Journal of Network and Systems Management

Papers
(The median citation count of Journal of Network and Systems Management is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers88
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things65
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems59
Deep Learning in IoT Intrusion Detection58
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder56
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security44
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques41
Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm38
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models36
Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks35
Energy-Efficient Data Transmission and Aggregation Protocol in Periodic Sensor Networks Based Fog Computing34
Immersive Interconnected Virtual and Augmented Reality: A 5G and IoT Perspective31
QoS-DPSO: QoS-aware Task Scheduling for Cloud Computing System30
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques30
Toward a Machine Learning and Software Defined Network Approaches to Manage Miners’ Reputation in Blockchain28
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection27
Energy-Efficient Delay-Aware Task Offloading in Fog-Cloud Computing System for IoT Sensor Applications27
Service Function Chain Placement in Distributed Scenarios: A Systematic Review26
Real-Time Task Scheduling Algorithm for IoT-Based Applications in the Cloud–Fog Environment26
Bayesian Decision Network-Based Security Risk Management Framework25
Machine Learning-Based Multipath Routing for Software Defined Networks23
Service Selection Using Multi-criteria Decision Making: A Comprehensive Overview23
Distributed Network Coding-Aware Routing Protocol Incorporating Fuzzy-Logic-Based Forwarders in Wireless Ad hoc Networks21
Modified Dragonfly Algorithm for Optimal Virtual Machine Placement in Cloud Computing21
Fuzzy, Dynamic and Trust Based Routing Protocol for IoT21
A Robust Energy Optimization and Data Reduction Scheme for IoT Based Indoor Environments Using Local Processing Framework21
Improved Artificial Bee Colony Using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environments20
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)20
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach20
A Responsible Internet to Increase Trust in the Digital World19
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion19
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives18
An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing Environment18
Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks18
A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems17
Meta-heuristic Approaches for Effective Scheduling in Infrastructure as a Service Cloud: A Systematic Review17
Performance and Availability Trade-Offs in Fog–Cloud IoT Environments16
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems16
Deep Reinforcement Learning Based Active Queue Management for IoT Networks16
Big Spatial Data Management for the Internet of Things: A Survey15
Hybrid Stochastic Ranking and Opposite Differential Evolution-Based Enhanced Firefly Optimization Algorithm for Extending Network Lifetime Through Efficient Clustering in WSNs15
Cybersecurity of Smart Home Systems: Sensor Identity Protection14
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis14
Decomposition Based Cloud Resource Demand Prediction Using Extreme Learning Machines14
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture14
Detecting and Mitigating DDoS Attack in Named Data Networking13
Monte Carlo Tree Search with Last-Good-Reply Policy for Cognitive Optimization of Cloud-Ready Optical Networks12
PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDN10
Design of a Security and Trust Framework for 5G Multi-domain Scenarios10
Optimized Sampling Strategies to Model the Performance of Virtualized Network Functions10
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing10
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications10
Reliability and Survivability Analysis of Long-Term Evolution Vehicular Ad-Hoc Networks: An Analytical Approach10
ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks10
MSN: A Playground Framework for Design and Evaluation of MicroServices-Based sdN Controller10
A Two-Stream Network Based on Capsule Networks and Sliced Recurrent Neural Networks for DGA Botnet Detection10
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for a Hyperconnected World: Challenges, Applications, and Major Advancements10
Collaborative Multi-domain Routing in SDN Environments10
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning9
Resolving Load Imbalance State for SDN by Minimizing Maximum Load of Controllers9
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning9
Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks8
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data8
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT8
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network7
An Unsupervised Approach to Infer Quality of Service for Large-Scale Wireless Networking7
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV7
A Management Architecture for IoT Smart Solutions: Design and Implementation7
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions7
Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention7
PassMon: A Technique for Password Generation and Strength Estimation7
Intelligent Wireless Networks: Challenges and Future Research Topics7
Knowledge Discovery: Can It Shed New Light on Threshold Definition for Heavy-Hitter Detection?6
Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points6
On the Performance of QUIC over Wireless Mesh Networks6
SDN-Based Traffic Management Middleware for Spontaneous WMNs6
Bloccess: Enabling Fine-Grained Access Control Based on Blockchain6
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol6
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework6
A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics6
Low Latency Low Loss Media Delivery Utilizing In-Network Packet Wash6
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains6
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks6
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks5
A Multi-criteria Decision Making Approach for Scaling and Placement of Virtual Network Functions5
XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks5
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System5
ML-Based DDoS Detection and Identification Using Native Cloud Telemetry Macroscopic Monitoring5
Self-organizing Fog Support Services for Responsive Edge Computing5
Towards a Trustful Game-Theoretic Mechanism for Data Trading in the Blockchain-IoT Ecosystem5
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks5
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing5
A Holistic Framework for Virtual Network Migration to Enhance Embedding Ratios in Network Virtualization Environments5
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach5
A Novel Cooperative Micro-Caching Algorithm Based on Fuzzy Inference Through NFV in Ultra-Dense IoT Networks5
Special Issue on Cybersecurity Management in the Era of AI5
Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor5
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking5
A Cost-Aware Management Framework for Placement of Data-Intensive Applications on Federated Cloud5
MaxHadoop: An Efficient Scalable Emulation Tool to Test SDN Protocols in Emulated Hadoop Environments4
Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty Workloads4
Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning4
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes4
Solutions for the Deployment of Communication Roadside Infrastructure for Streaming Delivery in Vehicular Networks4
WebAssembly Orchestration in the Context of Serverless Computing4
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)4
Optimal Service Selection and Placement Based on Popularity and Server Load in Multi-access Edge Computing4
A Hybrid Multi-objective Algorithm for Imbalanced Controller Placement in Software-Defined Networks4
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors4
Intelligent Multi-connectivity Based Energy-Efficient Framework for Smart City4
Joint Reliability-Aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme4
An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation4
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks4
Analyzing Handover Performances of Mobility Management Protocols in Ultra-dense Networks4
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN4
Data Transfers Using Bandwidth Reservation Through Multiple Disjoint Paths of Dynamic HPNs3
Bandwidth Utilization and Management Algorithms (BUMAs) for NG-EPON3
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation3
BitMatrix: A Multipurpose Sketch for Monitoring of Multi-tenant Networks3
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON3
Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game3
A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems3
Customizable Deployment of NFV Services3
Bottleneck Detection in Cloud Computing Performance and Dependability: Sensitivity Rankings for Hierarchical Models3
Expand or Oversize? Planning Internet Access Network in a Demand Growth Scenario3
Design and Performance Evaluation of a New Traffic Engineering Technique for Software-Defined Network Datacenters3
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks3
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond3
Intelligent Secure Networking in In-band Full-duplex Dynamic Access Networks: Spectrum Management and Routing Protocol3
An Architecture for Creating Slices to Experiment on Wireless Networks3
Configurable Deployment Descriptor Model in NFV3
Enhancing the Capabilities of Mobile Backhaul: A User Plane Perspective3
A Data-driven, Multi-setpoint Model Predictive Thermal Control System for Data Centers3
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples3
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems3
An Intrusion Detection System Using Extended Kalman Filter and Neural Networks for IoT Networks3
SD-RAN Interactive Management Using In-band Network Telemetry in IEEE 802.11 Networks3
Explora-VR: Content Prefetching for Tile-Based Immersive Video Streaming Applications2
Network Virtualization and Survivability of 5G Networks2
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks2
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach2
Speedy and Efficient Service Chaining and Function Placement Based on Lagrangian Heuristics for Capacitated Shortest Path Tour Problem2
A Secure IIoT Gateway Architecture based on Trusted Execution Environments2
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions2
Peripheral Diagnosis for Propagated Network Faults2
Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme2
Improving Network Delay Predictions Using GNNs2
Joint Content-Mobility Priority Modeling for Cached Content Selection in D2D Networks2
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning2
An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks2
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory2
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity2
Towards Service and Networking Intelligence for Humanity: A Report on APNOMS 20202
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment2
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S2
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks2
A Protection System Against HTTP Flood Attacks Using Software Defined Networking2
Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System2
High Capacity and Resilient Large-Scale Deterministic IP Networks2
On the Robustness of Controlled Deep Reinforcement Learning for Slice Placement2
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks2
Energy Aware Fuzzy Approach for VNF Placement and Consolidation in Cloud Data Centers2
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm2
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks2
ALPACA: A PCI Assignment Algorithm Taking Advantage of Weighted ANR2
AAC: Adaptively Adjusting Concurrency by Exploiting Path Diversity in Datacenter Networks2
0.027042865753174