Journal of Network and Systems Management

Papers
(The H4-Index of Journal of Network and Systems Management is 22. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency124
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices119
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework81
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT80
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis79
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)74
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures58
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN42
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance42
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis42
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings39
4MIDable: Flexible Network Offloading For Security VNFs38
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm38
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON36
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions33
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment32
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework30
One Class Density Estimation Approach for Fault Detection and Rootcause Analysis in Computer Networks26
Smart Hospital Patient Monitoring System Aided by Edge-Fog-Cloud Continuum: A Performability Evaluation Focusing on Distinct Sensor Sources26
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)25
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture24
Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing22
0.054994821548462