Computer Networks

Papers
(The TQCC of Computer Networks is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A compilation of UAV applications for precision agriculture448
Building an efficient intrusion detection system based on feature selection and ensemble classifier330
Campus traffic and e-Learning during COVID-19 pandemic292
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture255
A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges217
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective187
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset172
Machine learning methods for cyber security intrusion detection: Datasets and comparative study165
Clustering objectives in wireless sensor networks: A survey and research direction analysis160
6G networks: Beyond Shannon towards semantic and goal-oriented communications154
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things133
Federated learning for malware detection in IoT devices130
Aerial imagery pile burn detection using deep learning: The FLAME dataset130
Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm129
Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead127
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT122
Machine Learning-based traffic prediction models for Intelligent Transportation Systems121
A survey on IoT platforms: Communication, security, and privacy perspectives118
HealthBlock: A secure blockchain-based healthcare data management system114
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles112
Accurate and fast URL phishing detector: A convolutional neural network approach109
Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions109
In-band Network Telemetry: A Survey99
Dynamic job-shop scheduling in smart manufacturing using deep reinforcement learning96
Towards a deep learning-driven intrusion detection approach for Internet of Things92
A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements91
RETRACTED: Personalized federated learning framework for network traffic anomaly detection91
Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems90
A network traffic forecasting method based on SA optimized ARIMA–BP neural network89
5G In the internet of things era: An overview on security and privacy challenges85
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures84
NOMA and 5G emerging technologies: A survey on issues and solution techniques83
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities77
Hybrid approach to intrusion detection in fog-based IoT environments77
A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems74
Towards smart farming: Systems, frameworks and exploitation of multiple sources73
An effective service-oriented networking management architecture for 5G-enabled internet of things71
Efficient and flexible management for industrial Internet of Things: A federated learning approach68
An SDN architecture for time sensitive industrial IoT66
Secure over-the-air software updates in connected vehicles: A survey65
A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives63
A NSGA2-LR wrapper approach for feature selection in network intrusion detection61
How to exploit the Social Internet of Things: Query Generation Model and Device Profiles’ Dataset59
Application of Internet of Things and artificial intelligence for smart fitness: A survey59
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges59
An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks58
Deep reinforcement learning for blockchain in industrial IoT: A survey58
Cloud based security on outsourcing using blockchain in E-health systems57
User authentication on mobile devices: Approaches, threats and trends57
Quantum Internet protocol stack: A comprehensive survey55
Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications55
Composite and efficient DDoS attack detection framework for B5G networks55
Impact of the COVID-19 pandemic on the Internet latency: A large-scale study53
TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT53
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting52
Towards formal verification of IoT protocols: A Review51
New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN50
Blockchain-based Initiatives: Current state and challenges49
A survey of trust management in the Internet of Vehicles48
Fusion of Federated Learning and Industrial Internet of Things: A survey47
Hybrid SDN evolution: A comprehensive survey of the state-of-the-art47
Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks46
A survey on intrusion detection and prevention systems in digital substations46
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance46
Software defined networking architecture, traffic management, security, and placement: A survey46
A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks45
CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification45
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs45
End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular networks44
OpenAirInterface: Democratizing innovation in the 5G Era44
Mobility based network lifetime in wireless sensor networks: A review43
Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN43
Mobile edge computing for V2X architectures and applications: A survey43
Task offloading in edge computing for machine learning-based smart healthcare42
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model42
An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback42
Fuzzy Reinforcement Learning for energy efficient task offloading in Vehicular Fog Computing42
Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation42
Discrimination-aware trust management for social internet of things41
GCACS-IoD: A certificate based generic access control scheme for Internet of drones41
UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach41
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant41
The TeraNova platform: An integrated testbed for ultra-broadband wireless communications at true Terahertz frequencies41
A clogging resistant secure authentication scheme for fog computing services41
PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection41
Narrowband Internet of Things: A Comprehensive Study40
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms40
An intelligent fuzzy-based routing scheme for software-defined vehicular networks39
When machine learning meets congestion control: A survey and comparison39
State-of-the-art survey of artificial intelligent techniques for IoT security39
