Journal of Network and Computer Applications

(The median citation count of Journal of Network and Computer Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
Machine learning based solutions for security of Internet of Things (IoT): A survey270
Blockchain for 5G and beyond networks: A state of the art survey245
UAV assistance paradigm: State-of-the-art in applications and challenges240
Survey on blockchain based smart contracts: Applications, opportunities and challenges211
A systematic review of IoT in healthcare: Applications, techniques, and trends196
Deep learning methods in network intrusion detection: A survey and an objective comparison186
A survey on computation offloading modeling for edge computing172
Domain-specific knowledge graphs: A survey163
Communication and networking technologies for UAVs: A survey160
Blockchain-based identity management systems: A review155
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art147
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges147
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations145
Applications of link prediction in social networks: A review142
Detecting Internet of Things attacks using distributed deep learning139
Security and privacy protection in cloud computing: Discussions and challenges130
Blockchain based solutions to secure IoT: Background, integration trends and a way forward128
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems126
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects123
Security in SDN: A comprehensive survey119
Blockchain-based decentralized storage networks: A survey104
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions100
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0100
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security98
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction95
A review and categorization of techniques on device-free human activity recognition92
Computation offloading in mobile edge computing networks: A survey91
Detecting false data attacks using machine learning techniques in smart grid: A survey90
Automated DDOS attack detection in software defined networking89
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique88
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach88
Machine learning for intelligent optical networks: A comprehensive survey85
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey84
Survey on computation offloading in UAV-Enabled mobile edge computing83
A survey of consensus algorithms in public blockchain systems for crypto-currencies81
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations80
A systematic review of blockchain scalability: Issues, solutions, analysis and future research79
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions78
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction78
Adversarial attacks on deep-learning-based SAR image target recognition76
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments75
Analysis of cryptocurrency transactions from a network perspective: An overview75
A survey on technologies and security protocols: Reference for future generation IoT74
A comprehensive survey of load balancing techniques in software-defined network72
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain71
A GRU deep learning system against attacks in software defined networks70
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning69
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues69
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach68
UAV assisted 5G and beyond wireless networks: A survey65
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection63
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review61
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges59
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey58
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks57
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment57
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision57
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review57
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey57
From smart parking towards autonomous valet parking: A survey, challenges and future Works56
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things55
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches55
A comprehensive survey on resource allocation for CRAN in 5G and beyond networks55
Internet of Healthcare Things: A contemporary survey55
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML52
Application deployment using containers with auto-scaling for microservices in cloud environment52
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks52
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives50
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services50
Security in product lifecycle of IoT devices: A survey49
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic47
Mobile cloud computing models security issues: A systematic review46
IoT for energy efficient green highway lighting systems: Challenges and issues46
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities46
A network intrusion detection method based on semantic Re-encoding and deep learning46
Blockchain for IoT access control: Recent trends and future research directions45
A survey on data plane programming with P4: Fundamentals, advances, and applied research45
Virtual reality: A survey of enabling technologies and its applications in IoT45
Machine learning (ML)-centric resource management in cloud computing: A review and future directions44
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey43
Smart contracts for blockchain-based reputation systems: A systematic literature review43
A survey on energy efficiency in underwater wireless communications43
Blockchain for Internet of things applications: A review and open issues43
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)43
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey42
A dynamic and hierarchical access control for IoT in multi-authority cloud storage41
Minimizing the spread of misinformation in online social networks: A survey41
Fake news outbreak 2021: Can we stop the viral spread?40
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions40
Towards development of IoT-ML driven healthcare systems: A survey39
Attacks and defenses in user authentication systems: A survey39
On the classification of fog computing applications: A machine learning perspective39
Privacy preserving based logistic regression on big data39
Routing in the Space Internet: A contact graph routing tutorial37
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks37
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions37
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices36
Swarm intelligence for next-generation networks: Recent advances and applications36
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research36
Incentive techniques for the Internet of Things: A survey36
Towards DDoS detection mechanisms in Software-Defined Networking36
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics35
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models35
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions34
NOMA and future 5G & B5G wireless networks: A paradigm34
QoS-aware service provisioning in fog computing34
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy34
Resource slicing and customization in RAN with dueling deep Q-Network33
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions33
An adversarial attack on DNN-based black-box object detectors32
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence32
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey32
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm32
A survey on security challenges and solutions in the IOTA32
Data-intensive application scheduling on Mobile Edge Cloud Computing31
A Survey of Channel Modeling Techniques for Visible Light Communications31
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey30
Fog data management: A vision, challenges, and future directions30
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts30
Fog computing approaches in IoT-enabled smart cities30
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research30
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey30
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study29
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic29
