Computer Networks

Papers
(The H4-Index of Computer Networks is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Optimal pricing-based computation offloading and resource allocation for blockchain-enabled beyond 5G networks304
Mitigating Alert Fatigue in Cloud Monitoring Systems: A Machine Learning Perspective259
Virtual assistant mediated communications for radio resources saving255
Toward sustainable diffusion-based AIGC: Design and online orchestration in distributed edge networks223
Data-driven active session identification for LTE user-perceived QoS analysis220
Towards Open RAN in beyond 5G networks: Evolution, architectures, deployments, spectrum, prototypes, and performance assessment209
MSTFCAN: Multiscale sparse temporal-frequency cross attention network for traffic prediction164
Two enhanced schemes for coordinated spatial reuse in IEEE 802.11be: Adaptive and distributed approaches163
A novel hybrid approach combining GCN and GAT for effective anomaly detection from firewall logs in campus networks160
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm147
FAMTDS: A novel MFO-based fully automated malicious traffic detection system for multi-environment networks127
Secure over-the-air software update for connected vehicles119
LWSBFT: Leaderless weakly synchronous BFT protocol115
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs110
XAInomaly: Explainable and interpretable Deep Contractive Autoencoder for O-RAN traffic anomaly detection108
IPv6 active address detection model based on diffusion model102
Bilateral collaborative computing offloading via LEO satellites for remote network applications99
A fine-grained compression scheme for block transmission acceleration over IPFS network99
Differential private federated learning with per-sample adaptive clipping and layer-wise gradient perturbation98
Quantum internet building blocks state of research and development96
MTCR-AE: A Multiscale Temporal Convolutional Recurrent Autoencoder for unsupervised malicious network traffic detection93
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach87
System performance and optimization in NOMA mobile edge computing surveillance network using GA and PSO86
MalCon: A blockchain-based malware containment framework for Internet of Things85
Distributed neighbor discovery with mobility adaptive probing for beyond 5G D2D communications77
Energy-efficient task offloading and trajectory planning in UAV-enabled mobile edge computing networks75
Network cost optimization-based capacitated controller deployment for SDN74
An enhanced symmetric-key based 5G-AKA protocol74
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways73
Registered-backoff-time (RBT) based channel access with grouping control for the trigger RAW mode of IEEE 802.11ah IoT Network71
An Opportunistic Vehicle-Based Task Assignment for IoT offloading70
Continuity: A deterministic Byzantine fault tolerant asynchronous consensus algorithm69
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks68
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks68
A 5G multi-gNodeB simulator for ultra-reliable 0.5–100 GHz communication in indoor Industry 4.0 environments67
Editorial Board67
Effect of the incident angle of a transmitting laser light on the coverage of a NLOS-FSO network65
Digital twin-assisted and mobility-aware service migration in Mobile Edge Computing64
Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm63
Optimizing fairness in cellular networks with mobile drone relays63
Smart contract vulnerability detection combined with multi-objective detection62
Prospects on the adoption of a microservice-based architecture in 5G systems and beyond62
FedPA: An adaptively partial model aggregation strategy in Federated Learning62
Dynamic power allocation in cellular network based on multi-agent double deep reinforcement learning62
Balanced wireless crowd charging with mobility prediction and social awareness62
Adaptive federated reinforcement learning for critical realtime communications in UAV assisted vehicular networks60
NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification59
Classifying and tracking enterprise assets via dual-grained network behavioral analysis58
Correlation between weather and signal strength in LoRaWAN networks: An extensive dataset58
Intrusion detection game for ubiquitous security in vehicular networks: A signaling game based approach57
Editorial Board57
Partial coverage optimization under network connectivity constraints in heterogeneous sensor networks57
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles57
Privacy-preserving edge caching: A probabilistic approach56
Wireless powered NOMA-based cognitive radio for 6G networks56
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers56
0.10358810424805