IEEE Transactions on Network and Service Management

Papers
(The TQCC of IEEE Transactions on Network and Service Management is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring976500490
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection167
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario153
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing121
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning113
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection108
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures100
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks99
IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge98
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments92
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network89
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms87
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log85
A Comprehensive Survey on the E2E 5G Network Slicing Model85
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions83
Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning72
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning71
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids68
Real-Time Multiple-Workflow Scheduling in Cloud Environments68
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters65
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking63
Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment63
Secure Data Query Framework for Cloud and Fog Computing61
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space61
A Decentralized Framework for Serverless Edge Computing in the Internet of Things58
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles58
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification57
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks55
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach54
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model54
Trust-Based Blockchain Authorization for IoT54
Energy-Efficient Resource Allocation in Cognitive Radio Networks Under Cooperative Multi-Agent Model-Free Reinforcement Learning Schemes54
Design and Evaluation of Reconfigurable SDN LEO Constellations54
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond53
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid52
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network51
A Continuous-Decision Virtual Network Embedding Scheme Relying on Reinforcement Learning51
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs50
Swarm of UAVs for Network Management in 6G: A Technical Review50
DETONAR: Detection of Routing Attacks in RPL-Based IoT50
Experimental Review of Neural-Based Approaches for Network Intrusion Management49
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining47
Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning47
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains47
Sel-INT: A Runtime-Programmable Selective In-Band Network Telemetry System46
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices45
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process45
Characterization and Prediction of Mobile-App Traffic Using Markov Modeling44
Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning44
Rumor Diffusion Model Based on Representation Learning and Anti-Rumor43
DeepGuard: Efficient Anomaly Detection in SDN With Fine-Grained Traffic Flow Monitoring42
Workload and Capacity Optimization for Cloud-Edge Computing Systems with Vertical and Horizontal Offloading42
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing41
Privacy-Preserving Approach PBCN in Social Network With Differential Privacy41
Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks40
On Demand Fog Federations for Horizontal Federated Learning in IoV40
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments40
Anomaly Detection for Insider Threats Using Unsupervised Ensembles40
Towards a Trust-Enhanced Blockchain P2P Topology for Enabling Fast and Reliable Broadcast39
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution38
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification38
BotChase: Graph-Based Bot Detection Using Machine Learning38
Reliability-Aware Service Function Chaining With Function Decomposition and Multipath Routing38
Unsupervised Online Anomaly Detection With Parameter Adaptation for KPI Abrupt Changes38
Apt-RAN: A Flexible Split-Based 5G RAN to Minimize Energy Consumption and Handovers38
Attack Graph-Based Moving Target Defense in Software-Defined Networks38
A Framework for eBPF-Based Network Functions in an Era of Microservices37
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets36
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach36
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment36
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks34
Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT34
Joint Availability Guarantee and Resource Optimization of Virtual Network Function Placement in Data Center Networks33
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game32
Availability- and Traffic-Aware Placement of Parallelized SFC in Data Center Networks31
In-Band Network Telemetry in Industrial Wireless Sensor Networks31
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol31
Contract-Based Resource Sharing for Time Effective Task Scheduling in Fog-Cloud Environment31
Multi-Tenant Provisioning for Quantum Key Distribution Networks With Heuristics and Reinforcement Learning: A Comparative Study31
In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches30
Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic30
Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal Hosts30
Predicting Network Flow Characteristics Using Deep Learning and Real-World Network Traffic30
Reliable Slicing of 5G Transport Networks With Bandwidth Squeezing and Multi-Path Provisioning30
DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks30
DDQP: A Double Deep Q-Learning Approach to Online Fault-Tolerant SFC Placement30
Reliable Placement of Service Function Chains and Virtual Monitoring Functions With Minimal Cost in Softwarized 5G Networks30
Placement and Chaining for Run-Time IoT Service Deployment in Edge-Cloud29
An Incrementally-Deployable P4-Enabled Architecture for Network-Wide Heavy-Hitter Detection29
