Computer Networks

Papers
(The TQCC of Computer Networks is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Optimal pricing-based computation offloading and resource allocation for blockchain-enabled beyond 5G networks304
Mitigating Alert Fatigue in Cloud Monitoring Systems: A Machine Learning Perspective259
Virtual assistant mediated communications for radio resources saving255
Toward sustainable diffusion-based AIGC: Design and online orchestration in distributed edge networks223
Data-driven active session identification for LTE user-perceived QoS analysis220
Towards Open RAN in beyond 5G networks: Evolution, architectures, deployments, spectrum, prototypes, and performance assessment209
MSTFCAN: Multiscale sparse temporal-frequency cross attention network for traffic prediction164
Two enhanced schemes for coordinated spatial reuse in IEEE 802.11be: Adaptive and distributed approaches163
A novel hybrid approach combining GCN and GAT for effective anomaly detection from firewall logs in campus networks160
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm147
FAMTDS: A novel MFO-based fully automated malicious traffic detection system for multi-environment networks127
Secure over-the-air software update for connected vehicles119
LWSBFT: Leaderless weakly synchronous BFT protocol115
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs110
XAInomaly: Explainable and interpretable Deep Contractive Autoencoder for O-RAN traffic anomaly detection108
IPv6 active address detection model based on diffusion model102
Bilateral collaborative computing offloading via LEO satellites for remote network applications99
A fine-grained compression scheme for block transmission acceleration over IPFS network99
Differential private federated learning with per-sample adaptive clipping and layer-wise gradient perturbation98
Quantum internet building blocks state of research and development96
MTCR-AE: A Multiscale Temporal Convolutional Recurrent Autoencoder for unsupervised malicious network traffic detection93
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach87
System performance and optimization in NOMA mobile edge computing surveillance network using GA and PSO86
MalCon: A blockchain-based malware containment framework for Internet of Things85
Distributed neighbor discovery with mobility adaptive probing for beyond 5G D2D communications77
Energy-efficient task offloading and trajectory planning in UAV-enabled mobile edge computing networks75
Network cost optimization-based capacitated controller deployment for SDN74
An enhanced symmetric-key based 5G-AKA protocol74
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways73
Registered-backoff-time (RBT) based channel access with grouping control for the trigger RAW mode of IEEE 802.11ah IoT Network71
An Opportunistic Vehicle-Based Task Assignment for IoT offloading70
Continuity: A deterministic Byzantine fault tolerant asynchronous consensus algorithm69
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks68
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks68
Editorial Board67
A 5G multi-gNodeB simulator for ultra-reliable 0.5–100 GHz communication in indoor Industry 4.0 environments67
Effect of the incident angle of a transmitting laser light on the coverage of a NLOS-FSO network65
Digital twin-assisted and mobility-aware service migration in Mobile Edge Computing64
Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm63
Optimizing fairness in cellular networks with mobile drone relays63
Prospects on the adoption of a microservice-based architecture in 5G systems and beyond62
FedPA: An adaptively partial model aggregation strategy in Federated Learning62
Dynamic power allocation in cellular network based on multi-agent double deep reinforcement learning62
Balanced wireless crowd charging with mobility prediction and social awareness62
Smart contract vulnerability detection combined with multi-objective detection62
Adaptive federated reinforcement learning for critical realtime communications in UAV assisted vehicular networks60
NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification59
Classifying and tracking enterprise assets via dual-grained network behavioral analysis58
Correlation between weather and signal strength in LoRaWAN networks: An extensive dataset58
Intrusion detection game for ubiquitous security in vehicular networks: A signaling game based approach57
Editorial Board57
Partial coverage optimization under network connectivity constraints in heterogeneous sensor networks57
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles57
Privacy-preserving edge caching: A probabilistic approach56
Wireless powered NOMA-based cognitive radio for 6G networks56
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers56
Detecting malicious proxy nodes during IoT network joining phase55
Marvel: Towards Efficient Federated Learning on IoT Devices55
CIPO: Efficient, lightweight and programmable packet scheduling55
When less is more: BBR versus LEDBAT++54
Measurement for encrypted open resolvers: Applications and security54
SecureEI: Proactive intellectual property protection of AI models for edge intelligence53
