Computer Networks

Papers
(The median citation count of Computer Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-10-01 to 2024-10-01.)
ArticleCitations
A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges257
6G networks: Beyond Shannon towards semantic and goal-oriented communications219
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective218
Machine learning methods for cyber security intrusion detection: Datasets and comparative study209
Clustering objectives in wireless sensor networks: A survey and research direction analysis189
Aerial imagery pile burn detection using deep learning: The FLAME dataset171
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things163
Federated learning for malware detection in IoT devices160
HealthBlock: A secure blockchain-based healthcare data management system154
Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead153
Machine Learning-based traffic prediction models for Intelligent Transportation Systems149
A survey on IoT platforms: Communication, security, and privacy perspectives143
Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions135
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles123
In-band Network Telemetry: A Survey122
Dynamic job-shop scheduling in smart manufacturing using deep reinforcement learning118
A network traffic forecasting method based on SA optimized ARIMA–BP neural network117
Towards a deep learning-driven intrusion detection approach for Internet of Things112
RETRACTED: Personalized federated learning framework for network traffic anomaly detection108
A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements107
Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems107
NOMA and 5G emerging technologies: A survey on issues and solution techniques102
5G In the internet of things era: An overview on security and privacy challenges100
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities93
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures92
Hybrid approach to intrusion detection in fog-based IoT environments90
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges87
Quantum Internet protocol stack: A comprehensive survey86
A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives83
Efficient and flexible management for industrial Internet of Things: A federated learning approach81
An SDN architecture for time sensitive industrial IoT76
Fusion of Federated Learning and Industrial Internet of Things: A survey75
TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT75
Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN70
Deep reinforcement learning for blockchain in industrial IoT: A survey69
Application of Internet of Things and artificial intelligence for smart fitness: A survey69
A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges66
An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks65
A survey on security and privacy issues of UAVs65
Blockchain-based Initiatives: Current state and challenges63
Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications63
Composite and efficient DDoS attack detection framework for B5G networks62
Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation62
Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks59
Hybrid SDN evolution: A comprehensive survey of the state-of-the-art59
Software defined networking architecture, traffic management, security, and placement: A survey57
Impact of the COVID-19 pandemic on the Internet latency: A large-scale study57
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities55
Task offloading in fog computing: A survey of algorithms and optimization techniques54
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs54
End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular networks53
PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection53
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model53
The TeraNova platform: An integrated testbed for ultra-broadband wireless communications at true Terahertz frequencies53
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance53
A survey on intrusion detection and prevention systems in digital substations53
A survey of trust management in the Internet of Vehicles52
An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback52
State-of-the-art survey of artificial intelligent techniques for IoT security51
Fuzzy Reinforcement Learning for energy efficient task offloading in Vehicular Fog Computing51
LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system51
Task offloading in edge computing for machine learning-based smart healthcare51
Q-FANET: Improved Q-learning based routing protocol for FANETs50
When machine learning meets congestion control: A survey and comparison50
GCACS-IoD: A certificate based generic access control scheme for Internet of drones50
Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm49
A comparative study on online machine learning techniques for network traffic streams analysis48
Software-defined networks for resource allocation in cloud computing: A survey48
A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks48
A blockchain-based trading system for big data48
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms48
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST47
Mobile edge computing for V2X architectures and applications: A survey47
Blockchain-based privacy preserving e-health system for healthcare data in cloud46
Satellite-based communications security: A survey of threats, solutions, and research challenges46
LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge46
Acoustic-based sensing and applications: A survey46
Minimum delay function placement and resource allocation for Open RAN (O-RAN) 5G networks45
Anomaly detection and trust authority in artificial intelligence and cloud computing45
Convolutional Neural Networks for forecasting flood process in Internet-of-Things enabled smart city45
An intelligent fuzzy-based routing scheme for software-defined vehicular networks44
Detection of zero-day attacks: An unsupervised port-based approach44
SPEAR SIEM: A Security Information and Event Management system for the Smart Grid44
Smart contract vulnerability detection combined with multi-objective detection44
A clogging resistant secure authentication scheme for fog computing services44
Dynamic VNF placement, resource allocation and traffic routing in 5G43
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing43
An improved multi-objective genetic algorithm with heuristic initialization for service placement and load distribution in edge computing43
Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing43
