IEEE Transactions on Network and Service Management

Papers
(The median citation count of IEEE Transactions on Network and Service Management is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection173
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing139
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning120
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection116
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures107
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments101
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks101
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network99
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log97
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms91
A Comprehensive Survey on the E2E 5G Network Slicing Model89
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions86
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning77
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids75
Real-Time Multiple-Workflow Scheduling in Cloud Environments71
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters70
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking69
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification68
A Decentralized Framework for Serverless Edge Computing in the Internet of Things65
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach64
Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment63
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space63
Swarm of UAVs for Network Management in 6G: A Technical Review62
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs61
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles61
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks60
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond58
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model58
Trust-Based Blockchain Authorization for IoT57
Design and Evaluation of Reconfigurable SDN LEO Constellations56
Energy-Efficient Resource Allocation in Cognitive Radio Networks Under Cooperative Multi-Agent Model-Free Reinforcement Learning Schemes55
DETONAR: Detection of Routing Attacks in RPL-Based IoT55
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network55
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid54
A Continuous-Decision Virtual Network Embedding Scheme Relying on Reinforcement Learning52
Experimental Review of Neural-Based Approaches for Network Intrusion Management51
Anomaly Detection for Insider Threats Using Unsupervised Ensembles50
Sel-INT: A Runtime-Programmable Selective In-Band Network Telemetry System49
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains49
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process49
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining49
On Demand Fog Federations for Horizontal Federated Learning in IoV48
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets48
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices48
Characterization and Prediction of Mobile-App Traffic Using Markov Modeling47
Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning45
Privacy-Preserving Approach PBCN in Social Network With Differential Privacy45
Rumor Diffusion Model Based on Representation Learning and Anti-Rumor44
DeepGuard: Efficient Anomaly Detection in SDN With Fine-Grained Traffic Flow Monitoring43
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing42
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments42
Towards a Trust-Enhanced Blockchain P2P Topology for Enabling Fast and Reliable Broadcast42
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach40
Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks40
Reliability-Aware Service Function Chaining With Function Decomposition and Multipath Routing40
Attack Graph-Based Moving Target Defense in Software-Defined Networks40
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution40
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification40
A Framework for eBPF-Based Network Functions in an Era of Microservices39
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks38
Unsupervised Online Anomaly Detection With Parameter Adaptation for KPI Abrupt Changes38
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment38
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol37
Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT36
Joint Availability Guarantee and Resource Optimization of Virtual Network Function Placement in Data Center Networks35
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game34
Reliable Slicing of 5G Transport Networks With Bandwidth Squeezing and Multi-Path Provisioning33
Contract-Based Resource Sharing for Time Effective Task Scheduling in Fog-Cloud Environment33
ViCrypt to the Rescue: Real-Time, Machine-Learning-Driven Video-QoE Monitoring for Encrypted Streaming Traffic32
Multi-Tenant Provisioning for Quantum Key Distribution Networks With Heuristics and Reinforcement Learning: A Comparative Study32
Reliable Placement of Service Function Chains and Virtual Monitoring Functions With Minimal Cost in Softwarized 5G Networks32
Availability- and Traffic-Aware Placement of Parallelized SFC in Data Center Networks32
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs32
Predicting Network Flow Characteristics Using Deep Learning and Real-World Network Traffic32
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN31
Multi-Agent Based Autonomic Network Management Architecture31
Burst Traffic Scheduling for Hybrid E/O Switching DCN: An Error Feedback Spiking Neural Network Approach31
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey31
In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches31
DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks30
DDQP: A Double Deep Q-Learning Approach to Online Fault-Tolerant SFC Placement30
RESDN: A Novel Metric and Method for Energy Efficient Routing in Software Defined Networks29
Can Fine-Grained Functional Split Benefit to the Converged Optical-Wireless Access Networks in 5G and Beyond?29
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems29
LogClass: Anomalous Log Identification and Classification With Partial Labels29
P8: P4 With Predictable Packet Processing Performance29
Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset28
