IEEE Transactions on Network and Service Management

Papers
(The H4-Index of IEEE Transactions on Network and Service Management is 47. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing165
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection140
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning135
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network122
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures120
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments119
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks116
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log109
A Comprehensive Survey on the E2E 5G Network Slicing Model105
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms103
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning100
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions91
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids91
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters87
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification86
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs82
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking81
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space80
Real-Time Multiple-Workflow Scheduling in Cloud Environments79
Swarm of UAVs for Network Management in 6G: A Technical Review76
A Decentralized Framework for Serverless Edge Computing in the Internet of Things73
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets71
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks71
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach70
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network67
DETONAR: Detection of Routing Attacks in RPL-Based IoT67
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles67
Trust-Based Blockchain Authorization for IoT66
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model66
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond65
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid63
Experimental Review of Neural-Based Approaches for Network Intrusion Management59
On Demand Fog Federations for Horizontal Federated Learning in IoV58
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process58
Anomaly Detection for Insider Threats Using Unsupervised Ensembles57
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining57
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices55
Characterization and Prediction of Mobile-App Traffic Using Markov Modeling55
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment53
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains53
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach51
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification50
A Framework for eBPF-Based Network Functions in an Era of Microservices50
Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning49
Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT48
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution48
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey47
0.95514607429504