Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The median citation count of Cluster Computing-The Journal of Networks Software Tools and Applicati is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-10-01 to 2024-10-01.)
ArticleCitations
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance138
Energy efficiency in cloud computing data centers: a survey on software technologies113
Blockchain for decentralization of internet: prospects, trends, and challenges102
Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing89
Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges and open issues86
A survey on boosting IoT security and privacy through blockchain81
SDN–IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic72
Internet of Things intrusion detection systems: a comprehensive review and future directions71
Mobility-aware computational offloading in mobile edge networks: a survey67
A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm66
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms63
A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix62
Blockchain for deep learning: review and open challenges61
Joint wireless power transfer and task offloading in mobile edge computing: a survey61
Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning60
Cost-aware job scheduling for cloud instances using deep reinforcement learning59
A robust blind medical image watermarking approach for telemedicine applications57
An efficient malware detection approach with feature weighting based on Harris Hawks optimization54
An efficient harris hawk optimization algorithm for solving the travelling salesman problem54
Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments52
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing52
A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm52
RSM analysis based cloud access security broker: a systematic literature review50
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach49
A survey on deep learning-based identification of plant and crop diseases from UAV-based aerial images48
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges47
Privacy challenges of IoT-based blockchain: a systematic review46
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach45
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review45
Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing45
Privacy protection for fog computing and the internet of things data based on blockchain44
An intelligent cyber security phishing detection system using deep learning techniques43
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions43
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection42
Data replica placement approaches in fog computing: a review41
Task scheduling of cloud computing based on hybrid particle swarm algorithm and genetic algorithm41
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost41
Blockchain-based federated learning methodologies in smart environments40
MrLBA: multi-resource load balancing algorithm for cloud computing using ant colony optimization39
A hybrid multi-objective metaheuristic optimization algorithm for scientific workflow scheduling39
Data replication schemes in cloud computing: a survey39
Managing overloaded hosts for energy-efficiency in cloud data centers38
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture37
DLBench: a comprehensive experimental evaluation of deep learning frameworks37
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network35
Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection35
Popular deep learning algorithms for disease prediction: a review35
A review of smart contract-based platforms, applications, and challenges34
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning33
The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments33
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks33
A survey of blockchain applications in sustainable and smart cities33
Fusion of deep learning based cyberattack detection and classification model for intelligent systems32
Human activity recognition in cyber-physical systems using optimized machine learning techniques32
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm32
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications31
Resource scheduling methods in cloud and fog computing environments: a systematic literature review30
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices30
Decrypting distributed ledger design—taxonomy, classification and blockchain community evaluation30
Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare30
Fog computing and Internet of Things in one building block: a survey and an overview of interacting technologies29
Chatgpt for cybersecurity: practical applications, challenges, and future directions29
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing29
Energy efficiency in cloud computing data center: a survey on hardware technologies29
An explainable and efficient deep learning framework for video anomaly detection29
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images29
Blockchain for IoV in 6G environment: review solutions and challenges28
Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus28
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things28
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey28
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review27
An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G27
BigRC-EML: big-data based ransomware classification using ensemble machine learning27
A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks27
A novel mechanism to handle address spoofing attacks in SDN based IoT27
Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data26
An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment26
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems26
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems26
Intelligent ubiquitous computing for future UAV-enabled MEC network systems26
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes26
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model26
Load-balance scheduling for intelligent sensors deployment in industrial internet of things26
Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles26
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments26
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing25
Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization25
An efficient energy-aware approach for dynamic VM consolidation on cloud platforms25
Smart contract based policies for the Internet of Things25
MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning24
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective24
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory24
Detecting network cyber-attacks using an integrated statistical approach24
Clustering for smart cities in the internet of things: a review23
Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning23
Blockchain application for central bank digital currencies (CBDC)23
Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence23
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures23
A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud22
Mutual authentication scheme of IoT devices in fog computing environment22
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid22
Secure gene profile data processing using lightweight cryptography and blockchain22
A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks22
Improving load balancing for data-duplication in big data cloud computing networks22
Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR)22
Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation22
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing21
Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions21
An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment21
A novel deep reinforcement learning scheme for task scheduling in cloud computing21
An intelligent system for blood donation process optimization - smart techniques for minimizing blood wastages20
Detection and prediction of traffic accidents using deep learning techniques20
Reliable budget aware workflow scheduling strategy on multi-cloud environment20
Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment20
An attentive hierarchy ConvNet for crowd counting in smart city19
Research on sports training model based on intelligent data aggregation processing in internet of things19
Data governance through a multi-DLT architecture in view of the GDPR19
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing19
Design and development of an intelligent transportation management system using blockchain and smart contracts19
Auto-scaling techniques for IoT-based cloud applications: a review19
A secure authentication technique for connecting different IoT devices in the smart city infrastructure19
A flow-based intrusion detection framework for internet of things networks19
Workload time series prediction in storage systems: a deep learning based approach19
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments19
Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment19
A quantum inspired hybrid SSA–GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing18
