Computer Networks

Papers
(The H4-Index of Computer Networks is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Performance evaluation of ultra-dense macro-femto cellular networks based on efficient channel resource allocation system317
Using channel predictions for improved proportional-fair utility for vehicular users263
Editorial Board230
SRRS: A blockchain fast propagation protocol based on non-Markovian process227
MalCon: A blockchain-based malware containment framework for Internet of Things217
UAV deployment in WSN system for emergency/remote area applications172
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting168
Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks165
Detecting malicious proxy nodes during IoT network joining phase152
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization131
BGP anomaly detection as a group dynamics problem119
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach118
Privacy-preserving edge caching: A probabilistic approach116
Editorial Board115
Fair resource optimization for cooperative non-terrestrial vehicular networks114
Swarm intelligence for hole detection and healing in wireless sensor networks109
All in one: Improving GPS accuracy and security via crowdsourcing108
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks104
Editorial Board101
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks95
Experimental assessment of a JANUS-based consensus protocol95
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques89
DCCS: A dual congestion control signals based TCP for datacenter networks83
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance79
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment78
A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept76
Local Differential Privacy for correlated location data release in ITS76
Priority-awareness VNF migration method based on deep reinforcement learning73
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability72
A channel selection game for multi-operator LoRaWAN deployments72
Neural quantile optimization for edge–cloud networking70
Randomized distributed self-adjusting tree networks70
On the prediction of large-scale road-network constrained trajectories68
A marketplace model for drone-assisted edge computing in 5G scenarios67
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network67
A fine-grained compression scheme for block transmission acceleration over IPFS network67
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN66
Editorial Board66
Optimizing distributed firewall reconfiguration transients65
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks65
BGP convergence in an MRAI-free Internet64
Quantum enhanced time synchronisation for communication network64
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization64
Image super resolution based channel estimation for future wireless communication64
Reinforcement learning based tasks offloading in vehicular edge computing networks64
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs64
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis62
Estimation of the success probability of a malicious attacker on blockchain-based edge network62
Dominant coverage for target users at the lowest cost under competitive propagation in social networks60
Online training data acquisition for federated learning in cloud–edge networks60
Balanced wireless crowd charging with mobility prediction and social awareness59
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles58
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet58
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance57
Optimal server and service deployment for multi-tier edge cloud computing57
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs56
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime56
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks56
Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks56
0.095745801925659