Journal of Network and Computer Applications

Papers
(The median citation count of Journal of Network and Computer Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
The rise of machine learning for detection and classification of malware: Research developments, trends and challenges267
Machine learning based solutions for security of Internet of Things (IoT): A survey254
Blockchain for 5G and beyond networks: A state of the art survey229
UAV assistance paradigm: State-of-the-art in applications and challenges225
Survey on blockchain based smart contracts: Applications, opportunities and challenges198
A systematic review of IoT in healthcare: Applications, techniques, and trends179
Deep learning methods in network intrusion detection: A survey and an objective comparison175
A survey on computation offloading modeling for edge computing158
Domain-specific knowledge graphs: A survey146
Communication and networking technologies for UAVs: A survey144
Blockchain-based identity management systems: A review142
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations140
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges137
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art137
Applications of link prediction in social networks: A review137
The rise of traffic classification in IoT networks: A survey136
Detecting Internet of Things attacks using distributed deep learning130
Blockchain based solutions to secure IoT: Background, integration trends and a way forward116
Security and privacy protection in cloud computing: Discussions and challenges115
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems115
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects115
Security in SDN: A comprehensive survey114
Blockchain-based decentralized storage networks: A survey98
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security93
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions90
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction88
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.087
A review and categorization of techniques on device-free human activity recognition85
Detecting false data attacks using machine learning techniques in smart grid: A survey85
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach84
A comprehensive survey of interface protocols for software defined networks82
Machine learning for intelligent optical networks: A comprehensive survey80
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey79
Automated DDOS attack detection in software defined networking79
A survey of consensus algorithms in public blockchain systems for crypto-currencies79
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction77
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique75
Adversarial attacks on deep-learning-based SAR image target recognition73
Computation offloading in mobile edge computing networks: A survey73
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments72
A survey on technologies and security protocols: Reference for future generation IoT70
A systematic review of blockchain scalability: Issues, solutions, analysis and future research70
Survey on computation offloading in UAV-Enabled mobile edge computing70
Analysis of cryptocurrency transactions from a network perspective: An overview69
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions67
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning67
A GRU deep learning system against attacks in software defined networks66
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain66
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues66
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations64
A comprehensive survey of load balancing techniques in software-defined network64
UAV assisted 5G and beyond wireless networks: A survey61
Fog-based smart homes: A systematic review59
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges57
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection57
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review57
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey55
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey54
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach54
From smart parking towards autonomous valet parking: A survey, challenges and future Works53
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment53
A comprehensive survey on resource allocation for CRAN in 5G and beyond networks53
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things52
Internet of Healthcare Things: A contemporary survey50
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review50
Security in product lifecycle of IoT devices: A survey49
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks48
Application deployment using containers with auto-scaling for microservices in cloud environment47
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services47
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives46
IoT for energy efficient green highway lighting systems: Challenges and issues46
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic46
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML45
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks45
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches45
A network intrusion detection method based on semantic Re-encoding and deep learning44
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities44
A survey on data plane programming with P4: Fundamentals, advances, and applied research43
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision42
Mobile cloud computing models security issues: A systematic review42
Virtual reality: A survey of enabling technologies and its applications in IoT42
Blockchain for Internet of things applications: A review and open issues42
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey41
A survey on energy efficiency in underwater wireless communications40
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)39
On the classification of fog computing applications: A machine learning perspective39
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey39
A dynamic and hierarchical access control for IoT in multi-authority cloud storage39
Minimizing the spread of misinformation in online social networks: A survey39
Machine learning (ML)-centric resource management in cloud computing: A review and future directions39
Blockchain for IoT access control: Recent trends and future research directions38
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions37
Privacy preserving based logistic regression on big data37
Fake news outbreak 2021: Can we stop the viral spread?36
Smart contracts for blockchain-based reputation systems: A systematic literature review36
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions35
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Towards development of IoT-ML driven healthcare systems: A survey35
Attacks and defenses in user authentication systems: A survey35
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks35
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research34
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models34
Swarm intelligence for next-generation networks: Recent advances and applications34
QoS-aware service provisioning in fog computing34
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices33
Routing in the Space Internet: A contact graph routing tutorial33
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics33
Incentive techniques for the Internet of Things: A survey32
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey31
A survey on security challenges and solutions in the IOTA31
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm31
Towards DDoS detection mechanisms in Software-Defined Networking30
Resource slicing and customization in RAN with dueling deep Q-Network30
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence30
QCM2R: A QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks29
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions29
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts29
Fog data management: A vision, challenges, and future directions29
Data-intensive application scheduling on Mobile Edge Cloud Computing29
Spatial-temporal constrained particle filter for cooperative target tracking29
NOMA and future 5G & B5G wireless networks: A paradigm29
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic29
An adversarial attack on DNN-based black-box object detectors28
A Survey of Channel Modeling Techniques for Visible Light Communications28
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey28
