IEEE Transactions on Network and Service Management

Papers
(The TQCC of IEEE Transactions on Network and Service Management is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature?214
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access176
Table of Contents146
On the Bilevel Optimization to Design Control Plane for SDONs in Consideration of Planned Physical-Layer Attacks138
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows133
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection105
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior102
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks90
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay89
Robust Access Point Clustering in Edge Computing Resource Optimization86
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling81
On the Upgrade of Service Function Chains With Heterogeneous NFV Platforms76
Table of Contents72
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows71
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks64
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach63
Retraction Notice: Communication-Efficient Personalized Federated Meta-Learning in Edge Networks61
A Novel Hybrid Model for Docker Container Workload Prediction60
Smart Policy Control for Securing Federated Learning Management System59
The Evolution of Mining Pools and Miners’ Behaviors in the Bitcoin Blockchain58
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain54
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs53
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems53
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach51
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection50
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management50
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things49
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy48
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks48
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket46
Adaptive Reliability for the Automated Control of Human–Robot Collaboration in Beyond-5G Networks45
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services45
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers45
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network44
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments44
Deep Learning Model for Content Aware Caching at MEC Servers44
An Efficient and Robust Resource Allocation Method for Quantum Key Distribution Networks44
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks43
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment43
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation43
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation43
BECHAIN: A Sharding Blockchain With Higher Security43
Topology-Driven Configuration of Emulation Networks With Deterministic Templating43
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services43
Bilevel Optimization for Provisioning Heterogeneous Traffic in Deterministic Networks43
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection42
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion42
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction41
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks41
CARRAS: Combined AOA and RBFNN for Resource Allocation in Single Site 5G Network41
Know Where You are: A Practical Privacy-Preserving Semi-Supervised Indoor Positioning via Edge-Crowdsensing41
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment41
Mobility Management for Cellular-Connected UAVs: Model-Based Versus Learning-Based Approaches for Service Availability41
Metis: Selecting Diverse Atlas Vantage Points41
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN40
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment40
A Channel Perceiving-Based Handover Management in Space–Ground Integrated Information Network40
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection40
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs40
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars39
Composing eBPF Programs Made Easy With HIKe and eCLAT39
Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques39
Node-Oriented Slice Reconfiguration Based on Spatial and Temporal Traffic Prediction in Metro Optical Networks38
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC38
Robust Distributed Server Selection Model Against Delay Uncertainty38
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner38
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms38
A Bi-level Scheme for Mixed-Motive and Energy-Efficient Task Offloading in Vehicular Edge Computing Systems38
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation38
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks38
From the Beginning: Key Transitions in the First 15 Years of DNSSEC38
Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model37
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums37
Improving Address Clustering in Bitcoin by Proposing Heuristics37
These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots37
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships36
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts36
XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P436
An eBPF-XDP Hardware-Based Network Slicing Architecture for Future 6G Front- to Back-Haul Networks36
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks35
Multi-Party Payment Channel Network Based on Smart Contract34
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks34
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data34
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks34
Improving the Stability of Intrusion Detection With Causal Deep Learning34
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems34
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach34
DRL-Based Dynamic Resource Allocation for Multi-Beam Satellite Systems34
Table of Contents34
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks33
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments33
MDU-CACS: A Coordinated Forecasting-Based Cloud-Assisted Dynamic Channel Assignment Mechanism for Wi-Fi Network Clusters33
Table of Contents33
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance33
CASE: A Joint Traffic and Energy Optimization Framework Toward Grid Connected Green Future Networks33
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location33
Novel Adaptive Multi-User Multi-Services Scheduling to Enhance Throughput in 5G-Advanced and Beyond33
Efficiency of BIER Multicast in Large Networks32
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking32
Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows32
A Resource Allocation Model for Mixed-Grid Optical Networks32
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure32
AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification32
Optimized Planning of DU/CU Placement and Flow Routing in 5G Packet Xhaul Networks32
Dynamic Fog Federation Scheme for Internet of Vehicles32
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results32
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks32
Deep Reinforcement Learning Based Contract Incentive and Computation Offloading for Mobile Edge Computing-Enabled Blockchain31
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments31
Managing a Resilient Multitier Architecture for Unstable IoT Networks in Location Based-Services31
Design of 5G MEC-Based Networks With 1:N:K Protection Scheme31
A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT31
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission31
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things30
Game-Theoretic Framework for Malicious Controller Detection in Software Defined Networks30
Data-Driven Intra-Autonomous Systems Graph Generator30
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain30
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game30
Minimizing Update Makespan in SDNs Without TCAM Overhead30
ANFIS-DBA: ANFIS-Based Dynamic Bandwidth Allocation Scheme for Latency Driven Cost Effective Next Generation PON30
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services—Part II30
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G30
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN29
TraceDAE: Trace-Based Anomaly Detection in Micro-Service Systems via Dual Autoencoder29
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds29
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates29
Estimating Video on Demand QoE From Network QoS Through ICMP Probes29
