Computer Science Review

Papers
(The TQCC of Computer Science Review is 27. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Editorial Board222
The ML-based sensor data deception targeting cyber–physical systems: A review206
Characterising harmful API uses and repair techniques: Insights from a systematic review204
Blockchain verification and validation: Techniques, challenges, and research directions193
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture170
The Lonely Runner Conjecture turns 60162
Non-square grids: A new trend in imaging and modeling?144
A comprehensive review of usage control frameworks138
Editorial Board136
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review135
A systematic review of federated learning incentive mechanisms and associated security challenges124
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges115
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language106
A search for good pseudo-random number generators: Survey and empirical studies91
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications89
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems87
Model-based joint analysis of safety and security:Survey and identification of gaps80
Software as storytelling: A systematic literature review79
A survey of blockchain, artificial intelligence, and edge computing for Web 3.075
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges75
A survey of deep learning techniques for detecting and recognizing objects in complex environments75
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review75
A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review74
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey72
WebAssembly and security: A review72
Auto-scaling mechanisms in serverless computing: A comprehensive review68
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions68
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques66
Negative selection in anomaly detection—A survey62
A systematic literature review on cross-language source code clone detection58
Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis57
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions54
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives52
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems51
Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions48
Towards data augmentation in graph neural network: An overview and evaluation46
Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing46
Future of cyberspace: A critical review of standard security protocols in the post-quantum era46
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis45
Ontology learning towards expressiveness: A survey45
A comprehensive survey on deep learning based malware detection techniques44
A review of background, methods, limitations and opportunities of knowledge graph completion44
A survey of set accumulators for blockchain systems44
Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing43
Editorial Board42
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions41
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey40
Advances in online handwritten recognition in the last decades39
A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions37
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions36
A survey of lattice based expressive attribute based encryption36
Editorial Board35
The future of computing paradigms for medical and emergency applications35
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages34
A decade systematic review of fusion techniques in financial market prediction31
Addressing the challenges of modern DNS a comprehensive tutorial31
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns29
A survey on GANs for computer vision: Recent research, analysis and taxonomy29
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey28
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet28
NLP-based techniques for Cyber Threat Intelligence27
Comprehensive survey of the solving puzzle problems27
Secure storage—Confidentiality and authentication27
0.53708291053772