Security and Communication Networks

Papers
(The TQCC of Security and Communication Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security91
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System83
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications81
Computational Technique Based on Machine Learning and Image Processing for Medical Image Analysis of Breast Cancer Diagnosis80
A Research Survey on Applications of Consensus Protocols in Blockchain65
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities61
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques60
Rational Protocols and Attacks in Blockchain System60
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications57
Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices56
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey49
Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework48
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment47
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges47
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs46
Mining Cryptocurrency-Based Security Using Renewable Energy as Source45
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey44
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality43
Edge Computing for IoT-Enabled Smart Grid43
Wearable Sensor Data for Classification and Analysis of Functional Fitness Exercises Using Unsupervised Deep Learning Methodologies42
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network42
Android Malware Detection Based on a Hybrid Deep Learning Model42
A Survey of Self-Sovereign Identity Ecosystem40
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata40
Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques39
Implementation of Blockchain Consensus Algorithm on Embedded Architecture39
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions38
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments38
A Comprehensive Survey on Local Differential Privacy37
Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform37
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test36
R2AU-Net: Attention Recurrent Residual Convolutional Neural Network for Multimodal Medical Image Segmentation36
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers35
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms35
Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art35
Internet of Things Security: Challenges and Key Issues35
Migrating to Zero Trust Architecture: Reviews and Challenges34
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology34
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption34
Secure Framework Enhancing AES Algorithm in Cloud Computing34
IoT-Based Health Monitoring System Development and Analysis33
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems33
Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery32
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System32
Improved ECC-Based Three-Factor Multiserver Authentication Scheme32
Internet of Things-Based Intelligent Smart Home Control System32
An Improved Blockchain-Based Authentication Protocol for IoT Network Management30
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm29
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey29
Resource Selection from Edge-Cloud for IIoT and Blockchain-Based Applications in Industry 4.0/5.029
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques28
Driver Fatigue Detection Based on Facial Key Points and LSTM28
V2X-Based Mobile Localization in 3D Wireless Sensor Network27
Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks26
Overlapping Community Detection Based on Node Importance and Adjacency Information26
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow25
A Residual Learning-Based Network Intrusion Detection System25
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things25
Dominant Feature Selection and Machine Learning-Based Hybrid Approach to Analyze Android Ransomware25
Feature Selection Based on Cross-Correlation for the Intrusion Detection System24
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA23
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures23
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm23
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work23
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique23
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques22
Electronic Health Record Monitoring System and Data Security Using Blockchain Technology22
A Survey of Key Technologies for Constructing Network Covert Channel21
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection21
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey21
CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification21
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications21
Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review21
Network Teaching Technology Based on Big Data Mining and Information Fusion21
Distributed Security Framework for Reliable Threat Intelligence Sharing21
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method20
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA20
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency20
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization19
A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability19
Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System19
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT19
Dynamic Resource Allocation and Task Offloading for NOMA-Enabled IoT Services in MEC19
AFLPC: An Asynchronous Federated Learning Privacy-Preserving Computing Model Applied to 5G-V2X19
The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment19
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid19
A New Method of Coding for Steganography Based on LSB Matching Revisited19
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare19
Provably Secure Lattice-Based Self-Certified Signature Scheme18
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs18
iReTADS: An Intelligent Real-Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network18
A Manipulation Prevention Model for Blockchain-Based E-Voting Systems18
Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions18
Neural Reversible Steganography with Long Short-Term Memory18
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment18
Research on Face Recognition Classification Based on Improved GoogleNet18
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection18
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection17
Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns17
IoT-Driven Model for Weather and Soil Conditions Based on Precision Irrigation Using Machine Learning17
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques17
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection17
A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions17
Blockchain and Business Process Management in Health Care, Especially for COVID-19 Cases17
Improving the Imperceptibility of Adversarial Examples Based on Weakly Perceptual Perturbation in Key Regions17
Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks17
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach17
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication17
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles17
Development of the Broadband Multilayer Absorption Materials with Genetic Algorithm up to 8 GHz Frequency17
Design of English Interactive Teaching System Based on Association Rules Algorithm17
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing17
Towards Effective Detection of Recent DDoS Attacks: A Deep Learning Approach16
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet16
Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT16
Research on the Mental Health of College Students Based on Fuzzy Clustering Algorithm16
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM16
Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology16
Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network16
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks16
A Mean Convolutional Layer for Intrusion Detection System16
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems16
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm16
Somewhat Homomorphic Encryption: Ring Learning with Error Algorithm for Faster Encryption of IoT Sensor Signal-Based Edge Devices15
Nonlinear Lamb Wave for Structural Incipient Defect Detection with Sequential Probabilistic Ratio Test15
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model15
Research on Network Security Situational Awareness Based on Crawler Algorithm15
