IEEE Transactions on Network and Service Management

Papers
(The TQCC of IEEE Transactions on Network and Service Management is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature?200
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access182
Table of contents171
Table of Contents152
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management134
On the Bilevel Optimization to Design Control Plane for SDONs in Consideration of Planned Physical-Layer Attacks125
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection124
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows114
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks114
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection99
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments95
Adaptive Reliability for the Automated Control of Human–Robot Collaboration in Beyond-5G Networks87
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior86
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation84
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks83
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay83
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach83
Robust Access Point Clustering in Edge Computing Resource Optimization81
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment79
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling79
On the Upgrade of Service Function Chains With Heterogeneous NFV Platforms77
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers73
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach70
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows65
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network65
Table of Contents65
A Price-Incentive Resource Auction Mechanism Balancing the Interests Between Users and Cloud Service Provider65
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks64
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection61
Deep Learning Model for Content Aware Caching at MEC Servers56
BECHAIN: A Sharding Blockchain With Higher Security56
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment55
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things54
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion51
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy50
A Novel Hybrid Model for Docker Container Workload Prediction50
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks50
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain49
A Software-Defined Networking Solution for Transparent Session and Service Continuity in Dynamic Multi-Access Edge Computing49
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket49
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation47
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services47
Smart Policy Control for Securing Federated Learning Management System45
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs45
The Evolution of Mining Pools and Miners’ Behaviors in the Bitcoin Blockchain44
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks43
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services43
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems43
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model42
Metis: Selecting Diverse Atlas Vantage Points41
Criso: An Incremental Scalable and Cost-Effective Network Architecture for Data Centers41
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships41
Mobility Management for Cellular-Connected UAVs: Model-Based Versus Learning-Based Approaches for Service Availability40
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks40
Node-Oriented Slice Reconfiguration Based on Spatial and Temporal Traffic Prediction in Metro Optical Networks40
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks40
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums40
Improving the Stability of Intrusion Detection With Causal Deep Learning39
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach39
Know Where You are: A Practical Privacy-Preserving Semi-Supervised Indoor Positioning via Edge-Crowdsensing39
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs38
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks38
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN38
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks38
A Channel Perceiving-Based Handover Management in Space–Ground Integrated Information Network38
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction38
Composing eBPF Programs Made Easy With HIKe and eCLAT37
These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots37
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms37
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars37
Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques37
SQLR: Short-Term Memory Q-Learning for Elastic Provisioning37
C4ISR Service Deployment Based on an Improved Quantum Evolutionary Algorithm36
Producer Anonymity Based on Onion Routing in Named Data Networking36
DRL-Based Dynamic Resource Allocation for Multi-Beam Satellite Systems36
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner36
NPSCS: Non-Preemptive Stochastic Coflow Scheduling With Time-Indexed LP Relaxation36
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC36
Improving Address Clustering in Bitcoin by Proposing Heuristics36
From the Beginning: Key Transitions in the First 15 Years of DNSSEC36
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation36
XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P435
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems35
Multi-Party Payment Channel Network Based on Smart Contract35
An eBPF-XDP Hardware-Based Network Slicing Architecture for Future 6G Front- to Back-Haul Networks35
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data34
Table of Contents34
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks34
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment34
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection34
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN34
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains34
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts34
Redactable Blockchain-Based Secure and Accountable Data Management33
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates33
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance33
Dynamic Fog Federation Scheme for Internet of Vehicles33
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation33
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA33
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments33
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results32
Optimized Planning of DU/CU Placement and Flow Routing in 5G Packet Xhaul Networks32
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks32
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location32
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission31
Managing a Resilient Multitier Architecture for Unstable IoT Networks in Location Based-Services31
Novel Adaptive Multi-User Multi-Services Scheduling to Enhance Throughput in 5G-Advanced and Beyond31
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network31
MDU-CACS: A Coordinated Forecasting-Based Cloud-Assisted Dynamic Channel Assignment Mechanism for Wi-Fi Network Clusters31
Table of Contents31
Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks31
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach31
A Resource Allocation Model for Mixed-Grid Optical Networks30
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis30
Efficiency of BIER Multicast in Large Networks30
Design of 5G MEC-Based Networks With 1:N:K Protection Scheme30
Minimizing Update Makespan in SDNs Without TCAM Overhead30
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments30
Multi-Agent DRL-Based Two-Timescale Resource Allocation for Network Slicing in V2X Communications29
Optimizing Job Reliability Through Contention-Free, Distributed Checkpoint Scheduling29
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks29
A Novel Framework for Optical Layer Device Board Failure Localization in Optical Transport Network29
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G29
Data-Driven Intra-Autonomous Systems Graph Generator29
EdgeDASH: Exploiting Network-Assisted Adaptive Video Streaming for Edge Caching29
Game-Theoretic Framework for Malicious Controller Detection in Software Defined Networks28
CASE: A Joint Traffic and Energy Optimization Framework Toward Grid Connected Green Future Networks28
