International Journal of Network Management

Papers
(The TQCC of International Journal of Network Management is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture32
19
REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation15
Lightweight Flow‐Based Policy Enforcement for SDN‐Based Multi‐Domain Communication14
ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing13
SentinelGuard Pro: Deploying Cutting‐Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents13
Workload prediction based on improved error correlation logistic regression algorithm and Cross‐TRCN of spatiotemporal neural network13
Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things13
A secure cross‐organizational container deployment approach to enable ad hoc collaborations12
11
Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases11
Load balancing clustering and routing for IoT‐enabled wireless sensor networks10
Placement of virtual network functions for network services9
Truthful Decentralized Blockchain Oracles9
Leveraging Ponzi‐like designs in stablecoins7
Issue Information7
A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation7
vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH7
7
An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures6
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation6
Duo‐H: An Effectual Consensus Algorithm Using Two‐Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection6
Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment6
Transaction fee mechanisms with farsighted miners5
A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment5
Security, Privacy, and Trust Management on Decentralized Systems and Networks5
Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing5
An optimal hybrid cascade regional convolutional network for cyberattack detection5
On minimizing flow monitoring costs in large‐scale software‐defined network networks5
Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles4
Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios4
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges4
SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time‐Sensitive Networks4
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing4
Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture4
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack4
Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system3
An Adaptive Routing Architecture for IoT Multipath Video Transmission3
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning3
Issue Information3
Issue Information3
IGXSS: XSS payload detection model based on inductive GCN3
Issue Information3
3
Characterizing the Bitcoin network topology with Node‐Probe3
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network3
Denial of service detection using dynamic time warping3
Issue Information3
Issue Information2
2
Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis2
E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks2
2
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study2
Reducing the propagation delay of compact block in Bitcoin network2
A blockchain‐enabled security management framework for mobile edge computing2
Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 “Advancing Blockchain and Cryptocurrency”2
0.080648899078369