Journal of Network and Computer Applications

Papers
(The H4-Index of Journal of Network and Computer Applications is 51. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things278
Editorial Board256
SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts230
A profit-effective function service pricing approach for serverless edge computing function offloading186
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks174
C-PFL: A committee-based personalized federated learning framework143
Editorial Board141
The universal federator: A third-party authentication solution to federated cloud, edge, and fog130
Terra: Low-latency and reliable event col129
A cooperative image object recognition framework and task offloading optimization in edge computing125
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems124
Enhancement and optimization of FlexE technology within metro transport networks121
Performance modelling and optimal stage assignment for multistage P4 switches112
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices111
Stackelberg game-based dynamic resource trading for network slicing in 5G networks108
Securing edge based smart city networks with software defined Networking and zero trust architecture108
A dynamic spectrum access scheme for Internet of Things with improved federated learning108
Editorial Board103
Editorial Board99
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications94
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective91
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search90
Hardening of network segmentation using automated referential penetration testing89
Two formal design solutions for the generalization of network segmentation86
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks84
A gateway-assisted blockchain-based authentication scheme for internet-of-things83
Integrated probabilistic clustering and Deep Reinforcement Learning for bias mitigation and device heterogeneity of Federated Learning in edge networks80
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks78
Holistic survey on energy aware routing techniques for IoT applications77
Intelligent energy management with IoT framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems76
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS76
Community detection in complex network based on an improved random algorithm using local and global network information76
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment75
NOMA and future 5G & B5G wireless networks: A paradigm72
Mobility-aware fog computing in dynamic networks with mobile nodes: A survey72
Harnessing federated generative learning for green and sustainable Internet of Things69
A DDoS attack detection method based on IQR and DFFCNN in SDN68
Editorial Board67
Open RAN security: Challenges and opportunities67
Intelligent routing optimization for SDN based on PPO and GNN66
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments64
SAKA: Scalable authentication and key agreement scheme with configurable key evolution in edge-fog-multicloud computing environments64
Efficient application mapping approach based on grey wolf optimization for network on chip60
Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster situations60
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution57
Label-aware learning to enhance unsupervised cross-domain rumor detection55
Constrained routing in multi-partite graph to solve VNF placement and chaining problem54
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps54
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks53
OverShard: Scaling blockchain by full sharding with overlapping network and virtual accounts52
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms51
0.078150033950806