IEEE Transactions on Network and Service Management

Papers
(The TQCC of IEEE Transactions on Network and Service Management is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Table of Contents191
Robust Access Point Clustering in Edge Computing Resource Optimization115
Retraction Notice Communication-Efficient Personalized Federated Meta-Learning in Edge Networks110
Table of Contents103
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection101
Topology-Driven Configuration of Emulation Networks With Deterministic Templating99
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior98
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket98
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks97
Smart Policy Control for Securing Federated Learning Management System96
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach96
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks92
The Evolution of Mining Pools and Miners’ Behaviors in the Bitcoin Blockchain89
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain88
EcoPath: Energy-Efficient Multi-Path Data Aggregation for Ubiquitous Connectivity Services82
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation79
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services78
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access75
Efficient Optimization Algorithm for Virtual Backbone in Wireless Sensor Networks by Removing Redundant Dominators74
Communication-Efficient Disaggregated and Distributed Federated Learning in NG-RANs72
Optimizing QoS MAC Scheduling in 5G NR: A Lyapunov Approach Evaluated With XR Traffic71
D-Chain: A Load-Balancing Blockchain Sharding Protocol Based on Account State Partitioning70
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach69
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments69
Dual-Timescale Joint Optimization for Dynamic Edge Service Deployment and Task Scheduling in Space–Air–Ground Integrated Networks69
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion67
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment66
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks66
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks66
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network66
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems66
Adaptive Reliability for the Automated Control of Human–Robot Collaboration in Beyond-5G Networks64
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation64
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management63
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy63
HEEDFUL: Leveraging Sequential Transfer Learning for Robust WiFi Device Fingerprinting Amid Hardware Warm-Up Effects62
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers62
BECHAIN: A Sharding Blockchain With Higher Security59
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay59
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling58
A Unified Framework for Hybrid Network Intrusion Detection58
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature?57
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection57
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks57
Node-Based Blockchain Decentralization Measurement Model57
Deep Learning Model for Content Aware Caching at MEC Servers57
Bilevel Optimization for Provisioning Heterogeneous Traffic in Deterministic Networks55
Slicing for AI: An Online Learning Framework for Network Slicing Supporting AI Services55
Incremental DRL-Based Resource Management for Dynamic Network Slicing in an Urban-Wide Testbed55
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment53
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows53
An Efficient and Robust Resource Allocation Method for Quantum Key Distribution Networks53
HMap: Efficient Internet-Wide IPv6 Scanning With Dynamic Search53
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection53
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows53
Dynamic Normalization TD3-Based Task Offloading for UAV-Assisted Collaborative Computing52
A Novel Hybrid Model for Docker Container Workload Prediction52
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things52
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars51
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships50
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach49
Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques49
A Bi-Level Scheme for Mixed-Motive and Energy-Efficient Task Offloading in Vehicular Edge Computing Systems48
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment48
Hardware-Aware Neural Architecture Search for Encrypted Traffic Classification on Resource-Constrained Devices47
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection47
Robust Distributed Server Selection Model Against Delay Uncertainty46
Improving the Stability of Intrusion Detection With Causal Deep Learning46
Metis: Selecting Diverse Atlas Vantage Points46
Node-Oriented Slice Reconfiguration Based on Spatial and Temporal Traffic Prediction in Metro Optical Networks45
Composing eBPF Programs Made Easy With HIKe and eCLAT45
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner44
Availability and Cost Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems44
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems44
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC44
Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System43
Active Learning for Transformer-Based Fault Diagnosis in 5G and Beyond Mobile Networks43
FLATWISE: Flow Latency and Throughput Aware Sensitive Routing for 6DoF VR Over SDN43
CARRAS: Combined AOA and RBFNN for Resource Allocation in Single Site 5G Network43
Revenue-Aware Seamless Content Distribution in Satellite-Terrestrial Integrated Networks43
Improving Address Clustering in Bitcoin by Proposing Heuristics42
XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P442
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks42
High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality42
