Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The median citation count of Cluster Computing-The Journal of Networks Software Tools and Applicati is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance120
Resource provisioning using workload clustering in cloud computing environment: a hybrid approach80
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking73
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis73
Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing71
Blockchain for decentralization of internet: prospects, trends, and challenges71
A survey on boosting IoT security and privacy through blockchain65
SDN–IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic63
Mobility-aware computational offloading in mobile edge networks: a survey59
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security58
A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm56
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms55
A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix52
Joint wireless power transfer and task offloading in mobile edge computing: a survey51
A robust blind medical image watermarking approach for telemedicine applications51
Energy efficiency in cloud computing data centers: a survey on software technologies50
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm50
Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges and open issues50
DCHG-TS: a deadline-constrained and cost-effective hybrid genetic algorithm for scientific workflow scheduling in cloud computing50
Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning47
An efficient harris hawk optimization algorithm for solving the travelling salesman problem47
Cost-aware job scheduling for cloud instances using deep reinforcement learning46
A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm46
Blockchain for deep learning: review and open challenges46
Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments46
An efficient malware detection approach with feature weighting based on Harris Hawks optimization45
RSM analysis based cloud access security broker: a systematic literature review41
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing40
Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing39
Retail level Blockchain transformation for product supply chain using truffle development platform38
Privacy protection for fog computing and the internet of things data based on blockchain38
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach37
Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey37
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges37
An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach37
Autonomic task scheduling algorithm for dynamic workloads through a load balancing technique for the cloud-computing environment37
A hybrid multi-objective metaheuristic optimization algorithm for scientific workflow scheduling36
A survey and classification of the security anomaly detection mechanisms in software defined networks36
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities36
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection36
Privacy challenges of IoT-based blockchain: a systematic review36
Energy and resource efficient workflow scheduling in a virtualized cloud environment35
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review35
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network35
Managing overloaded hosts for energy-efficiency in cloud data centers34
DLBench: a comprehensive experimental evaluation of deep learning frameworks32
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture32
Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm32
An intelligent cyber security phishing detection system using deep learning techniques31
Internet of Things intrusion detection systems: a comprehensive review and future directions30
MrLBA: multi-resource load balancing algorithm for cloud computing using ant colony optimization30
A survey on deep learning-based identification of plant and crop diseases from UAV-based aerial images29
Blockchain-based federated learning methodologies in smart environments29
A survey of blockchain applications in sustainable and smart cities28
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm28
Energy efficiency in cloud computing data center: a survey on hardware technologies27
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost27
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications27
A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment26
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach26
An explainable and efficient deep learning framework for video anomaly detection26
Fog computing and Internet of Things in one building block: a survey and an overview of interacting technologies26
Data replication schemes in cloud computing: a survey26
Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare26
Data replica placement approaches in fog computing: a review25
Smart contract based policies for the Internet of Things25
The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments25
CCS-OSSR: A framework based on Hybrid MCDM for Optimal Service Selection and Ranking of Cloud Computing Services25
Intelligent ubiquitous computing for future UAV-enabled MEC network systems25
Task scheduling of cloud computing based on hybrid particle swarm algorithm and genetic algorithm24
Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection24
Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus24
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things24
A novel mechanism to handle address spoofing attacks in SDN based IoT23
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory23
TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things23
Decrypting distributed ledger design—taxonomy, classification and blockchain community evaluation23
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices23
Blockchain for IoV in 6G environment: review solutions and challenges23
RHAS: robust hybrid auto-scaling for web applications in cloud computing23
MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning22
Human activity recognition in cyber-physical systems using optimized machine learning techniques22
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey22
A review of smart contract-based platforms, applications, and challenges21
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review21
Mutual authentication scheme of IoT devices in fog computing environment21
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions21
Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation21
BigRC-EML: big-data based ransomware classification using ensemble machine learning21
An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment21
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images21
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes21
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing21
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning21
A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud20
Load-balance scheduling for intelligent sensors deployment in industrial internet of things20
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks20
Improving load balancing for data-duplication in big data cloud computing networks20
A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks20
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model20
Popular deep learning algorithms for disease prediction: a review20
Resource scheduling methods in cloud and fog computing environments: a systematic literature review20
Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization20
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks19
Fusion of deep learning based cyberattack detection and classification model for intelligent systems19
Detection of K-complexes in EEG signals using deep transfer learning and YOLOv319
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing19
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems19
An efficient energy-aware approach for dynamic VM consolidation on cloud platforms19
Multi-criteria HPC task scheduling on IaaS cloud infrastructures using meta-heuristics19
Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data18
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective18
Research on sports video detection technology motion 3D reconstruction based on hidden Markov model18
An efficient content placement scheme based on normalized node degree in content centric networking18
Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR)18
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments18
Auto-scaling techniques for IoT-based cloud applications: a review18
A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks18
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures18
An intelligent system for blood donation process optimization - smart techniques for minimizing blood wastages17
A route selection approach for variable data transmission in wireless sensor networks17
An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G17
Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC17
A secure authentication technique for connecting different IoT devices in the smart city infrastructure17
An effective HPSO-MGA optimization algorithm for dynamic resource allocation in cloud environment17
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems17