Resource consumption and security-aware multi-tenant service function chain deployment based on hypergraph matching53
Prediction-based dual-weight switch migration scheme for SDN load balancing51
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment51
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet50
FTG-Net-E: A hierarchical ensemble graph neural network for DDoS attack detection50
Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning50
RLS2: An energy efficient reinforcement learning- based sleep scheduling for energy harvesting WBANs50
CI_GRU: An efficient DGA botnet classification model based on an attention recurrence plot49
Optimizing distributed firewall reconfiguration transients48
BBRv2+: Towards balancing aggressiveness and fairness with delay-based bandwidth probing48
Service Function Chains multi-resource orchestration in Virtual Mobile Edge Computing47
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting47
Editorial Board47
Multi-objective optimisation of human exposure for various 5G network topologies in Switzerland47
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN46
κ-Coverage Reliability for Wireless Multihop Network incorporating46
Distributed scheduling method for multiple workflows with parallelism prediction and DAG prioritizing for time constrained cloud applications45
A measurement study on device-to-device communication technologies for IIoT44
Optimization framework for Best Approver Selection Method (BASM) and Best Tip Selection Method (BTSM) for IOTA tangle network: Blockchain-enabled next generation Industrial IoT43
Knowledge-based adaptive routing for energy efficiency and attack detection in ad hoc wireless sensor networks43
Editorial Board43
Evolving Chain-of-Thought and automatic text annotation based intent classification method for wireless network42
A novel evaluation function for higher acceptance rates and more profitable metaheuristic-based online virtual network embedding42
Unlocking QoS Potential: Integrating IoT services and Monte Carlo Control for heterogeneous IoT device management in gateways42
A generic learning simulation framework to assess security strategies in cyber-physical production systems41
A systematic survey on content caching in ICN and ICN-IoT: Challenges, approaches and strategies41
MT3A : A Novel Multicast Routing, Spectrum and Modulation-Level Assignment in Elastic Optical Networks41
Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems40
Network sum-rate maximization for network-coded clustered uplink NOMA networks with SWIPT-enabled relays40
SRRS: A blockchain fast propagation protocol based on non-Markovian process39
Editorial Board39
An offline mobile access control system based on self-sovereign identity standards39
Joint time scheduling and transaction fee selection in blockchain-based RF-powered backscatter cognitive radio network39
Performance evaluation of ultra-dense macro-femto cellular networks based on efficient channel resource allocation system38
Anomaly detection by discovering bipartite structure on complex networks38
Editorial Board38
Data signals for Terahertz communications research38
A trust-aware openflow switching framework for software defined networks (SDN)38
Unboxing trustworthiness through quantum internet38
Editorial Board38
Using channel predictions for improved proportional-fair utility for vehicular users37
Editorial Board37
Editorial Board36
Editorial Board36
Editorial Board36
MAGD: Minimal Attack Graph Generation Dynamically in Cyber Security36
User preference-aware content caching strategy for video delivery in cache-enabled IoT networks36
Heterogeneous SDN controller placement problem—The Wi-Fi and 4G LTE-U case35
Hierarchical Q-learning-enabled neutrosophic AHP scheme in candidate relay set size adaption in vehicular networks35
A survey of self-coordination in self-organizing network35
Editorial Board35
Cross-domain network attack detection enabled by heterogeneous transfer learning34
A migration method for service function chain based on failure prediction34
Rumors clarification with minimum credibility in social networks34
Editorial Board34
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems34
UAV deployment in WSN system for emergency/remote area applications33
Simultaneous update of sensing and control data using free-ride codes in vehicular networks: An age and energy perspective33
EAPT: An encrypted traffic classification model via adversarial pre-trained transformers33
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization33
Pseudonym revocation system for IoT-based medical applications33
GraphCC: A practical graph learning-based approach to Congestion Control in datacenters32
SFACIF: A safety function attack and anomaly industrial condition identified framework32
Reducing tail latency for multi-bottleneck in datacenter networks: A compound approach32
A path selection method based on rule prediction in non-terrestrial networks32
ABUV: Adaptive bitrate and upsampling for video streaming on mobile devices32
UINT: An intent-based adaptive routing architecture32
Workforce capacity planning for proactive troubleshooting in the Network Operations Center31