Convolutional Neural Networks for forecasting flood process in Internet-of-Things enabled smart city39
LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system39
Anomaly detection and trust authority in artificial intelligence and cloud computing39
SPEAR SIEM: A Security Information and Event Management system for the Smart Grid39
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure38
An improved multi-objective genetic algorithm with heuristic initialization for service placement and load distribution in edge computing38
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities37
Joint task offloading and data caching in mobile edge computing networks37
Software-defined networks for resource allocation in cloud computing: A survey37
Towards intelligent virtual resource allocation in UAVs-assisted 5G networks37
A blockchain-based trading system for big data37
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST37
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review36
Q-FANET: Improved Q-learning based routing protocol for FANETs36
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms36
Minimum delay function placement and resource allocation for Open RAN (O-RAN) 5G networks36
A comparative study on online machine learning techniques for network traffic streams analysis36
A kangaroo-based intrusion detection system on software-defined networks36
Dynamic VNF placement, resource allocation and traffic routing in 5G35
AI-enabled mobile multimedia service instance placement scheme in mobile edge computing35
Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm34
The partial computation offloading strategy based on game theory for multi-user in mobile edge computing environment34
An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks34
Blockchain-based privacy preserving e-health system for healthcare data in cloud34
LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge34
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing34
Task offloading in fog computing: A survey of algorithms and optimization techniques34
MARVEL: Enabling controller load balancing in software-defined networks with multi-agent reinforcement learning33
Scheduling of emergency tasks for multiservice UAVs in post-disaster scenarios33
Optimized content centric networking for future internet: Dynamic popularity window based caching scheme33
Realtime mobile bandwidth prediction using LSTM neural network and Bayesian fusion32
ScaleDRL: A Scalable Deep Reinforcement Learning Approach for Traffic Engineering in SDN with Pinning Control32
A QoS-guaranteed intelligent routing mechanism in software-defined networks32
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity32
A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges32
CellOS: Zero-touch Softwarized Open Cellular Networks32
A comprehensive survey on DNS tunnel detection31
Survey of crosschain communications protocols31
A literature review of IoT energy platforms aimed at end users31
NFStream31
Acoustic-based sensing and applications: A survey31
A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning31
Detection of zero-day attacks: An unsupervised port-based approach31
Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks31
Self-attentive deep learning method for online traffic classification and its interpretability31
UAVs joint optimization problems and machine learning to improve the 5G and Beyond communication31
An optimized UAV trajectory planning for localization in disaster scenarios31
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions30
Online classification of user activities using machine learning on network traffic30
Slow denial-of-service attacks on software defined networks30
Architectures, standardisation, and procedures for 5G Satellite Communications: A survey30
A cloud resource management framework for multiple online scientific workflows using cooperative reinforcement learning agents29
A comprehensive survey of vulnerability and information security in SDN29
SmartFCT: Improving power-efficiency for data center networks with deep reinforcement learning29
SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks29
Optimal auction for delay and energy constrained task offloading in mobile edge computing29
Satellite-based communications security: A survey of threats, solutions, and research challenges28
Leveraging fairness in LoRaWAN: A novel scheduling scheme for collision avoidance28
User satisfaction aware maximum utility task assignment in mobile crowdsensing28
MATEC: A lightweight neural network for online encrypted traffic classification28
Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing28
An optimization based localization with area minimization for heterogeneous wireless sensor networks in anisotropic fields27
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems27
Performance evaluation of CoAP and MQTT with security support for IoT environments27
NFV Resource Allocation: a Systematic Review and Taxonomy of VNF Forwarding Graph Embedding27
NFV security survey in 5G networks: A three-dimensional threat taxonomy27
Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks27
Cooperative service caching and computation offloading in multi-access edge computing27
Smart contract vulnerability detection combined with multi-objective detection27
A survey on security and privacy issues of UAVs27
5G networks: Types of isolation and their parameters in RAN and CN slices27
A survey: Distributed Machine Learning for 5G and beyond27
Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks27
A survey on sleep mode techniques for ultra-dense networks in 5G and beyond26
SecFHome: Secure remote authentication in fog-enabled smart home environment26
Communication technologies for Smart Water Grid applications: Overview, opportunities, and research directions26
5G-air-simulator: An open-source tool modeling the 5G air interface26
A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for satellite communications26
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability26
An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information26
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach26
An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems26
LiM-AHP-G-C: Life Time Maximizing based on Analytical Hierarchal Process and Genetic Clustering protocol for the Internet of Things environment26
A cyber-physical model for SCADA system and its intrusion detection26
An overview on cross-chain: Mechanism, platforms, challenges and advances26