Joint task offloading and data caching in mobile edge computing networks42
NFStream42
Towards intelligent virtual resource allocation in UAVs-assisted 5G networks42
An overview on cross-chain: Mechanism, platforms, challenges and advances42
A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning41
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms41
Self-attentive deep learning method for online traffic classification and its interpretability40
A kangaroo-based intrusion detection system on software-defined networks40
A survey on sleep mode techniques for ultra-dense networks in 5G and beyond40
Distributed denial of service attack prediction: Challenges, open issues and opportunities40
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review40
A comprehensive survey on DNS tunnel detection39
An optimized UAV trajectory planning for localization in disaster scenarios39
A Survey on Role of Blockchain for IoT: Applications and Technical Aspects39
AI-enabled mobile multimedia service instance placement scheme in mobile edge computing39
A comprehensive survey of vulnerability and information security in SDN38
NFV security survey in 5G networks: A three-dimensional threat taxonomy38
ScaleDRL: A Scalable Deep Reinforcement Learning Approach for Traffic Engineering in SDN with Pinning Control38
SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks38
Optimized content centric networking for future internet: Dynamic popularity window based caching scheme38
MATEC: A lightweight neural network for online encrypted traffic classification38
Survey of crosschain communications protocols38
A survey: Distributed Machine Learning for 5G and beyond38
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN38
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity37
Realtime mobile bandwidth prediction using LSTM neural network and Bayesian fusion36
A QoS-guaranteed intelligent routing mechanism in software-defined networks36
Scheduling of emergency tasks for multiservice UAVs in post-disaster scenarios36
Online classification of user activities using machine learning on network traffic36
CellOS: Zero-touch Softwarized Open Cellular Networks36
Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks36
Adversarial machine learning for network intrusion detection: A comparative study36
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems36
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach36
Architectures, standardisation, and procedures for 5G Satellite Communications: A survey35
Performance evaluation of CoAP and MQTT with security support for IoT environments35
Cooperative service caching and computation offloading in multi-access edge computing34
NFV Resource Allocation: a Systematic Review and Taxonomy of VNF Forwarding Graph Embedding34
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions34
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT34
Leveraging fairness in LoRaWAN: A novel scheduling scheme for collision avoidance33
Comprehensive review on ML-based RIS-enhanced IoT systems: basics, research progress and future challenges33
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios33
Fairness, integrity, and privacy in a scalable blockchain-based federated learning system33
Optimal auction for delay and energy constrained task offloading in mobile edge computing33
A differential game approach for real-time security defense decision in scale-free networks32
Arena: A 64-antenna SDR-based ceiling grid testing platform for sub-6 GHz 5G-and-Beyond radio spectrum research32
MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning32
An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems32
UAVs joint optimization problems and machine learning to improve the 5G and Beyond communication32
A cyber-physical model for SCADA system and its intrusion detection32
Energy-aware task scheduling and offloading using deep reinforcement learning in SDN-enabled IoT network32
SecFHome: Secure remote authentication in fog-enabled smart home environment32
A survey on stateful data plane in software defined networks32
Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks31
PrePass-Flow: A Machine Learning based technique to minimize ACL policy violation due to links failure in hybrid SDN31
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability31
SmartFCT: Improving power-efficiency for data center networks with deep reinforcement learning31
Efficient spam and phishing emails filtering based on deep learning31
Secure routing for LEO satellite network survivability31
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks30
A versatile experimental testbed for ultrabroadband communication networks above 100 GHz30
A position-based reliable emergency message routing scheme for road safety in VANETs30
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment30
Joint computation offloading and resource allocation for NOMA-based multi-access mobile edge computing systems30
A cloud resource management framework for multiple online scientific workflows using cooperative reinforcement learning agents30
Adaptive range-based localization algorithm based on trilateration and reference node selection for outdoor wireless sensor networks30
Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks30
Powder: Platform for Open Wireless Data-driven Experimental Research30
Deep Q-Network based resource allocation for UAV-assisted Ultra-Dense Networks30
Communication technologies for Smart Water Grid applications: Overview, opportunities, and research directions30
An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information30
Comprehensive survey on self-organizing cellular network approaches applied to 5G networks29
Computation offloading and resource allocation based on distributed deep learning and software defined mobile edge computing29
Machine learning empowered computer networks29
An optimization based localization with area minimization for heterogeneous wireless sensor networks in anisotropic fields29
Truck platoon security: State-of-the-art and road ahead28
Edge intelligence computing for mobile augmented reality with deep reinforcement learning approach28
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments28
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G28
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks28
An energy-efficient routing protocol for the Internet of Things networks based on geographical location and link quality28
Optimized pollard route deviation and route selection using Bayesian machine learning techniques in wireless sensor networks28
Attacks and countermeasures on blockchains: A survey from layering perspective28
