Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 17. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Survey on blockchain based smart contracts: Applications, opportunities and challenges262
A systematic review of IoT in healthcare: Applications, techniques, and trends226
Deep learning methods in network intrusion detection: A survey and an objective comparison221
A survey on computation offloading modeling for edge computing198
Domain-specific knowledge graphs: A survey196
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges174
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art162
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems156
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations140
Blockchain based solutions to secure IoT: Background, integration trends and a way forward140
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction139
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0132
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique120
Computation offloading in mobile edge computing networks: A survey119
Survey on computation offloading in UAV-Enabled mobile edge computing116
Automated DDOS attack detection in software defined networking115
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions114
A systematic review of blockchain scalability: Issues, solutions, analysis and future research110
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security109
Detecting false data attacks using machine learning techniques in smart grid: A survey108
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions100
A survey of consensus algorithms in public blockchain systems for crypto-currencies98
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey97
Analysis of cryptocurrency transactions from a network perspective: An overview94
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues93
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach92
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction91
A GRU deep learning system against attacks in software defined networks90
A survey on technologies and security protocols: Reference for future generation IoT90
A comprehensive survey of load balancing techniques in software-defined network85
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain82
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach82
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning80
UAV assisted 5G and beyond wireless networks: A survey77
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision72
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches70
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment69
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review69
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks69
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey68
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML68
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review66
A survey on data plane programming with P4: Fundamentals, advances, and applied research66
Internet of Healthcare Things: A contemporary survey65
From smart parking towards autonomous valet parking: A survey, challenges and future Works64
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks63
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives63
Blockchain for IoT access control: Recent trends and future research directions63
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey61
Machine learning (ML)-centric resource management in cloud computing: A review and future directions60
Security in product lifecycle of IoT devices: A survey59
Virtual reality: A survey of enabling technologies and its applications in IoT55
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey55
Blockchain for Internet of things applications: A review and open issues53
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities53
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic53
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs52
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions51
A survey on energy efficiency in underwater wireless communications51
Privacy preserving based logistic regression on big data51
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)51
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey51
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions50
Routing in the Space Internet: A contact graph routing tutorial50
Smart contracts for blockchain-based reputation systems: A systematic literature review50
Mobile cloud computing models security issues: A systematic review49
Towards development of IoT-ML driven healthcare systems: A survey47
Incentive techniques for the Internet of Things: A survey47
Fake news outbreak 2021: Can we stop the viral spread?47
Towards DDoS detection mechanisms in Software-Defined Networking46
Open RAN security: Challenges and opportunities46
NOMA and future 5G & B5G wireless networks: A paradigm45
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research45
Minimizing the spread of misinformation in online social networks: A survey45
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection44
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey44
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey44
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions44
A survey of UAV-based data collection: Challenges, solutions and future perspectives44
Attacks and defenses in user authentication systems: A survey44
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions44
Fog computing approaches in IoT-enabled smart cities43
Swarm intelligence for next-generation networks: Recent advances and applications43
A survey of Layer-two blockchain protocols42
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices41
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy41
Blockchain-based delegated Quantum Cloud architecture for medical big data security39
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey39
A Survey of Channel Modeling Techniques for Visible Light Communications39
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence39
Fog data management: A vision, challenges, and future directions38
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study38
A survey on security challenges and solutions in the IOTA37
Review on the application of deep learning in network attack detection36
A survey on deep learning for challenged networks: Applications and trends36
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap36
Master-slave chain based trusted cross-domain authentication mechanism in IoT35
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions34
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning33
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks33
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey32
Spatial-temporal constrained particle filter for cooperative target tracking32
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions32
Transformation from IoT to IoV for waste management in smart cities32
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks31
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts31
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks31
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder31
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications31
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment30
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition30
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic30
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks30
A survey of privacy-preserving offloading methods in mobile-edge computing29
Joint topology control and routing in a UAV swarm for crowd surveillance28
DroneCells: Improving spectral efficiency using drone-mounted flying base stations28
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review28
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things28
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications28
HELPHED: Hybrid Ensemble Learning PHishing Email Detection28
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution28
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review28
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks28
Joint edge caching and dynamic service migration in SDN based mobile edge computing27
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing27
Automatic guarantee scheme for intent-driven network slicing and reconfiguration26
Scalable edge cloud platforms for IoT services26
A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems25
A review on trust management in fog/edge computing: Techniques, trends, and challenges25
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions25
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps25
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems25
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions25
A review on reversible quantum adders24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
Mutual authentication with multi-factor in IoT-Fog-Cloud environment24
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications24
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications24
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling24
AI augmented Edge and Fog computing: Trends and challenges23
A survey on the placement of virtual network functions23
A hierarchical approach for accelerating IoT data management process based on SDN principles23
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments22
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)22
RANet: Network intrusion detection with group-gating convolutional neural network22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
DNA computing and table based data accessing in the cloud environment22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities21
Service discovery and selection in IoT: A survey and a taxonomy21
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets21
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing21
Blockchain technology in Named Data Networks: A detailed survey21
Application-aware resource allocation and data management for MEC-assisted IoT service providers21
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection20
Blockchain-based solutions for cloud computing: A survey20
A survey of link flooding attacks in software defined network ecosystems20
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations20
A systematic review of federated learning: Challenges, aggregation methods, and development tools20
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks20
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network19
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques19
Graph partition based privacy-preserving scheme in social networks19
Influential nodes selection to enhance data dissemination in mobile social networks: A survey19
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing19
SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs19
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains19
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm18
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication18
Decentralized authentication and access control protocol for blockchain-based e-health systems18
TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces18
A provably secure ECC-based access and handover authentication protocol for space information networks18
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm18
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems18
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review18
A QoS-Based routing algorithm over software defined networks17
Deep learning-based privacy-preserving framework for synthetic trajectory generation17
A novel Q-learning-based hybrid algorithm for the optimal offloading and scheduling in mobile edge computing environments17
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment17
A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks17
Towards reliable and efficient data retrieving in ICN-based satellite networks17
Optimal cross-layer resource allocation in fog computing: A market-based framework17
A selective ensemble model for cognitive cybersecurity analysis17
MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks17
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking17
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs17
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction17
Holistic survey on energy aware routing techniques for IoT applications17
0.12438416481018