Journal of Network and Computer Applications

Papers
(The median citation count of Journal of Network and Computer Applications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Editorial Board302
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things255
Editorial Board223
The universal federator: A third-party authentication solution to federated cloud, edge, and fog209
SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts182
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks180
Stackelberg game-based dynamic resource trading for network slicing in 5G networks177
Terra: Low-latency and reliable event col155
A cooperative image object recognition framework and task offloading optimization in edge computing149
Analysis of cryptocurrency transactions from a network perspective: An overview143
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems124
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices114
Editorial Board112
Editorial Board101
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks100
Service migration in multi-access edge computing: A joint state adaptation and reinforcement learning mechanism95
Intelligent energy management with IoT framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems95
Two formal design solutions for the generalization of network segmentation94
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications93
Hardening of network segmentation using automated referential penetration testing93
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search92
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective88
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks85
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS83
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities82
Open RAN security: Challenges and opportunities79
Mobility-aware fog computing in dynamic networks with mobile nodes: A survey79
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment78
UAV assisted 5G and beyond wireless networks: A survey77
Holistic survey on energy aware routing techniques for IoT applications75
Community detection in complex network based on an improved random algorithm using local and global network information73
Harnessing federated generative learning for green and sustainable Internet of Things72
NOMA and future 5G & B5G wireless networks: A paradigm69
Reducing cold start delay in serverless computing using lightweight virtual machines67
Editorial Board67
Editorial Board65
Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster situations65
OverShard: Scaling blockchain by full sharding with overlapping network and virtual accounts65
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud64
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution63
Efficient application mapping approach based on grey wolf optimization for network on chip63
Backscatter communication-based wireless sensing (BBWS): Performance enhancement and future applications63
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks63
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms62
Holistic resource management in UAV-assisted wireless networks: An optimization perspective62
Label-aware learning to enhance unsupervised cross-domain rumor detection62
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps61
Exploring Blockchain-driven security in SDN-based IoT networks61
Attenuating majority attack class bias using hybrid deep learning based IDS framework60
Constrained routing in multi-partite graph to solve VNF placement and chaining problem60
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments58
A survey on data plane programming with P4: Fundamentals, advances, and applied research57
Editorial Board57
Computation offloading in mobile edge computing networks: A survey57
Editorial Board56
FlexMon: A flexible and fine-grained traffic monitor for programmable networks56
AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel55
Editorial Board55
Knowledge reuse in edge computing environments55
Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC53
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features51
A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems49
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities49
Data reconstruction applications for IoT air pollution sensor networks using graph signal processing49
Deep Reinforcement Learning based reliable spectrum sensing under SSDF attacks in Cognitive Radio networks48
Device and network driven cellular networks architecture and mobility management technique for fog computing-based mobile communication system47
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems46
Editorial Board45
An online service provisioning strategy for container-based cloud brokers44
Optimizing the quality of information of networked machine learning agents44
Fog radio access network optimization for 5G leveraging user mobility and traffic data43
Proactive fault-tolerant wireless mesh networks for mission-critical control systems41
An online bi-objective scheduling algorithm for service provisioning in cloud computing41
A bargain game theory assisted interest packet forwarding strategy for information centric network39
Comprehensive review on congestion detection, alleviation, and control for IoT networks39
Network Coding-based Resilient Routing for Maintaining Data Security and Availability in Software-Defined Networks39
Efficient privacy-preserving ML for IoT: Cluster-based split federated learning scheme for non-IID data38
A review of graph-powered data quality applications for IoT monitoring sensor networks38
Quality-aware multi-task allocation based on location importance in mobile crowdsensing38
Enhancement of cellular networks via an improved clustering technique with D2D communication for mission-critical applications37
Intelligent aerial video streaming: Achievements and challenges36
Socially-aware and energy-efficient resource allocation and power control for D2D multicast content distribution36
ELA-RCP: An energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks36
A state lossless scheduling strategy in distributed stream computing systems34
