IEEE Transactions on Network and Service Management

Papers
(The median citation count of IEEE Transactions on Network and Service Management is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection171
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing129
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning117
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection115
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures104
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks101
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments97
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network95
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log92
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms88
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions86
A Comprehensive Survey on the E2E 5G Network Slicing Model86
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning75
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids72
Real-Time Multiple-Workflow Scheduling in Cloud Environments69
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters68
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking64
Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment63
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space62
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification61
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles60
A Decentralized Framework for Serverless Edge Computing in the Internet of Things59
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach57
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks57
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond56
Trust-Based Blockchain Authorization for IoT56
Swarm of UAVs for Network Management in 6G: A Technical Review55
Design and Evaluation of Reconfigurable SDN LEO Constellations55
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model54
Energy-Efficient Resource Allocation in Cognitive Radio Networks Under Cooperative Multi-Agent Model-Free Reinforcement Learning Schemes54
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs54
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid53
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network53
DETONAR: Detection of Routing Attacks in RPL-Based IoT52
A Continuous-Decision Virtual Network Embedding Scheme Relying on Reinforcement Learning52
Experimental Review of Neural-Based Approaches for Network Intrusion Management50
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining48
Sel-INT: A Runtime-Programmable Selective In-Band Network Telemetry System47
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains47
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process47
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices46
Characterization and Prediction of Mobile-App Traffic Using Markov Modeling45
Anomaly Detection for Insider Threats Using Unsupervised Ensembles45
Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning45
Rumor Diffusion Model Based on Representation Learning and Anti-Rumor44
On Demand Fog Federations for Horizontal Federated Learning in IoV44
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets43
Towards a Trust-Enhanced Blockchain P2P Topology for Enabling Fast and Reliable Broadcast42
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing42
Privacy-Preserving Approach PBCN in Social Network With Differential Privacy42
DeepGuard: Efficient Anomaly Detection in SDN With Fine-Grained Traffic Flow Monitoring42
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments41
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution40
Attack Graph-Based Moving Target Defense in Software-Defined Networks40
Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks40
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification40
Reliability-Aware Service Function Chaining With Function Decomposition and Multipath Routing39
Unsupervised Online Anomaly Detection With Parameter Adaptation for KPI Abrupt Changes38
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach38
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment37
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks37
A Framework for eBPF-Based Network Functions in an Era of Microservices37
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol36
Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT35
Joint Availability Guarantee and Resource Optimization of Virtual Network Function Placement in Data Center Networks35
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game34
Contract-Based Resource Sharing for Time Effective Task Scheduling in Fog-Cloud Environment33
Multi-Tenant Provisioning for Quantum Key Distribution Networks With Heuristics and Reinforcement Learning: A Comparative Study32
Reliable Placement of Service Function Chains and Virtual Monitoring Functions With Minimal Cost in Softwarized 5G Networks32
ViCrypt to the Rescue: Real-Time, Machine-Learning-Driven Video-QoE Monitoring for Encrypted Streaming Traffic31
Availability- and Traffic-Aware Placement of Parallelized SFC in Data Center Networks31
Reliable Slicing of 5G Transport Networks With Bandwidth Squeezing and Multi-Path Provisioning30
Multi-Agent Based Autonomic Network Management Architecture30
Burst Traffic Scheduling for Hybrid E/O Switching DCN: An Error Feedback Spiking Neural Network Approach30
Predicting Network Flow Characteristics Using Deep Learning and Real-World Network Traffic30
DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks30
In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches30
DDQP: A Double Deep Q-Learning Approach to Online Fault-Tolerant SFC Placement30
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey29
LogClass: Anomalous Log Identification and Classification With Partial Labels29
RESDN: A Novel Metric and Method for Energy Efficient Routing in Software Defined Networks29
P8: P4 With Predictable Packet Processing Performance28
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs28
Can Fine-Grained Functional Split Benefit to the Converged Optical-Wireless Access Networks in 5G and Beyond?28
Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset28
5MART: A 5G SMART Scheduling Framework for Optimizing QoS Through Reinforcement Learning28
