Journal of Network and Computer Applications

(The TQCC of Journal of Network and Computer Applications is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
Machine learning based solutions for security of Internet of Things (IoT): A survey270
Blockchain for 5G and beyond networks: A state of the art survey245
UAV assistance paradigm: State-of-the-art in applications and challenges240
Survey on blockchain based smart contracts: Applications, opportunities and challenges211
A systematic review of IoT in healthcare: Applications, techniques, and trends196
Deep learning methods in network intrusion detection: A survey and an objective comparison186
A survey on computation offloading modeling for edge computing172
Domain-specific knowledge graphs: A survey163
Communication and networking technologies for UAVs: A survey160
Blockchain-based identity management systems: A review155
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges147
IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art147
A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations145
Applications of link prediction in social networks: A review142
Detecting Internet of Things attacks using distributed deep learning139
Security and privacy protection in cloud computing: Discussions and challenges130
Blockchain based solutions to secure IoT: Background, integration trends and a way forward128
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems126
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects123
Security in SDN: A comprehensive survey119
Blockchain-based decentralized storage networks: A survey104
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions100
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0100
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security98
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction95
A review and categorization of techniques on device-free human activity recognition92
Computation offloading in mobile edge computing networks: A survey91
Detecting false data attacks using machine learning techniques in smart grid: A survey90
Automated DDOS attack detection in software defined networking89
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique88
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach88
Machine learning for intelligent optical networks: A comprehensive survey85
Applying machine learning techniques for caching in next-generation edge networks: A comprehensive survey84
Survey on computation offloading in UAV-Enabled mobile edge computing83
A survey of consensus algorithms in public blockchain systems for crypto-currencies81
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations80
A systematic review of blockchain scalability: Issues, solutions, analysis and future research79
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions78
Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction78
Adversarial attacks on deep-learning-based SAR image target recognition76
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments75
Analysis of cryptocurrency transactions from a network perspective: An overview75
A survey on technologies and security protocols: Reference for future generation IoT74
A comprehensive survey of load balancing techniques in software-defined network72
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain71
A GRU deep learning system against attacks in software defined networks70
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues69
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning69
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach68
UAV assisted 5G and beyond wireless networks: A survey65
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection63
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review61
Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges59
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey58
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review57
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey57
A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks57
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment57
A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision57
From smart parking towards autonomous valet parking: A survey, challenges and future Works56
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things55
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches55
A comprehensive survey on resource allocation for CRAN in 5G and beyond networks55
Internet of Healthcare Things: A contemporary survey55
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML52
Application deployment using containers with auto-scaling for microservices in cloud environment52
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks52
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives50
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services50
Security in product lifecycle of IoT devices: A survey49
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic47
Mobile cloud computing models security issues: A systematic review46
IoT for energy efficient green highway lighting systems: Challenges and issues46
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities46
A network intrusion detection method based on semantic Re-encoding and deep learning46
Virtual reality: A survey of enabling technologies and its applications in IoT45
Blockchain for IoT access control: Recent trends and future research directions45
A survey on data plane programming with P4: Fundamentals, advances, and applied research45
Machine learning (ML)-centric resource management in cloud computing: A review and future directions44
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)43
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey43
Smart contracts for blockchain-based reputation systems: A systematic literature review43
A survey on energy efficiency in underwater wireless communications43
Blockchain for Internet of things applications: A review and open issues43
Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey42
A dynamic and hierarchical access control for IoT in multi-authority cloud storage41
Minimizing the spread of misinformation in online social networks: A survey41
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions40
Fake news outbreak 2021: Can we stop the viral spread?40
On the classification of fog computing applications: A machine learning perspective39
Privacy preserving based logistic regression on big data39
Towards development of IoT-ML driven healthcare systems: A survey39
Attacks and defenses in user authentication systems: A survey39
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions37
Routing in the Space Internet: A contact graph routing tutorial37
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks37
Towards DDoS detection mechanisms in Software-Defined Networking36
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices36
Swarm intelligence for next-generation networks: Recent advances and applications36
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research36
Incentive techniques for the Internet of Things: A survey36
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models35
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience35
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics35
QoS-aware service provisioning in fog computing34
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy34
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions34
NOMA and future 5G & B5G wireless networks: A paradigm34
Resource slicing and customization in RAN with dueling deep Q-Network33
A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions33
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm32
A survey on security challenges and solutions in the IOTA32
An adversarial attack on DNN-based black-box object detectors32
Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence32
Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey32
A Survey of Channel Modeling Techniques for Visible Light Communications31
Data-intensive application scheduling on Mobile Edge Cloud Computing31
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey30
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey30
Fog data management: A vision, challenges, and future directions30
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts30
Fog computing approaches in IoT-enabled smart cities30
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research30
Spatial-temporal constrained particle filter for cooperative target tracking29
Bot recognition in a Web store: An approach based on unsupervised learning29
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study29
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic29
An automated implementation of hybrid cloud for performance evaluation of distributed databases29
A survey on deep learning for challenged networks: Applications and trends28
Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey28
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks28
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks27
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks27
Master-slave chain based trusted cross-domain authentication mechanism in IoT27
Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications27
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices26
Blockchain-based delegated Quantum Cloud architecture for medical big data security26
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation26
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment26
Transformation from IoT to IoV for waste management in smart cities26
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs26
Joint edge caching and dynamic service migration in SDN based mobile edge computing25
Scalable edge cloud platforms for IoT services25
Automatic guarantee scheme for intent-driven network slicing and reconfiguration25
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder24
The road to BOFUSS: The basic OpenFlow userspace software switch24
MARIO: A spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories24
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot24
Open RAN security: Challenges and opportunities24
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing23
Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization23
DroneCells: Improving spectral efficiency using drone-mounted flying base stations23
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning23
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications22
Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment22
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach22
A bibliometric overview of the Journal of Network and Computer Applications between 1997 and 201922
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions22
A survey of Layer-two blockchain protocols22
A hierarchical approach for accelerating IoT data management process based on SDN principles22
A survey of privacy-preserving offloading methods in mobile-edge computing22
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications21
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection21
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments21
Composing and deploying parallelized service function chains21
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks21
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)21
Mutual authentication with multi-factor in IoT-Fog-Cloud environment21
DNA computing and table based data accessing in the cloud environment21
An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition20
A review on reversible quantum adders20
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets20
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap20
RANet: Network intrusion detection with group-gating convolutional neural network20
Blockchain technology in Named Data Networks: A detailed survey20
When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems19
Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT19
A review on trust management in fog/edge computing: Techniques, trends, and challenges19
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions19
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling19
Joint topology control and routing in a UAV swarm for crowd surveillance18
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions18
On the use of big data frameworks for big service composition18
A survey on the placement of virtual network functions18
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things18
A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing18
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review18
A survey of link flooding attacks in software defined network ecosystems18
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application18
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution18