Computer Networks

Papers
(The median citation count of Computer Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
A compilation of UAV applications for precision agriculture459
Building an efficient intrusion detection system based on feature selection and ensemble classifier339
Campus traffic and e-Learning during COVID-19 pandemic296
A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges222
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective192
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset175
Machine learning methods for cyber security intrusion detection: Datasets and comparative study173
Clustering objectives in wireless sensor networks: A survey and research direction analysis164
6G networks: Beyond Shannon towards semantic and goal-oriented communications164
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things139
Federated learning for malware detection in IoT devices137
Aerial imagery pile burn detection using deep learning: The FLAME dataset134
Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm131
Machine Learning-based traffic prediction models for Intelligent Transportation Systems129
Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead129
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT127
A survey on IoT platforms: Communication, security, and privacy perspectives121
HealthBlock: A secure blockchain-based healthcare data management system120
Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions116
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles113
Accurate and fast URL phishing detector: A convolutional neural network approach110
In-band Network Telemetry: A Survey106
Dynamic job-shop scheduling in smart manufacturing using deep reinforcement learning102
Towards a deep learning-driven intrusion detection approach for Internet of Things98
A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements94
A network traffic forecasting method based on SA optimized ARIMA–BP neural network94
RETRACTED: Personalized federated learning framework for network traffic anomaly detection93
Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems93
5G In the internet of things era: An overview on security and privacy challenges89
NOMA and 5G emerging technologies: A survey on issues and solution techniques88
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures85
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities79
Hybrid approach to intrusion detection in fog-based IoT environments79
Towards smart farming: Systems, frameworks and exploitation of multiple sources74
Efficient and flexible management for industrial Internet of Things: A federated learning approach72
An effective service-oriented networking management architecture for 5G-enabled internet of things71
A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives68
Secure over-the-air software updates in connected vehicles: A survey66
An SDN architecture for time sensitive industrial IoT66
A NSGA2-LR wrapper approach for feature selection in network intrusion detection63
An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks61
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges61
Quantum Internet protocol stack: A comprehensive survey61
Application of Internet of Things and artificial intelligence for smart fitness: A survey60
How to exploit the Social Internet of Things: Query Generation Model and Device Profiles’ Dataset60
Cloud based security on outsourcing using blockchain in E-health systems59
Deep reinforcement learning for blockchain in industrial IoT: A survey58
TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT57
Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications57
Composite and efficient DDoS attack detection framework for B5G networks55
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting55
Impact of the COVID-19 pandemic on the Internet latency: A large-scale study53
Fusion of Federated Learning and Industrial Internet of Things: A survey52
Towards formal verification of IoT protocols: A Review52
Blockchain-based Initiatives: Current state and challenges50
New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN50
Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN49
Software defined networking architecture, traffic management, security, and placement: A survey49
A survey of trust management in the Internet of Vehicles49
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance48
Hybrid SDN evolution: A comprehensive survey of the state-of-the-art48
Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks48
A survey on intrusion detection and prevention systems in digital substations47
CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification47
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs47
A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks46
OpenAirInterface: Democratizing innovation in the 5G Era45
Mobility based network lifetime in wireless sensor networks: A review45
PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection45
Task offloading in edge computing for machine learning-based smart healthcare44
End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular networks44
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model44
Mobile edge computing for V2X architectures and applications: A survey44
Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation43
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant43
UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach43
An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback43
Discrimination-aware trust management for social internet of things42
The TeraNova platform: An integrated testbed for ultra-broadband wireless communications at true Terahertz frequencies42
When machine learning meets congestion control: A survey and comparison42
Narrowband Internet of Things: A Comprehensive Study42
Fuzzy Reinforcement Learning for energy efficient task offloading in Vehicular Fog Computing42
GCACS-IoD: A certificate based generic access control scheme for Internet of drones42
Q-FANET: Improved Q-learning based routing protocol for FANETs41
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms41
LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system41
Anomaly detection and trust authority in artificial intelligence and cloud computing41
A clogging resistant secure authentication scheme for fog computing services41
An intelligent fuzzy-based routing scheme for software-defined vehicular networks41
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities41
State-of-the-art survey of artificial intelligent techniques for IoT security40
