Journal of Network and Computer Applications

Papers
(The median citation count of Journal of Network and Computer Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Survey on blockchain based smart contracts: Applications, opportunities and challenges262
A systematic review of IoT in healthcare: Applications, techniques, and trends226
Deep learning methods in network intrusion detection: A survey and an objective comparison221
A survey on computation offloading modeling for edge computing198
Domain-specific knowledge graphs: A survey196
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges174
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art162
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems156
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations140
Blockchain based solutions to secure IoT: Background, integration trends and a way forward140
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction139
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0132
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique120
Computation offloading in mobile edge computing networks: A survey119
Survey on computation offloading in UAV-Enabled mobile edge computing116
Automated DDOS attack detection in software defined networking115
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions114
A systematic review of blockchain scalability: Issues, solutions, analysis and future research110
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security109
Detecting false data attacks using machine learning techniques in smart grid: A survey108
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions100
A survey of consensus algorithms in public blockchain systems for crypto-currencies98
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey97
Analysis of cryptocurrency transactions from a network perspective: An overview94
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues93
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach92
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction91
A GRU deep learning system against attacks in software defined networks90
A survey on technologies and security protocols: Reference for future generation IoT90
A comprehensive survey of load balancing techniques in software-defined network85
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain82
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach82
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning80
UAV assisted 5G and beyond wireless networks: A survey77
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision72
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches70
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment69
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review69
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks69
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey68
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML68
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review66
A survey on data plane programming with P4: Fundamentals, advances, and applied research66
Internet of Healthcare Things: A contemporary survey65
From smart parking towards autonomous valet parking: A survey, challenges and future Works64
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks63
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives63
Blockchain for IoT access control: Recent trends and future research directions63
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey61
Machine learning (ML)-centric resource management in cloud computing: A review and future directions60
Security in product lifecycle of IoT devices: A survey59
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey55
Virtual reality: A survey of enabling technologies and its applications in IoT55
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities53
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic53
Blockchain for Internet of things applications: A review and open issues53
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs52
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions51
A survey on energy efficiency in underwater wireless communications51
Privacy preserving based logistic regression on big data51
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)51
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey51
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions50
Routing in the Space Internet: A contact graph routing tutorial50
Smart contracts for blockchain-based reputation systems: A systematic literature review50
Mobile cloud computing models security issues: A systematic review49
Towards development of IoT-ML driven healthcare systems: A survey47
Incentive techniques for the Internet of Things: A survey47
Fake news outbreak 2021: Can we stop the viral spread?47
Towards DDoS detection mechanisms in Software-Defined Networking46
Open RAN security: Challenges and opportunities46
NOMA and future 5G & B5G wireless networks: A paradigm45
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research45
Minimizing the spread of misinformation in online social networks: A survey45
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection44
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey44
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey44
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions44
A survey of UAV-based data collection: Challenges, solutions and future perspectives44
Attacks and defenses in user authentication systems: A survey44
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions44
Fog computing approaches in IoT-enabled smart cities43
Swarm intelligence for next-generation networks: Recent advances and applications43
A survey of Layer-two blockchain protocols42
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices41
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy41
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence39
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey39
A Survey of Channel Modeling Techniques for Visible Light Communications39
Blockchain-based delegated Quantum Cloud architecture for medical big data security39
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study38
Fog data management: A vision, challenges, and future directions38
A survey on security challenges and solutions in the IOTA37
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap36
Review on the application of deep learning in network attack detection36
A survey on deep learning for challenged networks: Applications and trends36
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Master-slave chain based trusted cross-domain authentication mechanism in IoT35
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions34
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks33
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning33
Transformation from IoT to IoV for waste management in smart cities32
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey32
Spatial-temporal constrained particle filter for cooperative target tracking32
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions32
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder31
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications31
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks31
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts31
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks31
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks30
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment30
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition30
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic30
A survey of privacy-preserving offloading methods in mobile-edge computing29
HELPHED: Hybrid Ensemble Learning PHishing Email Detection28
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution28
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review28
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks28
Joint topology control and routing in a UAV swarm for crowd surveillance28
DroneCells: Improving spectral efficiency using drone-mounted flying base stations28
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review28
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things28
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications28
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing27
Joint edge caching and dynamic service migration in SDN based mobile edge computing27
Scalable edge cloud platforms for IoT services26
Automatic guarantee scheme for intent-driven network slicing and reconfiguration26
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems25
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions25
A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems25
