Computer Networks

Papers
(The H4-Index of Computer Networks is 54. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Adaptive overlay selection at the SD-WAN edges: A reinforcement learning approach with networked agents171127347
A compilation of UAV applications for precision agriculture434
Cyber-security on smart grid: Threats and potential solutions324
Building an efficient intrusion detection system based on feature selection and ensemble classifier322
Campus traffic and e-Learning during COVID-19 pandemic290
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture250
A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges210
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective182
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset169
Machine learning methods for cyber security intrusion detection: Datasets and comparative study159
Clustering objectives in wireless sensor networks: A survey and research direction analysis157
6G networks: Beyond Shannon towards semantic and goal-oriented communications144
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things129
Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm128
Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead127
Aerial imagery pile burn detection using deep learning: The FLAME dataset125
Federated learning for malware detection in IoT devices122
Machine Learning-based traffic prediction models for Intelligent Transportation Systems119
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT118
Security issues and challenges in V2X: A Survey117
A survey on IoT platforms: Communication, security, and privacy perspectives112
Accurate and fast URL phishing detector: A convolutional neural network approach109
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles108
HealthBlock: A secure blockchain-based healthcare data management system107
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning105
Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions104
In-band Network Telemetry: A Survey100
Dynamic job-shop scheduling in smart manufacturing using deep reinforcement learning91
A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements90
RETRACTED: Personalized federated learning framework for network traffic anomaly detection89
Towards a deep learning-driven intrusion detection approach for Internet of Things88
Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems85
A network traffic forecasting method based on SA optimized ARIMA–BP neural network85
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures82
5G In the internet of things era: An overview on security and privacy challenges82
NOMA and 5G emerging technologies: A survey on issues and solution techniques82
Hybrid approach to intrusion detection in fog-based IoT environments76
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities75
A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems72
An effective service-oriented networking management architecture for 5G-enabled internet of things71
Towards smart farming: Systems, frameworks and exploitation of multiple sources68
Efficient and flexible management for industrial Internet of Things: A federated learning approach68
Secure over-the-air software updates in connected vehicles: A survey65
An SDN architecture for time sensitive industrial IoT64
A NSGA2-LR wrapper approach for feature selection in network intrusion detection60
Application of Internet of Things and artificial intelligence for smart fitness: A survey58
A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives58
How to exploit the Social Internet of Things: Query Generation Model and Device Profiles’ Dataset58
Deep reinforcement learning for blockchain in industrial IoT: A survey58
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges57
Cloud based security on outsourcing using blockchain in E-health systems57
An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks57
Composite and efficient DDoS attack detection framework for B5G networks54
User authentication on mobile devices: Approaches, threats and trends54
0.05089282989502