Attacks and defenses in user authentication systems: A survey33
Towards DDoS detection mechanisms in Software-Defined Networking33
Survey of prominent blockchain development platforms33
EBDL: Effective blockchain-based covert storage channel with dynamic labels32
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems31
A systematic review of blockchain scalability: Issues, solutions, analysis and future research31
A lightweight SEL for attack detection in IoT/IIoT networks31
Broadcast/multicast delivery integration in B5G/6G environments30
Design, implementation, and performance evaluation of an earliest-deadline-first packet scheduling scheme in P4 hardware switches30
RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments30
Firm social management system for supporting IoT users in application environment30
Skin lesion classification using modified deep and multi-directional invariant handcrafted features30
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study30
Editorial Board29
Editorial Board29
Controller load optimization strategies in Software-Defined Networking: A survey29
Device-to-device communication in 5G heterogeneous network based on game-theoretic approaches: A comprehensive survey27
Privacy protection among three antithetic-parties for context-aware services26
A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning26
A novel secure and distributed architecture for privacy-preserving healthcare system26
DQN-based intelligent controller for multiple edge domains26
Energy-efficient hierarchical dynamic depth adjustment routing protocol for UWSN with distributed sink mobility and semantic self-healing26
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications25
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey25
CPS: Cross-interface network Partitioning and Scheduling towards QoS-aware data flow delivery in multimedia IoT25
Unfolding the blockchain era: Timeline, evolution, types and real-world applications25
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks25
MUSE: MUlti-lead Sub-beat ECG for remote AI based atrial fibrillation detection25
A survey on security issues in IoT operating systems25
AI-enhanced blockchain technology: A review of advancements and opportunities24
Data transmission reduction using prediction and aggregation techniques in IoT-based wireless sensor networks24
Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection23
Neglected infrastructures for 6G—Underwater communications: How mature are they?23
End-to-end active queue management with Named-Data Networking23
Efficient congestion control scheme based on caching strategy in NDN23
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network23
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks23
Learned Bloom-filter for the efficient name lookup in Information-Centric Networking23
Node cooperation for workload offloading in a fog computing network via multi-objective optimization23
Editorial Board23
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N23
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm22
Editorial Board22
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method22
Evolving techniques in cyber threat hunting: A systematic review22
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model22
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications22
TD-RA policy-enforcement framework for an SDN-based IoT architecture21
A Contextual Multi-Armed Bandit approach for NDN forwarding21
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments21
Hierarchical community discovery for multi-stage IP bearer network upgradation21
DIMY: Enabling privacy-preserving contact tracing21
REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks21
Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN21
A survey of privacy-preserving offloading methods in mobile-edge computing20
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal20
A survey of longitudinal changes in cellular network architecture: The good, the bad, and the ugly20
DAPNEML: Disease-diet associations prediction in a NEtwork using a machine learning based approach20
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting20
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions19
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions19
Mobile cloud computing models security issues: A systematic review19
An open-source implementation and validation of 5G NR configured grant for URLLC in ns-3 5G LENA: A scheduling case study in industry 4.0 scenarios19
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey19
A progressive learning method on unknown protocol behaviors19
Security and privacy of industrial big data: Motivation, opportunities, and challenges19
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions19
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution19
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues19
Preemptive admission control mechanism for strict QoS guarantee to life-saving emergency traffic in wireless LANs19
A comprehensive survey on channel hopping and scheduling enhancements for TSCH networks18
A deep density based and self-determining clustering approach to label unknown traffic18
Low load DIDS task scheduling based on Q-learning in edge computing environment18
Dynamic resource management in integrated NOMA terrestrial–satellite networks using multi-agent reinforcement learning18
Enhanced multi-objective gorilla troops optimizer for real-time multi-user dependent tasks offloading in edge-cloud computing17
Anomalous state detection in radio access networks: A proof-of-concept17
Artificial Intelligence of Things (AIoT) for smart agriculture: A review of architectures, technologies and solutions17
Multi-Batches Revenue Maximization for competitive products over online social network17
Exploiting web content semantic features to detect web robots from weblogs17
A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks17
Exploring an edge convolution and normalization based approach for link prediction in complex networks17
A systematic review of federated learning: Challenges, aggregation methods, and development tools16