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning27
Detecting DNS over HTTPS based data exfiltration27
Energy harvesting computation offloading game towards minimizing delay for mobile edge computing27
A survey on Bluetooth Low Energy security and privacy27
SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement27
ARES: Adaptive Resource-Aware Split Learning for Internet of Things27
From serendipity to sustainable green IoT: Technical, industrial and political perspective27
A game-theoretic joint optimal pricing and resource allocation for Mobile Edge Computing in NOMA-based 5G networks and beyond27
Swarm intelligence RFID network planning using multi-antenna readers for asset tracking in hospital environments27
Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective27
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management26
OpenRAN Gym: AI/ML development, data collection, and testing for O-RAN on PAWR platforms26
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains26
Packet-level prediction of mobile-app traffic using multitask Deep Learning26
Congestion free opportunistic multipath routing load balancing scheme for Internet of Things (IoT)26
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain26
Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing26
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment26
Energy Efficient Neuro-Fuzzy Cluster based Topology Construction with Metaheuristic Route Planning Algorithm for Unmanned Aerial Vehicles26
Communication-efficient asynchronous federated learning in resource-constrained edge computing26
Computation offloading and content caching and delivery in Vehicular Edge Network: A survey26
Mobile-edge computing-based delay minimization controller placement in SDN-IoV26
Edge Intelligent Agent Assisted Hybrid Hierarchical Blockchain for continuous healthcare monitoring & recommendation system in 5G WBAN-IoT26
A survey on ambient backscatter communications: Principles, systems, applications, and challenges26
Task offloading and resource allocation algorithm based on deep reinforcement learning for distributed AI execution tasks in IoT edge computing environments25
An efficient combined deep neural network based malware detection framework in 5G environment25
Fixed degree of decentralization DPoS consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value25
Smart computational offloading for mobile edge computing in next-generation Internet of Things networks25
A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept25
Battery-less internet of things –A survey25
An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks25
HashXor: A lightweight scheme for identity privacy of IoT devices in 5G mobile network24
Federated deep reinforcement learning based secure data sharing for Internet of Things24
Cognitive radio based spectrum sharing models for multicasting in 5G cellular networks: A survey24
IoT and digital circular economy: Principles, applications, and challenges24
A Social IoT-based platform for the deployment of a smart parking solution24
Realtime mobile bandwidth and handoff predictions in 4G/5G networks24
CNN-SSDI: Convolution neural network inspired surveillance system for UAVs detection and identification24
Efficient intrusion detection toward IoT networks using cloud–edge collaboration23
Diversity-improved caching of popular transient contents in Vehicular Named Data Networking23
An SDN perspective IoT-Fog security: A survey23
Driving assistance system based on data fusion of multisource sensors for autonomous unmanned ground vehicles23
Application of a Long Short Term Memory neural predictor with asymmetric loss function for the resource allocation in NFV network architectures23
Domain name system security and privacy: A contemporary survey23
Adaptive algorithm for spreading factor selection in LoRaWAN networks with multiple gateways23
EDTP: Energy and Delay Optimized Trajectory Planning for UAV-IoT Environment23
Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks23
Cluster-based flow control in hybrid software-defined wireless sensor networks23
Failure-resilient DAG task scheduling in edge computing23
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems23
Fine-grained TLS services classification with reject option23
Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model23
Resource Allocation in Multi-access Edge Computing for 5G-and-beyond networks22
Beyond 5G for digital twins of UAVs22
Intent-driven autonomous network and service management in future cellular networks: A structured literature review22
Few-shot website fingerprinting attack22
Optimized task scheduling for cost-latency trade-off in mobile fog computing using fuzzy analytical hierarchy process22
Determining the trade-offs between data delivery and energy consumption in large-scale WSNs by multi-objective evolutionary optimization22
The two-phase scheduling based on deep learning in the Internet of Things22
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion22
Securing Bluetooth Low Energy networking: An overview of security procedures and threats22
RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware22
Energy aware fault tolerant clustering with routing protocol for improved survivability in wireless sensor networks22
An enhanced symmetric-key based 5G-AKA protocol22
NetView: Towards on-demand network-wide telemetry in the data center21
Cloud-Enabled IoT-based embedded system and software for intelligent indoor lighting, ventilation, early stage fire detection and prevention21
Discovering unknown advanced persistent threat using shared features mined by neural networks21
Intrusion detection and prevention in fog based IoT environments: A systematic literature review21
Burn-to-Claim: An asset transfer protocol for blockchain interoperability21
A Novel Lyapunov based Dynamic Resource Allocation for UAVs-assisted Edge Computing21
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment21
A genetic algorithm approach for service function chain placement in 5G and beyond, virtualized edge networks21
A Reliability and latency-aware routing framework for 5G transport infrastructures21
ByteSGAN: A semi-supervised Generative Adversarial Network for encrypted traffic classification in SDN Edge Gateway21
Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN21
Building a Digital Twin for network optimization using Graph Neural Networks21
On-demand fragmentation-aware spectrum allocation in space division multiplexed elastic optical networks with minimized crosstalk and multipath routing21
0.66473603248596