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems27
Data Fusion Oriented Graph Convolution Network Model for Rumor Detection27
Throughput-Aware Partitioning and Placement of Applications in Fog Computing27
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN27
An Efficient Approach to Robust SDN Controller Placement for Security27
Backup Network Design Against Multiple Link Failures to Avoid Link Capacity Overestimation26
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain26
Dynamic Controller Assignment in Software Defined Internet of Vehicles Through Multi-Agent Deep Reinforcement Learning26
Fine-Grained Cloud Resource Provisioning for Virtual Network Function26
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election26
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control26
Throughput Optimization and Delay Guarantee VNF Placement for Mapping SFC Requests in NFV-Enabled Networks26
Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation26
Mobility-Aware Seamless Handover With MPTCP in Software-Defined HetNets25
Caching Popular Transient IoT Contents in an SDN-Based Edge Infrastructure25
Improving End-Users Utility in Software-Defined Wide Area Network Systems25
Workflow-Aware Automatic Fault Diagnosis for Microservice-Based Applications With Statistics25
Sub-Linear Scalability of MQTT Clusters in Topic-Based Publish-Subscribe Applications25
Chronos: DDoS Attack Detection Using Time-Based Autoencoder25
Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G25
SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment25
Risk-Aware Energy Scheduling for Edge Computing With Microgrid: A Multi-Agent Deep Reinforcement Learning Approach24
DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking24
Reliability-Oriented and Resource-Efficient Service Function Chain Construction and Backup24
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services24
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection24
NFV Platforms: Taxonomy, Design Choices and Future Challenges24
Risk-Aware Edge Computation Offloading Using Bayesian Stackelberg Game24
Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification24
A New Mutual Authentication and Key Agreement Protocol for Mobile Client—Server Environment24
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification24
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks24
Neural and Attentional Factorization Machine-Based Web API Recommendation for Mashup Development23
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks23
Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning23
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems23
Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method23
SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks23
Dynamic Distributed Multi-Path Aided Load Balancing for Optical Data Center Networks23
Dynamic Allocation of Computing and Communication Resources in Multi-Access Edge Computing for Mobile Users22
Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking22
Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads22
NDMF: Neighborhood-Integrated Deep Matrix Factorization for Service QoS Prediction22
Multi-Objective Deep Reinforcement Learning Assisted Service Function Chains Placement22
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks22
Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks22
Time-Sensitive Mobile User Association and SFC Placement in MEC-Enabled 5G Networks21
Assessing Container Network Interface Plugins: Functionality, Performance, and Scalability21
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding21
Code Caching-Assisted Computation Offloading and Resource Allocation for Multi-User Mobile Edge Computing21
Joint Resource Optimization and Delay-Aware Virtual Network Function Migration in Data Center Networks21
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection21
Joint Optimization With DNN Partitioning and Resource Allocation in Mobile Edge Computing21
Robust Service Provisioning With Service Function Chain Requirements in Mobile Edge Computing21
Reliable and Efficient Multimedia Service Optimization for Edge Computing-Based 5G Networks: Game Theoretic Approaches20
Optimized Joint Allocation of Radio, Optical, and MEC Resources for the 5G and Beyond Fronthaul20
Availability-Aware and Energy-Efficient Virtual Cluster Allocation Based on Multi-Objective Optimization in Cloud Datacenters20
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks20
Cross-Network-Slice Authentication Scheme for the 5 th Generation Mobile Communication System20
pHeavy: Predicting Heavy Flows in the Programmable Data Plane20
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks20
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services20
Virtual Network Function Allocation to Maximize Continuous Available Time of Service Function Chains With Availability Schedule20
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model20
FlexChain: Bridging Parallelism and Placement for Service Function Chains20
DeepCC: Multi-Agent Deep Reinforcement Learning Congestion Control for Multi-Path TCP Based on Self-Attention20
Data-Driven RAN Slicing Mechanisms for 5G and Beyond19
MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem19
A Scalable Approach to SDN Control Plane Management: High Utilization Comes With Low Latency19
BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN19
A Forecasting Approach to Improve Control and Management for 5G Networks19
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning19
Practical Intrusion Detection of Emerging Threats19
Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems19
Adaptive Computation Offloading Policy for Multi-Access Edge Computing in Heterogeneous Wireless Networks19
RoPE: An Architecture for Adaptive Data-Driven Routing Prediction at the Edge19
OSCAR: On Optimizing Resource Utilization in Live Video Streaming19
Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks19
A Dynamic and Collaborative Multi-Layer Virtual Network Embedding Algorithm in SDN Based on Reinforcement Learning19
Soft-Failure Detection, Localization, Identification, and Severity Prediction by Estimating QoT Model Input Parameters19
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains19
