Journal of Network and Systems Management

Papers
(The TQCC of Journal of Network and Systems Management is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings114
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach109
4MIDable: Flexible Network Offloading For Security VNFs73
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN73
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks70
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures65
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion55
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis48
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance44
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework40
Empirical Evaluation of QUIC-Based Software-Defined Service Migration in Multi-access Edge Computing Over 5G Networks39
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems38
Empowering Microservices: A Deep Dive into Intelligent Application Component Placement for Optimal Response Time36
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency33
Securing Software-Defined Networks Through Adaptive Moving Target Defense Capabilities32
Fault Tolerance and Failure Recovery Techniques in Software-Defined Networking: A Comprehensive Approach30
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems28
Enabling Organizations to Participate in the Ad Hoc Scheduling of a Cross-Organizational Data Pipeline26
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency26
Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment25
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations25
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing24
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)23
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm22
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions20
Mitigating DoS Attack in MANETs Considering Node Reputation with AI20
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework18
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis17
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks16
A Performance Evaluation of Neural Networks for Botnet Detection in the Internet of Things15
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN15
A Load Balancing Strategy Based on Fuzzy Satisfaction Among Multiple Controllers in Software-Defined Networking15
DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic Algorithms15
Towards a Trustful Game-Theoretic Mechanism for Data Trading in the Blockchain-IoT Ecosystem12
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT12
An Algorithm to Speed up Network Recovery Fault Point Estimation and Recovery Action Recommendation12
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks11
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond11
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks11
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON11
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution11
Networking Data and Intelligent Management in the Post-COVID19 Era: A Report on APNOMS 202110
ALPACA: A PCI Assignment Algorithm Taking Advantage of Weighted ANR10
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites10
Virtual Network Function Development for NG-PON Access Network Architecture10
Online Dynamic Container Rescheduling for Improved Application Service Time10
Dynamic Multi-Method Allocation for Intent-based Security Orchestration10
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions10
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment10
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization10
Design of a Security and Trust Framework for 5G Multi-domain Scenarios9
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S9
Cloud-Native Placement Strategies of Service Function Chains with Dependencies9
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques9
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks9
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices9
A Study of Costs and Benefits of Content Sharing in Personal Cloud Storage9
Intelligent Wireless Networks: Challenges and Future Research Topics9
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks9
Random Point Evolution-Based Heuristic for Resource Efficiency in OCDMA Networks9
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis8
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data8
A Novel Mathematical Model with Fairness Constraints for Uninterrupted Network Coverage in Disasters8
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach8
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory8
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples8
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems8
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game8
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)8
A Novel Light Reflection-Random Walk for Smart Sensors Relocation7
Resolving Load Imbalance State for SDN by Minimizing Maximum Load of Controllers7
Leveraging Multi-rate Multicast for Content Caching and Transmission Rate Allocation in Cache-Enabled Networks7
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning7
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation7
Design and Performance Evaluation of a New Traffic Engineering Technique for Software-Defined Network Datacenters7
SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks6
Overcoming Real-World IoT Deployment Challenges with Enhanced Fuzzy Logic Decision Algorithms6
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment6
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity6
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis6
Preprocessing-Based Approach for Prompt Intrusion Detection in SDN Networks6
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services6
Deployment of Future Services in a Multi-access Edge Computing Environment Using Intelligence at the Edge6
Improving VANET Data Dissemination Efficiency with Deep Neural Networks6
0.84982705116272