Multi-Agent Based Autonomic Network Management Architecture29
RESDN: A Novel Metric and Method for Energy Efficient Routing in Software Defined Networks29
ViCrypt to the Rescue: Real-Time, Machine-Learning-Driven Video-QoE Monitoring for Encrypted Streaming Traffic29
LogClass: Anomalous Log Identification and Classification With Partial Labels28
5MART: A 5G SMART Scheduling Framework for Optimizing QoS Through Reinforcement Learning28
Burst Traffic Scheduling for Hybrid E/O Switching DCN: An Error Feedback Spiking Neural Network Approach28
Comparison of MongoDB and Cassandra Databases for Spectrum Monitoring As-a-Service28
Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions28
P8: P4 With Predictable Packet Processing Performance27
Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset27
Throughput-Aware Partitioning and Placement of Applications in Fog Computing27
Backup Network Design Against Multiple Link Failures to Avoid Link Capacity Overestimation26
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain26
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey26
Fine-Grained Cloud Resource Provisioning for Virtual Network Function26
Can Fine-Grained Functional Split Benefit to the Converged Optical-Wireless Access Networks in 5G and Beyond?26
An Efficient Approach to Robust SDN Controller Placement for Security26
Per-Host DDoS Mitigation by Direct-Control Reinforcement Learning26
Dynamic Controller Assignment in Software Defined Internet of Vehicles Through Multi-Agent Deep Reinforcement Learning26
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN25
Improving End-Users Utility in Software-Defined Wide Area Network Systems25
Caching Popular Transient IoT Contents in an SDN-Based Edge Infrastructure25
SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment25
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs25
Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G25
Sub-Linear Scalability of MQTT Clusters in Topic-Based Publish-Subscribe Applications25
Data Fusion Oriented Graph Convolution Network Model for Rumor Detection25
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems25
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election25
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control25
DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking24
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification24
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services24
Throughput Optimization and Delay Guarantee VNF Placement for Mapping SFC Requests in NFV-Enabled Networks24
Workflow-Aware Automatic Fault Diagnosis for Microservice-Based Applications With Statistics24
Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation24
Risk-Aware Edge Computation Offloading Using Bayesian Stackelberg Game24
Chronos: DDoS Attack Detection Using Time-Based Autoencoder24
Mobility-Aware Seamless Handover With MPTCP in Software-Defined HetNets24
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks24
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection24
Risk-Aware Energy Scheduling for Edge Computing With Microgrid: A Multi-Agent Deep Reinforcement Learning Approach23
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems23
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks23
Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification23
SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks23
Dynamic Distributed Multi-Path Aided Load Balancing for Optical Data Center Networks23
Neural and Attentional Factorization Machine-Based Web API Recommendation for Mashup Development23
A New Mutual Authentication and Key Agreement Protocol for Mobile Client—Server Environment23
Dynamic Allocation of Computing and Communication Resources in Multi-Access Edge Computing for Mobile Users22
Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks22
Reliability-Oriented and Resource-Efficient Service Function Chain Construction and Backup22
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks22
NDMF: Neighborhood-Integrated Deep Matrix Factorization for Service QoS Prediction22
Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method22
Estimating and Synthesizing QoE Based on QoS Measurement for Improving Multimedia Services on Cellular Networks Using ANN Method22
Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads22
NFV Platforms: Taxonomy, Design Choices and Future Challenges22
Multi-Objective Optimization-Based Virtual Network Embedding Algorithm for Software-Defined Networking22
Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning22
Multi-Objective Deep Reinforcement Learning Assisted Service Function Chains Placement21
EvilScout: Detection and Mitigation of Evil Twin Attack in SDN Enabled WiFi21
Reliability Aware Service Placement Using a Viterbi-Based Algorithm21
Assessing Container Network Interface Plugins: Functionality, Performance, and Scalability21
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding21
Time-Sensitive Mobile User Association and SFC Placement in MEC-Enabled 5G Networks21
Joint Resource Optimization and Delay-Aware Virtual Network Function Migration in Data Center Networks21
Robust Service Provisioning With Service Function Chain Requirements in Mobile Edge Computing21
FlexChain: Bridging Parallelism and Placement for Service Function Chains20
Joint Optimization With DNN Partitioning and Resource Allocation in Mobile Edge Computing20
Virtual Network Function Allocation to Maximize Continuous Available Time of Service Function Chains With Availability Schedule20
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks20
Code Caching-Assisted Computation Offloading and Resource Allocation for Multi-User Mobile Edge Computing20
Cross-Network-Slice Authentication Scheme for the 5 th Generation Mobile Communication System20
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model20
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks20
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection20
DeepCC: Multi-Agent Deep Reinforcement Learning Congestion Control for Multi-Path TCP Based on Self-Attention19
Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks19
Reliable and Efficient Multimedia Service Optimization for Edge Computing-Based 5G Networks: Game Theoretic Approaches19
