Security and Communication Networks

Papers
(The H4-Index of Security and Communication Networks is 34. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security89
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System79
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications74
Computational Technique Based on Machine Learning and Image Processing for Medical Image Analysis of Breast Cancer Diagnosis73
A Research Survey on Applications of Consensus Protocols in Blockchain61
Rational Protocols and Attacks in Blockchain System60
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques59
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities57
Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices55
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications53
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey48
Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework46
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment45
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs45
Mining Cryptocurrency-Based Security Using Renewable Energy as Source44
Edge Computing for IoT-Enabled Smart Grid42
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey42
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges41
Android Malware Detection Based on a Hybrid Deep Learning Model41
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality40
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network40
A Survey of Self-Sovereign Identity Ecosystem40
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata40
Wearable Sensor Data for Classification and Analysis of Functional Fitness Exercises Using Unsupervised Deep Learning Methodologies39
Implementation of Blockchain Consensus Algorithm on Embedded Architecture38
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments38
Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques37
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions36
A Comprehensive Survey on Local Differential Privacy36
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test35
Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform34
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption34
Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art34
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms34
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers34
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology34
0.039959907531738