Journal of Network and Systems Management

Papers
(The median citation count of Journal of Network and Systems Management is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency134
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework127
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis99
4MIDable: Flexible Network Offloading For Security VNFs87
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN86
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis82
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings63
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment58
Deterministic Scheduling of Periodic Messages for Low Latency in Cloud RAN48
A Novel Wavelet-Based Model For Android Malware Detection Utilizing System Calls Features47
RLSK_US: An Improved Dynamic Virtual Machine Consolidation Model to Optimize Energy and SLA Violations in Cloud Datacenter44
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON43
Flow Migration for Service Function Chains: Correctness Criteria and Their Relaxation43
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance41
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)39
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework35
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions35
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT32
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures30
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm27
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices27
One Class Density Estimation Approach for Fault Detection and Rootcause Analysis in Computer Networks25
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)20
Smart Hospital Patient Monitoring System Aided by Edge-Fog-Cloud Continuum: A Performability Evaluation Focusing on Distinct Sensor Sources19
ARP Overhead Reduction Framework for Software Defined Data Centers19
Correction to: Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN19
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory18
Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing17
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services17
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture17
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications16
A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications16
Deployment of Future Services in a Multi-access Edge Computing Environment Using Intelligence at the Edge16
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams16
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning16
CNS-AOM: Design, Implementation and Integration of an Architecture for Orchestration and Management of Cloud-Network Slices15
QoE Evaluation in Adaptive Streaming: Enhanced MDT with Deep Learning15
A Hybrid Heuristic Task Offloading Algorithm in Mobile Edge Computing for Joint Optimization of Delay and Energy Consumption14
Optimizing Completion Time of Requests in Serverless Computing14
X-CLNN: A Hybrid Neural Network-Based Approach Combining CNN and RNN for Communication Services Classification14
LogAnomEX: An Unsupervised Log Anomaly Detection Method Based on Electra-DP and Gated Bilinear Neural Networks14
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN14
SDBlock-IoT: A Blockchain-Enabled Software-Defined Multicontroller Architecture to Safeguard OpenFlow Tables14
Responsible Workload Sequence Anomaly Detection with Bi-View Feature Fusion13
Enabling RPL on the Internet of Underwater Things13
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks13
An Adaptable and Agnostic Flow Scheduling Approach for Data Center Networks13
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives13
Distributed Maximum Utility Task Offloading for Delay-Sensitive IoT Applications in Cloud and Edge Computing12
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking12
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring12
An Efficient and Decentralized Fuzzy Reinforcement Learning Bandwidth Controller for Multitenant Data Centers12
PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks12
Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach11
Distributed AgriFood Supply Chains11
Policy-Gradient-Based Reinforcement Learning for Maximizing Operator’s Profit in Open-RAN11
A Survey on the Optimization of Security Components Placement in Internet of Things11
A Management Architecture for IoT Smart Solutions: Design and Implementation10
PassMon: A Technique for Password Generation and Strength Estimation10
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency10
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory10
A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach10
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques10
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks10
Customizable Mapping of Virtualized Network Services in Multi-datacenter Environments Based on Genetic Metaheuristics10
Explora-VR: Content Prefetching for Tile-Based Immersive Video Streaming Applications10
On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events10
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding10
Effect of Messaging Model on the Reliable Data Transfer Latency in a Fog System10
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond9
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV9
Efficient Task Allocation in Data Center Environments Based on Information Theory9
Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme9
Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN9
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review9
Link State Estimator for VANETs Using Neural Networks9
Dynamic Microservice Provisioning in 5G Networks Using Edge–Cloud Continuum9
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems8
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency8
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks8
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach7
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework7
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks7
A Load Balancing Strategy Based on Fuzzy Satisfaction Among Multiple Controllers in Software-Defined Networking7
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach7
SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks7
BoostSec: Adaptive Attack Detection for Vehicular Networks7
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks7
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach7
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm7
SynFloWatch: An Entropy-Based Live Defense System against SYN Spoofing DDoS Attacks in Hybrid SDN7
Energy Aware Fuzzy Approach for VNF Placement and Consolidation in Cloud Data Centers7
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment6
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)6
Novel Statistical Modelling and Optimization Techniques of Fading Channel Coefficients for 5G Network Performance6
A Framework for Dynamic Configuration of TLS Connections Based on Standards6
Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit6
ATENA: Adaptive TEchniques for Network Area Coverage and Routing in IoT-Based Edge Computing6
MLP-Based Intrusion Detection for Securing IoT Networks6
Special Issue on Cybersecurity Management in the Era of AI6
Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism6
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes6
A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments6
Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks6
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks6
Deep Learning in IoT Intrusion Detection5
