Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 16. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-07-01 to 2025-07-01.)
ArticleCitations
Editorial Board316
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things261
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices234
Editorial Board215
The universal federator: A third-party authentication solution to federated cloud, edge, and fog187
A dynamic spectrum access scheme for Internet of Things with improved federated learning186
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks179
Stackelberg game-based dynamic resource trading for network slicing in 5G networks158
Terra: Low-latency and reliable event col151
A cooperative image object recognition framework and task offloading optimization in edge computing147
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems127
Analysis of cryptocurrency transactions from a network perspective: An overview122
SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts117
Editorial Board102
Editorial Board99
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks99
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications97
Hardening of network segmentation using automated referential penetration testing97
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search97
Mobility-aware fog computing in dynamic networks with mobile nodes: A survey95
Harnessing federated generative learning for green and sustainable Internet of Things94
Community detection in complex network based on an improved random algorithm using local and global network information94
Intelligent energy management with IoT framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems88
UAV assisted 5G and beyond wireless networks: A survey86
Two formal design solutions for the generalization of network segmentation84
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks80
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective80
Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment80
NOMA and future 5G & B5G wireless networks: A paradigm78
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS77
Holistic survey on energy aware routing techniques for IoT applications74
Open RAN security: Challenges and opportunities72
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities72
Editorial Board70
Reducing cold start delay in serverless computing using lightweight virtual machines69
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud69
Efficient application mapping approach based on grey wolf optimization for network on chip68
Editorial Board68
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments66
Backscatter communication-based wireless sensing (BBWS): Performance enhancement and future applications65
Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster situations65
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks64
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution64
Label-aware learning to enhance unsupervised cross-domain rumor detection63
Intelligent routing optimization for SDN based on PPO and GNN62
Constrained routing in multi-partite graph to solve VNF placement and chaining problem62
OverShard: Scaling blockchain by full sharding with overlapping network and virtual accounts62
A systematic review on energy efficiency in the internet of underwater things (IoUT): Recent approaches and research gaps62
Holistic resource management in UAV-assisted wireless networks: An optimization perspective61
A survey on data plane programming with P4: Fundamentals, advances, and applied research61
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms61
Exploring Blockchain-driven security in SDN-based IoT networks60
Attenuating majority attack class bias using hybrid deep learning based IDS framework60
Editorial Board58
Computation offloading in mobile edge computing networks: A survey58
Editorial Board57
Editorial Board57
AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel56
Knowledge reuse in edge computing environments55
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems53
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features53
Data reconstruction applications for IoT air pollution sensor networks using graph signal processing53
Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC53
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities51
Device and network driven cellular networks architecture and mobility management technique for fog computing-based mobile communication system50
FlexMon: A flexible and fine-grained traffic monitor for programmable networks49
A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems48
Deep Reinforcement Learning based reliable spectrum sensing under SSDF attacks in Cognitive Radio networks46
Editorial Board45
Optimizing the quality of information of networked machine learning agents44
An online service provisioning strategy for container-based cloud brokers43
Network Coding-based Resilient Routing for Maintaining Data Security and Availability in Software-Defined Networks41
Proactive fault-tolerant wireless mesh networks for mission-critical control systems41
Enhancement of cellular networks via an improved clustering technique with D2D communication for mission-critical applications40
A bargain game theory assisted interest packet forwarding strategy for information centric network40
Intelligent aerial video streaming: Achievements and challenges39
Socially-aware and energy-efficient resource allocation and power control for D2D multicast content distribution38
A state lossless scheduling strategy in distributed stream computing systems38
A review of graph-powered data quality applications for IoT monitoring sensor networks38
Quality-aware multi-task allocation based on location importance in mobile crowdsensing37
RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems36
An online bi-objective scheduling algorithm for service provisioning in cloud computing36
EBDL: Effective blockchain-based covert storage channel with dynamic labels35
Fog radio access network optimization for 5G leveraging user mobility and traffic data34
Towards DDoS detection mechanisms in Software-Defined Networking34
ELA-RCP: An energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks34
A systematic review of blockchain scalability: Issues, solutions, analysis and future research33
Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study32
A lightweight SEL for attack detection in IoT/IIoT networks32
Survey of prominent blockchain development platforms31
Attacks and defenses in user authentication systems: A survey31
