Journal of Network and Computer Applications

Papers
(The H4-Index of Journal of Network and Computer Applications is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board325
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things241
Stackelberg game-based dynamic resource trading for network slicing in 5G networks224
A cooperative image object recognition framework and task offloading optimization in edge computing197
Analysis of cryptocurrency transactions from a network perspective: An overview190
Editorial Board182
The universal federator: A third-party authentication solution to federated cloud, edge, and fog159
A dynamic spectrum access scheme for Internet of Things with improved federated learning153
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks152
Terra: Low-latency and reliable event col137
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems127
SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts124
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices104
Editorial Board103
Editorial Board103
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search102
Hardening of network segmentation using automated referential penetration testing100
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications99
Community detection in complex network based on an improved random algorithm using local and global network information99
Harnessing federated generative learning for green and sustainable Internet of Things99
Two formal design solutions for the generalization of network segmentation98
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective92
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks88
A DDoS attack detection method based on IQR and DFFCNN in SDN87
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment84
UAV assisted 5G and beyond wireless networks: A survey82
NOMA and future 5G & B5G wireless networks: A paradigm82
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities81
Holistic survey on energy aware routing techniques for IoT applications81
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS78
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks75
Intelligent energy management with IoT framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems75
Open RAN security: Challenges and opportunities72
Mobility-aware fog computing in dynamic networks with mobile nodes: A survey71
Editorial Board70
Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster situations69
Reducing cold start delay in serverless computing using lightweight virtual machines69
Backscatter communication-based wireless sensing (BBWS): Performance enhancement and future applications66
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks66
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution66
Editorial Board65
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments65
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud65
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms64
Constrained routing in multi-partite graph to solve VNF placement and chaining problem64
Label-aware learning to enhance unsupervised cross-domain rumor detection64
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps64
Efficient application mapping approach based on grey wolf optimization for network on chip63
OverShard: Scaling blockchain by full sharding with overlapping network and virtual accounts63
Holistic resource management in UAV-assisted wireless networks: An optimization perspective63
A survey on data plane programming with P4: Fundamentals, advances, and applied research62
Attenuating majority attack class bias using hybrid deep learning based IDS framework62
Computation offloading in mobile edge computing networks: A survey60
Exploring Blockchain-driven security in SDN-based IoT networks58
Editorial Board57
Editorial Board57
Knowledge reuse in edge computing environments56
AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel56
Editorial Board56
0.06497597694397