Security and Communication Networks

Papers
(The median citation count of Security and Communication Networks is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications99
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security97
Computational Technique Based on Machine Learning and Image Processing for Medical Image Analysis of Breast Cancer Diagnosis97
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications72
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities71
A Research Survey on Applications of Consensus Protocols in Blockchain70
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges64
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions60
Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices58
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment57
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs57
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey55
Mining Cryptocurrency-Based Security Using Renewable Energy as Source54
A Survey of Self-Sovereign Identity Ecosystem52
Migrating to Zero Trust Architecture: Reviews and Challenges51
R2AU-Net: Attention Recurrent Residual Convolutional Neural Network for Multimodal Medical Image Segmentation50
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality50
Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework49
Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art49
Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques47
IoT-Based Health Monitoring System Development and Analysis46
Edge Computing for IoT-Enabled Smart Grid46
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network46
Internet of Things-Based Intelligent Smart Home Control System45
Overlapping Community Detection Based on Node Importance and Adjacency Information44
Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform44
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata44
Wearable Sensor Data for Classification and Analysis of Functional Fitness Exercises Using Unsupervised Deep Learning Methodologies42
Implementation of Blockchain Consensus Algorithm on Embedded Architecture42
Internet of Things Security: Challenges and Key Issues41
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test40
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems39
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments39
Driver Fatigue Detection Based on Facial Key Points and LSTM37
Improved ECC-Based Three-Factor Multiserver Authentication Scheme37
Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery35
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption35
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things35
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology34
Electronic Health Record Monitoring System and Data Security Using Blockchain Technology33
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques33
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm33
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System32
V2X-Based Mobile Localization in 3D Wireless Sensor Network32
Dominant Feature Selection and Machine Learning-Based Hybrid Approach to Analyze Android Ransomware32
Resource Selection from Edge-Cloud for IIoT and Blockchain-Based Applications in Industry 4.0/5.031
iReTADS: An Intelligent Real-Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network30
A Residual Learning-Based Network Intrusion Detection System30
Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review30
Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks30
Improving the Imperceptibility of Adversarial Examples Based on Weakly Perceptual Perturbation in Key Regions29
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures28
Provably Secure Lattice-Based Self-Certified Signature Scheme27
A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability27
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work26
The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment25
Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network25
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique24
A Manipulation Prevention Model for Blockchain-Based E-Voting Systems24
A New Method of Coding for Steganography Based on LSB Matching Revisited24
Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions24
AFLPC: An Asynchronous Federated Learning Privacy-Preserving Computing Model Applied to 5G-V2X24
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques23
Network Teaching Technology Based on Big Data Mining and Information Fusion23
Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System22
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey22
CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification22
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare22
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT22
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering22
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization21
Design of English Interactive Teaching System Based on Association Rules Algorithm21
IoT-Driven Model for Weather and Soil Conditions Based on Precision Irrigation Using Machine Learning21
Real-Time Surveillance Using Deep Learning21
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency21
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles20
A Secure Two-Factor Authentication Framework in Cloud Computing20
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks20
Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns20
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection20
Research on the Mental Health of College Students Based on Fuzzy Clustering Algorithm20
Towards Effective Detection of Recent DDoS Attacks: A Deep Learning Approach20
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection20
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing20
Research on Face Recognition Classification Based on Improved GoogleNet19
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach19
Dynamic Resource Allocation and Task Offloading for NOMA-Enabled IoT Services in MEC19
Neural Reversible Steganography with Long Short-Term Memory19
Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks19
Efficient Deep Learning Models for DGA Domain Detection19
Permission Sensitivity-Based Malicious Application Detection for Android19
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM18
A Novel Comprehensive Watermarking Scheme for Color Images18
Blockchain and Business Process Management in Health Care, Especially for COVID-19 Cases18
Spread of Misinformation in Social Networks: Analysis Based on Weibo Tweets18
Blockchain Enabled Automatic Reward System in Solid Waste Management18
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs18
Development of the Broadband Multilayer Absorption Materials with Genetic Algorithm up to 8 GHz Frequency18
Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology18
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture18
An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs18
Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions18
An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones18
A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks18
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection18
Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges17
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey17
Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment17
Impact of Digital Transformation of Engineering Enterprises on Enterprise Performance Based on Data Mining and Credible Bayesian Neural Network Model17
A Blockchain System Based on Quantum-Resistant Digital Signature17
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain17
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection17
A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions17
Improve Neural Distinguishers of SIMON and SPECK17
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm17
A GRU-Based Lightweight System for CAN Intrusion Detection in Real Time17
A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks17
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts17
Deep Neural Network-Based SQL Injection Detection Method17
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet16
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating16
Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT16
A Systematic Review on Hybrid Intrusion Detection System16
Research on Network Security Situational Awareness Based on Crawler Algorithm16
Coverless Steganography Based on Motion Analysis of Video16
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition16
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things16
Robust Authentication System with Privacy Preservation of Biometrics16
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre16
Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization16