Improved gossip protocol for blockchain applications18
Detection and classification of sensor anomalies for simulating urban traffic scenarios18
BERT-based ensemble learning for multi-aspect hate speech detection18
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property18
Detection of K-complexes in EEG signals using deep transfer learning and YOLOv318
A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid18
A mixed sine cosine butterfly optimization algorithm for global optimization and its application18
A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs17
VMS-MCSA: virtual machine scheduling using modified clonal selection algorithm17
Sidechain: storage land registry data using blockchain improve performance of search records17
Mitigating the worst parent attack in RPL based internet of things17
CP-PGWO: multi-objective workflow scheduling for cloud computing using critical path17
Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique16
Blockchain-enabled real-time SLA monitoring for cloud-hosted services16
Toward integrating software defined networks with the Internet of Things: a review16
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain16
Optimized task scheduling in cloud computing using improved multi-verse optimizer16
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks16
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique16
Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm16
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things15
Task scheduling and VM placement to resource allocation in Cloud computing: challenges and opportunities15
An efficient load balancing technique for task scheduling in heterogeneous cloud environment15
Business intelligence using deep learning techniques for social media contents15
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid15
FARMIT: continuous assessment of crop quality using machine learning and deep learning techniques for IoT-based smart farming15
ProBlock: a novel approach for fake news detection15
A power and thermal-aware virtual machine management framework based on machine learning15
Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment15
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework14
An enhanced design of a 5G MIMO antenna for fixed wireless aerial access14
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection14
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things14
Intelligent management of supply chain logistics based on 5g LoT14
Boosting the training of neural networks through hybrid metaheuristics14
Towards a secure and dependable IoT data monetization using blockchain and fog computing14
A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things14
SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks14
Cloud to cloud data migration using self sovereign identity for 5G and beyond14
Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection14
Lightweight encryption for privacy protection of data transmission in cyber physical systems14
Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes14
Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds14
Energy-aware scientific workflow scheduling in cloud environment14
Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks14
A federated approach to Android malware classification through Perm-Maps14
MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns14
A gradient-based optimization approach for task scheduling problem in cloud computing14
Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network14
Battling against cyberattacks: towards pre-standardization of countermeasures13
On an improved clustering algorithm based on node density for WSN routing protocol13
TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms13
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure13
A survey of uncover misleading and cyberbullying on social media for public health13
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud13
A new weighted fuzzy C-means clustering for workload monitoring in cloud datacenter platforms13
RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations13
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud13
Machine learning-based computation offloading in edge and fog: a systematic review13
Big data dimensionality reduction techniques in IoT: review, applications and open research challenges13
Edge computing based secure health monitoring framework for electronic healthcare system13
An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles13
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine13
Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment13
Towards the design of real-time autonomous IoT NIDS13
Privacy protection framework for face recognition in edge-based Internet of Things13
Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques13
Intelligent intrusion detection based on fuzzy Big Data classification13
A high-efficiency learning model for virtual machine placement in mobile edge computing12
Multi-objective optimization-based privacy in data mining12
A pre-trained convolutional neural network with optimized capsule networks for chest X-rays COVID-19 diagnosis12
A blockchain-based IoT data marketplace12
Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming12
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat12
Implementation and evaluation of a container management platform on Docker: Hadoop deployment as an example12
CoPUP: content popularity and user preferences aware content caching framework in mobile edge computing12
Federated recommenders: methods, challenges and future12
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks12
Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM12
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy12
An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems12
Fraud detection in the distributed graph database11
Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence11
Multi-antenna relay based cyber-physical systems in smart-healthcare NTNs: an explainable AI approach11
Artificial intelligent system for multimedia services in smart home environments11
Smart sensors, sensing mechanisms and platforms of sustainable smart agriculture realized through the big data analysis11
Software architecture for IoT-based health-care systems with cloud/fog service model11
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey11
Video event detection, classification and retrieval using ensemble feature selection11
Performance prediction of deep learning applications training in GPU as a service systems11
Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms11
TC3PoP: a time-cost compromised workflow scheduling heuristic customized for cloud environments11
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources11
PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment11
An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing11
Multi-factor nature inspired SLA-aware energy efficient resource management for cloud environments11
Placement of IoT services in fog environment based on complex network features: a genetic-based approach11
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system11
Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images11
A novel generalized fuzzy intelligence-based ant lion optimization for internet of things based disease prediction and diagnosis11
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT11
An optimized human resource management model for cloud-edge computing in the internet of things11
Energy efficient offloading scheme for MEC-based augmented reality system10
Clustering-based data placement in cloud computing: a predictive approach10
FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos10
TRAP: task-resource adaptive pairing for efficient scheduling in fog computing10
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization10
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts10
New CNN and hybrid CNN-LSTM models for learning object manipulation of humanoid robots from demonstration10
Workflow scheduling of scientific workflows under simultaneous deadline and budget constraints10
Prediction-based scheduling techniques for cloud data center’s workload: a systematic review10
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA)10
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function10
Towards decomposition based multi-objective workflow scheduling for big data processing in clouds10
Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems10
Offloading strategy with PSO for mobile edge computing based on cache mechanism10
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs10
A classification-based sensor data processing method for the internet of things assimilated wearable sensor technology10
RETRACTED ARTICLE: Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model9
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing9
A framework for evaluating cloud computing services using AHP and TOPSIS approaches with interval valued spherical fuzzy sets9
High-speed hyperparameter optimization for deep ResNet models in image recognition9
QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds9
A secure and flexible edge computing scheme for AI-driven industrial IoT9
0.049612998962402