Journal of Network and Computer Applications

Papers
(The TQCC of Journal of Network and Computer Applications is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication280
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things240
Efficient congestion control scheme based on caching strategy in NDN203
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things203
CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks190
A review on trust management in fog/edge computing: Techniques, trends, and challenges170
Editorial Board162
Editorial Board160
Editorial Board160
Stackelberg game-based dynamic resource trading for network slicing in 5G networks145
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks140
Editorial Board140
Tracing footprints of anti-forensics and assuring secured data transmission in the cloud using an effective ECCDH and Kalman Filter116
Editorial Board115
Editorial Board113
On the scalability of Big Data Cyber Security Analytics systems105
Editorial Board105
Editorial Board96
Video streaming over IoV using IP multicast92
A survey on security challenges and solutions in the IOTA90
MCTE-RPL: A multi-context trust-based efficient RPL for IoT90
An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols88
A survey of data mining methodologies in the environment of IoT and its variants88
A survey of contemporary open-source honeypots, frameworks, and tools87
Terra: Low-latency and reliable event col87
A flexible algorithm to offload DAG applications for edge computing85
A radio map self-updating algorithm based on mobile crowd sensing77
Node cooperation for workload offloading in a fog computing network via multi-objective optimization77
Nefis: A network coding based flexible device-to-device video streaming scheme75
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains75
Network slicing in virtualized 5G Core with VNF sharing74
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices73
Efficient regular expression matching over hybrid dictionary-based compressed data72
Mobility-Aware Registry Migration for Containerized Applications on Edge Computing Infrastructures72
Blockchain-based delegated Quantum Cloud architecture for medical big data security71
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic70
Trust-minimized optimistic cross-rollup arbitrary message bridge69
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network66
Blockchain based crowdsourcing framework for Vehicle-to-Vehicle charging63
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions62
Learned Bloom-filter for the efficient name lookup in Information-Centric Networking60
Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station60
CL-AP2: A compo59
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain59
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques58
STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning58
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey58
SafeCoder: A machine-learning-based encoding system to embed safety identification information into QR codes58
Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems57
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems57
A cooperative image object recognition framework and task offloading optimization in edge computing56
Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey56
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N56
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs54
Multi-neural network based tiled 360°video caching with Mobile Edge Computing54
Application-aware resource allocation and data management for MEC-assisted IoT service providers53
Neglected infrastructures for 6G—Underwater communications: How mature are they?52
Reliability optimization for industrial WSNs with FD relays and multiple parallel connections52
Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks52
A virtual gateway media access placement approach for large-scale Internet of Things52
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables51
End-to-end active queue management with Named-Data Networking49
HTTP adaptive streaming scheme based on reinforcement learning with edge computing assistance49
Defeating deep learning based de-anonymization attacks with adversarial example48
HFedDI: A novel privacy preserving horizontal federated learning based scheme for IoT device identification47
HiMAQ: Hierarchical multi-agent Q-learning-based throughput and fairness improvement for UAV-Aided IoT networks47
Cost optimization of omnidirectional offloading in two-tier cloud–edge federated systems46
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment46
Internet of Things botnets: A survey on Artificial Intelligence based detection techniques45
Leveraging blockchain and federated learning in Edge-Fog-Cloud computing environments for intelligent decision-making with ECG data in IoT43
Caching transient data in Information-Centric Internet-of-Things (IC-IoT) networks: A survey42
Modular zk-rollup on-demand42
Optimizing federated learning with weighted aggregation in aerial and space networks41
Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection39
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts39
Editorial Board39
Evolving techniques in cyber threat hunting: A systematic review38
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions38
SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts38
Joint VM and container consolidation with auto-encoder based contribution extraction of decision criteria in Edge-Cloud environment37
Collective reinforcement learning based resource allocation for digital twin service in 6G networks37
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications36
An efficient exact method with polynomial time-complexity to achieve k36
Energy-efficient and delay-guaranteed routing algorithm for software-defined wireless sensor networks: A cooperative deep reinforcement learning approach34
PTTS: Zero-knowledge proof-based private token transfer system on Ethereum blockchain and its network flow based balance range privacy attack analysis34
RSCAT: Towards zero touch congestion control based on actor–critic reinforcement learning and software-defined networking34
Traffic flow control using multi-agent reinforcement learning34