5MART: A 5G SMART Scheduling Framework for Optimizing QoS Through Reinforcement Learning28
Chronos: DDoS Attack Detection Using Time-Based Autoencoder28
Workflow-Aware Automatic Fault Diagnosis for Microservice-Based Applications With Statistics27
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification27
An Efficient Approach to Robust SDN Controller Placement for Security27
Throughput-Aware Partitioning and Placement of Applications in Fog Computing27
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks27
Data Fusion Oriented Graph Convolution Network Model for Rumor Detection27
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election27
Backup Network Design Against Multiple Link Failures to Avoid Link Capacity Overestimation26
Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G26
Mobility-Aware Seamless Handover With MPTCP in Software-Defined HetNets26
Dynamic Controller Assignment in Software Defined Internet of Vehicles Through Multi-Agent Deep Reinforcement Learning26
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control26
Neural and Attentional Factorization Machine-Based Web API Recommendation for Mashup Development26
Fine-Grained Cloud Resource Provisioning for Virtual Network Function26
Throughput Optimization and Delay Guarantee VNF Placement for Mapping SFC Requests in NFV-Enabled Networks26
Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation26
Risk-Aware Edge Computation Offloading Using Bayesian Stackelberg Game26
Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification26
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection26
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain26
Caching Popular Transient IoT Contents in an SDN-Based Edge Infrastructure26
Reliability-Oriented and Resource-Efficient Service Function Chain Construction and Backup26
DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking25
Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning25
Risk-Aware Energy Scheduling for Edge Computing With Microgrid: A Multi-Agent Deep Reinforcement Learning Approach25
Dynamic Distributed Multi-Path Aided Load Balancing for Optical Data Center Networks25
Sub-Linear Scalability of MQTT Clusters in Topic-Based Publish-Subscribe Applications25
Improving End-Users Utility in Software-Defined Wide Area Network Systems25
Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method25
SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment25
SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks24
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services24
Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking24
A New Mutual Authentication and Key Agreement Protocol for Mobile Client—Server Environment24
NFV Platforms: Taxonomy, Design Choices and Future Challenges24
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems23
Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads23
Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks23
Code Caching-Assisted Computation Offloading and Resource Allocation for Multi-User Mobile Edge Computing23
NDMF: Neighborhood-Integrated Deep Matrix Factorization for Service QoS Prediction23
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks23
Dynamic Allocation of Computing and Communication Resources in Multi-Access Edge Computing for Mobile Users23
Joint Optimization With DNN Partitioning and Resource Allocation in Mobile Edge Computing23
Multi-Objective Deep Reinforcement Learning Assisted Service Function Chains Placement22
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding22
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks22
Robust Service Provisioning With Service Function Chain Requirements in Mobile Edge Computing22
DeepCC: Multi-Agent Deep Reinforcement Learning Congestion Control for Multi-Path TCP Based on Self-Attention22
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection22
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks22
Availability-Aware and Energy-Efficient Virtual Cluster Allocation Based on Multi-Objective Optimization in Cloud Datacenters21
Time-Sensitive Mobile User Association and SFC Placement in MEC-Enabled 5G Networks21
Tensor-Based Recurrent Neural Network and Multi-Modal Prediction With Its Applications in Traffic Network Management21
pHeavy: Predicting Heavy Flows in the Programmable Data Plane21
FlexChain: Bridging Parallelism and Placement for Service Function Chains21
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks21
Assessing Container Network Interface Plugins: Functionality, Performance, and Scalability21
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model21
Joint Resource Optimization and Delay-Aware Virtual Network Function Migration in Data Center Networks21
Soft-Failure Detection, Localization, Identification, and Severity Prediction by Estimating QoT Model Input Parameters21
MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem20
Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks20
Reliable and Efficient Multimedia Service Optimization for Edge Computing-Based 5G Networks: Game Theoretic Approaches20
Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems20
TSSM: Time-Sharing Switch Migration to Balance Loads of Distributed SDN Controllers20
Data-Driven RAN Slicing Mechanisms for 5G and Beyond20
Practical Intrusion Detection of Emerging Threats20
DeepEdge: A New QoE-Based Resource Allocation Framework Using Deep Reinforcement Learning for Future Heterogeneous Edge-IoT Applications20
A Dynamic and Collaborative Multi-Layer Virtual Network Embedding Algorithm in SDN Based on Reinforcement Learning20
Virtual Network Function Allocation to Maximize Continuous Available Time of Service Function Chains With Availability Schedule20
Optimized Joint Allocation of Radio, Optical, and MEC Resources for the 5G and Beyond Fronthaul20
CoScal: Multifaceted Scaling of Microservices With Reinforcement Learning20
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services20
A Scalable Approach to SDN Control Plane Management: High Utilization Comes With Low Latency20
Cross-Network-Slice Authentication Scheme for the 5 th Generation Mobile Communication System20
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks20
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains20
BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN19
Adaptive Computation Offloading Policy for Multi-Access Edge Computing in Heterogeneous Wireless Networks19
Online Sparse BLSTM Models for Resource Usage Prediction in Cloud Datacentres19
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices19
Deploying SDN Control in Internet of UAVs: Q-Learning-Based Edge Scheduling19
In-Band Network Monitoring Technique to Support SDN-Based Wireless Networks19
A Forecasting Approach to Improve Control and Management for 5G Networks19
OSCAR: On Optimizing Resource Utilization in Live Video Streaming19
Resource Allocation in an Open RAN System Using Network Slicing19
RoPE: An Architecture for Adaptive Data-Driven Routing Prediction at the Edge19
Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning19
Traffic Engineering With Three-Segments Routing19
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning19
A Survey on Blockchain-Based Telecommunication Services Marketplaces19
Blockchain State Sharding With Space-Aware Representations18
A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network18
Uncovering Lateral Movement Using Authentication Logs18
Machine Learning-Based Radio Coverage Prediction in Urban Environments18
Uncertainty-Aware Resource Provisioning for Network Slicing18
Accelerating Virtual Network Functions With Fast-Slow Path Architecture Using eXpress Data Path18
AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks18
SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network18
Optimized IoT Service Chain Implementation in Edge Cloud Platform: A Deep Learning Framework18
Mosaic: Advancing User Quality of Experience in 360-Degree Video Streaming With Machine Learning18
Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support18
Traffic Engineering in Segment Routing Networks Using MILP18
Joint Progressive Network and Datacenter Recovery After Large-Scale Disasters18
Multi-Domain Network Slicing With Latency Equalization18
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks18
Mobile Traffic Classification Through Physical Control Channel Fingerprinting: A Deep Learning Approach18
DNS Tunneling Detection by Cache-Property-Aware Features18
A Network Intelligence Architecture for Efficient VNF Lifecycle Management18
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller18
E2E QoS Guarantee for the Tactile Internet via Joint NFV and Radio Resource Allocation18
Distributed Evolutionary Hyperparameter Optimization for Fuzzy Time Series18
Towards Optimal Parallelism-Aware Service Chaining and Embedding18
Estimation of the Quality of Experience During Video Streaming From Facial Expression and Gaze Direction17
Disaster Protection in Inter-DataCenter Networks Leveraging Cooperative Storage17
GMTA: A Geo-Aware Multi-Agent Task Allocation Approach for Scientific Workflows in Container-Based Cloud17
Outage Analysis and Reliability Enhancement of Hybrid VLC-RF Networks Using Cooperative Non-Orthogonal Multiple Access17
Deadline-Aware SFC Orchestration Under Demand Uncertainty17
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory17
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement17
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning17
TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection17
A Privacy-Preserving Reinforcement Learning Algorithm for Multi-Domain Virtual Network Embedding17
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method17
A Novel Autonomous Profiling Method for the Next-Generation NFV Orchestrators17
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks17
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks17
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection17
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities17
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold17
Bloom Filter With a False Positive Free Zone16
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond16
QoS Time Series Modeling and Forecasting for Web Services: A Comprehensive Survey16
Study of Virtual Network Function Placement in 5G Cloud Radio Access Network16
SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing16
Joint Computation Offloading and Resource Allocation Under Task-Overflowed Situations in Mobile-Edge Computing16
A Service-Centric Q-Learning Algorithm for Mobility Robustness Optimization in LTE16
Delay-Sensitive Multi-Source Multicast Resource Optimization in NFV-Enabled Networks: A Column Generation Approach16
Bandwidth Allocation of Stream-Reservation Traffic in TSN16
Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem16
Anomaly-Aware Network Traffic Estimation via Outlier-Robust Tensor Completion16
Decentralized On-Chain Data Access via Smart Contracts in Ethereum Blockchain16
IntFlow: Integrating Per-Packet and Per-Flowlet Switching Strategy for Load Balancing in Datacenter Networks16
Optimal Network Slicing for Service-Oriented Networks With Flexible Routing and Guaranteed E2E Latency16
Petri Net-Based Reliability Assessment and Migration Optimization Strategy of SFC16
Unavailability-Aware Shared Virtual Backup Allocation for Middleboxes: A Queueing Approach16
Energy Optimization With Multi-Sleeping Control in 5G Heterogeneous Networks Using Reinforcement Learning16
Auto-Scaling Network Service Chains Using Machine Learning and Negotiation Game16
STAD: Spatio-Temporal Anomaly Detection Mechanism for Mobile Network Management15
A Scaling Mechanism for an Evolved Packet Core Based on Network Functions Virtualization15
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs15
A Packet Loss Monitoring System for In-Band Network Telemetry: Detection, Localization, Diagnosis and Recovery15
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms15
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods15
Over-the-Air Software-Defined Vehicle Updates Using Federated Fog Environment15
Multi-Path Selection and Congestion Control for NDN: An Online Learning Approach15
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting15
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model15
ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks15
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks15
Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks15
0.030110120773315