Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Comprehensive survey of UAVs communication networks95
Optimal 5G network slicing using machine learning and deep learning concepts85
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities84
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission64
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester60
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment58
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses51
A stream processing architecture for heterogeneous data sources in the Internet of Things48
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning45
Factory Communications at the Dawn of the Fourth Industrial Revolution44
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications42
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review40
A microservice architecture for real-time IoT data processing: A reusable Web of things approach for smart ports36
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications35
Designing secure and lightweight user access to drone for smart city surveillance34
Toward secure distributed data storage with error locating in blockchain enabled edge computing33
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing31
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption29
DOA tracking for seamless connectivity in beamformed IoT-based drones29
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing28
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO28
Performance evaluation of secured network traffic classification using a machine learning approach27
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs25
Trusted data sharing with flexible access control based on blockchain24
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient24
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud23
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks22
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA22
Privacy-preserving Byzantine-robust federated learning21
A new secure arrangement for privacy-preserving data collection21
A taxonomy of attack mechanisms in the automotive domain21
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud20
Blockchain-empowered security and privacy protection technologies for smart grid19
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior19
Blockchain-based verifiable privacy-preserving data classification protocol for medical data19
Software Process Simulation Modeling: Systematic literature review19
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing18
Energy trading scheme based on consortium blockchain and game theory18
Accountable outsourcing data storage atop blockchain17
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture17
The impact of error control schemes on lifetime of energy harvesting wireless sensor networks in industrial environments16
Efficient dynamic-power AODV routing protocol based on node density16
SafeSec Tropos: Joint security and safety requirements elicitation16
Secure deduplication with efficient user revocation in cloud storage16
The trust model of enterprise purchasing for B2B e-marketplaces16
Risk management in the software life cycle: A systematic literature review16
Privacy-preserving COVID-19 contact tracing solution based on blockchain16
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack16
DTMR: An adaptive Distributed Tree-based Multicast Routing protocol for vehicular networks15
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis15
Generic server-aided secure multi-party computation in cloud computing15
Provable data deletion from efficient data integrity auditing and insertion in cloud storage15
Public-key encryption with bidirectional keyword search and its application to encrypted emails14
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption14
An efficient multivariate threshold ring signature scheme13
Energy aware algorithm based on actual utilization for periodic tasks in mixed-criticality real-time systems13
Performance analysis of handover management in 5G small cells13
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health13
Predicting the security threats of internet rumors and spread of false information based on sociological principle13
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things13
Attribute-based proxy re-signature from standard lattices and its applications12
Web service reliability prediction based on machine learning12
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network12
AgentDSM-Eval: A framework for the evaluation of domain-specific modeling languages for multi-agent systems11
Energy aware fixed priority scheduling in mixed-criticality systems11
A reference framework for the implementation of data governance systems for industry 4.011
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems11
Verifiable database supporting keyword searches with forward security11
Detection of web service anti-patterns using weighted extreme learning machine11
0.037609100341797