Optimized IoT Service Chain Implementation in Edge Cloud Platform: A Deep Learning Framework18
In-Band Network Monitoring Technique to Support SDN-Based Wireless Networks18
Online Sparse BLSTM Models for Resource Usage Prediction in Cloud Datacentres18
Traffic Engineering With Three-Segments Routing18
Tensor-Based Recurrent Neural Network and Multi-Modal Prediction With Its Applications in Traffic Network Management18
DNS Tunneling Detection by Cache-Property-Aware Features18
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller18
Traffic Engineering in Segment Routing Networks Using MILP18
A Survey on Blockchain-Based Telecommunication Services Marketplaces18
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks18
Blockchain State Sharding With Space-Aware Representations18
A Network Intelligence Architecture for Efficient VNF Lifecycle Management18
Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning18
E2E QoS Guarantee for the Tactile Internet via Joint NFV and Radio Resource Allocation18
DeepEdge: A New QoE-Based Resource Allocation Framework Using Deep Reinforcement Learning for Future Heterogeneous Edge-IoT Applications18
Mobile Traffic Classification Through Physical Control Channel Fingerprinting: A Deep Learning Approach18
TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection17
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection17
A Privacy-Preserving Reinforcement Learning Algorithm for Multi-Domain Virtual Network Embedding17
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities17
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold17
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices17
Uncertainty-Aware Resource Provisioning for Network Slicing17
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement17
Accelerating Virtual Network Functions With Fast-Slow Path Architecture Using eXpress Data Path17
AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks17
Multi-Domain Network Slicing With Latency Equalization17
SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network17
Deadline-Aware SFC Orchestration Under Demand Uncertainty17
Machine Learning-Based Radio Coverage Prediction in Urban Environments17
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory17
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning17
Disaster Protection in Inter-DataCenter Networks Leveraging Cooperative Storage17
GMTA: A Geo-Aware Multi-Agent Task Allocation Approach for Scientific Workflows in Container-Based Cloud17
Deploying SDN Control in Internet of UAVs: Q-Learning-Based Edge Scheduling17
Distributed Evolutionary Hyperparameter Optimization for Fuzzy Time Series17
Uncovering Lateral Movement Using Authentication Logs17
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks17
Joint Progressive Network and Datacenter Recovery After Large-Scale Disasters17
Estimation of the Quality of Experience During Video Streaming From Facial Expression and Gaze Direction17
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks17
CoScal: Multifaceted Scaling of Microservices With Reinforcement Learning16
Unavailability-Aware Shared Virtual Backup Allocation for Middleboxes: A Queueing Approach16
Auto-Scaling Network Service Chains Using Machine Learning and Negotiation Game16
Mosaic: Advancing User Quality of Experience in 360-Degree Video Streaming With Machine Learning16
Study of Virtual Network Function Placement in 5G Cloud Radio Access Network16
Outage Analysis and Reliability Enhancement of Hybrid VLC-RF Networks Using Cooperative Non-Orthogonal Multiple Access16
TSSM: Time-Sharing Switch Migration to Balance Loads of Distributed SDN Controllers16
Optimal Network Slicing for Service-Oriented Networks With Flexible Routing and Guaranteed E2E Latency16
Petri Net-Based Reliability Assessment and Migration Optimization Strategy of SFC16
Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem16
A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network16
Bloom Filter With a False Positive Free Zone16
Delay-Sensitive Multi-Source Multicast Resource Optimization in NFV-Enabled Networks: A Column Generation Approach16
Provisioning Optimization for Determining and Embedding 5G End-to-End Information Centric Network Slice15
A Scaling Mechanism for an Evolved Packet Core Based on Network Functions Virtualization15
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks15
A Novel Autonomous Profiling Method for the Next-Generation NFV Orchestrators15
Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis15
STAD: Spatio-Temporal Anomaly Detection Mechanism for Mobile Network Management15
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms15
Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks15
A Packet Loss Monitoring System for In-Band Network Telemetry: Detection, Localization, Diagnosis and Recovery15
Smart Zero-Touch Management of UAV-Based Edge Network15
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks15
Resource Allocation in an Open RAN System Using Network Slicing15
Demystifying the Transferability of Adversarial Attacks in Computer Networks15
Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support15
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method15
Toward Consistent SDNs: A Case for Network State Fuzzing15
Towards Automatic Network Slicing for the Internet of Space Things15
Multi-Agent Meta-Reinforcement Learning for Self-Powered and Sustainable Edge Computing Systems15
Privacy and Transparency in CBDCs: A Regulation-by-Design AML/CFT Scheme14
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model14
Network Function Offloading Through Classification of Elephant Flows14
ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks14
IntFlow: Integrating Per-Packet and Per-Flowlet Switching Strategy for Load Balancing in Datacenter Networks14
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods14
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs14
Joint Computation Offloading and Resource Allocation Under Task-Overflowed Situations in Mobile-Edge Computing14
Enabling Dynamically Centralized RAN Architectures in 5G and Beyond14
Multi-Path Selection and Congestion Control for NDN: An Online Learning Approach14
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond14
0.098770141601562