Journal of Network and Computer Applications

Papers
(The H4-Index of Journal of Network and Computer Applications is 54. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication280
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things240
Efficient congestion control scheme based on caching strategy in NDN203
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things203
CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks190
A review on trust management in fog/edge computing: Techniques, trends, and challenges170
Editorial Board162
Editorial Board160
Editorial Board160
Stackelberg game-based dynamic resource trading for network slicing in 5G networks145
Editorial Board140
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks140
Tracing footprints of anti-forensics and assuring secured data transmission in the cloud using an effective ECCDH and Kalman Filter116
Editorial Board115
Editorial Board113
On the scalability of Big Data Cyber Security Analytics systems105
Editorial Board105
Editorial Board96
Video streaming over IoV using IP multicast92
MCTE-RPL: A multi-context trust-based efficient RPL for IoT90
A survey on security challenges and solutions in the IOTA90
An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols88
A survey of data mining methodologies in the environment of IoT and its variants88
Terra: Low-latency and reliable event col87
A survey of contemporary open-source honeypots, frameworks, and tools87
A flexible algorithm to offload DAG applications for edge computing85
Node cooperation for workload offloading in a fog computing network via multi-objective optimization77
A radio map self-updating algorithm based on mobile crowd sensing77
Nefis: A network coding based flexible device-to-device video streaming scheme75
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains75
Network slicing in virtualized 5G Core with VNF sharing74
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices73
Efficient regular expression matching over hybrid dictionary-based compressed data72
Mobility-Aware Registry Migration for Containerized Applications on Edge Computing Infrastructures72
Blockchain-based delegated Quantum Cloud architecture for medical big data security71
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic70
Trust-minimized optimistic cross-rollup arbitrary message bridge69
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network66
Blockchain based crowdsourcing framework for Vehicle-to-Vehicle charging63
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions62
Learned Bloom-filter for the efficient name lookup in Information-Centric Networking60
Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station60
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain59
CL-AP2: A compo59
SafeCoder: A machine-learning-based encoding system to embed safety identification information into QR codes58
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques58
STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning58
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey58
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems57
Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems57
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N56
A cooperative image object recognition framework and task offloading optimization in edge computing56
Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey56
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs54
Multi-neural network based tiled 360°video caching with Mobile Edge Computing54
0.17497801780701