IEEE Transactions on Network and Service Management

Papers
(The median citation count of IEEE Transactions on Network and Service Management is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature?166
Table of Contents113
Robust Access Point Clustering in Edge Computing Resource Optimization98
Bilevel Optimization for Provisioning Heterogeneous Traffic in Deterministic Networks95
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services95
Retraction Notice Communication-Efficient Personalized Federated Meta-Learning in Edge Networks91
Table of Contents86
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows84
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection84
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay82
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things77
Topology-Driven Configuration of Emulation Networks With Deterministic Templating76
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior70
An Efficient and Robust Resource Allocation Method for Quantum Key Distribution Networks70
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket68
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network65
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems64
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach64
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks64
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment63
Optimizing QoS MAC Scheduling in 5G NR: A Lyapunov Approach Evaluated With XR Traffic60
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access60
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection60
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment59
A Unified Framework for Hybrid Network Intrusion Detection59
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks59
Efficient Optimization Algorithm for Virtual Backbone in Wireless Sensor Networks by Removing Redundant Dominators56
Adaptive Reliability for the Automated Control of Human–Robot Collaboration in Beyond-5G Networks55
Communication-Efficient Disaggregated and Distributed Federated Learning in NG-RANs55
BECHAIN: A Sharding Blockchain With Higher Security54
Deep Learning Model for Content Aware Caching at MEC Servers54
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy54
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection53
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation53
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks52
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments52
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management51
D-Chain: A Load-Balancing Blockchain Sharding Protocol Based on Account State Partitioning51
Slicing for AI: An Online Learning Framework for Network Slicing Supporting AI Services50
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation50
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks50
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach50
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain50
A Novel Hybrid Model for Docker Container Workload Prediction50
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows49
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks49
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling49
The Evolution of Mining Pools and Miners’ Behaviors in the Bitcoin Blockchain48
Smart Policy Control for Securing Federated Learning Management System48
Incremental DRL-Based Resource Management for Dynamic Network Slicing in an Urban-Wide Testbed47
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers47
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion47
HEEDFUL: Leveraging Sequential Transfer Learning for Robust WiFi Device Fingerprinting Amid Hardware Warm-Up Effects47
XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P446
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars45
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems44
Improving Address Clustering in Bitcoin by Proposing Heuristics44
Metis: Selecting Diverse Atlas Vantage Points44
Multi-Party Payment Channel Network Based on Smart Contract44
Node-Oriented Slice Reconfiguration Based on Spatial and Temporal Traffic Prediction in Metro Optical Networks43
Robust Distributed Server Selection Model Against Delay Uncertainty43
These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots43
Availability and Cost Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems43
Composing eBPF Programs Made Easy With HIKe and eCLAT43
Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques43
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks42
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data42
A Channel Perceiving-Based Handover Management in Space–Ground Integrated Information Network42
CARRAS: Combined AOA and RBFNN for Resource Allocation in Single Site 5G Network42
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection42
VeCroToken: An Efficient, Verifiable, and Privacy-Preserving Cross-Chain Model for Consortium Blockchains Based on zk-SNARKs40
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC40
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs40
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships40
From the Beginning: Key Transitions in the First 15 Years of DNSSEC40
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN40
FLATWISE: Flow Latency and Throughput Aware Sensitive Routing for 6DoF VR Over SDN39
Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model38
Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System38
Improving the Stability of Intrusion Detection With Causal Deep Learning38
An eBPF-XDP Hardware-Based Network Slicing Architecture for Future 6G Front- to Back-Haul Networks38
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner38
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks37
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach37