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges16
Community Detection method based on Random walk and Multi objective Evolutionary algorithm in complex networks16
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network16
Editorial Board16
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks16
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues16
Editorial Board16
PMP: A partition-match parallel mechanism for DNN inference acceleration in cloud–edge collaborative environments15
Red Deer Algorithm based nano-sensor node clustering for IoNT15
PRISM: PSI and Voronoi diagram based Automated Exposure Notification with location privacy15
MW3F: Improved multi-tab website fingerprinting attacks with Transformer-based feature fusion15
Flow control oriented forwarding and caching in cache-enabled networks15
BLIND: A privacy preserving truth discovery system for mobile crowdsensing15
A Survey of Channel Modeling Techniques for Visible Light Communications15
A slotted random request scheme for connectionless data transmission in bluetooth low energy 5.015
Designing transport scheme of 3D naked-eye system15
Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach15
Early Prevention and Mitigation of Link Flooding Attacks in Software Defined Networks14
Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions14
Enhanced detection of imbalanced malicious network traffic with regularized Generative Adversarial Networks14
A survey on essential challenges in relay-aided D2D communication for next-generation cellular networks14
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions14
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things14
Performance enhancement of artificial intelligence: A survey14
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain14
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs13
RL-based HTTP adaptive streaming with edge collaboration in multi-client environment13
Editorial Board13
Enhanced detection of low-rate DDoS attack patterns using machine learning models13
Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things13
An efficient and cost effective application mapping for network-on-chip using Andean condor algorithm13
Secured location-aware mobility-enabled RPL13
Multi-level video quality services and security guarantees based on compressive sensing in sensor-cloud system13
Server load estimation by Burr distribution mixture analysis of TCP SYN response time13
Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation12
GROM: A generalized routing optimization method with graph neural network and deep reinforcement learning12
The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap12
A holistic survey of multipath wireless video streaming12
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation12
Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey12
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network12
A low-storage synchronization framework for blockchain systems12
Blockchain-based key management system in Named Data Networking: A survey12
Efficient stochastic scheduling for highly complex resource placement in edge clouds12
Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments12
A survey on the role of Internet of Things for adopting and promoting Agriculture 4.012
Book review12
Split PO for paging in B5G networks11
Time-efficient distributed virtual network embedding for round-trip delay minimization11
Complex networks for Smart environments management11
Node and relevant data selection in distributed predictive analytics: A query-centric approach11
SDN-based wireless mobile backhaul architecture: Review and challenges11
PriFoB: A Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification11
FRRL: A reinforcement learning approach for link failure recovery in a hybrid SDN11
Editorial Board11
Heuristic and approximate Steiner tree algorithms for ensuring network connectivity in mobile wireless sensor networks11
Boundary node detection in wireless networks with uneven node distribution on open surfaces11
TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces11
Autonomous valet parking optimization with two-step reservation and pricing strategy11
Heterogeneous graph representation learning via mutual information estimation for fraud detection11
Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing10
Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection10
Consensus hybrid ensemble machine learning for intrusion detection with explainable AI10
BAS-NDN: BlockChain based mobile producer authentication scheme for Named Data Networking10
Defeating deep learning based de-anonymization attacks with adversarial example10
Optimizing federated learning with weighted aggregation in aerial and space networks10
Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions10
A survey of state-of-the-art sharding blockchains: Models, components, and attack surfaces10
Blockchain-inspired intelligent framework for logistic theft control10
Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station10
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables10
A zero trust and blockchain-based defense model for smart electric vehicle chargers10
A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning10
Region-aware dynamic job scheduling and resource efficiency for load balancing based on adaptive chaotic sparrow search optimization and coalitional game in cloud computing environments10
Cost optimization of omnidirectional offloading in two-tier cloud–edge federated systems10
Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems10
Editorial Board9
SafeCoder: A machine-learning-based encoding system to embed safety identification information into QR codes9
Video streaming over IoV using IP multicast9
Modular zk-rollup on-demand9
Traffic flow control using multi-agent reinforcement learning9
Multi-neural network based tiled 360°video caching with Mobile Edge Computing9
A survey on security challenges and solutions in the IOTA9
Caching transient data in Information-Centric Internet-of-Things (IC-IoT) networks: A survey9
0.051229953765869