Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Machine learning based solutions for security of Internet of Things (IoT): A survey261
Blockchain for 5G and beyond networks: A state of the art survey237
UAV assistance paradigm: State-of-the-art in applications and challenges231
Survey on blockchain based smart contracts: Applications, opportunities and challenges204
A systematic review of IoT in healthcare: Applications, techniques, and trends186
Deep learning methods in network intrusion detection: A survey and an objective comparison180
A survey on computation offloading modeling for edge computing161
Domain-specific knowledge graphs: A survey158
Communication and networking technologies for UAVs: A survey152
Blockchain-based identity management systems: A review149
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations143
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges142
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art141
Applications of link prediction in social networks: A review137
Detecting Internet of Things attacks using distributed deep learning135
Security and privacy protection in cloud computing: Discussions and challenges127
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems121
Blockchain based solutions to secure IoT: Background, integration trends and a way forward120
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects118
Security in SDN: A comprehensive survey117
Blockchain-based decentralized storage networks: A survey100
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security96
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.095
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions93
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction92
A review and categorization of techniques on device-free human activity recognition91
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach87
Detecting false data attacks using machine learning techniques in smart grid: A survey87
A comprehensive survey of interface protocols for software defined networks86
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique85
Automated DDOS attack detection in software defined networking85
Machine learning for intelligent optical networks: A comprehensive survey82
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey80
A survey of consensus algorithms in public blockchain systems for crypto-currencies80
Computation offloading in mobile edge computing networks: A survey78
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction77
Survey on computation offloading in UAV-Enabled mobile edge computing77
Adversarial attacks on deep-learning-based SAR image target recognition74
A systematic review of blockchain scalability: Issues, solutions, analysis and future research74
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions73
Analysis of cryptocurrency transactions from a network perspective: An overview73
A survey on technologies and security protocols: Reference for future generation IoT73
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments73
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations71
A GRU deep learning system against attacks in software defined networks70
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning68
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain68
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues67
A comprehensive survey of load balancing techniques in software-defined network67
UAV assisted 5G and beyond wireless networks: A survey61
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection59
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach58
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review58
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges57
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey57
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey56
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment55
A comprehensive survey on resource allocation for CRAN in 5G and beyond networks55
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things53
From smart parking towards autonomous valet parking: A survey, challenges and future Works53
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review53
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks51
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches51
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision50
Internet of Healthcare Things: A contemporary survey50
Security in product lifecycle of IoT devices: A survey49
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML49
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services48
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives48
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks48
Application deployment using containers with auto-scaling for microservices in cloud environment48
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic47
IoT for energy efficient green highway lighting systems: Challenges and issues46
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities46
Blockchain for IoT access control: Recent trends and future research directions44
A network intrusion detection method based on semantic Re-encoding and deep learning44
Mobile cloud computing models security issues: A systematic review44
A survey on data plane programming with P4: Fundamentals, advances, and applied research43
Virtual reality: A survey of enabling technologies and its applications in IoT43
Blockchain for Internet of things applications: A review and open issues43
Machine learning (ML)-centric resource management in cloud computing: A review and future directions42
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey42
A survey on energy efficiency in underwater wireless communications41
A dynamic and hierarchical access control for IoT in multi-authority cloud storage40
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)40
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey40
On the classification of fog computing applications: A machine learning perspective39
Smart contracts for blockchain-based reputation systems: A systematic literature review39
Minimizing the spread of misinformation in online social networks: A survey39
Fake news outbreak 2021: Can we stop the viral spread?38
Privacy preserving based logistic regression on big data38
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions38
Attacks and defenses in user authentication systems: A survey37
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks37
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research36
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Towards development of IoT-ML driven healthcare systems: A survey35
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics35
Swarm intelligence for next-generation networks: Recent advances and applications35
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices35
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions35
QoS-aware service provisioning in fog computing34
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models34
Towards DDoS detection mechanisms in Software-Defined Networking33
Routing in the Space Internet: A contact graph routing tutorial33
Incentive techniques for the Internet of Things: A survey33
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy32
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm32
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions32
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey32
A survey on security challenges and solutions in the IOTA32
An adversarial attack on DNN-based black-box object detectors31
NOMA and future 5G & B5G wireless networks: A paradigm31
A Survey of Channel Modeling Techniques for Visible Light Communications31
Data-intensive application scheduling on Mobile Edge Cloud Computing31
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence30
Resource slicing and customization in RAN with dueling deep Q-Network30
QCM2R: A QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks30
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey29
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey29
Fog data management: A vision, challenges, and future directions29
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic29
Spatial-temporal constrained particle filter for cooperative target tracking29
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions29
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts29
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey28
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research28
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study28
A survey on deep learning for challenged networks: Applications and trends27
An automated implementation of hybrid cloud for performance evaluation of distributed databases27
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks27
Bot recognition in a Web store: An approach based on unsupervised learning27
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks26
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices26
Master-slave chain based trusted cross-domain authentication mechanism in IoT26
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks26
Transformation from IoT to IoV for waste management in smart cities25
Blockchain-based delegated Quantum Cloud architecture for medical big data security25
A high-performance framework for a network programmable packet processor using P4 and FPGA25
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment25
Automatic guarantee scheme for intent-driven network slicing and reconfiguration25
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications25
Fog computing approaches in IoT-enabled smart cities24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
MARIO: A spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories24
Scalable edge cloud platforms for IoT services24
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation24
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder23
Joint edge caching and dynamic service migration in SDN based mobile edge computing23
Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization23
DroneCells: Improving spectral efficiency using drone-mounted flying base stations23
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs23
The road to BOFUSS: The basic OpenFlow userspace software switch23
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications22
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing22
A bibliometric overview of the Journal of Network and Computer Applications between 1997 and 201922
Open RAN security: Challenges and opportunities22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach21
Composing and deploying parallelized service function chains21
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions21
A survey of Layer-two blockchain protocols21
A hierarchical approach for accelerating IoT data management process based on SDN principles21
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning21
Mutual authentication with multi-factor in IoT-Fog-Cloud environment21
DNA computing and table based data accessing in the cloud environment21
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications20
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets20
Blockchain technology in Named Data Networks: A detailed survey20
RANet: Network intrusion detection with group-gating convolutional neural network20
A review on reversible quantum adders20
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection20
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks20
The path planning scheme for joint charging and data collection in WRSNs: A multi-objective optimization method19
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments19
Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT19
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)19
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems18
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application18
On the use of big data frameworks for big service composition18
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition18
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling18
A review on trust management in fog/edge computing: Techniques, trends, and challenges18
A survey on the placement of virtual network functions18
A survey of link flooding attacks in software defined network ecosystems18
A survey of privacy-preserving offloading methods in mobile-edge computing18
0.039329051971436