Peer-to-Peer Networking and Applications

Papers
(The H4-Index of Peer-to-Peer Networking and Applications is 24. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems82
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things60
EICache: A learning-based intelligent caching strategy in mobile edge computing46
Energy-efficient client selection in federated learning with heterogeneous data on edge40
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks40
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing39
Reducing the number of transaction messages in bitcoin39
Energy efficient clustering with compressive sensing for underwater wireless sensor networks35
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks33
Optimal RSU deployment using complex network analysis for traffic prediction in VANET33
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value32
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing32
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network32
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things31
Efficient multi-job federated learning scheduling with fault tolerance30
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare30
Forwarding information base construction and hybrid data transmission for information-centric IoT30
Sybil attack detection in ultra-dense VANETs using verifiable delay functions29
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation29
Network security based combined CNN-RNN models for IoT intrusion detection system29
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks28
Lightweight secure authentication and key agreement technique for smart grid27
Threshold-sensitive energy efficient routing for precision agriculture26
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications26
0.65741205215454