and an objective comparison175
A survey on computation offloading modeling for edge computing158
Domain-specific knowledge graphs: A survey146
Communication and networking technologies for UAVs: A survey144
Blockchain-based identity management systems: A review142
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations140
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art137
Applications of link prediction in social networks: A review137
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges137
The rise of traffic classification in IoT networks: A survey136
Detecting Internet of Things attacks using distributed deep learning130
Blockchain based solutions to secure IoT: Background, integration trends and a way forward116
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems115
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects115
Security and privacy protection in cloud computing: Discussions and challenges115
Security in SDN: A comprehensive survey114
Blockchain-based decentralized storage networks: A survey98
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security93
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions90
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction88
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.087
Detecting false data attacks using machine learning techniques in smart grid: A survey85
A review and categorization of techniques on device-free human activity recognition85
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach84
A comprehensive survey of interface protocols for software defined networks82
Machine learning for intelligent optical networks: A comprehensive survey80
Automated DDOS attack detection in software defined networking79
A survey of consensus algorithms in public blockchain systems for crypto-currencies79
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey79
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction77
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique75
Adversarial attacks on deep-learning-based SAR image target recognition73
Computation offloading in mobile edge computing networks: A survey73
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments72
A systematic review of blockchain scalability: Issues, solutions, analysis and future research70
Survey on computation offloading in UAV-Enabled mobile edge computing70
A survey on technologies and security protocols: Reference for future generation IoT70
Analysis of cryptocurrency transactions from a network perspective: An overview69
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning67
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions67
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain66
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues66
A GRU deep learning system against attacks in software defined networks66
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations64
A comprehensive survey of load balancing techniques in software-defined network64
UAV assisted 5G and beyond wireless networks: A survey61
Fog-based smart homes: A systematic review59
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection57
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review57
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges57
0.041765928268433