IEEE Transactions on Network and Service Management

Papers
(The H4-Index of IEEE Transactions on Network and Service Management is 45. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring976500490
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection167
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario153
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing121
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning113
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection108
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures100
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks99
IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge98
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments92
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network89
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms87
A Comprehensive Survey on the E2E 5G Network Slicing Model85
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log85
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions83
Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning72
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning71
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids68
Real-Time Multiple-Workflow Scheduling in Cloud Environments68
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters65
Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment63
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking63
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space61
Secure Data Query Framework for Cloud and Fog Computing61
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles58
A Decentralized Framework for Serverless Edge Computing in the Internet of Things58
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification57
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks55
Design and Evaluation of Reconfigurable SDN LEO Constellations54
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach54
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model54
Trust-Based Blockchain Authorization for IoT54
Energy-Efficient Resource Allocation in Cognitive Radio Networks Under Cooperative Multi-Agent Model-Free Reinforcement Learning Schemes54
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond53
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid52
A Continuous-Decision Virtual Network Embedding Scheme Relying on Reinforcement Learning51
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network51
DETONAR: Detection of Routing Attacks in RPL-Based IoT50
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs50
Swarm of UAVs for Network Management in 6G: A Technical Review50
Experimental Review of Neural-Based Approaches for Network Intrusion Management49
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains47
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining47
Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning47
Sel-INT: A Runtime-Programmable Selective In-Band Network Telemetry System46
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process45
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices45
0.050874948501587