Comprehensive review on congestion detection, alleviation, and control for IoT networks31
Skin lesion classification using modified deep and multi-directional invariant handcrafted features30
Design, implementation, and performance evaluation of an earliest-deadline-first packet scheduling scheme in P4 hardware switches30
Broadcast/multicast delivery integration in B5G/6G environments30
RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments30
Efficient privacy-preserving ML for IoT: Cluster-based split federated learning scheme for non-IID data30
Editorial Board29
Editorial Board29
Controller load optimization strategies in Software-Defined Networking: A survey28
Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications28
Device-to-device communication in 5G heterogeneous network based on game-theoretic approaches: A comprehensive survey28
Firm social management system for supporting IoT users in application environment27
Data transmission reduction using prediction and aggregation techniques in IoT-based wireless sensor networks27
Energy-efficient hierarchical dynamic depth adjustment routing protocol for UWSN with distributed sink mobility and semantic self-healing27
A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning27
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey27
A survey on security issues in IoT operating systems27
Unfolding the blockchain era: Timeline, evolution, types and real-world applications26
CPS: Cross-interface network Partitioning and Scheduling towards QoS-aware data flow delivery in multimedia IoT26
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks26
MUSE: MUlti-lead Sub-beat ECG for remote AI based atrial fibrillation detection26
AI-enhanced blockchain technology: A review of advancements and opportunities25
Editorial Board25
A novel secure and distributed architecture for privacy-preserving healthcare system25
Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection25
End-to-end active queue management with Named-Data Networking25
DQN-based intelligent controller for multiple edge domains25
Privacy protection among three antithetic-parties for context-aware services25
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks25
ParallelC-Store: A committee structure-based reliable parallel storage mechanism for permissioned blockchain sharding24
Learned Bloom-filter for the efficient name lookup in Information-Centric Networking24
Neglected infrastructures for 6G—Underwater communications: How mature are they?24
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network24
Efficient congestion control scheme based on caching strategy in NDN23
Node cooperation for workload offloading in a fog computing network via multi-objective optimization23
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications23
Editorial Board22
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method22
Evolving techniques in cyber threat hunting: A systematic review22
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model22
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N22
TD-RA policy-enforcement framework for an SDN-based IoT architecture21
A survey of longitudinal changes in cellular network architecture: The good, the bad, and the ugly21
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm21
REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks21
Hierarchical community discovery for multi-stage IP bearer network upgradation21
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions21
A Contextual Multi-Armed Bandit approach for NDN forwarding21
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey21
DAPNEML: Disease-diet associations prediction in a NEtwork using a machine learning based approach21
DIMY: Enabling privacy-preserving contact tracing21
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues20
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting20
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions20
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution20
Preemptive admission control mechanism for strict QoS guarantee to life-saving emergency traffic in wireless LANs20
Mobile cloud computing models security issues: A systematic review20
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments20
Security and privacy of industrial big data: Motivation, opportunities, and challenges20
Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN20
A progressive learning method on unknown protocol behaviors19
An open-source implementation and validation of 5G NR configured grant for URLLC in ns-3 5G LENA: A scheduling case study in industry 4.0 scenarios19
Artificial Intelligence of Things (AIoT) for smart agriculture: A review of architectures, technologies and solutions19
A survey of privacy-preserving offloading methods in mobile-edge computing19
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions19
A deep density based and self-determining clustering approach to label unknown traffic19
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal19
Anomalous state detection in radio access networks: A proof-of-concept18
A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks18
A comprehensive survey on channel hopping and scheduling enhancements for TSCH networks18
Exploiting web content semantic features to detect web robots from weblogs18
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network17
Low load DIDS task scheduling based on Q-learning in edge computing environment17
Exploring an edge convolution and normalization based approach for link prediction in complex networks17
Community Detection method based on Random walk and Multi objective Evolutionary algorithm in complex networks17
Multi-Batches Revenue Maximization for competitive products over online social network17
Dynamic resource management in integrated NOMA terrestrial–satellite networks using multi-agent reinforcement learning17
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks17
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges17
A systematic review of federated learning: Challenges, aggregation methods, and development tools16
Editorial Board16
BLIND: A privacy preserving truth discovery system for mobile crowdsensing16
Editorial Board16
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues16
Early Prevention and Mitigation of Link Flooding Attacks in Software Defined Networks16
Enhanced multi-objective gorilla troops optimizer for real-time multi-user dependent tasks offloading in edge-cloud computing16
Fair association and rate maximization in 6G UAV Aided HS only network and HetNet16
Designing transport scheme of 3D naked-eye system16
0.099415063858032