Computer Science Review

Papers
(The TQCC of Computer Science Review is 30. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A survey on legal question–answering systems783
Smart Farming in Europe430
Editorial Board235
A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics175
Influence decision models: From cooperative game theory to social network analysis163
A survey: When moving target defense meets game theory154
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey150
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions134
PCG signals for biometric authentication systems: An in-depth review131
A comprehensive review on transformer network for natural and medical image analysis120
More than a framework: Sketching out technical enablers for natural language-based source code generation117
A survey of set accumulators for blockchain systems114
Content-driven music recommendation: Evolution, state of the art, and challenges109
Web service adaptation: A decade’s overview107
Blockchain verification and validation: Techniques, challenges, and research directions106
A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes105
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges100
Synthetic data generation: State of the art in health care domain92
Cloud services selection: A systematic review and future research directions87
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges81
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises80
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations79
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis76
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture72
Editorial Board68
Editorial Board64
Deep learning with the generative models for recommender systems: A survey63
A comprehensive survey on deep learning based malware detection techniques63
Securing microservices and microservice architectures: A systematic mapping study62
Summarization of legal documents: Where are we now and the way forward62
Optimized traffic engineering in Software Defined Wireless Network based IoT (SDWN-IoT): State-of-the-art, research opportunities and challenges61
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language56
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review56
Modelling web-service uncertainty: The angel/daemon approach54
A comprehensive survey on authentication and privacy-preserving schemes in VANETs54
Abelian combinatorics on words: A survey53
Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams51
A survey of low-latency transmission strategies in software defined networking48
Research communities in cyber security: A comprehensive literature review48
Backbones-review: Feature extractor networks for deep learning and deep reinforcement learning approaches in computer vision47
Editorial Board47
Editorial Board46
Uncertainty in runtime verification: A survey46
Editorial Board46
Compactors for parameterized counting problems46
Editorial Board45
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey44
A survey of lattice based expressive attribute based encryption41
System security assurance: A systematic literature review41
A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services40
Editorial Board40
A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches40
The interaction design of 3D virtual humans: A survey40
Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review37
Vision-based approaches towards person identification using gait37
Private set intersection: A systematic literature review36
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions35
The future of computing paradigms for medical and emergency applications33
A systematic review of federated learning incentive mechanisms and associated security challenges33
A search for good pseudo-random number generators: Survey and empirical studies32
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions31
Advances in online handwritten recognition in the last decades30
1.1198279857635