An automated implementation of hybrid cloud for performance evaluation of distributed databases29
Spatial-temporal constrained particle filter for cooperative target tracking29
Bot recognition in a Web store: An approach based on unsupervised learning29
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey28
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks28
A survey on deep learning for challenged networks: Applications and trends28
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks27
Master-slave chain based trusted cross-domain authentication mechanism in IoT27
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications27
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks27
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation26
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment26
Transformation from IoT to IoV for waste management in smart cities26
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs26
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices26
Blockchain-based delegated Quantum Cloud architecture for medical big data security26
Scalable edge cloud platforms for IoT services25
Automatic guarantee scheme for intent-driven network slicing and reconfiguration25
Joint edge caching and dynamic service migration in SDN based mobile edge computing25
MARIO: A spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
Open RAN security: Challenges and opportunities24
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder24
The road to BOFUSS: The basic OpenFlow userspace software switch24
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing23
Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization23
DroneCells: Improving spectral efficiency using drone-mounted flying base stations23
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning23
A bibliometric overview of the Journal of Network and Computer Applications between 1997 and 201922
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions22
A survey of Layer-two blockchain protocols22
A hierarchical approach for accelerating IoT data management process based on SDN principles22
A survey of privacy-preserving offloading methods in mobile-edge computing22
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
Composing and deploying parallelized service function chains21
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks21
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)21
Mutual authentication with multi-factor in IoT-Fog-Cloud environment21
DNA computing and table based data accessing in the cloud environment21
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications21
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection21
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments21
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets20
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap20
RANet: Network intrusion detection with group-gating convolutional neural network20
Blockchain technology in Named Data Networks: A detailed survey20
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition20
A review on reversible quantum adders20
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling19
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems19
A review on trust management in fog/edge computing: Techniques, trends, and challenges19
Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT19
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions19
Joint topology control and routing in a UAV swarm for crowd surveillance18
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions18
On the use of big data frameworks for big service composition18
A survey on the placement of virtual network functions18
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things18
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing18
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review18
A survey of link flooding attacks in software defined network ecosystems18
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application18
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution18
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm17
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network17
Influential nodes selection to enhance data dissemination in mobile social networks: A survey17
Performance analyses of the IEEE 802.15.6 Wireless Body Area Network with heterogeneous traffic17
Hybrid End-to-End VPN Security Approach for Smart IoT Objects17
MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks17
A QoS-Based routing algorithm over software defined networks17
Blockchain-based solutions for cloud computing: A survey17
Energy-efficient activity recognition framework using wearable accelerometers17
Collaborative resource allocation for Cloud of Things systems17
Application-aware resource allocation and data management for MEC-assisted IoT service providers17
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection17
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps17
A selective ensemble model for cognitive cybersecurity analysis17
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions17
Service discovery and selection in IoT: A survey and a taxonomy17
Fine-grained flow classification using deep learning for software defined data center networks16
HELPHED: Hybrid Ensemble Learning PHishing Email Detection16
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection16
A survey on QoE-oriented wireless resources scheduling16
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks16
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication16
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs16
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations16
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing16
Secure multiparty learning from the aggregation of locally trained models16
Graph partition based privacy-preserving scheme in social networks15
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities15
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains15
A survey of UAV-based data collection: Challenges, solutions and future perspectives15
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment15
Towards efficient motion-blurred public security video super-resolution based on back-projection networks15
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks15
User preference-aware navigation for mobile robot in domestic via defined virtual area14
Decentralized authentication and access control protocol for blockchain-based e-health systems14
A survey on the suitability of risk identification techniques in the current networked environment14
An optimized content caching strategy for video stream in edge-cloud environment14
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review14
Holistic survey on energy aware routing techniques for IoT applications14
Aggregating and disaggregating packets with various sizes of payload in P4 switches at 100 Gbps line rate14
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma14
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity14
A provably secure ECC-based access and handover authentication protocol for space information networks13
Software-Defined Networking in wireless ad hoc scenarios: Objectives and control architectures13
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications13
A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks13
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems13
Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism13
A novel Q-learning-based hybrid algorithm for the optimal offloading and scheduling in mobile edge computing environments13
Review on the application of deep learning in network attack detection13
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking13
A survey on network forwarding in Software-Defined Networking13
Temporary immutability: A removable blockchain solution for prosumer-side energy trading13
A distributed deployment algorithm for communication coverage in wireless robotic networks13
An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols13
Towards reliable and efficient data retrieving in ICN-based satellite networks13
Building multi-subtopic Bi-level network for micro-blog hot topic based on feature Co-Occurrence and semantic community division12
Multi-neural network based tiled 360°video caching with Mobile Edge Computing12
Confidence guided anomaly detection model for anti-concept drift in dynamic logs12
A survey on security issues of 5G NR: Perspective of artificial dust and artificial rain12