Node placement optimization under Q-Coverage and Q-Connectivity constraints in wireless sensor networks33
Service discovery and selection in IoT: A survey and a taxonomy33
Joint privacy and data quality aware reward in opportunistic Mobile Crowdsensing systems32
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review32
The universal federator: A third-party authentication solution to federated cloud, edge, and fog30
Analysis of cryptocurrency transactions from a network perspective: An overview30
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection29
Review on the application of deep learning in network attack detection29
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey29
ParallelC-Store: A committee structure-based reliable parallel storage mechanism for permissioned blockchain sharding28
Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things28
A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction28
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot27
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues26
IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks26
RT-APT: A real-time APT anomaly detection method for large-scale provenance graph26
A survey on energy efficient medium access control for acoustic wireless communication networks in underwater environments25
A survey of Machine Learning-based Physical-Layer Authentication in wireless communications25
Intelligent energy management with IoT framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems24
Adaptive differential privacy in asynchronous federated learning for aerial-aided edge computing24
An efficient mechanism for function scheduling and placement in function as a service edge environment23
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting23
Context-aware distribution of fog applications using deep reinforcement learning23
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions23
Editorial Board23
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions23
Holistic survey on energy aware routing techniques for IoT applications23
Dynamically identify important nodes in the hypergraph based on the ripple diffusion and ant colony collaboration model22
Reducing traffic burstiness for MPTCP in data center networks22
IP traffic behavior characterization via semantic mining22
SDN-AAA: Towards the standard management of AAA infrastructures22
A selective ensemble model for cognitive cybersecurity analysis22
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm21
Genetic algorithm enabled virtual multicast tree embedding in Software-Defined Networks21
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS21
A context-aware information-based clone node attack detection scheme in Internet of Things21
Modeling and optimization of the data plane in the SDN-based DCN by queuing theory21
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy21
A Contextual Multi-Armed Bandit approach for NDN forwarding21
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks21
Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks20
PPR-RM: Performance-to-Power Ratio, Reliability and Makespan — aware scientific workflow scheduling based on a coalitional game in the cloud20
Editorial Board20
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks20
TD-RA policy-enforcement framework for an SDN-based IoT architecture20
Hierarchical community discovery for multi-stage IP bearer network upgradation19
Editorial Board19
BAC-CRL: Blockchain-Assisted Coded Caching Certificate Revocation List for Authentication in VANETs19
Editorial Board19
iContainer: Consecutive checkpointing with rapid resilience for immortal container-based services19
A novel ICMetric public key framework for secure communication19
Editorial Board19
Editorial Board19
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel19
Editorial Board19
Editorial Board19
Editorial Board19
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments18
Discrete-time Markov decision process for performance analysis of virtual machine allocation schemes in C-RAN18
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network18
Optimizing the performance of OpenFlow Protocol over QUIC18
mPillBox: An open framework for a smarter pillbox18
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks18
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities18
Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management17
A cooperative task assignment framework with minimum cooperation cost in crowdsourcing systems17
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal17
Two formal design solutions for the generalization of network segmentation17
A robust PID and RLS controller for TCP/AQM system17
Network shortcut in data plane of service mesh with eBPF17
Hardening of network segmentation using automated referential penetration testing17
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications17
A scalable private Bitcoin payment channel network with privacy guarantees16
Virtualizing GPU direct packet I/O on commodity Ethernet to accelerate GPU-NFV16
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search16
An application of multi-objective reinforcement learning for efficient model-free control of canals deployed with IoT networks16
A distributed deployment algorithm for communication coverage in wireless robotic networks16
RAaaS: Resource Allocation as a Service in multiple cloud providers16
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey16
Temporal complex networks modeling applied to vehicular ad-hoc networks16
Sequence-to-sequence learning for link-scheduling in D2D communication networks16
A novel distributed multi-slot TDMA-based MAC protocol for LED-based UOWC networks16
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations15
Preemptive admission control mechanism for strict QoS guarantee to life-saving emergency traffic in wireless LANs15
PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature15
Editorial Board15
Survivable virtual network embedding algorithm considering multiple node failure in IIoT environment15
DIMY: Enabling privacy-preserving contact tracing15
Multi-objective particle swarm optimization based rendezvous point selection for the energy and delay efficient networked wireless sensor data acquisition15
0.22648596763611