Computer Networks

Papers
(The H4-Index of Computer Networks is 52. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
A compilation of UAV applications for precision agriculture459
Building an efficient intrusion detection system based on feature selection and ensemble classifier339
Campus traffic and e-Learning during COVID-19 pandemic296
A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges222
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective192
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset175
Machine learning methods for cyber security intrusion detection: Datasets and comparative study173
6G networks: Beyond Shannon towards semantic and goal-oriented communications164
Clustering objectives in wireless sensor networks: A survey and research direction analysis164
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things139
Federated learning for malware detection in IoT devices137
Aerial imagery pile burn detection using deep learning: The FLAME dataset134
Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm131
Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead129
Machine Learning-based traffic prediction models for Intelligent Transportation Systems129
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT127
A survey on IoT platforms: Communication, security, and privacy perspectives121
HealthBlock: A secure blockchain-based healthcare data management system120
Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions116
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles113
Accurate and fast URL phishing detector: A convolutional neural network approach110
In-band Network Telemetry: A Survey106
Dynamic job-shop scheduling in smart manufacturing using deep reinforcement learning102
Towards a deep learning-driven intrusion detection approach for Internet of Things98
A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements94
A network traffic forecasting method based on SA optimized ARIMA–BP neural network94
Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems93
RETRACTED: Personalized federated learning framework for network traffic anomaly detection93
5G In the internet of things era: An overview on security and privacy challenges89
NOMA and 5G emerging technologies: A survey on issues and solution techniques88
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures85
Hybrid approach to intrusion detection in fog-based IoT environments79
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities79
Towards smart farming: Systems, frameworks and exploitation of multiple sources74
Efficient and flexible management for industrial Internet of Things: A federated learning approach72
An effective service-oriented networking management architecture for 5G-enabled internet of things71
A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives68
An SDN architecture for time sensitive industrial IoT66
Secure over-the-air software updates in connected vehicles: A survey66
A NSGA2-LR wrapper approach for feature selection in network intrusion detection63
Quantum Internet protocol stack: A comprehensive survey61
An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks61
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges61
How to exploit the Social Internet of Things: Query Generation Model and Device Profiles’ Dataset60
Application of Internet of Things and artificial intelligence for smart fitness: A survey60
Cloud based security on outsourcing using blockchain in E-health systems59
Deep reinforcement learning for blockchain in industrial IoT: A survey58
TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT57
Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications57
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting55
Composite and efficient DDoS attack detection framework for B5G networks55
Impact of the COVID-19 pandemic on the Internet latency: A large-scale study53
Towards formal verification of IoT protocols: A Review52
Fusion of Federated Learning and Industrial Internet of Things: A survey52
0.063598155975342