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA29
Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks29
Redactable Blockchain-Based Secure and Accountable Data Management29
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation29
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks29
Detecting Service Disruptions in Large BGP/MPLS VPN Networks28
FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC28
Handover-Aware Scheduling for Small- and Large-Scale VLC Networks28
A Novel Framework for Optical Layer Device Board Failure Localization in Optical Transport Network28
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach28
Critical Limitations of the Least Outstanding Request Load Balancing Policy in Service Meshes for Large-Scale Microservice Applications28
Fair Scheduling and Computation Co-Offloading for Industrial Applications in Fog Networks28
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network28
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis28
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation27
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul27
Neural Attention Networks for Recommendation With Auxiliary Data27
End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows27
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas27
Multi-Agent DRL-Based Two-Timescale Resource Allocation for Network Slicing in V2X Communications27
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers26
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping26
A Dynamic Cascading Failure Model for LEO Satellite Networks26
Adaptive One Memory Access Bloom Filters26
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing26
Key Flow First Prioritized Flow Scheduling Strategy in Multi-Tenant Data Centers26
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems26
Correction to “Optimal Subscription Policies for Participation-Dependent Social-Learning Markets”26
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning26
Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security26
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System26
Automated Service Provisioning and Hierarchical SLA Management in 5G Systems25
Age of Information Optimization in RIS-Assisted Wireless Networks25
Towards a Distributed Caching Service at the WiFi Edge Using Wi-Cache25
Dynamic Management of Constrained Computing Resources for Serverless Services25
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane25
Proactive and AoI-Aware Failure Recovery for Stateful NFV-Enabled Zero-Touch 6G Networks: Model-Free DRL Approach25
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory25
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation25
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment25
P8: P4 With Predictable Packet Processing Performance25
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management25
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus25
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning24
A Deep RL Approach on Task Placement and Scaling of Edge Resources for Cellular Vehicle-to-Network Service Provisioning24
Scalable Storage Optimization for Blockchain-Based Cross-Domain Authentication in IoT24
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain24
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing24
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission24
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation24
Identifying a Malicious Node in a UAV Network24
Collaborative Cloud Resource Management and Task Consolidation Using JAYA Variants24
AI Anomaly Detection for Cloudified Mobile Core Architectures24
On Demand Fog Federations for Horizontal Federated Learning in IoV24
From An In-Depth Understanding of Multipath TCP Enhancement Schemes to an Adaptive Control Framework in Wireless Networks24
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing23
Table of Contents23
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process23
Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis23
TSEngine: Enable Efficient Communication Overlay in Distributed Machine Learning in WANs23
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering23
Data-Driven Energy Conservation in Cellular Networks: A Systems Approach23
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing23
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey23
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks23
Self-Imitation Learning-Based Inter-Cell Interference Coordination in Autonomous HetNets23
Maximizing Utility Joint Optimization Based on Edge Full Cooperation23
Embracing Complexity: Agent-Based Modeling for HetNets Design and Optimization via Concurrent Reinforcement Learning Algorithms23
Efficient Multi-Broker Load Balancing in Event Driven Pub-Sub Networks23
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks22
SFCache: Hybrid NF Synthesization in Runtime With Rule-Caching in Programmable Switches22
3CP: Coordinated Congestion Control Protocol for Named-Data Networking22
Identifying Networks Vulnerable to IP Spoofing22
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks22
Contrastive Learning Enhanced Intrusion Detection22
An Intelligent Blockchain-Assisted Cooperative Framework for Industry 4.0 Service Management22
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring22
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking22
Table of Contents22
Intent-Based Service Provisioning and Closed-Loop Automation for Cobot Service Migration in a Multi-Stakeholder Environment22
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning22
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction22
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks21
Practical Intrusion Detection of Emerging Threats21
RibsNet: A Scalable, High-Performance, and Cost-Effective Two-Layer-Based Cloud Data Center Network Architecture21
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks21
Privacy-Preserving Deployment Mechanism for Service Function Chains Across Multiple Domains21
Blockchain Storage Optimisation With Multi-Level Distributed Caching21
Paxos With Priorities for Blockchain Applications21
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services21
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks21
Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach21
Optimized FlexEthernet for Inter-Domain Traffic Restoration21
Cluster and Conquer: Malicious Traffic Classification at the Edge21
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning21
Detecting Cloud Anomaly via Broad Network-Based Contrastive Autoencoder21
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning21
Towards Reliable Remote Health Monitoring in Fog Computing Networks21
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment21
Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT21
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks21
Mobility-Aware MEC Planning With a GNN-Based Graph Partitioning Framework21
P4-Secure: In-Band DDoS Detection in Software Defined Networks20
KDN-Based Fault-Tolerant Scheduling for VNFs in Data Centers20
AppShot: A Conditional Deep Generative Model for Synthesizing Service-Level Mobile Traffic Snapshots at City Scale20
Graph Transformer and LSTM Attention for VNF Multi-Step Workload Prediction in SFC20
Table of Contents20
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning20
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs20
Strategic Analysis of Griefing Attack in Lightning Network20
Augmentation-Based Edge Differentially Private Path Publishing in Networks20
Latency-Sensitive Parallel Multi-Path Service Flow Routing With Segmented VNF Processing in NFV-Enabled Networks20
Yuz: Improving Performance of Cluster-Based Services by Near-L4 Session-Persistent Load Balancing20
Table of Contents20
Resource Orchestration and Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks20
SAFAR: Simulated Annealing-Based Flow Allocation Rules for Industrial Networks20
Resilient Multi-Hop Autonomous UAV Networks With Extended Lifetime for Multi-Target Surveillance20
Multi-Beam Satellite Optical Networks: A Joint Time-Slot Resource Scheduling for End-to-End Services From a Networking Perspective20
Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments20
A Group-Based Block Storage Model With Block Splitting and Unit Encoding for Consortium Blockchains20
ML-Based Handover Prediction Over a Real O-RAN Deployment Using RAN Intelligent Controller20
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G20
DRLLog: Deep Reinforcement Learning for Online Log Anomaly Detection19
1.099396944046