Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The H4-Index of Cluster Computing-The Journal of Networks Software Tools and Applicati is 45. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Design and implementation of dynamic I/O control scheme for large scale distributed file systems327
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study267
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units248
Quantification and analysis of performance fluctuation in distributed file system226
A description language for enhancing transparency and interoperability in blockchain smart contracts120
Privacy preserving spatio-temporal attribute-based encryption for cloud applications118
A layered and integrative framework for Advance Persistent Threat detection and mitigation: combining AI, Zero-Trust, and Advanced Threat Intelligence110
Internet of vehicles task offloading based on edge computing using double deep Q-network106
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things106
Retraction Note: Improved image compression using effective lossless compression technique96
A multi-illusive voids approach for increasing base station anonymity95
Retraction Note: An effiecient human tracking system using Haar-like and hog feature extraction92
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks90
Combining evolutionary and swarm algorithms in a hybrid subspace-wise search strategy for feature selection88
Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm88
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN86
Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem83
Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud83
DLBW: an end-to-end multi-task adaptive gradient balancing method78
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization76
DNA sequences design under many objective evolutionary algorithm73
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting67
RF-FedAvg: Federated learning-based random forest model for intrusion detection in wireless sensor networks64
Research on inspection task allocation method of inspection robot based on improved genetic algorithm62
An efficient cross-domain mutual authentication scheme for heterogeneous signcryption in VANETs60
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks57
Autonomous underwater vehicle 3D path planning based on multiple populations for multiple objectives ant colony optimization57
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies56
Deep learning fusion for effective malware detection: leveraging visual features55
Performance optimization in cloud data warehouse based on blockchain and data security using AC-AKDES approach52
PSO-TK: a hybrid optimization method for the trade-off between coverage and robustness in edge service placement52
Quantitative and qualitative similarity measure for data clustering analysis51
Examining deep learning’s capability to spot code smells: a systematic literature review51
The management of energy-aware virtual machine deployment and load balancing using mapping in network-on-chip for cyber-physical systems in cloud computing51
Energy-efficient edge deployment of generative AI models using federated learning50
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis50
A survey on privacy-preserving federated learning against poisoning attacks49
Design of distributed network intrusion prevention system based on Spark and P2DR models49
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study48
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network47
ROI-based optimized image watermarking with real-time authentication47
An efficient framework to combat multidimensionality in multi-criteria recommender systems46
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid46
Secure electronic medical records sharing scheme based on blockchain and quantum key46
An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage45
0.9434609413147