Computer Science Review

Papers
(The TQCC of Computer Science Review is 23. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Editorial Board197
Characterising harmful API uses and repair techniques: Insights from a systematic review192
Blockchain verification and validation: Techniques, challenges, and research directions191
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture174
The ML-based sensor data deception targeting cyber–physical systems: A review158
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges157
A comprehensive review of usage control frameworks126
The Lonely Runner Conjecture turns 60126
A search for good pseudo-random number generators: Survey and empirical studies123
Research communities in cyber security: A comprehensive literature review119
Editorial Board110
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language100
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review91
A systematic review of federated learning incentive mechanisms and associated security challenges86
Non-square grids: A new trend in imaging and modeling?83
A survey of blockchain, artificial intelligence, and edge computing for Web 3.071
Software as storytelling: A systematic literature review69
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems69
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications68
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges68
A survey of deep learning techniques for detecting and recognizing objects in complex environments68
A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review67
Model-based joint analysis of safety and security:Survey and identification of gaps67
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review67
WebAssembly and security: A review65
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques63
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey62
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions61
A decade: Review of scene text detection methods56
Auto-scaling mechanisms in serverless computing: A comprehensive review53
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions51
A survey on deep matrix factorizations49
A systematic literature review on cross-language source code clone detection49
Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis48
Negative selection in anomaly detection—A survey46
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives43
Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions43
Towards data augmentation in graph neural network: An overview and evaluation40
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems40
Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing40
Future of cyberspace: A critical review of standard security protocols in the post-quantum era39
A review of background, methods, limitations and opportunities of knowledge graph completion38
Ontology learning towards expressiveness: A survey37
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis37
Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing36
A survey of set accumulators for blockchain systems35
A comprehensive survey on deep learning based malware detection techniques35
Editorial Board35
The future of computing paradigms for medical and emergency applications34
Editorial Board34
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey33
A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions33
Advances in online handwritten recognition in the last decades32
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions31
A survey of lattice based expressive attribute based encryption31
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions30
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages29
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey26
NLP-based techniques for Cyber Threat Intelligence26
A survey on GANs for computer vision: Recent research, analysis and taxonomy24
Editorial Board24
A decade systematic review of fusion techniques in financial market prediction24
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet23
Addressing the challenges of modern DNS a comprehensive tutorial23
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns23
Routing optimization strategies in data center networks: A survey23
0.072144031524658