Task offloading in fog computing: A survey of algorithms and optimization techniques40
Convolutional Neural Networks for forecasting flood process in Internet-of-Things enabled smart city39
A comparative study on online machine learning techniques for network traffic streams analysis39
SPEAR SIEM: A Security Information and Event Management system for the Smart Grid39
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST39
Joint task offloading and data caching in mobile edge computing networks39
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure38
Software-defined networks for resource allocation in cloud computing: A survey38
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing38
Towards intelligent virtual resource allocation in UAVs-assisted 5G networks38
A blockchain-based trading system for big data38
A kangaroo-based intrusion detection system on software-defined networks38
Dynamic VNF placement, resource allocation and traffic routing in 5G37
LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge37
An improved multi-objective genetic algorithm with heuristic initialization for service placement and load distribution in edge computing37
Minimum delay function placement and resource allocation for Open RAN (O-RAN) 5G networks37
AI-enabled mobile multimedia service instance placement scheme in mobile edge computing36
A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges36
Blockchain-based privacy preserving e-health system for healthcare data in cloud36
MARVEL: Enabling controller load balancing in software-defined networks with multi-agent reinforcement learning36
The partial computation offloading strategy based on game theory for multi-user in mobile edge computing environment36
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms36
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review36
Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm35
Realtime mobile bandwidth prediction using LSTM neural network and Bayesian fusion34
ScaleDRL: A Scalable Deep Reinforcement Learning Approach for Traffic Engineering in SDN with Pinning Control34
Optimized content centric networking for future internet: Dynamic popularity window based caching scheme34
Scheduling of emergency tasks for multiservice UAVs in post-disaster scenarios34
An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks34
CellOS: Zero-touch Softwarized Open Cellular Networks33
A QoS-guaranteed intelligent routing mechanism in software-defined networks33
A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning33
Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks33
A comprehensive survey on DNS tunnel detection32
UAVs joint optimization problems and machine learning to improve the 5G and Beyond communication32
NFStream32
SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks32
Detection of zero-day attacks: An unsupervised port-based approach32
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity32
Survey of crosschain communications protocols32
An optimized UAV trajectory planning for localization in disaster scenarios32
Slow denial-of-service attacks on software defined networks31
Online classification of user activities using machine learning on network traffic31
Self-attentive deep learning method for online traffic classification and its interpretability31
A survey: Distributed Machine Learning for 5G and beyond31
A comprehensive survey of vulnerability and information security in SDN31
Acoustic-based sensing and applications: A survey31
Smart contract vulnerability detection combined with multi-objective detection31
A survey on security and privacy issues of UAVs30
Optimal auction for delay and energy constrained task offloading in mobile edge computing30
Cooperative service caching and computation offloading in multi-access edge computing30
MATEC: A lightweight neural network for online encrypted traffic classification30
Satellite-based communications security: A survey of threats, solutions, and research challenges30
Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing30
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions30
Architectures, standardisation, and procedures for 5G Satellite Communications: A survey30
A cloud resource management framework for multiple online scientific workflows using cooperative reinforcement learning agents29
NFV Resource Allocation: a Systematic Review and Taxonomy of VNF Forwarding Graph Embedding29
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems29
SmartFCT: Improving power-efficiency for data center networks with deep reinforcement learning29
User satisfaction aware maximum utility task assignment in mobile crowdsensing29
Leveraging fairness in LoRaWAN: A novel scheduling scheme for collision avoidance29
Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks28
NFV security survey in 5G networks: A three-dimensional threat taxonomy28
An overview on cross-chain: Mechanism, platforms, challenges and advances28
Performance evaluation of CoAP and MQTT with security support for IoT environments28
A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for satellite communications27
Communication technologies for Smart Water Grid applications: Overview, opportunities, and research directions27
An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information27
Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks27
An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems27
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability27
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach27
An optimization based localization with area minimization for heterogeneous wireless sensor networks in anisotropic fields27
SecFHome: Secure remote authentication in fog-enabled smart home environment27
Fairness, integrity, and privacy in a scalable blockchain-based federated learning system27
PrePass-Flow: A Machine Learning based technique to minimize ACL policy violation due to links failure in hybrid SDN27
LiM-AHP-G-C: Life Time Maximizing based on Analytical Hierarchal Process and Genetic Clustering protocol for the Internet of Things environment26
5G-air-simulator: An open-source tool modeling the 5G air interface26
Comprehensive survey on self-organizing cellular network approaches applied to 5G networks26
Deep Q-Network based resource allocation for UAV-assisted Ultra-Dense Networks26
pSMART: A lightweight, privacy-aware service function chain orchestration in multi-domain NFV/SDN26
On supporting IoT data aggregation through programmable data planes26
Edge intelligence computing for mobile augmented reality with deep reinforcement learning approach26
