Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 16. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board285
SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts252
A profit-effective function service pricing approach for serverless edge computing function offloading215
MPC 189
Hierarchical mixture of vital feature experts for mobile target coverage optimization in directional sensor networks183
Stackelberg game-based dynamic resource trading for network slicing in 5G networks164
C-PFL: A committee-based personalized federated learning framework162
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things145
Editorial Board144
Terra: Low-latency and reliable event col136
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems133
Enhancement and optimization of FlexE technology within metro transport networks132
Securing edge based smart city networks with software defined Networking and zero trust architecture129
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices126
A cooperative image object recognition framework and task offloading optimization in edge computing125
A dynamic spectrum access scheme for Internet of Things with improved federated learning124
The universal federator: A third-party authentication solution to federated cloud, edge, and fog106
Performance modelling and optimal stage assignment for multistage P4 switches103
Editorial Board102
Editorial Board102
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment102
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks101
Hardening of network segmentation using automated referential penetration testing95
Intelligent energy management with IoT framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems95
Two formal design solutions for the generalization of network segmentation94
Community detection in complex network based on an improved random algorithm using local and global network information91
A gateway-assisted blockchain-based authentication scheme for internet-of-things91
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications89
Holistic survey on energy aware routing techniques for IoT applications84
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search84
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks83
NOMA and future 5G & B5G wireless networks: A paradigm81
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective80
Integrated probabilistic clustering and Deep Reinforcement Learning for bias mitigation and device heterogeneity of Federated Learning in edge networks75
A DDoS attack detection method based on IQR and DFFCNN in SDN75
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS75
Mobility-aware fog computing in dynamic networks with mobile nodes: A survey74
Open RAN security: Challenges and opportunities70
Harnessing federated generative learning for green and sustainable Internet of Things68
Editorial Board65
SAKA: Scalable authentication and key agreement scheme with configurable key evolution in edge-fog-multicloud computing environments64
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments63
Intelligent routing optimization for SDN based on PPO and GNN60
Label-aware learning to enhance unsupervised cross-domain rumor detection60
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud59
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution58
DeFinder: Error-sensitive testing of deep neural networks via vulnerability interpretation58
Constrained routing in multi-partite graph to solve VNF placement and chaining problem57
Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster situations54
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks54
Efficient application mapping approach based on grey wolf optimization for network on chip54
Backscatter communication-based wireless sensing (BBWS): Performance enhancement and future applications53
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps53
Attenuating majority attack class bias using hybrid deep learning based IDS framework49
OverShard: Scaling blockchain by full sharding with overlapping network and virtual accounts48
Holistic resource management in UAV-assisted wireless networks: An optimization perspective48
Computation offloading in mobile edge computing networks: A survey47
Reducing cold start delay in serverless computing using lightweight virtual machines47
Exploring Blockchain-driven security in SDN-based IoT networks47
Editorial Board46
Spectrum allocation method for millimeter-wave train-ground communication in high-speed rail based on multi-agent attention46
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms46
A survey on data plane programming with P4: Fundamentals, advances, and applied research46
Secure event-triggered control for vehicle platooning against dual deception attacks46
AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel45
Editorial Board44
Editorial Board44
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems43
Variational Deep Clustering approaches for anomaly-based cyber-attack detection43
FlexMon: A flexible and fine-grained traffic monitor for programmable networks42
Knowledge reuse in edge computing environments42
Energy-efficient performance optimization in Kubernetes microservices using Generalized Stochastic Petri Net38
Accelerating the consensus speed of complex networked system via reweighting the edges38
Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC38
A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems38
Privacy-preserving and Verifiable Federated Learning with weighted average aggregation in edge computing38
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities37
Data reconstruction applications for IoT air pollution sensor networks using graph signal processing37
LCC: Latency-aware Cross-radio Cooperation for energy-optimized data dissemination in heterogeneous IoT37
Addressing security requirements in industrial IoT: A robust three-factor authentication scheme with enhanced features37
Deep Reinforcement Learning based reliable spectrum sensing under SSDF attacks in Cognitive Radio networks36
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features36
Optimizing disaster response with UAV-mounted RIS and HAP-enabled edge computing in 6G networks34
ReinFog: A Deep Reinforcement Learning empowered framework for resource management in edge and cloud computing environments34
Smart parking optimization with software defined networking and blockchain: SPOSChain33
ST-MemA: Leveraging Swin Transformer and memory-enhanced LSTM for encrypted traffic classification33
Enhancement of cellular networks via an improved clustering technique with D2D communication for mission-critical applications33
An online service provisioning strategy for container-based cloud brokers33
Survey of prominent blockchain development platforms32
Privacy-preserving trajectory data publication: A distributed approach without trusted servers32
Network Coding-based Resilient Routing for Maintaining Data Security and Availability in Software-Defined Networks32
Editorial Board32
Socially-aware and energy-efficient resource allocation and power control for D2D multicast content distribution31
An online bi-objective scheduling algorithm for service provisioning in cloud computing31
Intelligent aerial video streaming: Achievements and challenges31
A review of graph-powered data quality applications for IoT monitoring sensor networks31
A bargain game theory assisted interest packet forwarding strategy for information centric network31
Quality-aware multi-task allocation based on location importance in mobile crowdsensing30
Comprehensive review on congestion detection, alleviation, and control for IoT networks30
ELA-RCP: An energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks30
Balancing function performance and cluster load in serverless computing: A reinforcement learning solution30
Artificial intelligence-enhanced zero-knowledge proofs for privacy-preserving digital forensics in cloud environments30