BGP anomaly detection as a group dynamics problem31
LEO satellite beam management algorithms31
Optimized design for integrated sensing and communication in secure MIMO SWIPT systems31
A lightweight deployment of TD routing based on SD-WANs31
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing31
Blockchain based secure smart city architecture using low resource IoTs30
Review and analysis of recent advances in intelligent network softwarization for the Internet of Things30
Application of a Long Short Term Memory neural predictor with asymmetric loss function for the resource allocation in NFV network architectures30
Editorial Board30
Optimal server and service deployment for multi-tier edge cloud computing30
DSMLB: Dynamic switch-migration based load balancing for software-defined IoT network30
A networked multi-agent reinforcement learning approach for cooperative FemtoCaching assisted wireless heterogeneous networks30
Integrated trajectory optimization for UAV-enabled wireless powered MEC system with joint energy consumption and AoI minimization30
Data signals for deep learning applications in Terahertz communications30
Fog-based caching mechanism for IoT data in information centric network using prioritization30
Cross-layer tradeoff of QoS and security in Vehicular ad hoc Networks: A game theoretical approach30
Optimal bandwidth and computing resource allocation in low earth orbit satellite constellation for earth observation applications30
DACP: Enforcing a dynamic access control policy in cross-domain environments30
Adaptive contrastive learning based network latency prediction in 5G URLLC scenarios30
An anonymity-preserving mobile user authentication protocol for global roaming services29
A sub-action aided deep reinforcement learning framework for latency-sensitive network slicing29
An integrated approach explaining the detection of distributed denial of service attacks29
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge29
Demand Island Routing for LEO satellite constellations29
RouteChain: Towards Blockchain-based secure and efficient BGP routing29
QoS-oriented media access control using reinforcement learning for next-generation WLANs29
A marketplace model for drone-assisted edge computing in 5G scenarios29
Artificial neural network assisted polling scheme for central coordinated low-latency WLANs29
Resource and delay aware fine-grained service offloading in collaborative edge computing29
An DL-based approach for Packet Error Compensation using radio mobile network quality parameters in a rainfall scenario29
BGSD: A SBERT and GAT-based Service Discovery Framework for Heterogeneous Distributed IoT28
Online training data acquisition for federated learning in cloud–edge networks28
Vehicle-cluster-based opportunistic relays for data collection in intelligent transportation systems28
Web browsing privacy in the deep learning era: Beyond VPNs and encryption28
Marconi-Rosenblatt Framework for Intelligent Networks (MR-iNet Gym): For Rapid Design and Implementation of Distributed Multi-agent Reinforcement Learning Solutions for Wireless Networks28
UW-GRE: Underwater Greedy Geographic Routing by Network Embedding28
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability27
Traffic-aware service relocation in software-defined and intent-based elastic optical networks27
Multi-domain authorization and decision-making method of access control in the edge environment27
CNNParted: An open source framework for efficient Convolutional Neural Network inference partitioning in embedded systems27
Blockchain-enhanced cross-ISP spectrum assignment framework in SDONs: SpectrumChain27
TrackSign-labeled web tracking dataset27
Optimal algorithm for min-max line barrier coverage with mobile sensors on 2-dimensional plane27
Dominant coverage for target users at the lowest cost under competitive propagation in social networks27
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime27
On performance of RIS-aided ground-to-air and air-to-ground communications in multi-user NOMA systems27
Assessing LoRaWAN radio propagation for smart parking service: An experimental study26
Randomized distributed self-adjusting tree networks26
A privacy-preserving attribute-based framework for IoT identity lifecycle management26
A streaming algorithm and hardware accelerator to estimate the empirical entropy of network flows26
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments26
ED-VNE: A profit-oriented VNE optimization scheme of energy and delay in 5G SlaaS26
CRLM: A cooperative model based on reinforcement learning and metaheuristic algorithms of routing protocols in wireless sensor networks26
Approximate computing in B5G and 6G wireless systems: A survey and future outlook26
Multi-resource predictive workload consolidation approach in virtualized environments26
Extending device noise measurement capacity for OFDM-based PLC systems: Design, implementation, and on-field validation26
Image super resolution based channel estimation for future wireless communication26
A DASH server-side delay-based representation switching solution to improve the quality of experience for low-latency live video streaming26