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare19
pHeavy: Predicting Heavy Flows in the Programmable Data Plane19
Availability-Aware and Energy-Efficient Virtual Cluster Allocation Based on Multi-Objective Optimization in Cloud Datacenters19
OSCAR: On Optimizing Resource Utilization in Live Video Streaming19
A Scalable Approach to SDN Control Plane Management: High Utilization Comes With Low Latency19
Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking19
Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems19
RoPE: An Architecture for Adaptive Data-Driven Routing Prediction at the Edge19
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services19
A Dynamic and Collaborative Multi-Layer Virtual Network Embedding Algorithm in SDN Based on Reinforcement Learning19
Soft-Failure Detection, Localization, Identification, and Severity Prediction by Estimating QoT Model Input Parameters19
A Forecasting Approach to Improve Control and Management for 5G Networks19
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains19
Adaptive Computation Offloading Policy for Multi-Access Edge Computing in Heterogeneous Wireless Networks18
E2E QoS Guarantee for the Tactile Internet via Joint NFV and Radio Resource Allocation18
Practical Intrusion Detection of Emerging Threats18
Tensor-Based Recurrent Neural Network and Multi-Modal Prediction With Its Applications in Traffic Network Management18
Optimized IoT Service Chain Implementation in Edge Cloud Platform: A Deep Learning Framework18
Optimized Joint Allocation of Radio, Optical, and MEC Resources for the 5G and Beyond Fronthaul18
Data-Driven RAN Slicing Mechanisms for 5G and Beyond18
MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem18
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks18
DNS Tunneling Detection by Cache-Property-Aware Features18
Traffic Engineering in Segment Routing Networks Using MILP18
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning18
A Survey on Blockchain-Based Telecommunication Services Marketplaces18
BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN18
Disaster Protection in Inter-DataCenter Networks Leveraging Cooperative Storage17
Accelerating Virtual Network Functions With Fast-Slow Path Architecture Using eXpress Data Path17
DeepEdge: A New QoE-Based Resource Allocation Framework Using Deep Reinforcement Learning for Future Heterogeneous Edge-IoT Applications17
Distributed Evolutionary Hyperparameter Optimization for Fuzzy Time Series17
A Network Intelligence Architecture for Efficient VNF Lifecycle Management17
Deadline-Aware SFC Orchestration Under Demand Uncertainty17
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller17
Joint Progressive Network and Datacenter Recovery After Large-Scale Disasters17
Estimation of the Quality of Experience During Video Streaming From Facial Expression and Gaze Direction17
TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection17
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection17
Blockchain State Sharding With Space-Aware Representations17
In-Band Network Monitoring Technique to Support SDN-Based Wireless Networks17
Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning17
Machine Learning-Based Radio Coverage Prediction in Urban Environments17
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory17
Uncertainty-Aware Resource Provisioning for Network Slicing17
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks17
Deploying SDN Control in Internet of UAVs: Q-Learning-Based Edge Scheduling17
Multi-Domain Network Slicing With Latency Equalization17
Mobile Traffic Classification Through Physical Control Channel Fingerprinting: A Deep Learning Approach17
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks17
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold17
CAPEST: Offloading Network Capacity and Available Bandwidth Estimation to Programmable Data Planes17
Traffic Engineering With Three-Segments Routing17
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning16
Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem16
GMTA: A Geo-Aware Multi-Agent Task Allocation Approach for Scientific Workflows in Container-Based Cloud16
Outage Analysis and Reliability Enhancement of Hybrid VLC-RF Networks Using Cooperative Non-Orthogonal Multiple Access16
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities16
Online Sparse BLSTM Models for Resource Usage Prediction in Cloud Datacentres16
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices16
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement16
AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks16
A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network16
Mosaic: Advancing User Quality of Experience in 360-Degree Video Streaming With Machine Learning16
Optimal Network Slicing for Service-Oriented Networks With Flexible Routing and Guaranteed E2E Latency16
Energy Efficient Data Forwarding Scheme in Fog-Based Ubiquitous System With Deadline Constraints16
Study of Virtual Network Function Placement in 5G Cloud Radio Access Network16
Unavailability-Aware Shared Virtual Backup Allocation for Middleboxes: A Queueing Approach16
A Privacy-Preserving Reinforcement Learning Algorithm for Multi-Domain Virtual Network Embedding16
Bloom Filter With a False Positive Free Zone16
Delay-Sensitive Multi-Source Multicast Resource Optimization in NFV-Enabled Networks: A Column Generation Approach16
Auto-Scaling Network Service Chains Using Machine Learning and Negotiation Game15
Failure-Based Controller Placement in Software Defined Networks15
A Scaling Mechanism for an Evolved Packet Core Based on Network Functions Virtualization15
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method15
Provisioning Optimization for Determining and Embedding 5G End-to-End Information Centric Network Slice15
MNO-OTT Collaborative Video Streaming in 5G: The Zero-Rated QoE Approach for Quality and Resource Management15
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks15
Demystifying the Transferability of Adversarial Attacks in Computer Networks15
Uncovering Lateral Movement Using Authentication Logs15
Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support15
Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks15
0.027684926986694