Smart routing: Towards proactive fault handling of software-defined networks25
pSMART: A lightweight, privacy-aware service function chain orchestration in multi-domain NFV/SDN25
Fairness, integrity, and privacy in a scalable blockchain-based federated learning system25
PrePass-Flow: A Machine Learning based technique to minimize ACL policy violation due to links failure in hybrid SDN25
SUTSEC: SDN Utilized trust based secure clustering in IoT25
Energy-aware task scheduling and offloading using deep reinforcement learning in SDN-enabled IoT network25
Edge intelligence computing for mobile augmented reality with deep reinforcement learning approach25
Congestion free opportunistic multipath routing load balancing scheme for Internet of Things (IoT)25
On supporting IoT data aggregation through programmable data planes24
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management24
Powder: Platform for Open Wireless Data-driven Experimental Research24
A versatile experimental testbed for ultrabroadband communication networks above 100 GHz24
Truck platoon security: State-of-the-art and road ahead24
A survey on stateful data plane in software defined networks24
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN24
A survey on space-aerial-terrestrial integrated 5G networks24
Efficient spam and phishing emails filtering based on deep learning24
Joint computation offloading and resource allocation for NOMA-based multi-access mobile edge computing systems24
Wireless energy harvesting meets receiver diversity: A successful approach for two-way half-duplex relay networks over block Rayleigh fading channel24
Secure routing for LEO satellite network survivability24
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments24
Deep Q-Network based resource allocation for UAV-assisted Ultra-Dense Networks24
From serendipity to sustainable green IoT: Technical, industrial and political perspective24
Arena: A 64-antenna SDR-based ceiling grid testing platform for sub-6 GHz 5G-and-Beyond radio spectrum research24
Comprehensive survey on self-organizing cellular network approaches applied to 5G networks23
A position-based reliable emergency message routing scheme for road safety in VANETs23
Attacks and countermeasures on blockchains: A survey from layering perspective23
Comprehensive review on ML-based RIS-enhanced IoT systems: basics, research progress and future challenges23
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G23
Optimized pollard route deviation and route selection using Bayesian machine learning techniques in wireless sensor networks23
Energy Efficient Neuro-Fuzzy Cluster based Topology Construction with Metaheuristic Route Planning Algorithm for Unmanned Aerial Vehicles23
Energy harvesting computation offloading game towards minimizing delay for mobile edge computing23
A privacy preserving scheme for vehicle-to-everything communications using 5G mobile edge computing23
Swarm intelligence RFID network planning using multi-antenna readers for asset tracking in hospital environments23
Cluster-based flow control in hybrid software-defined wireless sensor networks23
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains22
Detecting DNS over HTTPS based data exfiltration22
Application of a Long Short Term Memory neural predictor with asymmetric loss function for the resource allocation in NFV network architectures22
An energy-efficient routing protocol for the Internet of Things networks based on geographical location and link quality22
An optimal delay routing algorithm considering delay variation in the LEO satellite communication network22
MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning22
Determining the trade-offs between data delivery and energy consumption in large-scale WSNs by multi-objective evolutionary optimization22
SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement22
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT22
Battery-less internet of things –A survey22
Topology Control in Fog Computing Enabled IoT Networks for Smart Cities21
Mobile-edge computing-based delay minimization controller placement in SDN-IoV21
Driving assistance system based on data fusion of multisource sensors for autonomous unmanned ground vehicles21
Energy efficiency maximization in a wireless powered IoT sensor network for water quality monitoring21
Computation offloading and content caching and delivery in Vehicular Edge Network: A survey21
The two-phase scheduling based on deep learning in the Internet of Things21
Packet-level prediction of mobile-app traffic using multitask Deep Learning21
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment21
Computation offloading and resource allocation based on distributed deep learning and software defined mobile edge computing21
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning21
Collision avoidance in 5G using MEC and NFV: The vulnerable road user safety use case21
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios21
Distributed denial of service attack prediction: Challenges, open issues and opportunities20
Adversarial machine learning for network intrusion detection: A comparative study20
Optimized task scheduling for cost-latency trade-off in mobile fog computing using fuzzy analytical hierarchy process20
A Social IoT-based platform for the deployment of a smart parking solution20
An efficient combined deep neural network based malware detection framework in 5G environment20
HashXor: A lightweight scheme for identity privacy of IoT devices in 5G mobile network20
Layer based security in Narrow Band Internet of Things (NB-IoT)20
Beyond 5G for digital twins of UAVs20
Adaptive range-based localization algorithm based on trilateration and reference node selection for outdoor wireless sensor networks20
An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks20
Fixed degree of decentralization DPoS consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value20
An effective scheduling strategy based on hypergraph partition in geographically distributed datacenters20
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment20
Smart computational offloading for mobile edge computing in next-generation Internet of Things networks20
Cloud-Enabled IoT-based embedded system and software for intelligent indoor lighting, ventilation, early stage fire detection and prevention19
Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks19
Few-shot website fingerprinting attack19
Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks19
0.058115005493164