A state lossless scheduling strategy in distributed stream computing systems30
EBDL: Effective blockchain-based covert storage channel with dynamic labels30
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems29
Intelligent congestion control in 5G URLLC Software-Defined Networks using adaptive resource management via Reinforced Dueling Deep Q-Networks29
Efficient privacy-preserving ML for IoT: Cluster-based split federated learning scheme for non-IID data27
Editorial Board27
Towards IT/OT integration in industry digitalization: A comprehensive survey27
A lightweight SEL for attack detection in IoT/IIoT networks27
Large-scale web tracking and cookie compliance: Evaluating one million websites under GDPR with AI categorization26
Design, implementation, and performance evaluation of an earliest-deadline-first packet scheduling scheme in P4 hardware switches26
Firm social management system for supporting IoT users in application environment26
MUSE: MUlti-lead Sub-beat ECG for remote AI based atrial fibrillation detection26
CPSketch: A ‘couple’ sketch-based heavy flow detection method26
A novel secure and distributed architecture for privacy-preserving healthcare system25
Unfolding the blockchain era: Timeline, evolution, types and real-world applications25
Device-to-device communication in 5G heterogeneous network based on game-theoretic approaches: A comprehensive survey25
Task scheduling of cloud computing system by frilled lizard optimization with time varying expansion mixed function oscillation and horned lizard camouflage strategy25
Skin lesion classification using modified deep and multi-directional invariant handcrafted features25
Energy-efficient hierarchical dynamic depth adjustment routing protocol for UWSN with distributed sink mobility and semantic self-healing25
DNCCQ-PPO: A dynamic network congestion control algorithm based on deep reinforcement learning for XQUIC25
Data transmission reduction using prediction and aggregation techniques in IoT-based wireless sensor networks25
Broadcast/multicast delivery integration in B5G/6G environments25
A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning25
A survey on security issues in IoT operating systems25
DQN-based intelligent controller for multiple edge domains24
AI-enhanced blockchain technology: A review of advancements and opportunities24
ParallelC-Store: A committee structure-based reliable parallel storage mechanism for permissioned blockchain sharding24
CPS: Cross-interface network Partitioning and Scheduling towards QoS-aware data flow delivery in multimedia IoT24
Controller load optimization strategies in Software-Defined Networking: A survey24
Predictive safe delivery with machine learning and digital twins collaboration for decentralized crowdsourced systems23
Neglected infrastructures for 6G—Underwater communications: How mature are they?23
Bitcoin attacks: A comprehensive study23
End-to-end active queue management with Named-Data Networking23
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications23
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks22
DBASC: Decentralized blockchain-based architecture with integration of smart contracts for secure communication in VANETs22
Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection22
Immersive intelligence: ST-GNN guided and RL-optimized multimodal intent-driven Kubernetes Orchestration for 6G resource management22
Node cooperation for workload offloading in a fog computing network via multi-objective optimization22
Network traffic feature representation with contrastive learning for traffic engineering in hybrid software defined networks22
Dynamic and Adaptive Scheduling of Cognitive Sensors for collaborative target tracking in energy-efficient IOT environments21
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network21
Next-generation AI for advanced threat detection and security enhancement in DNS over HTTPS21
Evolving techniques in cyber threat hunting: A systematic review21
Blockchain for the metaverse: Recent advances, taxonomy, and future challenges21
NTP-INT: Network traffic prediction-driven in-band network telemetry for high-load switches20
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model20
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method20
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions20
Efficient congestion control scheme based on caching strategy in NDN20
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions20
Hierarchical reinforcement learning–based load balancing in datacenter network20
A survey of privacy-preserving offloading methods in mobile-edge computing20
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting20
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues20
Robust and energy-aware detection of Mirai botnet for future 6G-enabled IoT networks20
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey20
DAPNEML: Disease-diet associations prediction in a NEtwork using a machine learning based approach19
Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN19
DIMY: Enabling privacy-preserving contact tracing19
Clear data, clear roads: Imputing missing data for enhanced intersection flow of connected autonomous vehicles18
TD-RA policy-enforcement framework for an SDN-based IoT architecture18
Active RIS-assisted task partitioning and offloading for industrial edge computing18
Energy and density-based stable election routing protocol for wireless IoT network18
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions18
Editorial Board18
MTD-FRD: Malicious traffic detection method based on feature representation and conditional diffusion model18
REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks18
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments18
A Contextual Multi-Armed Bandit approach for NDN forwarding18
A survey of longitudinal changes in cellular network architecture: The good, the bad, and the ugly18
An open-source implementation and validation of 5G NR configured grant for URLLC in ns-3 5G LENA: A scheduling case study in industry 4.0 scenarios18
OpenDriver: An open-road driver state detection benchmark18
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal18
Enhanced energy efficiency in UAV-assisted Mobile Edge Computing through improved hybrid nature-inspired algorithm for task offloading17
Exploiting web content semantic features to detect web robots from weblogs17
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution17
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks17
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges17
A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks17
A comprehensive survey on channel hopping and scheduling enhancements for TSCH networks17
Anomalous state detection in radio access networks: A proof-of-concept17
Security and privacy of industrial big data: Motivation, opportunities, and challenges17
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network16
Seamless remote roaming activation in LoRaWAN via an API-driven gateway bridge service16
Enhanced multi-objective gorilla troops optimizer for real-time multi-user dependent tasks offloading in edge-cloud computing16
Community Detection method based on Random walk and Multi objective Evolutionary algorithm in complex networks16
Multi-Batches Revenue Maximization for competitive products over online social network16
Dynamic resource management in integrated NOMA terrestrial–satellite networks using multi-agent reinforcement learning16
Artificial Intelligence of Things (AIoT) for smart agriculture: A review of architectures, technologies and solutions16
From cloud to edge: dynamic placement optimization of business processes in IIoT networks16
A deep density based and self-determining clustering approach to label unknown traffic16
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues16
0.24773406982422