Journal of Network and Systems Management

Papers
(The H4-Index of Journal of Network and Systems Management is 20. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency122
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)92
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices77
Flow Migration for Service Function Chains: Correctness Criteria and Their Relaxation74
Defense-in-Depth and Machine Learning-Based Intrusion Detection for Industrial Control Systems56
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis54
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures54
Deterministic Scheduling of Periodic Messages for Low Latency in Cloud RAN50
A Novel Wavelet-Based Model For Android Malware Detection Utilizing System Calls Features48
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings40
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT37
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework36
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN36
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment34
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis32
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm32
4MIDable: Flexible Network Offloading For Security VNFs28
RLSK_US: An Improved Dynamic Virtual Machine Consolidation Model to Optimize Energy and SLA Violations in Cloud Datacenter24
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions24
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance22
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework20
0.36341881752014