A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs17
Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles17
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid17
A Spark-based differential evolution with grouping topology model for large-scale global optimization16
A flow-based intrusion detection framework for internet of things networks16
Detecting dental problem related brain disease using intelligent bacterial optimized associative deep neural network16
Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment16
Research on sports training model based on intelligent data aggregation processing in internet of things16
A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid16
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property16
SDN-based server clusters with dynamic load balancing and performance improvement16
A heuristic method towards deadline-aware energy-efficient mapreduce scheduling problem in Hadoop YARN16
Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence16
Reliable budget aware workflow scheduling strategy on multi-cloud environment16
An attentive hierarchy ConvNet for crowd counting in smart city16
Detecting network cyber-attacks using an integrated statistical approach16
Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm15
An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment15
Budget-deadline constrained approach for scientific workflows scheduling in a cloud environment15
A novel deep reinforcement learning scheme for task scheduling in cloud computing15
Blockchain-based e-cheque clearing framework with trust based consensus mechanism15
Design and development of an intelligent transportation management system using blockchain and smart contracts15
Blockchain application for central bank digital currencies (CBDC)15
A mixed sine cosine butterfly optimization algorithm for global optimization and its application15
BDDT: use blockchain to facilitate IoT data transactions15
Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions15
Clustering for smart cities in the internet of things: a review14
Detection and prediction of traffic accidents using deep learning techniques14
Detection and classification of sensor anomalies for simulating urban traffic scenarios14
Towards an optimized distributed deep learning framework for a heterogeneous multi-GPU cluster14
Workload time series prediction in storage systems: a deep learning based approach14
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique14
Task replication to improve the reliability of running workflows on the cloud14
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain13
Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment13
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing13
Sidechain: storage land registry data using blockchain improve performance of search records13
A gradient-based optimization approach for task scheduling problem in cloud computing13
Replacing email protocols with blockchain-based smart contracts13
A secure, efficient and verifiable multimedia data sharing scheme in fog networking system13
Blockchain-enabled real-time SLA monitoring for cloud-hosted services13
A statistical class center based triangle area vector method for detection of denial of service attacks13
Apache Spark Implementation of Whale Optimization Algorithm13
CP-PGWO: multi-objective workflow scheduling for cloud computing using critical path13
Mitigating the worst parent attack in RPL based internet of things13
A quantum inspired hybrid SSA–GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing13
BERT-based ensemble learning for multi-aspect hate speech detection13
Improved gossip protocol for blockchain applications13
VMS-MCSA: virtual machine scheduling using modified clonal selection algorithm13
Software-defined load-balanced data center: design, implementation and performance analysis12
A model-driven engineering approach for the service integration of IoT systems12
FARMIT: continuous assessment of crop quality using machine learning and deep learning techniques for IoT-based smart farming12
Software architecture for IoT-based health-care systems with cloud/fog service model12
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing12
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks12
ProBlock: a novel approach for fake news detection12
A power and thermal-aware virtual machine management framework based on machine learning12
A novel energy-efficient scheduling model for multi-core systems12
Optimized task scheduling in cloud computing using improved multi-verse optimizer12
RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations12
Toward integrating software defined networks with the Internet of Things: a review12
Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds12
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud12
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework12
Battling against cyberattacks: towards pre-standardization of countermeasures12
Execution cost minimization scheduling algorithms for deadline-constrained parallel applications on heterogeneous clouds12
Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment12
Boosting the training of neural networks through hybrid metaheuristics12
Multi-objective optimization-based privacy in data mining12
An enhanced design of a 5G MIMO antenna for fixed wireless aerial access11
Performance prediction of deep learning applications training in GPU as a service systems11
Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network11
Big data dimensionality reduction techniques in IoT: review, applications and open research challenges11
An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles11
An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems11
A new weighted fuzzy C-means clustering for workload monitoring in cloud datacenter platforms11
An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing11
Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes11
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid11
An optimization of distributed Voronoi-based collaboration for energy-efficient geographic routing in wireless sensor networks11
Lightweight encryption for privacy protection of data transmission in cyber physical systems11
Two new collaborative filtering approaches to solve the sparsity problem11
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things11
Offloading strategy with PSO for mobile edge computing based on cache mechanism11
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection10
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system10
Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms10
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud10
Intelligent intrusion detection based on fuzzy Big Data classification10
Implementation and evaluation of a container management platform on Docker: Hadoop deployment as an example10
Chatgpt for cybersecurity: practical applications, challenges, and future directions10
Cloud to cloud data migration using self sovereign identity for 5G and beyond10
Data governance through a multi-DLT architecture in view of the GDPR10
MapReduce FCM clustering set algorithm10
On an improved clustering algorithm based on node density for WSN routing protocol10
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine10
A dynamic task scheduler tolerant to multiple hibernations in cloud environments10
Task scheduling and VM placement to resource allocation in Cloud computing: challenges and opportunities10
A high-efficiency learning model for virtual machine placement in mobile edge computing10
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments10
PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment10
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT10
An optimized human resource management model for cloud-edge computing in the internet of things10
MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns9
Towards a secure and dependable IoT data monetization using blockchain and fog computing9
TOP-Storm: A topology-based resource-aware scheduler for Stream Processing Engine9
RETRACTED ARTICLE: Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model9
Clustering-based data placement in cloud computing: a predictive approach9
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing9
Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds9
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things9
Intelligent management of supply chain logistics based on 5g LoT9
A survey of uncover misleading and cyberbullying on social media for public health9
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing9
Energy-aware scientific workflow scheduling in cloud environment9
SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks9
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs9
Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images9
Business intelligence using deep learning techniques for social media contents9
Edge computing based secure health monitoring framework for electronic healthcare system9
Towards decomposition based multi-objective workflow scheduling for big data processing in clouds9
Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem9
Artificial intelligent system for multimedia services in smart home environments9
An efficient load balancing technique for task scheduling in heterogeneous cloud environment9
0.035767078399658