A Secure Two-Factor Authentication Framework in Cloud Computing15
Improve Neural Distinguishers of SIMON and SPECK15
An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones15
Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion15
A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks15
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre15
Efficient Deep Learning Models for DGA Domain Detection15
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things14
Deep Neural Network-Based SQL Injection Detection Method14
PICAndro: Packet InspeCtion-Based Android Malware Detection14
The Defense of Adversarial Example with Conditional Generative Adversarial Networks14
The Drivers of the Behavioral Adoption Intention of BITCOIN Payment from the Perspective of Chinese Citizens14
Application of Internet of Things and Edge Computing Technology in Sports Tourism Services14
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts14
A GRU-Based Lightweight System for CAN Intrusion Detection in Real Time14
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering14
An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs13
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating13
Spread of Misinformation in Social Networks: Analysis Based on Weibo Tweets13
A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks13
Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci13
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview13
Real-Time Surveillance Using Deep Learning13
Blockchain Enabled Automatic Reward System in Solid Waste Management13
Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone13
Permission Sensitivity-Based Malicious Application Detection for Android13
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture13
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain12
A Secure and Effective Construction Scheme for Blockchain Networks12
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain12
Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact12
Unsupervised Anomaly Detection Based on Deep Autoencoding and Clustering12
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures12
Robust Authentication System with Privacy Preservation of Biometrics12
Internet-of-Things-Based Suspicious Activity Recognition Using Multimodalities of Computer Vision for Smart City Security12
Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization12
S-DPS: An SDN-Based DDoS Protection System for Smart Grids12
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security12
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning12
Ensemble Learning by High-Dimensional Acoustic Features for Emotion Recognition from Speech Audio Signal12
Major Challenges and Future Approaches in the Employment of Blockchain and Machine Learning Techniques in the Health and Medicine12
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models12
Cryptographic Strength Evaluation of Key Schedule Algorithms12
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications12
Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices12
A Novel Comprehensive Watermarking Scheme for Color Images12
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map12
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption11
Designing an Efficient and Highly Dynamic Substitution-Box Generator for Block Ciphers Based on Finite Elliptic Curves11
A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites11
A Survey on Secure Deployment of Mobile Services in Edge Computing11
A Blockchain-Based Editorial Management System11
A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks11
Coverless Steganography Based on Motion Analysis of Video11
Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues11
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition11
Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model11
A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning11
N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection11
Enhancing Vehicular Ad Hoc Networks’ Dynamic Behavior by Integrating Game Theory and Machine Learning Techniques for Reliable and Stable Routing11
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing11
BSD-Guard: A Collaborative Blockchain-Based Approach for Detection and Mitigation of SDN-Targeted DDoS Attacks11
Prediction of IoT Traffic Using the Gated Recurrent Unit Neural Network- (GRU-NN-) Based Predictive Model11
A Privacy-Protection Model for Patients11
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets11
An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm11
Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions11
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update11
The Applications of Blockchain in Artificial Intelligence11
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection11
Robust Zero Watermarking Algorithm for Medical Images Based on Zernike-DCT11
Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions11
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey11
Towards Face Presentation Attack Detection Based on Residual Color Texture Representation11
A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain11
Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment10
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection10
Application Analysis of the Machine Learning Fusion Model in Building a Financial Fraud Prediction Model10
CTRF: Ethereum-Based Ponzi Contract Identification10
Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots10
A Blockchain System Based on Quantum-Resistant Digital Signature10
Design of Teaching Video Resource Management System in Colleges and Universities based on Microtechnology10
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems10
Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications10
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism10
Classification and Prediction of Software Incidents Using Machine Learning Techniques10
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention10
Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model10
Analysis of Intrusion Detection Approaches for Network Traffic Anomalies with Comparative Analysis on Botnets (2008–2020)10
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection10
MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images10
Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems10
A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks10
Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions10
Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges10
A Systematic Review on Hybrid Intrusion Detection System10
Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix10
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles10
Blockchain-Based Privacy Access Control Mechanism and Collaborative Analysis for Medical Images10
Few-Shot Website Fingerprinting Attack with Data Augmentation10
Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information10
Construction Model of E-Commerce Agricultural Product Online Marketing System Based on Blockchain and Improved Genetic Algorithm10
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks10
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems10
Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm10
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications10
A Personalized Eccentric Cyber-Physical System Architecture for Smart Healthcare10
ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities10
Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning10
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments9
Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network9
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map9
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT9
Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network9
Study on Stochastic Differential Game Model in Network Attack and Defense9
Exploring the Fuzzy Integrated Assessment of College Students’ Education for Innovative Entrepreneurship under the Background of Internet+9
An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks9
Research on Market Stock Index Prediction Based on Network Security and Deep Learning9
Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network9
Secure Model for IoT Healthcare System under Encrypted Blockchain Framework9
DDoS Detection Using a Cloud-Edge Collaboration Method Based on Entropy-Measuring SOM and KD-Tree in SDN9
SWOT: A Hybrid Hardware-Based Approach for Robust Fault-Tolerant Framework in a Smart Day Care9
Modelling Features-Based Birthmarks for Security of End-to-End Communication System9
0.058531999588013