International Journal of Network Management

Papers
(The median citation count of International Journal of Network Management is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment54
SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time‐Sensitive Networks39
Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things33
A2C Reinforcement Learning for Cryptocurrency Trading: Analyzing the Impact of Price Prediction Accuracy and Data Granularity29
A novel data streaming method for detecting abnormal flows in distributed monitoring systems28
An Efficient Workflow Scheduling Using Genetically Modified Golden Jackal Optimization With Recurrent Autoencoder in Cloud Computing23
22
Load Balancing Based on Consistent Hashing in P4 Switches19
Characterizing the Bitcoin network topology with Node‐Probe16
Issue Information14
Homomorphic Witness Encryption and Its Applications14
Issue Information13
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network12
Issue Information12
Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning11
11
A Comprehensive Survey of Lightning Network Technology and Research11
Container placement and migration strategies for cloud, fog, and edge data centers: A survey11
A Blockchain‐Based Proxy Re‐Encryption Scheme With Cryptographic Reverse Firewall for IoV10
Issue Information10
Towards optimal synchronization in NFV‐based environments10
10
Risk‐Aware SDN Defense Framework Against Anti‐Honeypot Attacks Using Safe Reinforcement Learning9
Athena: Smart order routing on centralized crypto exchanges using a unified order book9
Traffic Engineering Optimization in Hybrid Software‐Defined Networks: A Mixed Integer Non‐Linear Programming Model and Heuristic Algorithm8
Issue Information8
Issue Information8
8
Effects of Fractionalizing NFTS in the Art Market: An Empirical Study of Fractional Art8
Blockchain and crypto forensics: Investigating crypto frauds7
7
Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning6
6
Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review6
Data sharing mode of dispatching automation system based on distributed machine learning6
Leveraging Ponzi‐like designs in stablecoins5
Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain5
ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing5
5
Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks4
Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files4
Load balancing clustering and routing for IoT‐enabled wireless sensor networks4
Massive Data HBase Storage Method for Electronic Archive Management4
A Comprehensive Survey on LLM‐Based Network Management and Operations4
Autonomous Attack Mitigation Through Firewall Reconfiguration4
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning4
A secure and light‐weight patient survival prediction in Internet of Medical Things framework4
A Method for Sharing English Education Resources in Multiple Virtual Networks Based on 6G3
Editorial for special issue on security and trust on networked systems3
A Fast Cross‐Chain Protocol Based on Trusted Notary Group for Metaverse3
Out‐of‐band transaction pool sync for large dynamic blockchain networks3
Energy‐Aware Controller Placement With Delay Guarantees for In‐Band SDN3
Computationally Efficient Approach for 6G‐AI‐IoT Network Slicing and Error‐Free Transmission3
Blockchain‐inspired lightweight trust‐based system in vehicular networks3
A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform3
Issue Information3
A Survey of IPv6 Active Address Discovery2
MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications2
2
Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system2
Editorial for the Special Issue on Research Trends in Network Operations and Management With Selected Papers From the 42nd Brazilian Symposium on Computer Networks and Distributed Systems2
A federated semi‐supervised learning approach for network traffic classification2
Issue Information2
Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles2
2
2
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network2
FGLB: A fine‐grained hardware intra‐server load balancer based on 100 G FPGA SmartNIC2
2
Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 “Advancing Blockchain and Cryptocurrency”2
Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios2
SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things‐enabled wireless sensor networks2
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments2
Issue Information2
The Evolution of Network Management: From Manual Configurations to Intelligent Automation2
A novel eviction policy based on shortest remaining time for software defined networking flow tables2
Reducing the propagation delay of compact block in Bitcoin network2
2
Privacy‐preserving data aggregation achieving completeness of data queries in smart grid1
Topology analysis of the Ripple transaction network1
Issue Information1
Securing Multicloud Environments With SAFIRE: A Federated and Adaptive Intelligence Approach1
Issue Information1
1
Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things1
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA1
An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing1
The next phase of identifying illicit activity in Bitcoin1
An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks1
Design and Development of a Trust Mechanism to Enhance Security Protection in SDN‐Based IoT Network1
QuantumNetSec: Quantum Machine Learning for Network Security1
Issue Information1
Multitopology Routing With Virtual Topologies and Segment Routing1
Issue Information1
Enhancing QUIC Performance in Heterogeneous Networks: A Proactive Connection Migration Approach1
Analysis of network function sharing in Content Delivery Network‐as‐a‐service slicing scenarios0
Software‐defined content delivery network at the edge for adaptive video streaming0
