Journal of Network and Computer Applications

Papers
(The median citation count of Journal of Network and Computer Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
Machine learning based solutions for security of Internet of Things (IoT): A survey284
UAV assistance paradigm: State-of-the-art in applications and challenges259
Blockchain for 5G and beyond networks: A state of the art survey254
Survey on blockchain based smart contracts: Applications, opportunities and challenges229
A systematic review of IoT in healthcare: Applications, techniques, and trends205
Deep learning methods in network intrusion detection: A survey and an objective comparison194
A survey on computation offloading modeling for edge computing182
Domain-specific knowledge graphs: A survey179
Communication and networking technologies for UAVs: A survey175
Blockchain-based identity management systems: A review161
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges157
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations153
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art152
Applications of link prediction in social networks: A review150
Detecting Internet of Things attacks using distributed deep learning143
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems133
Blockchain based solutions to secure IoT: Background, integration trends and a way forward130
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects126
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction116
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0113
Blockchain-based decentralized storage networks: A survey108
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions104
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security104
Computation offloading in mobile edge computing networks: A survey103
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique102
Automated DDOS attack detection in software defined networking101
A review and categorization of techniques on device-free human activity recognition96
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations95
Detecting false data attacks using machine learning techniques in smart grid: A survey95
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions93
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey90
A systematic review of blockchain scalability: Issues, solutions, analysis and future research90
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach89
Survey on computation offloading in UAV-Enabled mobile edge computing88
A survey of consensus algorithms in public blockchain systems for crypto-currencies87
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction86
A comprehensive survey of load balancing techniques in software-defined network79
Adversarial attacks on deep-learning-based SAR image target recognition79
A survey on technologies and security protocols: Reference for future generation IoT78
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments78
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach77
Analysis of cryptocurrency transactions from a network perspective: An overview77
A GRU deep learning system against attacks in software defined networks75
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning74
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain74
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues74
UAV assisted 5G and beyond wireless networks: A survey71
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection65
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision65
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks65
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review63
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment63
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review62
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches62
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey61
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey60
From smart parking towards autonomous valet parking: A survey, challenges and future Works60
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges60
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives57
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things57
Internet of Healthcare Things: A contemporary survey56
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML56
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks56
Security in product lifecycle of IoT devices: A survey54
Blockchain for IoT access control: Recent trends and future research directions52
A survey on data plane programming with P4: Fundamentals, advances, and applied research52
Machine learning (ML)-centric resource management in cloud computing: A review and future directions50
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services50
A network intrusion detection method based on semantic Re-encoding and deep learning50
Smart contracts for blockchain-based reputation systems: A systematic literature review49
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic49
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey49
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities49
A survey on energy efficiency in underwater wireless communications48
Mobile cloud computing models security issues: A systematic review47
Virtual reality: A survey of enabling technologies and its applications in IoT47
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey46
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)44
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions44
Privacy preserving based logistic regression on big data44
Blockchain for Internet of things applications: A review and open issues44
Routing in the Space Internet: A contact graph routing tutorial43
Minimizing the spread of misinformation in online social networks: A survey43
Towards development of IoT-ML driven healthcare systems: A survey42
Towards DDoS detection mechanisms in Software-Defined Networking42
Incentive techniques for the Internet of Things: A survey41
Fake news outbreak 2021: Can we stop the viral spread?41
Attacks and defenses in user authentication systems: A survey41
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions40
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions39
Swarm intelligence for next-generation networks: Recent advances and applications38
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks38
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research38
NOMA and future 5G & B5G wireless networks: A paradigm38
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices37
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy37
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey36
Fog computing approaches in IoT-enabled smart cities36
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models36
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics36
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions36
QoS-aware service provisioning in fog computing35
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey35
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence34
A Survey of Channel Modeling Techniques for Visible Light Communications34
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey34
An adversarial attack on DNN-based black-box object detectors34
Fog data management: A vision, challenges, and future directions34
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study34
A survey on security challenges and solutions in the IOTA34
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm33
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs33
Data-intensive application scheduling on Mobile Edge Cloud Computing32
A survey on deep learning for challenged networks: Applications and trends31
Blockchain-based delegated Quantum Cloud architecture for medical big data security31
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts30
Spatial-temporal constrained particle filter for cooperative target tracking30
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks30
Master-slave chain based trusted cross-domain authentication mechanism in IoT30
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic30
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey30
Transformation from IoT to IoV for waste management in smart cities29
An automated implementation of hybrid cloud for performance evaluation of distributed databases29
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks29
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning28
