International Journal of Network Management

Papers
(The TQCC of International Journal of Network Management is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time‐Sensitive Networks33
Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things19
A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation18
Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment16
A cost‐effective and load‐balanced controller placement method in software‐defined networks16
16
Characterizing the Bitcoin network topology with Node‐Probe15
An Efficient Workflow Scheduling Using Genetically Modified Golden Jackal Optimization With Recurrent Autoencoder in Cloud Computing15
A novel data streaming method for detecting abnormal flows in distributed monitoring systems15
Homomorphic Witness Encryption and Its Applications15
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network14
Container placement and migration strategies for cloud, fog, and edge data centers: A survey14
Issue Information13
Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning11
Issue Information11
9
Risk‐Aware SDN Defense Framework Against Anti‐Honeypot Attacks Using Safe Reinforcement Learning8
A Blockchain‐Based Proxy Re‐Encryption Scheme With Cryptographic Reverse Firewall for IoV8
Issue Information8
Privacy‐preserving and efficient user matching based on attribute encryption in mobile social networks7
Towards optimal synchronization in NFV‐based environments6
Traffic Engineering Optimization in Hybrid Software‐Defined Networks: A Mixed Integer Non‐Linear Programming Model and Heuristic Algorithm6
6
6
Issue Information6
Athena: Smart order routing on centralized crypto exchanges using a unified order book6
Blockchain and crypto forensics: Investigating crypto frauds6
6
5
Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain5
ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing5
5
Data sharing mode of dispatching automation system based on distributed machine learning5
Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review5
Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning5
Load balancing clustering and routing for IoT‐enabled wireless sensor networks4
Leveraging Ponzi‐like designs in stablecoins4
Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks4
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning4
Autonomous Attack Mitigation Through Firewall Reconfiguration4
Massive Data HBase Storage Method for Electronic Archive Management4
Topics from networks management and operations4
Editorial for special issue on security and trust on networked systems3
Blockchain‐inspired lightweight trust‐based system in vehicular networks3
Computationally Efficient Approach for 6G‐AI‐IoT Network Slicing and Error‐Free Transmission3
A secure and light‐weight patient survival prediction in Internet of Medical Things framework3
Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files3
Issue Information3
Out‐of‐band transaction pool sync for large dynamic blockchain networks3
A Method for Sharing English Education Resources in Multiple Virtual Networks Based on 6G3
Issue Information2
MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications2
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure2
A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform2
2
2
A Fast Cross‐Chain Protocol Based on Trusted Notary Group for Metaverse2
SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things‐enabled wireless sensor networks2
An access control for IoT based on network community perception and social trust against Sybil attacks2
0.068822860717773