Security and Communication Networks

Papers
(The H4-Index of Security and Communication Networks is 35. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Security Analysis of Intelligent System Based on Edge Computing104
Design and Optimization of Blockchain-Based Distributed Data-Sharing System for Urban Rail Transit99
Beyond Statistical Analysis in Chaos-Based CSPRNG Design97
Nesting Circles: An Interactive Visualization Paradigm for Network Intrusion Detection System Alerts87
Optimal Network Destruction Strategy with Heterogeneous Cost under Cascading Failure Model71
Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning64
Design of a Blockchain-Based Traceability System with a Privacy-Preserving Scheme of Zero-Knowledge Proof61
PACAM: A Pairwise-Allocated Strategy and Capability Average Matrix-Based Task Scheduling Approach for Edge Computing60
Performance Analysis of IEEE 802.11p Protocol in IoV under Error-Prone Channel Conditions58
Immune Algorithm to Suppress Rumor Propagation Based on Influence Maximization57
A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination57
An Efficient Multiscale Pyramid Attention Network for Face Detection in Surveillance Images54
Experimental Study on Damage and Fracture of Rock-like Mass Based on Intelligent Data Analysis52
An XML Privacy-Preserving Data Disclosure Decision Scheme51
CLE against SOA with Better Data Security Storage to Cloud 5G51
A Multiuser Ciphertext Search Scheme Based on Blockchain and SGX50
Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering50
Privacy-Preserving Task Distribution Mechanism with Cloud-Edge IoT for the Mobile Crowdsensing49
GT-Bidding: Group Trust Model of P2P Network Based on Bidding49
Reversible Privacy Protection with the Capability of Antiforensics48
IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection47
Blockchain-Enabled Joint Resource Allocation for Virtualized Video Service Functions46
Next-Generation Digital Forensic Readiness BYOD Framework45
Pattern Mathematical Model for Fingerprint Security Using Bifurcation Minutiae Extraction and Neural Network Feature Selection45
Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges44
A Novel Approach for Malicious URL Detection Based on the Joint Model44
SoK: Context and Risk Aware Access Control for Zero Trust Systems44
Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks42
Information Security Field Event Detection Technology Based on SAtt-LSTM41
A Noninteractive Multireplica Provable Data Possession Scheme Based on Smart Contract40
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge39
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter39
Generalized and Multiple-Queries-Oriented Privacy Budget Strategies in Differential Privacy via Convergent Series39
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?35
Robustness of the Storage in Cloud Data Centers Based on Simple Swarm Optimization Algorithm35
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data35
0.11283588409424