Computer Networks

Papers
(The TQCC of Computer Networks is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board247
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization234
Editorial Board194
Editorial Board147
Experimental assessment of a JANUS-based consensus protocol138
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment137
DCCS: A dual congestion control signals based TCP for datacenter networks137
Local Differential Privacy for correlated location data release in ITS135
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability126
Randomized distributed self-adjusting tree networks122
Neural quantile optimization for edge–cloud networking117
On the prediction of large-scale road-network constrained trajectories109
A marketplace model for drone-assisted edge computing in 5G scenarios96
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network94
Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks93
Online training data acquisition for federated learning in cloud–edge networks84
Editorial Board81
A privacy-preserving attribute-based framework for IoT identity lifecycle management81
Estimation of the success probability of a malicious attacker on blockchain-based edge network79
Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks76
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs75
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime75
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques75
Reinforcement learning based tasks offloading in vehicular edge computing networks73
A fine-grained compression scheme for block transmission acceleration over IPFS network73
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs72
Balanced wireless crowd charging with mobility prediction and social awareness71
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration71
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting70
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach69
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge68
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing67
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks66
UAV deployment in WSN system for emergency/remote area applications65
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance62
Task offloading and multi-cache placement in multi-access mobile edge computing62
Secure over-the-air software update for connected vehicles61
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks60
Priority-awareness VNF migration method based on deep reinforcement learning59
A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept59
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization59
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things58
A channel selection game for multi-operator LoRaWAN deployments58
Accelerating traffic engineering optimization for segment routing: A recommendation perspective57
An anonymity-preserving mobile user authentication protocol for global roaming services57
BGP convergence in an MRAI-free Internet57
SRRS: A blockchain fast propagation protocol based on non-Markovian process57
Using channel predictions for improved proportional-fair utility for vehicular users57
All in one: Improving GPS accuracy and security via crowdsourcing55
Privacy-preserving edge caching: A probabilistic approach55
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks54
MalCon: A blockchain-based malware containment framework for Internet of Things54
Quantum enhanced time synchronisation for communication network54
Swarm intelligence for hole detection and healing in wireless sensor networks52
Detecting malicious proxy nodes during IoT network joining phase52
Lightweight zero-knowledge authentication scheme for IoT embedded devices52
Fair resource optimization for cooperative non-terrestrial vehicular networks51
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles51
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system50
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model50
BGP anomaly detection as a group dynamics problem50
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis50
Workforce capacity planning for proactive troubleshooting in the Network Operations Center50
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST49
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks48
Image super resolution based channel estimation for future wireless communication48
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet48
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance46
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN46
Wireless powered NOMA-based cognitive radio for 6G networks46
Dominant coverage for target users at the lowest cost under competitive propagation in social networks46
Optimal server and service deployment for multi-tier edge cloud computing46
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN45
Edge-caching assisted underlay spectrum sharing in large-scale cognitive radio networks44
Toward resilient communication architecture: Online network reconfiguration for UAV failure44
Optimizing distributed firewall reconfiguration transients44
Decentralized traffic detection utilizing blockchain-federated learning with quality-driven aggregation44
ArchW3: An adaptive blockchain wallet architecture for Web3 applications44
ScasDK—An all-in-one test platform for security assurance in 5G core networks43
VECLLF: A vehicle-edge collaborative lifelong learning framework for anomaly detection in VANETs43
Towards strong continuous consistency in edge-assisted VR-SGs: Delay-differences sensitive online task redistribution42
Defining and measuring the resilience of network services42
Learning quantile QoT models to address uncertainty over unseen lightpaths41
A joint orchestration of security and functionality services at network edge41
Collision-free optimal packet scheduling algorithm for multi-hop wireless IoT networks41
Energy-efficient communication for UAV-enabled mobile relay networks41
Implementing efficient attribute encryption in IoV under cloud environments40
Performance characterization and profiling of chained CPU-bound Virtual Network Functions40
SIM+: A comprehensive implementation-agnostic information model assisting AI-driven optimization for beyond 5G networks40
Optimizing resource allocation for cluster D2D-assisted fog computing networks: A three-layer Stackelberg game approach39
Privacy-preserving and scalable federated blockchain scheme for healthcare 4.039
Cooperative caching algorithm for mobile edge networks based on multi-agent meta reinforcement learning39