DELTA: A Modular, Transparent, and Efficient Synchronization of DLTs and Databases0
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges0
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm0
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack0
Innovations in Blockchain for Crypto Assets and Exchanges0
Beyond Size: Investigating the Impact of Scaled‐Down Network Telescopes on Threat Detection0
SRv6‐based Time‐Sensitive Networks (TSN) with low‐overhead rerouting0
0
0
Joint service placement and user assignment model in multi‐access edge computing networks against base‐station failure0
Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax0
IGXSS: XSS payload detection model based on inductive GCN0
Audit‐based correction mechanism for malicious statistics information of data plane0
Issue Information0
Availability‐aware virtual network function placement based on multidimensional universal generating functions0
Construction of Metaphorical Maps of Cyberspace Resources Based on Point‐Cluster Feature Generalization0
Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges0
0
0
Music Transmission and Performance Optimization Based on the Integration of Artificial Intelligence and 6G Network Slice0
Cover Image0
EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network0
Latency‐Aware Proactive Event Monitoring Scheme in SDN/P4‐Based IoT Networks0
Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network0
Duo‐H: An Effectual Consensus Algorithm Using Two‐Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection0
Accelerating network softwarization in the cognitive age0
0
Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse0
vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH0
Performance of security options for message protocols: A comparative analysis0
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing0
0
REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation0
Issue Information0
Security, Privacy, and Trust Management on Decentralized Systems and Networks0
Latency‐ and Load‐Aware MEC Host Selection in Simu5G: A Lightweight Orchestration Policy for Delay‐Sensitive 5G Applications0
0
Graph neural network‐based virtual network function deployment optimization0
Performance and Resilience Impact of Microservice Granularity: An Empirical Evaluation Using Service Weaver and Amazon EKS0
A security‐enhanced equipment predictive maintenance solution for the ETO manufacturing0
A distributed algorithm with network‐independent step‐size and event‐triggered mechanism for economic dispatch problem0
0
No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation0
P4‐QUPF: A P4‐Based QoS Framework for 5G‐UPF0
Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks0
Issue Information0
Dynamic management network system of automobile detection applying edge computing0
The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens0
An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network0
MTS‐PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows0
Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks0
A Literature Survey on Resource Allocation for Network Function Virtualization With and Without Machine Learning in Cloud Computing0
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity0
Privacy‐protected object detection through trustworthy image fusion0
An optimal hybrid cascade regional convolutional network for cyberattack detection0
Optimal network‐aware virtual data center embedding0
Lightweight Flow‐Based Policy Enforcement for SDN‐Based Multi‐Domain Communication0
Issue Information0
A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks0
Issue Information0
Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing0
A blockchain‐enabled security management framework for mobile edge computing0
Issue Information0
Issue Information0
Predicting Arbitrage Occurrences With Machine Learning and Improved Decision Threshold Level in Live‐Trading Crypto Environments0
Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions0
Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture0
ASMTP: Anonymous secure messaging token‐based protocol assisted data security in swarm of unmanned aerial vehicles0
Placement of virtual network functions for network services0
Load migration in distributed softwarized network controllers0
A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment0
A comprehensive review of blockchain integration in remote patient monitoring for E‐health0
Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility0
Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem0
SentinelGuard Pro: Deploying Cutting‐Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents0
RNN‐EdgeQL: An auto‐scaling and placement approach for SFC0
0
Blockchain‐Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy0
Workload prediction based on improved error correlation logistic regression algorithm and Cross‐TRCN of spatiotemporal neural network0
Issue Information0
Issue Information0
Issue Information0
0
Issue Information0
0
0
Updatable Signature Scheme With Weakened Token and No‐Directional Key Update0
Log‐TF‐IDF and NETCONF‐Based Network Switch Anomaly Detection0
On minimizing flow monitoring costs in large‐scale software‐defined network networks0
Decentralized Anomaly Detection Using Deep Feed‐Forward Neural Networks0
Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges0
Intrusion Detection for Blockchain‐Based Internet of Things Using Gaussian Mixture–Fully Convolutional Variational Autoencoder Model0
Intent‐Based Network Configuration Using Large Language Models0
An Adaptive Routing Architecture for IoT Multipath Video Transmission0
Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture0
QoS‐Aware Load Balancing in Cloud Computing Based on Chronological Kookaburra Optimization Algorithm0
Transaction fee mechanisms with farsighted miners0
0.090183973312378