A review on trust management in fog/edge computing: Techniques, trends, and challenges25
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions25
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps25
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications24
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling24
A review on reversible quantum adders24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
Mutual authentication with multi-factor in IoT-Fog-Cloud environment24
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications24
A hierarchical approach for accelerating IoT data management process based on SDN principles23
AI augmented Edge and Fog computing: Trends and challenges23
A survey on the placement of virtual network functions23
DNA computing and table based data accessing in the cloud environment22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments22
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)22
RANet: Network intrusion detection with group-gating convolutional neural network22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
Blockchain technology in Named Data Networks: A detailed survey21
Application-aware resource allocation and data management for MEC-assisted IoT service providers21
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities21
Service discovery and selection in IoT: A survey and a taxonomy21
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets21
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing21
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations20
A systematic review of federated learning: Challenges, aggregation methods, and development tools20
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks20
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection20
Blockchain-based solutions for cloud computing: A survey20
A survey of link flooding attacks in software defined network ecosystems20
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing19
SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs19
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains19
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network19
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques19
Graph partition based privacy-preserving scheme in social networks19
Influential nodes selection to enhance data dissemination in mobile social networks: A survey19
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems18
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review18
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm18
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication18
Decentralized authentication and access control protocol for blockchain-based e-health systems18
TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces18
A provably secure ECC-based access and handover authentication protocol for space information networks18
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm18
A novel Q-learning-based hybrid algorithm for the optimal offloading and scheduling in mobile edge computing environments17
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment17
A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks17
Towards reliable and efficient data retrieving in ICN-based satellite networks17
Optimal cross-layer resource allocation in fog computing: A market-based framework17
A selective ensemble model for cognitive cybersecurity analysis17
MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks17
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking17
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs17
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction17
Holistic survey on energy aware routing techniques for IoT applications17
A QoS-Based routing algorithm over software defined networks17
Deep learning-based privacy-preserving framework for synthetic trajectory generation17
Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment16
A context-aware information-based clone node attack detection scheme in Internet of Things16
Tensor based framework for Distributed Denial of Service attack detection16
Software-Defined Networking in wireless ad hoc scenarios: Objectives and control architectures16
A distributed deployment algorithm for communication coverage in wireless robotic networks16
User preference-aware navigation for mobile robot in domestic via defined virtual area16
A survey on the suitability of risk identification techniques in the current networked environment16
When machine learning meets Network Management and Orchestration in Edge-based networking paradigms16
Unfolding the blockchain era: Timeline, evolution, types and real-world applications15
A survey on network forwarding in Software-Defined Networking15
Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning15
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm15
An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols15
Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks15
User-centric privacy preserving models for a new era of the Internet of Things15
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma15
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions15
Software-Defined Wireless Sensor Network: A Comprehensive Survey15
Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge15
Regulating data sharing across MQTT environments15
Temporary immutability: A removable blockchain solution for prosumer-side energy trading15
Design and implementation of NDN-based Ethereum blockchain15
Design and implementation of an intrusion detection system by using Extended BPF in the Linux kernel14
Deep Q-Network and Traffic Prediction based Routing Optimization in Software Defined Networks14
Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism14
SoftIoT: A resource-aware SDN/NFV-based IoT network14
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel14
Multi-neural network based tiled 360°video caching with Mobile Edge Computing14
Context-oriented performance evaluation of network selection algorithms in 5G heterogeneous networks14
A survey on essential challenges in relay-aided D2D communication for next-generation cellular networks14
Fault tolerance in SDN data plane considering network and application based metrics14
Building multi-subtopic Bi-level network for micro-blog hot topic based on feature Co-Occurrence and semantic community division14
Machine learning based malicious payload identification in software-defined networking14
An optimized content caching strategy for video stream in edge-cloud environment14
A co-evolutionary genetic algorithm for robust and balanced controller placement in software-defined networks14
Worm computing: A blockchain-based resource sharing and cybersecurity framework13
Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review13
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment13
Data transmission reduction using prediction and aggregation techniques in IoT-based wireless sensor networks13
Red Deer Algorithm based nano-sensor node clustering for IoNT13
Exploring an edge convolution and normalization based approach for link prediction in complex networks13
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling13
A matching game-based crowdsourcing framework for last-mile delivery: Ground-vehicles and Unmanned-Aerial Vehicles13
SmartDR:A device-to-device communication for post-disaster recovery13
Towards a privacy-preserving smart contract-based data aggregation and quality-driven incentive mechanism for mobile crowdsensing13
Traffic flow control using multi-agent reinforcement learning13
Multicast-aware optimization for resource allocation with edge computing and caching12
NLP methods in host-based intrusion detection systems: A systematic review and future directions12
Strategizing secured image storing and efficient image retrieval through a new cloud framework12
Cost-aware automatic scaling and workload-aware replica management for edge-cloud environment12
Review of Underwater Mobile Sensor Network for ocean phenomena monitoring12
End-to-end CNN-based dueling deep Q-Network for autonomous cell activation in Cloud-RANs12
SmartValidator: A framework for automatic identification and classification of cyber threat data12
Adaptive Small Cell position algorithm (ASPA) for green farming using NB-IoT12
TRAQR: Trust aware End-to-End QoS routing in multi-domain SDN using Blockchain12
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks12
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions12
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things11
On the scalability of Big Data Cyber Security Analytics systems11
Service migration in multi-access edge computing: A joint state adaptation and reinforcement learning mechanism11
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense11
0.022706985473633