Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
Machine learning based solutions for security of Internet of Things (IoT): A survey284
UAV assistance paradigm: State-of-the-art in applications and challenges259
Blockchain for 5G and beyond networks: A state of the art survey254
Survey on blockchain based smart contracts: Applications, opportunities and challenges229
A systematic review of IoT in healthcare: Applications, techniques, and trends205
Deep learning methods in network intrusion detection: A survey and an objective comparison194
A survey on computation offloading modeling for edge computing182
Domain-specific knowledge graphs: A survey179
Communication and networking technologies for UAVs: A survey175
Blockchain-based identity management systems: A review161
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges157
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations153
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art152
Applications of link prediction in social networks: A review150
Detecting Internet of Things attacks using distributed deep learning143
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems133
Blockchain based solutions to secure IoT: Background, integration trends and a way forward130
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects126
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction116
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0113
Blockchain-based decentralized storage networks: A survey108
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions104
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security104
Computation offloading in mobile edge computing networks: A survey103
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique102
Automated DDOS attack detection in software defined networking101
A review and categorization of techniques on device-free human activity recognition96
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations95
Detecting false data attacks using machine learning techniques in smart grid: A survey95
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions93
A systematic review of blockchain scalability: Issues, solutions, analysis and future research90
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey90
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach89
Survey on computation offloading in UAV-Enabled mobile edge computing88
A survey of consensus algorithms in public blockchain systems for crypto-currencies87
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction86
Adversarial attacks on deep-learning-based SAR image target recognition79
A comprehensive survey of load balancing techniques in software-defined network79
A survey on technologies and security protocols: Reference for future generation IoT78
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments78
Analysis of cryptocurrency transactions from a network perspective: An overview77
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach77
A GRU deep learning system against attacks in software defined networks75
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues74
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning74
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain74
UAV assisted 5G and beyond wireless networks: A survey71
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks65
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection65
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision65
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review63
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment63
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches62
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review62
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey61
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey60
From smart parking towards autonomous valet parking: A survey, challenges and future Works60
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges60
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives57
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things57
Internet of Healthcare Things: A contemporary survey56
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML56
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks56
Security in product lifecycle of IoT devices: A survey54
Blockchain for IoT access control: Recent trends and future research directions52
A survey on data plane programming with P4: Fundamentals, advances, and applied research52
A network intrusion detection method based on semantic Re-encoding and deep learning50
Machine learning (ML)-centric resource management in cloud computing: A review and future directions50
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services50
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey49
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities49
Smart contracts for blockchain-based reputation systems: A systematic literature review49
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic49
A survey on energy efficiency in underwater wireless communications48
Virtual reality: A survey of enabling technologies and its applications in IoT47
Mobile cloud computing models security issues: A systematic review47
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey46
Blockchain for Internet of things applications: A review and open issues44
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)44
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions44
Privacy preserving based logistic regression on big data44
Minimizing the spread of misinformation in online social networks: A survey43
Routing in the Space Internet: A contact graph routing tutorial43
Towards DDoS detection mechanisms in Software-Defined Networking42
Towards development of IoT-ML driven healthcare systems: A survey42
Incentive techniques for the Internet of Things: A survey41
Fake news outbreak 2021: Can we stop the viral spread?41
Attacks and defenses in user authentication systems: A survey41
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions40
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions39
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research38
NOMA and future 5G & B5G wireless networks: A paradigm38
Swarm intelligence for next-generation networks: Recent advances and applications38
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks38
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices37
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy37
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics36
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions36
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey36
Fog computing approaches in IoT-enabled smart cities36
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models36
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey35
QoS-aware service provisioning in fog computing35
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study34
A survey on security challenges and solutions in the IOTA34
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence34
A Survey of Channel Modeling Techniques for Visible Light Communications34
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey34
An adversarial attack on DNN-based black-box object detectors34
Fog data management: A vision, challenges, and future directions34
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs33
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm33
Data-intensive application scheduling on Mobile Edge Cloud Computing32
Blockchain-based delegated Quantum Cloud architecture for medical big data security31
A survey on deep learning for challenged networks: Applications and trends31
Master-slave chain based trusted cross-domain authentication mechanism in IoT30
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic30
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey30
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts30
Spatial-temporal constrained particle filter for cooperative target tracking30
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks30
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks29
Transformation from IoT to IoV for waste management in smart cities29
An automated implementation of hybrid cloud for performance evaluation of distributed databases29
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks28
Open RAN security: Challenges and opportunities28
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning28
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection28
A survey of UAV-based data collection: Challenges, solutions and future perspectives28
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications27
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation27
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment27
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions27
A survey of Layer-two blockchain protocols26
Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization26
Scalable edge cloud platforms for IoT services26
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder26
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices26
Automatic guarantee scheme for intent-driven network slicing and reconfiguration26
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing26
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks25
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap25
Joint edge caching and dynamic service migration in SDN based mobile edge computing25
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications24
DroneCells: Improving spectral efficiency using drone-mounted flying base stations24
MARIO: A spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories24
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
Joint topology control and routing in a UAV swarm for crowd surveillance24
A survey of privacy-preserving offloading methods in mobile-edge computing24
The road to BOFUSS: The basic OpenFlow userspace software switch24
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review23
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks23
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling23
A hierarchical approach for accelerating IoT data management process based on SDN principles23
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions23
Mutual authentication with multi-factor in IoT-Fog-Cloud environment23
A bibliometric overview of the Journal of Network and Computer Applications between 1997 and 201923
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition22
DNA computing and table based data accessing in the cloud environment22
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)22
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications21
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection21
A review on trust management in fog/edge computing: Techniques, trends, and challenges21
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets21
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments21
Composing and deploying parallelized service function chains21
A review on reversible quantum adders21
Service discovery and selection in IoT: A survey and a taxonomy21
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing20
RANet: Network intrusion detection with group-gating convolutional neural network20
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions20
Blockchain technology in Named Data Networks: A detailed survey20
A survey on the placement of virtual network functions20
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution20
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps19
Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT19
Blockchain-based solutions for cloud computing: A survey19
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application19
DNC: A Deep Neural Network-based Clustering-oriented Network Embedding Algorithm18
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network18
Influential nodes selection to enhance data dissemination in mobile social networks: A survey18
Application-aware resource allocation and data management for MEC-assisted IoT service providers18
HELPHED: Hybrid Ensemble Learning PHishing Email Detection18
A survey of link flooding attacks in software defined network ecosystems18
On the use of big data frameworks for big service composition18
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing18
Fine-grained flow classification using deep learning for software defined data center networks18
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations18
0.078577995300293