A machine learning based Distributed Congestion Control Protocol for multi-hop wireless networks26
Energy harvesting in self-sustainable IoT devices and applications based on cross-layer architecture design: A survey26
EagerCC: An ultra-low latency congestion control mechanism in datacenter networks26
A survey of indoor positioning systems based on a six-layer model26
Highly reliable DHR-based polar compilation code communication method25
Multi-objective optimization of asymmetric bit rate partitioning for multipath protection in elastic optical networks25
Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks25
PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection25
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles25
Edge server enhanced secure and privacy preserving federated learning25
Game based robust power allocation strategy with QoS guarantee in D2D communication network25
LPulse: An efficient algorithm for service function chain placement and routing with delay guarantee24
Sphinx: A transport protocol for high-speed and lossy mobile networks24
DiSAuth: A DNS-based secure authorization framework for protecting data decoupled from applications24
Towards securing Duplicate Address Detection using P424
LESS-ON: Load-aware edge server shutdown for energy saving in cellular networks24
A review on green communication for wearable and implantable wireless body area networks24
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers24
Effective *-flow schedule for optical circuit switching based data center networks: A comprehensive survey24
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance24
Low-latency intelligent service combination caching strategy with density peak clustering algorithm in vehicle edge computing24
AI/ML-based services and applications for 6G-connected and autonomous vehicles24
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment23
A network operator-biased approach for multi-service network function placement in a 5G network slicing architecture23
Neural quantile optimization for edge–cloud networking23
Local Differential Privacy for correlated location data release in ITS23
Quantitative analysis of segmented satellite network architectures: A maritime surveillance case study23
On the prediction of large-scale road-network constrained trajectories23
Interlayer link prediction based on multiple network structural attributes22
Instant queue occupancy used for automatic traffic scheduling in data center networks22
DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA22
Experimental assessment of a JANUS-based consensus protocol22
FIWARE based low-cost wireless acoustic sensor network for monitoring and classification of urban soundscape22
Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT22
Energy efficient multipath routing in space division multiplexed elastic optical networks22
A novel multi-modal Federated Learning based thermal-aware job scheduling framework22
A Blockchain-based carbon emission security accounting scheme22
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks22
Hierarchical aerial offload computing algorithm based on the Stackelberg-evolutionary game model22
SP-PoR: Improve blockchain performance by semi-parallel processing transactions21
Multi-agent deep reinforcement learning for trajectory planning in UAVs-assisted mobile edge computing with heterogeneous requirements21
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things21
Using bursty announcements for detecting BGP routing anomalies21
DCCS: A dual congestion control signals based TCP for datacenter networks21
LiKey: Location-independent keystroke recognition on numeric keypads using WiFi signal21
A congestion-aware user–cell association scheme to assist with traffic offloading in a three-tier heterogeneous network21
Towards website domain name classification using graph based semi-supervised learning21
A differential privacy location protect approach with intelligence data collection paradigm for MCS20
LSTM-based graph attention network for vehicle trajectory prediction20
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques20
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis20
MUSCAT: Distributed multi-agent Q-learning-based minimum span channel allocation technique for UAV-enabled wireless networks20
An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks20
Intelligent traffic control for QoS optimization in hybrid SDNs20
Proposal and investigation of a distributed learning strategy in Orbital Edge Computing-endowed satellite networks for Earth Observation applications20
Is 6LoWPAN-ND necessary? (Spoiler alert: Yes)19
Understanding Internet of Things malware by analyzing endpoints in their static artifacts19
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis19
Coverage and throughput analysis of an energy efficient UAV base station positioning scheme19
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization19
P-SHARP: Privacy Preserving Secure Hash based Authentication and Revelation Protocol in IoVs19
Swarm UAV networking with collaborative beamforming and automated ESN learning in the presence of unknown blockages19
0.19908809661865