Enhancing LoRaWAN scalability with Longest First Slotted CSMA39
Editorial Board38
Reunion: Receiver-driven network load balancing mechanism in AI training clusters38
Coordinated multi-point by distributed hierarchical active inference with sensor feedback38
Editorial Board38
Editorial Board38
Salience-based VNF placement method for evolving multiple network slices37
Minimize BER without CSI for dynamic RIS-assisted wireless broadcast communication systems37
On studying active radio measurements estimating the mobile network quality of service for the Regulatory Authority's purposes37
SP-DG: A programmable packet-level scheduling for queuing delay guarantees in time-critical networks37
Multi-provider NFV network service delegation via average reward reinforcement learning37
A covert channel over blockchain based on label tree without long waiting times36
Line rate botnet detection with SmartNIC-embedded feature extraction36
Low-AoI data collection in integrated UAV-UGV-assisted IoT systems based on deep reinforcement learning36
EdgeML: Towards network-accelerated federated learning over wireless edge36
Secure and privacy-preserving D2D communication in fog computing services36
Multi-UAV trajectory planning for RIS-assisted SWIPT system under connectivity preservation36
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency36
A survey on the roles of Bloom Filter in implementation of the Named Data Networking36
Mobility-aware multi-user service placement and resource allocation in edge computing35
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking35
DDoSBlocker: Enhancing SDN security with time-based address mapping and AI-driven approach35
A hybrid optimization-Machine Learning approach for the VNF placement and chaining problem35
An accelerated Benders decomposition approach for virtual base station formation in stochastic Cloud-RANs35
Resource-efficient seamless transitions for high-performance multi-hop UAV multicasting35
Open set identification of malicious encrypted traffic based on multi-feature fusion35
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios34
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things34
A novel Congestion Control algorithm based on inverse reinforcement learning with parallel training34
Leveraging pervasive computing for ambient intelligence: A survey on recent advancements, applications and open challenges34
Lyapunov-guided Deep Reinforcement Learning for service caching and task offloading in Mobile Edge Computing34
On the impact of Open RAN Fronthaul Control in scenarios with XR Traffic34
Dynamic resource allocation for URLLC and eMBB in MEC-NFV 5G networks34
MuHoW: Distributed protocol for resource sharing in collaborative edge-computing networks34
CA-Live360: Crowd-assisted transcoding and delivery for live 360-degree video streaming34
Real time detection of malicious DoH traffic using statistical analysis34
Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system33
An intelligent task offloading method based on multi-agent deep reinforcement learning in ultra-dense heterogeneous network with mobile edge computing33
Deep learning for online computation offloading and resource allocation in NOMA33
Live migration of virtual machine memory content in networked systems33
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT33
Sum computation rate maximization for wireless powered OFDMA-based mobile edge computing network32
Irregular repetition slotted Aloha with multiuser detection: A density evolution analysis32
Hierarchical feature block ranking for data-efficient intrusion detection modeling32
Task offloading and resource allocation in hybrid-powered WPT MEC system: An enhanced deep reinforcement learning method32
Provisioning network slice for mobile content delivery in uncertain MEC environment32
Optimizing DV-Hop localization through topology-based straight-line distance estimation32
Deep learning approaches for vehicle type classification with 3-D magnetic sensor32
GramMatch: An automatic protocol feature extraction and identification system32
A new approach for Bitcoin pool-hopping detection31
Quality-driven video streaming for ultra-dense OFDMA heterogeneous networks31
Editorial Board31
Location constrained virtual optical network embedding in space-division multiplexing elastic optical networks31
Blockchain security threats: A comprehensive classification and impact assessment31
Multi-timescale and multi-centrality layered node selection for efficient traffic monitoring in SDNs31
Access mechanism for period flows of non-deterministic end systems for time-sensitive networks31
Studying and improving the performance of ETSI ITS contention-based forwarding (CBF) in urban and highway scenarios: S-FoT+31
Proactive radio- and QoS-aware UAV as BS deployment to improve cellular operations31
A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs30
Age of collection with non-orthogonal multiple access: A theoretical-plus-experimental study30
Digital twin approach to estimating and utilizing the capacity region of wireless ad hoc networks30
Amazon Alexa traffic traces30
Resource allocation in mmWave 5G IAB networks: A reinforcement learning approach based on column generation30
CAAST: Optimizing data communications in satellite networks through Cache and Anycast30
Path stability in partially deployed secure BGP routing29
Complexity of minimum uplink power scheduling with delay bound for Backbone-assisted PD-NOMA wireless networks29
Editorial Board29
A comprehensive survey on Green ICT with 5G-NB-IoT: Towards sustainable planet29
SmartDefense: A distributed deep defense against DDoS attacks with edge computing29
Balanar: Balancing deadline guarantee and Jain’s fairness for inter-datacenter transfers29
Editorial Board29
Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems29
Performance modeling and comparison of URLLC and eMBB coexistence strategies in 5G new radio systems29
Multiple linear regression-based energy-aware resource allocation in the Fog computing environment29
Toward pragmatic modeling of privacy information propagation in online social networks29
Joint user grouping and resource allocation scheme based on user satisfaction management for indoor multicolor VLC-NOMA network29
Design and implementation of ARA wireless living lab for rural broadband and applications28
Robust integration of blockchain and explainable federated learning for automated credit scoring28
Distributed user-to-multiple access points association through deep learning for beyond 5G28
