Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-10-01 to 2024-10-01.)
ArticleCitations
Survey on blockchain based smart contracts: Applications, opportunities and challenges250
A systematic review of IoT in healthcare: Applications, techniques, and trends226
Deep learning methods in network intrusion detection: A survey and an objective comparison209
A survey on computation offloading modeling for edge computing198
Domain-specific knowledge graphs: A survey196
Communication and networking technologies for UAVs: A survey192
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges174
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art162
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems145
Blockchain based solutions to secure IoT: Background, integration trends and a way forward140
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction139
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0127
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations124
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique120
Computation offloading in mobile edge computing networks: A survey119
Automated DDOS attack detection in software defined networking115
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions114
Survey on computation offloading in UAV-Enabled mobile edge computing111
A systematic review of blockchain scalability: Issues, solutions, analysis and future research110
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security109
Detecting false data attacks using machine learning techniques in smart grid: A survey105
A review and categorization of techniques on device-free human activity recognition102
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions100
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey97
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach92
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction91
A survey of consensus algorithms in public blockchain systems for crypto-currencies91
A GRU deep learning system against attacks in software defined networks90
A comprehensive survey of load balancing techniques in software-defined network85
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues85
A survey on technologies and security protocols: Reference for future generation IoT85
Analysis of cryptocurrency transactions from a network perspective: An overview83
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach82
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning80
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain79
UAV assisted 5G and beyond wireless networks: A survey77
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision72
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches70
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks69
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection69
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review69
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment69
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML68
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey68
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review66
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges65
From smart parking towards autonomous valet parking: A survey, challenges and future Works64
Blockchain for IoT access control: Recent trends and future research directions63
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives63
Internet of Healthcare Things: A contemporary survey63
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things63
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks63
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey61
A survey on data plane programming with P4: Fundamentals, advances, and applied research60
Security in product lifecycle of IoT devices: A survey59
Virtual reality: A survey of enabling technologies and its applications in IoT55
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic53
Blockchain for Internet of things applications: A review and open issues53
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services53
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities53
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions51
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey51
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey51
A survey on energy efficiency in underwater wireless communications51
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions50
Smart contracts for blockchain-based reputation systems: A systematic literature review50
Mobile cloud computing models security issues: A systematic review49
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)49
Privacy preserving based logistic regression on big data48
Towards development of IoT-ML driven healthcare systems: A survey47
Fake news outbreak 2021: Can we stop the viral spread?47
Routing in the Space Internet: A contact graph routing tutorial47
Incentive techniques for the Internet of Things: A survey47
Towards DDoS detection mechanisms in Software-Defined Networking46
Open RAN security: Challenges and opportunities46
NOMA and future 5G & B5G wireless networks: A paradigm45
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs45
Minimizing the spread of misinformation in online social networks: A survey45
Attacks and defenses in user authentication systems: A survey44
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions44
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research44
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey44
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions44
A survey of UAV-based data collection: Challenges, solutions and future perspectives44
Swarm intelligence for next-generation networks: Recent advances and applications43
Fog computing approaches in IoT-enabled smart cities43
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices41
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy41
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey40
Blockchain-based delegated Quantum Cloud architecture for medical big data security39
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey39
A Survey of Channel Modeling Techniques for Visible Light Communications39
Fog data management: A vision, challenges, and future directions38
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence38
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study38
A survey on security challenges and solutions in the IOTA37
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics37
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap36
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm36
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection36
A survey on deep learning for challenged networks: Applications and trends36
Master-slave chain based trusted cross-domain authentication mechanism in IoT35
A survey of Layer-two blockchain protocols35
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Data-intensive application scheduling on Mobile Edge Cloud Computing34
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions34
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning33
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks33
Spatial-temporal constrained particle filter for cooperative target tracking32
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions32
Transformation from IoT to IoV for waste management in smart cities32
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder31
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks31
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey31
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts31
An automated implementation of hybrid cloud for performance evaluation of distributed databases31
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition30
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic30
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment29
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks29
A survey of privacy-preserving offloading methods in mobile-edge computing29
Joint topology control and routing in a UAV swarm for crowd surveillance28
DroneCells: Improving spectral efficiency using drone-mounted flying base stations28
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review28
HELPHED: Hybrid Ensemble Learning PHishing Email Detection28
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things28
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications28
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks28
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution28
Review on the application of deep learning in network attack detection28
Joint edge caching and dynamic service migration in SDN based mobile edge computing27
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing27
Automatic guarantee scheme for intent-driven network slicing and reconfiguration26
Scalable edge cloud platforms for IoT services26
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps25
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks25
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions25
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems25
A review on trust management in fog/edge computing: Techniques, trends, and challenges25
Mutual authentication with multi-factor in IoT-Fog-Cloud environment24
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications24
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling24
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications24
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection24
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications24
A review on reversible quantum adders24
A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
A survey on the placement of virtual network functions23
A hierarchical approach for accelerating IoT data management process based on SDN principles23
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions23
AI augmented Edge and Fog computing: Trends and challenges23
DNA computing and table based data accessing in the cloud environment22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments22
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)22
RANet: Network intrusion detection with group-gating convolutional neural network22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
Blockchain technology in Named Data Networks: A detailed survey21
Service discovery and selection in IoT: A survey and a taxonomy21
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities21
Application-aware resource allocation and data management for MEC-assisted IoT service providers21
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets21
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing21
Blockchain-based solutions for cloud computing: A survey20
A survey of link flooding attacks in software defined network ecosystems20
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks20
A systematic review of federated learning: Challenges, aggregation methods, and development tools20
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains19
Graph partition based privacy-preserving scheme in social networks19
Influential nodes selection to enhance data dissemination in mobile social networks: A survey19
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network19
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations19
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing19
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques19
A provably secure ECC-based access and handover authentication protocol for space information networks18
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review18
TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces18
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems18
Fine-grained flow classification using deep learning for software defined data center networks18
Energy-efficient activity recognition framework using wearable accelerometers18
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm18
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm18
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication18
Decentralized authentication and access control protocol for blockchain-based e-health systems18
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection18
0.087350130081177