A Bi-Level Scheme for Mixed-Motive and Energy-Efficient Task Offloading in Vehicular Edge Computing Systems37
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums37
Federated Intelligent Service Function Chain Orchestration in Future 6G Networks37
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks37
A Sampling-Neighborhood-Regularized Latent Factorization of Tensor for Dynamic QoS Estimation37
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction36
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks36
DRL-Based Dynamic Resource Allocation for Multi-Beam Satellite Systems36
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation36
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts36
High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality35
Mobility Management for Cellular-Connected UAVs: Model-Based Versus Learning-Based Approaches for Service Availability35
Revenue-Aware Seamless Content Distribution in Satellite-Terrestrial Integrated Networks35
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment35
Active Learning for Transformer-Based Fault Diagnosis in 5G and Beyond Mobile Networks35
Efficiency of BIER Multicast in Large Networks34
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments34
Handover-Aware Scheduling for Small- and Large-Scale VLC Networks34
MDU-CACS: A Coordinated Forecasting-Based Cloud-Assisted Dynamic Channel Assignment Mechanism for Wi-Fi Network Clusters34
Table of Contents34
Table of Contents34
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation34
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks33
Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems33
A Novel Framework for Optical Layer Device Board Failure Localization in Optical Transport Network33
Managing a Resilient Multitier Architecture for Unstable IoT Networks in Location Based-Services33
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments33
A Comprehensive Benchmark of Flannel CNI in SDN/Non-SDN Enabled Cloud-Native Environments32
Minimizing Update Makespan in SDNs Without TCAM Overhead32
Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks32
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G32
Critical Limitations of the Least Outstanding Request Load Balancing Policy in Service Meshes for Large-Scale Microservice Applications32
Explainable GNN-Based Approach to Fault Forecasting in Cloud Service Debugging32
Detecting Service Disruptions in Large BGP/MPLS VPN Networks32
Backhaul Traffic-Aware Edge Caching for Recommended Content With Personalized Privacy32
TraceDAE: Trace-Based Anomaly Detection in Microservice Systems via Dual Autoencoder32
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain32
FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC32
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking31
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results31
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA31
Deep Reinforcement Learning-Based Contract Incentive and Computation Offloading for Mobile Edge Computing-Enabled Blockchain31
Fair Scheduling and Computation Co-Offloading for Industrial Applications in Fog Networks31
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things31
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks31
ANFIS-DBA: ANFIS-Based Dynamic Bandwidth Allocation Scheme for Latency Driven Cost Effective Next Generation PON31
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission30
Optimized Planning of DU/CU Placement and Flow Routing in 5G Packet Xhaul Networks30
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance30
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis30
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location30
Redactable Blockchain-Based Secure and Accountable Data Management30
A Resource Allocation Model for Mixed-Grid Optical Networks30
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure29
Dynamic Fog Federation Scheme for Internet of Vehicles29
Data-Driven Intra-Autonomous Systems Graph Generator29
AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification29
Subgraph-Driven Lightweight Federated Learning for Spatiotemporal Cellular Traffic Prediction29
Novel Adaptive Multi-User Multi-Services Scheduling to Enhance Throughput in 5G-Advanced and Beyond29
Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows29
Estimating Video on Demand QoE From Network QoS Through ICMP Probes29
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds29
Multi-Agent DRL-Based Two-Timescale Resource Allocation for Network Slicing in V2X Communications29
CASE: A Joint Traffic and Energy Optimization Framework Toward Grid Connected Green Future Networks29
A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT29
Collaborative Cloud Resource Management and Task Consolidation Using JAYA Variants28
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach28
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game28
Design of 5G MEC-Based Networks With 1:N:K Protection Scheme28
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission28
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates28
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network28
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory28
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping28
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services—Part II28
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN28
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation27
Adaptive One Memory Access Bloom Filters27
From an In-Depth Understanding of Multipath TCP Enhancement Schemes to an Adaptive Control Framework in Wireless Networks27
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment27
Scalable Storage Optimization for Blockchain-Based Cross-Domain Authentication in IoT27
Neural Attention Networks for Recommendation With Auxiliary Data27
AI Anomaly Detection for Cloudified Mobile Core Architectures27