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research28
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey28
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks27
Bot recognition in a Web store: An approach based on unsupervised learning27
A survey on deep learning for challenged networks: Applications and trends27
An automated implementation of hybrid cloud for performance evaluation of distributed databases27
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study26
Master-slave chain based trusted cross-domain authentication mechanism in IoT25
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks25
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey25
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks25
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications25
A high-performance framework for a network programmable packet processor using P4 and FPGA25
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices25
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy25
Fog computing approaches in IoT-enabled smart cities24
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment24
MARIO: A spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories24
Scalable edge cloud platforms for IoT services24
Transformation from IoT to IoV for waste management in smart cities24
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation24
Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization23
The road to BOFUSS: The basic OpenFlow userspace software switch23
DroneCells: Improving spectral efficiency using drone-mounted flying base stations23
Automatic guarantee scheme for intent-driven network slicing and reconfiguration23
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot23
Joint edge caching and dynamic service migration in SDN based mobile edge computing22
Blockchain-based delegated Quantum Cloud architecture for medical big data security22
A bibliometric overview of the Journal of Network and Computer Applications between 1997 and 201922
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications21
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning21
Survey and taxonomy of clustering algorithms in 5G21
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment21
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach21
Composing and deploying parallelized service function chains21
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing21
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder20
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection20
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions20
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications20
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks20
A hierarchical approach for accelerating IoT data management process based on SDN principles20
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs20
A review on reversible quantum adders19
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments19
Mutual authentication with multi-factor in IoT-Fog-Cloud environment19
DNA computing and table based data accessing in the cloud environment19
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions19
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)19
Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT19
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets19
Blockchain technology in Named Data Networks: A detailed survey19
Open RAN security: Challenges and opportunities19
The path planning scheme for joint charging and data collection in WRSNs: A multi-objective optimization method19
A survey of link flooding attacks in software defined network ecosystems18
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling18
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems18
RANet: Network intrusion detection with group-gating convolutional neural network18
Collaborative resource allocation for Cloud of Things systems18
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition18
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application18
A review on trust management in fog/edge computing: Techniques, trends, and challenges18
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection17
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing17
Joint topology control and routing in a UAV swarm for crowd surveillance17
A survey of Layer-two blockchain protocols17
On the use of big data frameworks for big service composition17
A survey on the placement of virtual network functions16
Blockchain-based solutions for cloud computing: A survey16
A survey of privacy-preserving offloading methods in mobile-edge computing16
Reliability-aware virtual network function placement in carrier networks16
A QoS-Based routing algorithm over software defined networks16
Hybrid End-to-End VPN Security Approach for Smart IoT Objects16
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations16
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network16
Energy-efficient activity recognition framework using wearable accelerometers16
Performance analyses of the IEEE 802.15.6 Wireless Body Area Network with heterogeneous traffic16
HELPHED: Hybrid Ensemble Learning PHishing Email Detection15
Secure multiparty learning from the aggregation of locally trained models15
MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks15
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm15
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap15
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs15
Application-aware resource allocation and data management for MEC-assisted IoT service providers15
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions15
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection15
Fine-grained flow classification using deep learning for software defined data center networks15
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains15
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication14
Holistic survey on energy aware routing techniques for IoT applications14
Towards efficient motion-blurred public security video super-resolution based on back-projection networks14
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity14
User preference-aware navigation for mobile robot in domestic via defined virtual area14
Influential nodes selection to enhance data dissemination in mobile social networks: A survey14
A selective ensemble model for cognitive cybersecurity analysis14
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment14
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing14
Graph partition based privacy-preserving scheme in social networks14
A survey on QoE-oriented wireless resources scheduling14
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions14
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks14
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks14
Towards reliable and efficient data retrieving in ICN-based satellite networks13
Software-Defined Networking in wireless ad hoc scenarios: Objectives and control architectures13
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions13
An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols13
Novel resource allocation mechanism for SDN-based data center networks13
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma13
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities13
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking13
Aggregating and disaggregating packets with various sizes of payload in P4 switches at 100 Gbps line rate13
Temporary immutability: A removable blockchain solution for prosumer-side energy trading13
Service discovery and selection in IoT: A survey and a taxonomy13
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things12
A survey on the suitability of risk identification techniques in the current networked environment12
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review12
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel12
Red Deer Algorithm based nano-sensor node clustering for IoNT12
Adaptive priority-based cache replacement and prediction-based cache prefetching in edge computing environment12
Confidence guided anomaly detection model for anti-concept drift in dynamic logs12
An enhanced probabilistic fairness-aware group recommendation by incorporating social activeness12
A survey on network forwarding in Software-Defined Networking12
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps12
Decentralized authentication and access control protocol for blockchain-based e-health systems12
A distributed deployment algorithm for communication coverage in wireless robotic networks12
0.083348035812378