Handover-Aware Scheduling for Small- and Large-Scale VLC Networks28
AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification28
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services—Part II28
Fair Scheduling and Computation Co-Offloading for Industrial Applications in Fog Networks28
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game28
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain28
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things28
ANFIS-DBA: ANFIS-Based Dynamic Bandwidth Allocation Scheme for Latency Driven Cost Effective Next Generation PON27
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking27
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds27
Estimating Video on Demand QoE From Network QoS Through ICMP Probes27
A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT27
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure27
Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing27
End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows26
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus26
Neural Attention Networks for Recommendation With Auxiliary Data26
Correction to “Optimal Subscription Policies for Participation-Dependent Social-Learning Markets”26
A Dynamic Cascading Failure Model for LEO Satellite Networks26
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas26
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation26
AI Anomaly Detection for Cloudified Mobile Core Architectures26
Collaborative Cloud Resource Management and Task Consolidation Using JAYA Variants26
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul26
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation26
Self-Imitation Learning-Based Inter-Cell Interference Coordination in Autonomous HetNets25
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation25
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems25
P8: P4 With Predictable Packet Processing Performance25
Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security25
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers25
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing25
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System25
Automated Service Provisioning and Hierarchical SLA Management in 5G Systems25
Adaptive One Memory Access Bloom Filters25
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping25
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning25
Key Flow First Prioritized Flow Scheduling Strategy in Multi-Tenant Data Centers25
Proactive and AoI-Aware Failure Recovery for Stateful NFV-Enabled Zero-Touch 6G Networks: Model-Free DRL Approach25
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain24
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory24
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering24
Age of Information Optimization in RIS-Assisted Wireless Networks24
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing24
Identifying a Malicious Node in a UAV Network24
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane24
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing24
Towards a Distributed Caching Service at the WiFi Edge Using Wi-Cache24
Let’s Share: A Game-Theoretic Framework for Resource Sharing in Mobile Edge Clouds24
Dynamic Management of Constrained Computing Resources for Serverless Services24
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning24
Privacy-Preserving Deployment Mechanism for Service Function Chains Across Multiple Domains23
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission23
TSEngine: Enable Efficient Communication Overlay in Distributed Machine Learning in WANs23
Table of Contents23
Data-Driven Energy Conservation in Cellular Networks: A Systems Approach23
Efficient Multi-Broker Load Balancing in Event Driven Pub-Sub Networks23
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management23
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks23
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks23
Cluster and Conquer: Malicious Traffic Classification at the Edge23
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey23
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment23
On Demand Fog Federations for Horizontal Federated Learning in IoV23
Maximizing Utility Joint Optimization Based on Edge Full Cooperation23
Detecting Cloud Anomaly via Broad Network-Based Contrastive Autoencoder23
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks22
An Intelligent Blockchain-Assisted Cooperative Framework for Industry 4.0 Service Management22
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks22
Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach22
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning22
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process22
Embracing Complexity: Agent-Based Modeling for HetNets Design and Optimization via Concurrent Reinforcement Learning Algorithms22
Optimized FlexEthernet for Inter-Domain Traffic Restoration22
Mobility-Aware MEC Planning With a GNN-Based Graph Partitioning Framework22
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing22
Table of Contents22
P4-Secure: In-Band DDoS Detection in Software Defined Networks21
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction21
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks21
3CP: Coordinated Congestion Control Protocol for Named-Data Networking21
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning21
Practical Intrusion Detection of Emerging Threats21
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning21
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks21
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment21
Resource Orchestration and Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks21
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning21
RibsNet: A Scalable, High-Performance, and Cost-Effective Two-Layer-Based Cloud Data Center Network Architecture21
Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis21
SFCache: Hybrid NF Synthesization in Runtime With Rule-Caching in Programmable Switches21
Blockchain Storage Optimisation With Multi-Level Distributed Caching21
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks21
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services20
Identifying Networks Vulnerable to IP Spoofing20
Optimal Placement of the Virtualized Federated Learning Aggregation Function at the Edge20
Table of Contents20
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking20
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs20
Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT20
ML-Based Handover Prediction Over a Real O-RAN Deployment Using RAN Intelligent Controller20
Contrastive Learning Enhanced Intrusion Detection20
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring20
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G20
Towards Reliable Remote Health Monitoring in Fog Computing Networks20
Correlating the Ambient Conditions and Performance Indicators of the LoRaWAN via Surrogate Gaussian Process-Based Bidirectional LSTM Stacked Autoencoder20
Privacy-Preserving and Fair Crowdsourcing Framework With Fine-Grained Reuse Based on Blockchain19
Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis19
Software Defined Multicast for Large-Scale Multi-Layer LEO Satellite Networks19
Battery-Aware Green Cellular Networks Fed By Smart Grid and Renewable Energy19
Table of Contents19
A Group-Based Block Storage Model With Block Splitting and Unit Encoding for Consortium Blockchains19
NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture19
Mobility-Aware and Double Auction-Based Joint Task Offloading and Resource Allocation Algorithm in MEC19
Time-Sensitive Mobile User Association and SFC Placement in MEC-Enabled 5G Networks19
ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin Network19
Strategic Analysis of Griefing Attack in Lightning Network19
Augmentation-Based Edge Differentially Private Path Publishing in Networks19
Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments19
Traffic-Aware Virtual Network Embedding With Joint Load Balancing and Datarate Assignment for SDN-Based Networks19
Multi-Beam Satellite Optical Networks: A Joint Time-Slot Resource Scheduling for End-to-End Services From a Networking Perspective19
DRLLog: Deep Reinforcement Learning for Online Log Anomaly Detection19
Safety-Aware Age of Information (S-AoI) for Collision Risk Minimization in Cell-Free mMIMO Platooning Networks19
0.21102595329285