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks42
Proof of Genesis-Supported Blockchain and Resilience Networks for In-Disaster Scenarios42
An eBPF-XDP Hardware-Based Network Slicing Architecture for Future 6G Front- to Back-Haul Networks41
Federated Intelligent Service Function Chain Orchestration in Future 6G Networks41
DRL-Based Dynamic Resource Allocation for Multi-Beam Satellite Systems41
A Channel Perceiving-Based Handover Management in Space–Ground Integrated Information Network41
Network Slicing With Flexible VNF Order: A Branch-and-Bound Approach41
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN41
Multi-Party Payment Channel Network Based on Smart Contract41
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums41
These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots41
Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model40
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks40
From the Beginning: Key Transitions in the First 15 Years of DNSSEC39
QoE-Aware Transport Slicing Configuration: Improving Application Performance in Beyond-5G Networks39
VeCroToken: An Efficient, Verifiable, and Privacy-Preserving Cross-Chain Model for Consortium Blockchains Based on zk-SNARKs39
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation38
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT Editorial Board38
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction38
An Efficient and Secure Smart Parking System With Conditional Preservation of Citizens Privacy for Smart Cities38
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data38
A Sampling-Neighborhood-Regularized Latent Factorization of Tensor for Dynamic QoS Estimation38
Exploring the Conditional Effect of RLF on Handover Failure Based on ns-3 Under Stochastic Channel Condition38
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs37
Mobility Management for Cellular-Connected UAVs: Model-Based Versus Learning-Based Approaches for Service Availability37
Table of Contents36
MDU-CACS: A Coordinated Forecasting-Based Cloud-Assisted Dynamic Channel Assignment Mechanism for Wi-Fi Network Clusters36
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments36
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments36
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts36
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation36
Table of Contents36
Subgraph-Driven Lightweight Federated Learning for Spatiotemporal Cellular Traffic Prediction35
Managing a Resilient Multitier Architecture for Unstable IoT Networks in Location Based-Services35
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location35
Backhaul Traffic-Aware Edge Caching for Recommended Content With Personalized Privacy35
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds35
A Comprehensive Benchmark of Flannel CNI in SDN/Non-SDN Enabled Cloud-Native Environments35
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services—Part II35
Multi-Agent DRL-Based Two-Timescale Resource Allocation for Network Slicing in V2X Communications35
Estimating Video on Demand QoE From Network QoS Through ICMP Probes34
Detecting Service Disruptions in Large BGP/MPLS VPN Networks34
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance34
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis34
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks34
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN34
B-TWGA: A Trusted Gateway Architecture Based on Blockchain for Internet of Things34
Minimizing Update Makespan in SDNs Without TCAM Overhead34
Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems34
IBNS: Optimizing Intent-Based 6G Network Slicing for Conflict Detection and Mitigation34
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks33
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking33
A Novel Framework for Optical Layer Device Board Failure Localization in Optical Transport Network33
CASE: A Joint Traffic and Energy Optimization Framework Toward Grid Connected Green Future Networks33
Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks33
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure33
Secure Data Sharing Framework With Fine-Grained Access Control and Privacy Protection for IoT Data Marketplace33
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things33
Design of 5G MEC-Based Networks With 1:N:K Protection Scheme33
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results33
A Resource Allocation Model for Mixed-Grid Optical Networks33
Efficiency of BIER Multicast in Large Networks32
Redactable Blockchain-Based Secure and Accountable Data Management32
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game32
Entity-Level Autoregressive Relational Triple Extraction Toward Knowledge Graph Construction for Network Operation and Maintenance32
Data-Driven Intra-Autonomous Systems Graph Generator32
FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC32
ANFIS-DBA: ANFIS-Based Dynamic Bandwidth Allocation Scheme for Latency Driven Cost Effective Next Generation PON32
Critical Limitations of the Least Outstanding Request Load Balancing Policy in Service Meshes for Large-Scale Microservice Applications32
TraceDAE: Trace-Based Anomaly Detection in Microservice Systems via Dual Autoencoder31
Explainable GNN-Based Approach to Fault Forecasting in Cloud Service Debugging31
Fair Scheduling and Computation Co-Offloading for Industrial Applications in Fog Networks31
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach31
A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT30
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network30
Dynamic Fog Federation Scheme for Internet of Vehicles30
Deep Reinforcement Learning-Based Contract Incentive and Computation Offloading for Mobile Edge Computing-Enabled Blockchain30
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain30
Optimized Planning of DU/CU Placement and Flow Routing in 5G Packet Xhaul Networks30
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission30
Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows30
AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification30
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA30
Handover-Aware Scheduling for Small- and Large-Scale VLC Networks30
Novel Adaptive Multi-User Multi-Services Scheduling to Enhance Throughput in 5G-Advanced and Beyond30
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G30
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates30
Correction to “Optimal Subscription Policies for Participation-Dependent Social-Learning Markets”29
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management29
FastScheduler: Polynomial-Time Scheduling for Time-Triggered Flows in TSN29
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping29
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas29
Neural Attention Networks for Recommendation With Auxiliary Data29
AI Anomaly Detection for Cloudified Mobile Core Architectures29
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing29
Adaptive One Memory Access Bloom Filters29
Urban Mobile Data Prediction With Geospatial Clustering and Dual Residual Learning28
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation28
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment28
Extending WebAssembly for Deep-Learning Inference Across the Cloud Continuum28
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission28
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning28
An RL-Based Framework for Task Offloading and Resource Allocation in Energy Harvesting-Based Multi-Access Edge Computing28
Key Flow First Prioritized Flow Scheduling Strategy in Multi-Tenant Data Centers28
Dynamic Task Scheduling and Adaptive GPU Resource Allocation in the Cloud28
Incremental Survivability Enhancement in Mobile Crowdsensing Systems27
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory27
Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security27
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing27
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System27
Identifying a Malicious Node in a UAV Network27
Distributed Model Training Task Migration for Hotspot Management in Intelligent Computing Center Interconnection With Tidal Characteristics27
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul26
6Global: Dynamic IPv6 Active Address Scanning Assisted by Global Perspective26
From an In-Depth Understanding of Multipath TCP Enhancement Schemes to an Adaptive Control Framework in Wireless Networks26
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers26
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation26
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing26
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning26
Collaborative Cloud Resource Management and Task Consolidation Using JAYA Variants26
A Deep RL Approach on Task Placement and Scaling of Edge Resources for Cellular Vehicle-to-Network Service Provisioning26
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks26
Revisit Fast Event Matching–Routing for High-Volume Subscriptions26
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems26
A Robust Trust Management System for V2X Networks Integrating ISAC With Blockchain Smart Contracts26
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering26
On Demand Fog Federations for Horizontal Federated Learning in IoV25
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane25
PDRAA: An Efficient Privacy Data Retrieval Protocol With Anonymous Authorization Based on Verifiable Credential25
VNF Mapping and Selective Handover for eMBB and mMTC Services in a LEO Satellite Network25
Table of Contents25
End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows25
Flat UP: A Converged RAN-Core Architecture for the 6G User Plane25
A Dynamic Cascading Failure Model for LEO Satellite Networks25
Age of Information Optimization in RIS-Assisted Wireless Networks25
Scalable Storage Optimization for Blockchain-Based Cross-Domain Authentication in IoT25
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus25
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain25
Dynamic Management of Constrained Computing Resources for Serverless Services25
Globally Integrated Trust Authority (GITA) for Resource-Constrained Edge Devices in IoT and 6G25
Maximizing Utility Joint Optimization Based on Edge Full Cooperation25
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process24
Intent-Based Service Provisioning and Closed-Loop Automation for Cobot Service Migration in a Multi-Stakeholder Environment24
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G24
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey24
Detecting Cloud Anomaly via Broad Network-Based Contrastive Autoencoder24
Optimized FlexEthernet for Inter-Domain Traffic Restoration24
Comparative Analysis of Deep Learning Models for Real-World ISP Network Traffic Forecasting24
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing24
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks24
Resource Orchestration and Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks24
Table of Contents24
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks24
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring24
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment24
Paxos With Priorities for Blockchain Applications24
Timeslot-Adaptive and Traffic Load-Aware Routing Computation in Two-Layer LEO Satellite Networks23
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning23
Blockchain Storage Optimisation With Multi-Level Distributed Caching23
Privacy-Preserving Deployment Mechanism for Service Function Chains Across Multiple Domains23
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services23
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks23
Cluster and Conquer: Malicious Traffic Classification at the Edge23
P4-Secure: In-Band DDoS Detection in Software Defined Networks23
SFCache: Hybrid NF Synthesization in Runtime With Rule-Caching in Programmable Switches23
Mobility-Aware MEC Planning With a GNN-Based Graph Partitioning Framework23
0.093878030776978