A cyber-physical model for SCADA system and its intrusion detection26
Energy-aware task scheduling and offloading using deep reinforcement learning in SDN-enabled IoT network26
A survey on sleep mode techniques for ultra-dense networks in 5G and beyond26
Comprehensive review on ML-based RIS-enhanced IoT systems: basics, research progress and future challenges25
Efficient spam and phishing emails filtering based on deep learning25
Arena: A 64-antenna SDR-based ceiling grid testing platform for sub-6 GHz 5G-and-Beyond radio spectrum research25
SUTSEC: SDN Utilized trust based secure clustering in IoT25
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments25
Joint computation offloading and resource allocation for NOMA-based multi-access mobile edge computing systems25
Optimized pollard route deviation and route selection using Bayesian machine learning techniques in wireless sensor networks25
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN25
Energy harvesting computation offloading game towards minimizing delay for mobile edge computing25
A survey on stateful data plane in software defined networks25
Congestion free opportunistic multipath routing load balancing scheme for Internet of Things (IoT)25
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios24
Secure routing for LEO satellite network survivability24
A survey on space-aerial-terrestrial integrated 5G networks24
A versatile experimental testbed for ultrabroadband communication networks above 100 GHz24
From serendipity to sustainable green IoT: Technical, industrial and political perspective24
A position-based reliable emergency message routing scheme for road safety in VANETs24
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT24
Swarm intelligence RFID network planning using multi-antenna readers for asset tracking in hospital environments24
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management24
An energy-efficient routing protocol for the Internet of Things networks based on geographical location and link quality24
SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement24
Wireless energy harvesting meets receiver diversity: A successful approach for two-way half-duplex relay networks over block Rayleigh fading channel24
Attacks and countermeasures on blockchains: A survey from layering perspective24
Energy Efficient Neuro-Fuzzy Cluster based Topology Construction with Metaheuristic Route Planning Algorithm for Unmanned Aerial Vehicles24
Powder: Platform for Open Wireless Data-driven Experimental Research24
Truck platoon security: State-of-the-art and road ahead24
An optimal delay routing algorithm considering delay variation in the LEO satellite communication network24
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G23
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment23
MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning23
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning23
A privacy preserving scheme for vehicle-to-everything communications using 5G mobile edge computing23
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment23
Computation offloading and resource allocation based on distributed deep learning and software defined mobile edge computing23
A Survey on Role of Blockchain for IoT: Applications and Technical Aspects23
Adaptive range-based localization algorithm based on trilateration and reference node selection for outdoor wireless sensor networks23
Cluster-based flow control in hybrid software-defined wireless sensor networks23
Distributed denial of service attack prediction: Challenges, open issues and opportunities22
Mobile-edge computing-based delay minimization controller placement in SDN-IoV22
Detecting DNS over HTTPS based data exfiltration22
An efficient combined deep neural network based malware detection framework in 5G environment22
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain22
Battery-less internet of things –A survey22
Determining the trade-offs between data delivery and energy consumption in large-scale WSNs by multi-objective evolutionary optimization22
Packet-level prediction of mobile-app traffic using multitask Deep Learning22
An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks22
Communication-efficient asynchronous federated learning in resource-constrained edge computing22
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains22
Driving assistance system based on data fusion of multisource sensors for autonomous unmanned ground vehicles22
Application of a Long Short Term Memory neural predictor with asymmetric loss function for the resource allocation in NFV network architectures22
A joint global and local path planning optimization for UAV task scheduling towards crowd air monitoring21
HashXor: A lightweight scheme for identity privacy of IoT devices in 5G mobile network21
Burn-to-Claim: An asset transfer protocol for blockchain interoperability21
RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware21
Topology Control in Fog Computing Enabled IoT Networks for Smart Cities21
Fixed degree of decentralization DPoS consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value21
The two-phase scheduling based on deep learning in the Internet of Things21
Smart computational offloading for mobile edge computing in next-generation Internet of Things networks21
Adversarial machine learning for network intrusion detection: A comparative study21
Computation offloading and content caching and delivery in Vehicular Edge Network: A survey21
Optimized task scheduling for cost-latency trade-off in mobile fog computing using fuzzy analytical hierarchy process21
Collision avoidance in 5G using MEC and NFV: The vulnerable road user safety use case21
Energy efficiency maximization in a wireless powered IoT sensor network for water quality monitoring21
CNN-SSDI: Convolution neural network inspired surveillance system for UAVs detection and identification20
Federated deep reinforcement learning based secure data sharing for Internet of Things20
Cloud-Enabled IoT-based embedded system and software for intelligent indoor lighting, ventilation, early stage fire detection and prevention20
EDTP: Energy and Delay Optimized Trajectory Planning for UAV-IoT Environment20
A Social IoT-based platform for the deployment of a smart parking solution20
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion20
Edge Intelligent Agent Assisted Hybrid Hierarchical Blockchain for continuous healthcare monitoring & recommendation system in 5G WBAN-IoT20
Machine learning empowered computer networks20
0.063148021697998