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection28
A survey of UAV-based data collection: Challenges, solutions and future perspectives28
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks28
Open RAN security: Challenges and opportunities28
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation27
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment27
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions27
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications27
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder26
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices26
Automatic guarantee scheme for intent-driven network slicing and reconfiguration26
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing26
A survey of Layer-two blockchain protocols26
Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization26
Scalable edge cloud platforms for IoT services26
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap25
Joint edge caching and dynamic service migration in SDN based mobile edge computing25
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks25
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
Joint topology control and routing in a UAV swarm for crowd surveillance24
A survey of privacy-preserving offloading methods in mobile-edge computing24
The road to BOFUSS: The basic OpenFlow userspace software switch24
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications24
DroneCells: Improving spectral efficiency using drone-mounted flying base stations24
MARIO: A spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories24
A hierarchical approach for accelerating IoT data management process based on SDN principles23
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions23
Mutual authentication with multi-factor in IoT-Fog-Cloud environment23
A bibliometric overview of the Journal of Network and Computer Applications between 1997 and 201923
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review23
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks23
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling23
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition22
DNA computing and table based data accessing in the cloud environment22
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)22
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets21
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments21
Composing and deploying parallelized service function chains21
A review on reversible quantum adders21
Service discovery and selection in IoT: A survey and a taxonomy21
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications21
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection21
A review on trust management in fog/edge computing: Techniques, trends, and challenges21
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions20
Blockchain technology in Named Data Networks: A detailed survey20
A survey on the placement of virtual network functions20
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution20
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing20
RANet: Network intrusion detection with group-gating convolutional neural network20
Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT19
Blockchain-based solutions for cloud computing: A survey19
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application19
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps19
HELPHED: Hybrid Ensemble Learning PHishing Email Detection18
A survey of link flooding attacks in software defined network ecosystems18
On the use of big data frameworks for big service composition18
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing18
Fine-grained flow classification using deep learning for software defined data center networks18
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations18
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm18
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network18
Influential nodes selection to enhance data dissemination in mobile social networks: A survey18
Application-aware resource allocation and data management for MEC-assisted IoT service providers18
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection17
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities17
A selective ensemble model for cognitive cybersecurity analysis17
Review on the application of deep learning in network attack detection17
A provably secure ECC-based access and handover authentication protocol for space information networks17
Energy-efficient activity recognition framework using wearable accelerometers17
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks17
A QoS-Based routing algorithm over software defined networks17
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment17
Performance analyses of the IEEE 802.15.6 Wireless Body Area Network with heterogeneous traffic17
MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks17
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs16
Optimal cross-layer resource allocation in fog computing: A market-based framework16
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications16
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems16
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication16
Decentralized authentication and access control protocol for blockchain-based e-health systems16
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains16
Graph partition based privacy-preserving scheme in social networks16
Secure multiparty learning from the aggregation of locally trained models16
Towards efficient motion-blurred public security video super-resolution based on back-projection networks16
Aggregating and disaggregating packets with various sizes of payload in P4 switches at 100 Gbps line rate15
A survey on the suitability of risk identification techniques in the current networked environment15
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity15
User preference-aware navigation for mobile robot in domestic via defined virtual area15
AI augmented Edge and Fog computing: Trends and challenges15
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review15
Towards reliable and efficient data retrieving in ICN-based satellite networks15
SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs15
Holistic survey on energy aware routing techniques for IoT applications15
An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols14
Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks14
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma14
A novel Q-learning-based hybrid algorithm for the optimal offloading and scheduling in mobile edge computing environments14
An optimized content caching strategy for video stream in edge-cloud environment14
A systematic review of federated learning: Challenges, aggregation methods, and development tools14
A distributed deployment algorithm for communication coverage in wireless robotic networks14
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking14
A survey on essential challenges in relay-aided D2D communication for next-generation cellular networks14
Software-Defined Networking in wireless ad hoc scenarios: Objectives and control architectures14
A survey on network forwarding in Software-Defined Networking13
Red Deer Algorithm based nano-sensor node clustering for IoNT13
Adaptive priority-based cache replacement and prediction-based cache prefetching in edge computing environment13
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm13
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment13
Deep learning-based privacy-preserving framework for synthetic trajectory generation13
Machine learning based malicious payload identification in software-defined networking13
User-centric privacy preserving models for a new era of the Internet of Things13
SoftIoT: A resource-aware SDN/NFV-based IoT network13
A context-aware information-based clone node attack detection scheme in Internet of Things13
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling13
Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge13
Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism13
Temporary immutability: A removable blockchain solution for prosumer-side energy trading13
Fault tolerance in SDN data plane considering network and application based metrics13
Building multi-subtopic Bi-level network for micro-blog hot topic based on feature Co-Occurrence and semantic community division13
0.047836065292358