A survey on how network simulators serve reinforcement learning in wireless networks28
Slice aware baseband function splitting and placement in disaggregated 5G Radio Access Network28
A survey on Bluetooth Low Energy security and privacy28
ScaIR: Scalable Intelligent Routing based on Distributed Graph Reinforcement Learning28
Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks27
PADAL - Passive Acoustic Detection and Localisation: Low energy underwater wireless vessel tracking network27
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions27
Intelligent Horizontal Autoscaling in Edge Computing using a Double Tower Neural Network27
Matrix Profile data mining for BGP anomaly detection27
GCP: A multi-strategy improved wireless sensor network model for environmental monitoring27
Deep learning for encrypted traffic classification in the face of data drift: An empirical study26
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks26
A PLS-HECC-based device authentication and key agreement scheme for smart home networks26
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security26
Enhanced LR-FHSS receiver for headerless frame recovery in space–terrestrial integrated IoT networks26
AI/ML for beyond 5G systems: Concepts, technology enablers & solutions26
AAE-DSVDD: A one-class classification model for VPN traffic identification26
HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications25
UGL: A comprehensive hybrid model integrating GCN and LSTM for enhanced intrusion detection in UAV controller area networks25
Comprehensive survey on air quality monitoring systems based on emerging computing and communication technologies25
Network anomaly detection in cars: A case for time-sensitive stream filtering and policing25
Federated deep reinforcement learning based secure data sharing for Internet of Things25
Decentralized and collaborative machine learning framework for IoT25
Detection of mobile network abnormality using deep learning models on massive network measurement data25
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks25
Full duplex based collision detection to enhance the V2X sidelink autonomous mode25
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges25
Non-cooperative multi-agent deep reinforcement learning for channel resource allocation in vehicular networks24
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework24
P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams24
HSGAN-IoT: A hierarchical semi-supervised generative adversarial networks for IoT device classification24
Introduction to the special issue on machine learning and artificial intelligence for the internet of things, 5G, and beyond24
Efficient data transmission mechanisms in energy harvesting wireless body area networks: A survey23
Probabilistic probe selection algorithm for fault diagnosis in communication networks23
Intraflow temporal correlation-based network traffic prediction23
Leveraging quantum uncertainty: Quantum randomness through the lens of classical communication networks23
Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity23
A multi-node attack scheme based on community partitioning in large scale infrastructure networks23
An approximate factorization approach to multi-jammer location and range estimation from peer-to-peer connectivity measurements23
Using virtual function replacement to mitigate 0-day attacks in a multi-vendor NFV-based network23
S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform23
Achieving scalable capacity in wireless mesh networks23
A cost and demand sensitive adjustment algorithm for service function chain in data center network23
A differential game view of antagonistic dynamics for cybersecurity23
M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting23
Quantum advantages for data transmission in future networks: An overview23
Privacy-preserving local clustering coefficient query on structured encrypted graphs23
D2DLive: Iterative live video streaming algorithm for D2D networks22
DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation22
A genetic algorithm approach for service function chain placement in 5G and beyond, virtualized edge networks22
Optimal network intrusion detection assignment in multi-level IoT systems22
DoS and DDoS mitigation using Variational Autoencoders22
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain22
An adaptive GA-based slice provisioning method for vertical industries in 5G and beyond networks22
Gradient importance enhancement based feature fusion intrusion detection technique22
EC-GCN: A encrypted traffic classification framework based on multi-scale graph convolution networks22
Measuring DoH with web ads21
Exploiting radio access information to improve performance of remote-controlled mobile robots in MEC-based 5G networks21
LLMs are one-shot URL classifiers and explainers21
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things21
LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures21
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT21
A dynamic policy for selecting D2D mobile relays21
EUAV: An enhanced blockchain-based two-factor anonymous authentication key agreement protocol for UAV networks21
Energy-efficient collaborative optimization for VM scheduling in cloud computing21
Cooperative cache update using multi-agent recurrent deep reinforcement learning for mobile edge networks21
Improving the performance of Dragonfly networks through restrictive Proxy routing strategies21
Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs21
MADRLOM: A Computation offloading mechanism for software-defined cloud-edge computing power network21
Parameterized deep reinforcement learning with hybrid action space for energy efficient data center networks21
Edge collaborative caching solution based on improved NSGA II algorithm in Internet of Vehicles21
A lightweight anonymity protocol at terabit speeds on programmable switches20
Disruptive 6G architecture: Software-centric, AI-driven, and digital market-based mobile networks20
Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks20
An effective and accurate flow size measurement using funnel-shaped sketch20
Tolerance of SCM Nyquist and OFDM signals for heterogeneous fiber-optic and millimeter-wave mobile backhaul links under the effect of power amplifier saturation induced clipping20
Planning-based mobile crowdsourcing bidirectional multi-stage online task assignment20
Application placement with shared monitoring points in multi-purpose IoT wireless sensor networks20
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges20
0.089498043060303