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing27
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas27
Correction to “Optimal Subscription Policies for Participation-Dependent Social-Learning Markets”27
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul27
A Dynamic Cascading Failure Model for LEO Satellite Networks27
FastScheduler: Polynomial-Time Scheduling for Time-Triggered Flows in TSN27
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning26
An RL-Based Framework for Task Offloading and Resource Allocation in Energy Harvesting-Based Multi-Access Edge Computing26
Distributed Model Training Task Migration for Hotspot Management in Intelligent Computing Center Interconnection With Tidal Characteristics26
Dynamic Management of Constrained Computing Resources for Serverless Services26
Urban Mobile Data Prediction With Geospatial Clustering and Dual Residual Learning26
Extending WebAssembly for Deep-Learning Inference Across the Cloud Continuum26
Incremental Survivability Enhancement in Mobile Crowdsensing Systems26
Dynamic Task Scheduling and Adaptive GPU Resource Allocation in the Cloud25
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus25
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System25
Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security25
Key Flow First Prioritized Flow Scheduling Strategy in Multi-Tenant Data Centers25
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane25
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning25
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management25
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering25
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks24
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation24
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems24
Identifying a Malicious Node in a UAV Network24
On Demand Fog Federations for Horizontal Federated Learning in IoV24
A Deep RL Approach on Task Placement and Scaling of Edge Resources for Cellular Vehicle-to-Network Service Provisioning24
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers24
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain24
Proactive and AoI-Aware Failure Recovery for Stateful NFV-Enabled Zero-Touch 6G Networks: Model-Free DRL Approach24
End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows24
Age of Information Optimization in RIS-Assisted Wireless Networks24
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing23
Table of Contents23
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process23
Paxos With Priorities for Blockchain Applications23
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing23
Table of Contents23
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning23
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks23
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing23
Efficient Multi-Broker Load Balancing in Event Driven Pub-Sub Networks23
Maximizing Utility Joint Optimization Based on Edge Full Cooperation23
Fed-RWM: A Robust Watermarking Approach for Federated Learning Model Ownership Protection23
Cluster and Conquer: Malicious Traffic Classification at the Edge23
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction22
SFCache: Hybrid NF Synthesization in Runtime With Rule-Caching in Programmable Switches22
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services22
An Intelligent Blockchain-Assisted Cooperative Framework for Industry 4.0 Service Management22
Detecting Cloud Anomaly via Broad Network-Based Contrastive Autoencoder22
P4-Secure: In-Band DDoS Detection in Software Defined Networks22
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning22
Privacy-Preserving Deployment Mechanism for Service Function Chains Across Multiple Domains22
Optimized FlexEthernet for Inter-Domain Traffic Restoration22
Intent-Based Service Provisioning and Closed-Loop Automation for Cobot Service Migration in a Multi-Stakeholder Environment22
Contrastive Learning Enhanced Intrusion Detection22
Mobility-Aware MEC Planning With a GNN-Based Graph Partitioning Framework22
A GNN-Based Autopilot Recommendation Strategy to Mitigate Payment Channel Imbalance Problem in Bitcoin Lightning Network22
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks22
Practical Intrusion Detection of Emerging Threats22
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment22
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking22
Towards Reliable Remote Health Monitoring in Fog Computing Networks22
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning21
Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis21
Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach21
Blockchain Storage Optimisation With Multi-Level Distributed Caching21
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks21
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring21
RibsNet: A Scalable, High-Performance, and Cost-Effective Two-Layer-Based Cloud Data Center Network Architecture21
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks21
An Efficient Website Fingerprinting for New Websites Emerging Based on Incremental Learning21
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey21
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks21
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning21
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G21
Comparative Analysis of Deep Learning Models for Real-World ISP Network Traffic Forecasting21
Design of Multiple-Plane Twisted and Folded Clos Network Guaranteeing Admissible Blocking Probability20
DRLLog: Deep Reinforcement Learning for Online Log Anomaly Detection20
Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments20
Toward Intelligent Intent-Based Network Slicing for IoT Systems: Enabling Technologies, Challenges, and Vision20
Optimal Placement of the Virtualized Federated Learning Aggregation Function at the Edge20
0.10225987434387