A Multi-criteria Decision Making Approach for Scaling and Placement of Virtual Network Functions5
Flexible RAN Slicing for Mobile Wireless Networks5
A WAN Infrastructure Manager Prototype for QoS-based Multi-Site SDN-Enabled NFV Orchestration5
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks5
Hi-SAM: A High-Scalable Authentication Model for Satellite-Ground Zero-Trust System Using Mean Field Game5
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing5
Optimizing Network and Systems Management for Fraud Detection: A High-Performance Approach Using Random Light Gradient-Based CatBoost Ensemble with Enhanced Gold Rush Algorithm5
Provisioning Load Balancing in Time-Sensitive Task Allocation for Mobile Crowdsensing5
Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm5
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game5
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels5
Long Boosted Memory Algorithm for Intelligent Spectrum Sensing in 5G and Beyond Systems5
On the Deployment Problem of Multiple Drones in Millimeter Wave Systems5
Performance Analysis of the Multi-connection Tactile Internet Protocol over 5G5
An Edge Cloud Based Coordination Platform for Multi-user AR Applications5
MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things5
DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic Algorithms5
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches5
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks4
ALPACA: A PCI Assignment Algorithm Taking Advantage of Weighted ANR4
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion4
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling4
A Secure IIoT Gateway Architecture based on Trusted Execution Environments4
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection4
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree4
Overcoming Real-World IoT Deployment Challenges with Enhanced Fuzzy Logic Decision Algorithms4
Fault Tolerance and Failure Recovery Techniques in Software-Defined Networking: A Comprehensive Approach4
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation4
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks4
RiskNet: Neural Risk Assessment in Networks of Unreliable Resources4
Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa4
Towards Resource-Efficient DDoS Detection in IoT: Leveraging Feature Engineering of System and Network Usage Metrics4
Proactive Fault-Recovery on Distributed Software-Defined Network Controllers4
Mitigating DoS Attack in MANETs Considering Node Reputation with AI4
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks4
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites4
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis4
On the Robustness of Controlled Deep Reinforcement Learning for Slice Placement4
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble4
Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach4
Cybersecurity Via Programmable Networks: Are We There Yet?3
FL-DBA: Fuzzy Logic Based Dynamic Bandwidth Allocation Algorithm for Next Generation Passive Optical Network3
Federated RNN for Intrusion Detection System in IoT Environment Under Adversarial Attack3
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion3
A Hybrid Biologically-Inspired Optimization Algorithm for Data Gathering in IoT Sensor Networks3
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing3
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks3
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples3
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition3
A Performance Evaluation of Neural Networks for Botnet Detection in the Internet of Things3
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems3
Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain3
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions3
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios3
Service Function Chain Placement in Distributed Scenarios: A Systematic Review3
PDRAS: Priority-Based Dynamic Resource Allocation Scheme in 5G Network Slicing3
High Capacity and Resilient Large-Scale Deterministic IP Networks3
Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System3
A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics3
Load Balancing With Proactive Traffic Separation in Data Center Network3
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks3
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach3
Performance Evaluation of Cloud Native Applications: A Systematic Mapping Study3
Correction to: Joint Reliability-Aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme3
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning3
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)3
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol3
Balancing Act: Navigating Control and Data Plane Responsibilities for Fast Operation in Programmable Networks3
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks3
Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty Workloads3
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data3
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks3
A Novel Light Reflection-Random Walk for Smart Sensors Relocation2
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment2
Improving the Resource Efficiency in Massive MIMO-NOMA Systems2
A Blackout Aware Handover Mechanism for Ultra Dense Networks2
Optimizing Drone Deployment for Maximized User Connectivity in Areas of Interest Via Deep Reinforcement Learning2
DIFT: A Diffusion-Transformer for Intrusion Detection of IoT with Imbalanced Learning2
NS-ENFORCER: Enforcing Network Slicing on Radio Access Networks2
Employing Federated Semi-supervised Learning for Network Traffic Classification2
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring2
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization2
A Novel Mathematical Model with Fairness Constraints for Uninterrupted Network Coverage in Disasters2
A Novel Framework for Integrating Blockchain-Driven Federated Learning with Neural Networks in E-Commerce2
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations2
Enhancing Cloud Gaming QoE Estimation by Stacking Learning2
ConfExp: Root-Cause Analysis of Service Misconfigurations in Enterprise Systems2
A Workflow for Synthetic Biometric in-Edge Data Generation using GAN based models2
Hardware-Accelerated Edge AI Orchestration on the Multi-Tier Edge-to-Cloud Continuum2
High-Precision, Predictable and Low-Latency Networking2
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges2
An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain2
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster2
Enabling the Rescheduling of Containerized Workloads in an Ad Hoc Cross-Organizational Collaboration2
Asynchronous Time-Aware Shaper for Time-Sensitive Networking2
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity2
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach2
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks2
Cost-Sensitive Detection of DoS Attacks in Automotive Cybersecurity Using Artificial Neural Networks and CatBoost2
Innovative Fitness Functions for Robust Energy Management in WSNs2
AI-Based Intrusion Detection for a Secure Internet of Things (IoT)2
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing2
Joint Policy for Virtual Network Embedding in Distributed SDN-Enabled Cloud2
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning2
A Game Theoretic Framework for Distributed Mission Slice Allocation and Management for Tactical Networks2
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems2
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation2
0.024600028991699