IEEE Transactions on Network and Service Management

Papers
(The median citation count of IEEE Transactions on Network and Service Management is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing165
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection140
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning135
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network122
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures120
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments119
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks116
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log109
A Comprehensive Survey on the E2E 5G Network Slicing Model105
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms103
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning100
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions91
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids91
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters87
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification86
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs82
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking81
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space80
Real-Time Multiple-Workflow Scheduling in Cloud Environments79
Swarm of UAVs for Network Management in 6G: A Technical Review76
A Decentralized Framework for Serverless Edge Computing in the Internet of Things73
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks71
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets71
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach70
DETONAR: Detection of Routing Attacks in RPL-Based IoT67
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles67
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network67
Trust-Based Blockchain Authorization for IoT66
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model66
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond65
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid63
Experimental Review of Neural-Based Approaches for Network Intrusion Management59
On Demand Fog Federations for Horizontal Federated Learning in IoV58
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process58
Anomaly Detection for Insider Threats Using Unsupervised Ensembles57
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining57
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices55
Characterization and Prediction of Mobile-App Traffic Using Markov Modeling55
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment53
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains53
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach51
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification50
A Framework for eBPF-Based Network Functions in an Era of Microservices50
Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning49
Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT48
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution48
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey47
Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks45
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs44
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing43
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks42
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol41
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN40
Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking38
Resource Allocation in an Open RAN System Using Network Slicing38
Reliable Placement of Service Function Chains and Virtual Monitoring Functions With Minimal Cost in Softwarized 5G Networks38
Predicting Network Flow Characteristics Using Deep Learning and Real-World Network Traffic38
ViCrypt to the Rescue: Real-Time, Machine-Learning-Driven Video-QoE Monitoring for Encrypted Streaming Traffic37
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection37
DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks37
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems36
Availability- and Traffic-Aware Placement of Parallelized SFC in Data Center Networks36
In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches35
Multi-Agent Based Autonomic Network Management Architecture35
Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification35
DDQP: A Double Deep Q-Learning Approach to Online Fault-Tolerant SFC Placement35
Chronos: DDoS Attack Detection Using Time-Based Autoencoder34
Burst Traffic Scheduling for Hybrid E/O Switching DCN: An Error Feedback Spiking Neural Network Approach34
Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads34
LogClass: Anomalous Log Identification and Classification With Partial Labels33
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks33
Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G33
Dynamic Controller Assignment in Software Defined Internet of Vehicles Through Multi-Agent Deep Reinforcement Learning33
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services33
SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks33
Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation33
Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method32
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election32
Throughput-Aware Partitioning and Placement of Applications in Fog Computing32
Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset32
Risk-Aware Energy Scheduling for Edge Computing With Microgrid: A Multi-Agent Deep Reinforcement Learning Approach31
P8: P4 With Predictable Packet Processing Performance31
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks31
Neural and Attentional Factorization Machine-Based Web API Recommendation for Mashup Development31
Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks31
pHeavy: Predicting Heavy Flows in the Programmable Data Plane31
Mobility-Aware Seamless Handover With MPTCP in Software-Defined HetNets31
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification31
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services30
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain30
Workflow-Aware Automatic Fault Diagnosis for Microservice-Based Applications With Statistics30
Throughput Optimization and Delay Guarantee VNF Placement for Mapping SFC Requests in NFV-Enabled Networks30
DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking29
Caching Popular Transient IoT Contents in an SDN-Based Edge Infrastructure29
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection29
NFV Platforms: Taxonomy, Design Choices and Future Challenges29
Dynamic Distributed Multi-Path Aided Load Balancing for Optical Data Center Networks29
Joint Resource Optimization and Delay-Aware Virtual Network Function Migration in Data Center Networks29
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks29
Reliability-Oriented and Resource-Efficient Service Function Chain Construction and Backup29
A New Mutual Authentication and Key Agreement Protocol for Mobile Client—Server Environment28
Code Caching-Assisted Computation Offloading and Resource Allocation for Multi-User Mobile Edge Computing28
Multi-Objective Deep Reinforcement Learning Assisted Service Function Chains Placement28
Data Fusion Oriented Graph Convolution Network Model for Rumor Detection27
TSSM: Time-Sharing Switch Migration to Balance Loads of Distributed SDN Controllers27
Online Sparse BLSTM Models for Resource Usage Prediction in Cloud Datacentres27
NDMF: Neighborhood-Integrated Deep Matrix Factorization for Service QoS Prediction26
DeepEdge: A New QoE-Based Resource Allocation Framework Using Deep Reinforcement Learning for Future Heterogeneous Edge-IoT Applications26
Joint Optimization With DNN Partitioning and Resource Allocation in Mobile Edge Computing26
Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks26
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks26
Assessing Container Network Interface Plugins: Functionality, Performance, and Scalability26
SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment26
Time-Sensitive Mobile User Association and SFC Placement in MEC-Enabled 5G Networks25
A Survey on Blockchain-Based Telecommunication Services Marketplaces25
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains25
Data-Driven RAN Slicing Mechanisms for 5G and Beyond25
Soft-Failure Detection, Localization, Identification, and Severity Prediction by Estimating QoT Model Input Parameters25
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks25
MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem25
Blockchain State Sharding With Space-Aware Representations25
Cross-Network-Slice Authentication Scheme for the 5 th Generation Mobile Communication System24
Optimized Joint Allocation of Radio, Optical, and MEC Resources for the 5G and Beyond Fronthaul24
In-Band Network Monitoring Technique to Support SDN-Based Wireless Networks24
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold24
DeepCC: Multi-Agent Deep Reinforcement Learning Congestion Control for Multi-Path TCP Based on Self-Attention24
Dynamic Allocation of Computing and Communication Resources in Multi-Access Edge Computing for Mobile Users24
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning24
Robust Service Provisioning With Service Function Chain Requirements in Mobile Edge Computing24
Adaptive Computation Offloading Policy for Multi-Access Edge Computing in Heterogeneous Wireless Networks24
Mosaic: Advancing User Quality of Experience in 360-Degree Video Streaming With Machine Learning24
Machine Learning-Based Radio Coverage Prediction in Urban Environments24
Uncertainty-Aware Resource Provisioning for Network Slicing24
CoScal: Multifaceted Scaling of Microservices With Reinforcement Learning24
AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks24
Demystifying the Transferability of Adversarial Attacks in Computer Networks24
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model24
Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning24
FlexChain: Bridging Parallelism and Placement for Service Function Chains24
Deterministic Latency/Jitter-Aware Service Function Chaining Over Beyond 5G Edge Fabric24
Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records24
Practical Intrusion Detection of Emerging Threats23
Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks23
A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network23
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning23
Provisioning Optimization for Determining and Embedding 5G End-to-End Information Centric Network Slice23
The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey23
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems23
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement23
Virtual Network Function Allocation to Maximize Continuous Available Time of Service Function Chains With Availability Schedule23
A Forecasting Approach to Improve Control and Management for 5G Networks23
Adaptive Placement and Routing for Service Function Chains With Service Deadlines22
Towards Optimal Parallelism-Aware Service Chaining and Embedding22
Joint Computation Offloading and Resource Allocation Under Task-Overflowed Situations in Mobile-Edge Computing22
Deep Reinforcement Learning-Based Joint User Association and CU–DU Placement in O-RAN22
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices22
UAV-Assisted Online Machine Learning Over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach22
Deploying SDN Control in Internet of UAVs: Q-Learning-Based Edge Scheduling22
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities22
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond22
OSCAR: On Optimizing Resource Utilization in Live Video Streaming22
Energy Optimization With Multi-Sleeping Control in 5G Heterogeneous Networks Using Reinforcement Learning22
DNS Tunneling Detection by Cache-Property-Aware Features22
Privacy and Transparency in CBDCs: A Regulation-by-Design AML/CFT Scheme22
ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks21
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks21
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums21
A Network Intelligence Architecture for Efficient VNF Lifecycle Management21
A Dynamic and Collaborative Multi-Layer Virtual Network Embedding Algorithm in SDN Based on Reinforcement Learning21
Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support21
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods21
Tensor-Based Recurrent Neural Network and Multi-Modal Prediction With Its Applications in Traffic Network Management21
Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks21
Uncovering Lateral Movement Using Authentication Logs21
Petri Net-Based Reliability Assessment and Migration Optimization Strategy of SFC20
Multi-Domain Network Slicing With Latency Equalization20
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks20
Bandwidth Allocation of Stream-Reservation Traffic in TSN20
Mobile Traffic Classification Through Physical Control Channel Fingerprinting: A Deep Learning Approach20
Multi-Path Selection and Congestion Control for NDN: An Online Learning Approach20
Towards Automatic Network Slicing for the Internet of Space Things20
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model20
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks19
Decentralized On-Chain Data Access via Smart Contracts in Ethereum Blockchain19
SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network19
Enabling Dynamically Centralized RAN Architectures in 5G and Beyond19
Optimal Network Slicing for Service-Oriented Networks With Flexible Routing and Guaranteed E2E Latency19
Smart Zero-Touch Management of UAV-Based Edge Network19
VNF and CNF Placement in 5G: Recent Advances and Future Trends19
Towards Sustainable Edge Computing Through Renewable Energy Resources and Online, Distributed and Predictive Scheduling19
Optimized IoT Service Chain Implementation in Edge Cloud Platform: A Deep Learning Framework19
Admission Control and Resource Reservation for Prioritized Slice Requests With Guaranteed SLA Under Uncertainties19
Delay-Sensitive Task Offloading in Vehicular Fog Computing-Assisted Platoons19
A Novel Autonomous Profiling Method for the Next-Generation NFV Orchestrators19
TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection19
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates19
Bloom Filter With a False Positive Free Zone19
DeepAir: Deep Reinforcement Learning for Adaptive Intrusion Response in Software-Defined Networks19
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller19
Helix: A Fair Blockchain Consensus Protocol Resistant to Ordering Manipulation18
Improving Quality-of-Service in Cluster-Based UAV-Assisted Edge Networks18
Blockchain-Based Resource Trading in Multi-UAV-Assisted Industrial IoT Networks: A Multi-Agent DRL Approach18
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs18
An Overview of Interslice and Intraslice Resource Allocation in B5G Telecommunication Networks18
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks18
Anomaly-Aware Network Traffic Estimation via Outlier-Robust Tensor Completion18
A Service-Centric Q-Learning Algorithm for Mobility Robustness Optimization in LTE18
Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain18
Disaster Protection in Inter-DataCenter Networks Leveraging Cooperative Storage18
Unavailability-Aware Shared Virtual Backup Allocation for Middleboxes: A Queueing Approach18
Intelligent EV Charging for Urban Prosumer Communities: An Auction and Multi-Agent Deep Reinforcement Learning Approach18
Deadline-Aware SFC Orchestration Under Demand Uncertainty18
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method18
Effects of Differentiated 5G Services on Computational and Radio Resource Allocation Performance17
SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing17
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting17
Dynamic Radio Access Selection and Slice Allocation for Differentiated Traffic Management on Future Mobile Networks17
A Packet Loss Monitoring System for In-Band Network Telemetry: Detection, Localization, Diagnosis and Recovery17
Over-the-Air Software-Defined Vehicle Updates Using Federated Fog Environment17
Improving SD-WAN Resilience: From Vertical Handoff to WAN-Aware MPTCP17
Improving Performance, Reliability, and Feasibility in Multimodal Multitask Traffic Classification with XAI17
Study of Virtual Network Function Placement in 5G Cloud Radio Access Network17
Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem17
Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis17
Churn in the Bitcoin Network17
Privacy-Preserving Scheme With Account-Mapping and Noise-Adding for Energy Trading Based on Consortium Blockchain17
An Adaptive Forecasting Model for Slice Allocation in Softwarized Networks17
A Privacy-Preserving Reinforcement Learning Algorithm for Multi-Domain Virtual Network Embedding17
A Hierarchical and Location-Aware Consensus Protocol for IoT-Blockchain Applications17
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems17
Environmentally-Aware and Energy-Efficient Multi-Drone Coordination and Networking for Disaster Response17
Estimation of the Quality of Experience During Video Streaming From Facial Expression and Gaze Direction17
Deep Reinforcement Learning-Based Content Migration for Edge Content Delivery Networks With Vehicular Nodes17
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection17
Multi-Agent Meta-Reinforcement Learning for Self-Powered and Sustainable Edge Computing Systems17
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading17
Outage Analysis and Reliability Enhancement of Hybrid VLC-RF Networks Using Cooperative Non-Orthogonal Multiple Access17
HARS: A High-Available and Resource-Saving Service Function Chain Placement Approach in Data Center Networks17
Delay-Sensitive Multi-Source Multicast Resource Optimization in NFV-Enabled Networks: A Column Generation Approach17
QoS Time Series Modeling and Forecasting for Web Services: A Comprehensive Survey17
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory17
PP5GS—An Efficient Procedure-Based and Stateless Architecture for Next-Generation Core Networks17
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks17
Online Anomaly Detection Leveraging Stream-Based Clustering and Real-Time Telemetry17
A Novel Multi-Stage Approach for Hierarchical Intrusion Detection16
Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks16
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment16
A Hybrid Blockchain-Edge Architecture for Electronic Health Record Management With Attribute-Based Cryptographic Mechanisms16
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms16
Highly-Efficient and Adaptive Network Monitoring: When INT Meets Segment Routing16
0.05495810508728