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning15
Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci15
Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone15
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets15
Unsupervised Anomaly Detection Based on Deep Autoencoding and Clustering15
A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis15
Somewhat Homomorphic Encryption: Ring Learning with Error Algorithm for Faster Encryption of IoT Sensor Signal-Based Edge Devices15
Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions15
PICAndro: Packet InspeCtion-Based Android Malware Detection15
A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites15
Ensemble Learning by High-Dimensional Acoustic Features for Emotion Recognition from Speech Audio Signal15
A Summary of PID Control Algorithms Based on AI-Enabled Embedded Systems15
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models15
Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix14
A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection14
Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model14
The Applications of Blockchain in Artificial Intelligence14
BSD-Guard: A Collaborative Blockchain-Based Approach for Detection and Mitigation of SDN-Targeted DDoS Attacks14
The Drivers of the Behavioral Adoption Intention of BITCOIN Payment from the Perspective of Chinese Citizens14
S-DPS: An SDN-Based DDoS Protection System for Smart Grids14
Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices14
Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion14
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures14
A Blockchain-Based Editorial Management System14
A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks14
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security14
Designing an Efficient and Highly Dynamic Substitution-Box Generator for Block Ciphers Based on Finite Elliptic Curves14
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection14
CTRF: Ethereum-Based Ponzi Contract Identification14
Major Challenges and Future Approaches in the Employment of Blockchain and Machine Learning Techniques in the Health and Medicine14
Application of Internet of Things and Edge Computing Technology in Sports Tourism Services14
An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm13
Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning13
Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions13
A Novel Approach for Malicious URL Detection Based on the Joint Model13
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications13
A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain13
Enhancing Vehicular Ad Hoc Networks’ Dynamic Behavior by Integrating Game Theory and Machine Learning Techniques for Reliable and Stable Routing13
Prediction of IoT Traffic Using the Gated Recurrent Unit Neural Network- (GRU-NN-) Based Predictive Model13
Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues13
Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact13
Network Intrusion Detection Model Based on Improved BYOL Self-Supervised Learning13
Secure Model for IoT Healthcare System under Encrypted Blockchain Framework13
Internet-of-Things-Based Suspicious Activity Recognition Using Multimodalities of Computer Vision for Smart City Security13
Algorithm of 3D Virtual Reconstruction of Ancient Buildings in Qing Dynasty Based on Image Sequence13
Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model12
Research on IoT Forensics System Based on Blockchain Technology12
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks12
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems12
A Privacy-Protection Model for Patients12
Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy12
A Secure and Privacy-Preserving Medical Data Sharing via Consortium Blockchain12
Influencing Factors of Cross-Border E-Commerce Consumer Purchase Intention Based on Wireless Network and Machine Learning12
Towards Face Presentation Attack Detection Based on Residual Color Texture Representation12
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles12
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption12
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update12
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain12
Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems12
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms12
Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review12
A Secure and Effective Construction Scheme for Blockchain Networks12
Efficient Access Control Permission Decision Engine Based on Machine Learning11
Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications11
N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection11
AGG: A Novel Intelligent Network Traffic Prediction Method Based on Joint Attention and GCN-GRU11
Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract11
Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification11
Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme11
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments11
Analysis and Research of Psychological Education Based on Data Mining Technology11
Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm11
A Personalized Eccentric Cyber-Physical System Architecture for Smart Healthcare11
Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records11
BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System11
Research Overview on Edge Detection Algorithms Based on Deep Learning and Image Fusion11
Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information11
Analysis of Intrusion Detection Approaches for Network Traffic Anomalies with Comparative Analysis on Botnets (2008–2020)11
The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment11
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks11
Survey of Consensus Algorithms for Proof of Stake in Blockchain11
Robust Zero Watermarking Algorithm for Medical Images Based on Zernike-DCT11
A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing11
A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model11
Few-Shot Website Fingerprinting Attack with Data Augmentation11
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention11
Application Analysis of the Machine Learning Fusion Model in Building a Financial Fraud Prediction Model11
A Survey on Secure Deployment of Mobile Services in Edge Computing11
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing11
Nonlinear Lamb Wave for Structural Incipient Defect Detection with Sequential Probabilistic Ratio Test11
Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network11
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features11
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments10
An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks10
ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities10
A Power Transformer Fault Prediction Method through Temporal Convolutional Network on Dissolved Gas Chromatography Data10
Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption10
Identity-Based Linkable Ring Signature on NTRU Lattice10
MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images10
Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things10
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems10
E-minBatch GraphSAGE: An Industrial Internet Attack Detection Model10
Data Access Control Based on Blockchain in Medical Cyber Physical Systems10
Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM10
Evaluation and Application of College English Mixed Flipping Classroom Teaching Quality Based on the Fuzzy Judgment Model10
SANS: Self-Sovereign Authentication for Network Slices10
ForkDec: Accurate Detection for Selfish Mining Attacks10
A Research on Traceability Technology of Agricultural Products Supply Chain Based on Blockchain and IPFS10
DDoS Attack Detection by Hybrid Deep Learning Methodologies10
Design of Teaching Video Resource Management System in Colleges and Universities based on Microtechnology10
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications10
Provable Secure and Lightweight Vehicle Message Broadcasting Authentication Protocol with Privacy Protection for VANETs10
Classification and Prediction of Software Incidents Using Machine Learning Techniques10
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing10
Construction Model of E-Commerce Agricultural Product Online Marketing System Based on Blockchain and Improved Genetic Algorithm10
Digital Forensics Use Case for Glaucoma Detection Using Transfer Learning Based on Deep Convolutional Neural Networks10
Face Antispoofing Method Using Color Texture Segmentation on FPGA10
Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network10
Web Application Firewall Using Machine Learning and Features Engineering10
Textual Backdoor Attack for the Text Classification System10
0.04659104347229