IEEE Transactions on Network and Service Management

Papers
(The TQCC of IEEE Transactions on Network and Service Management is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature?192
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access160
Table of Contents153
Robust Access Point Clustering in Edge Computing Resource Optimization151
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling111
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services108
Bilevel Optimization for Provisioning Heterogeneous Traffic in Deterministic Networks93
Retraction Notice Communication-Efficient Personalized Federated Meta-Learning in Edge Networks92
Table of Contents87
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection83
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows83
Slicing for AI: An Online Learning Framework for Network Slicing Supporting AI Services80
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach74
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks71
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks70
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network66
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems63
Smart Policy Control for Securing Federated Learning Management System62
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment60
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment59
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks59
Efficient Optimization Algorithm for Virtual Backbone in Wireless Sensor Networks by Removing Redundant Dominators58
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection57
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach56
Communication-Efficient Disaggregated and Distributed Federated Learning in NG-RANs56
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion55
The Evolution of Mining Pools and Miners’ Behaviors in the Bitcoin Blockchain54
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain54
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection52
Adaptive Reliability for the Automated Control of Human–Robot Collaboration in Beyond-5G Networks52
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy51
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks50
BECHAIN: A Sharding Blockchain With Higher Security50
Deep Learning Model for Content Aware Caching at MEC Servers50
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation49
A Unified Framework for Hybrid Network Intrusion Detection49
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers48
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things48
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows48
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments48
Topology-Driven Configuration of Emulation Networks With Deterministic Templating47
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks47
An Efficient and Robust Resource Allocation Method for Quantum Key Distribution Networks47
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior47
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay47
HEEDFUL: Leveraging Sequential Transfer Learning for Robust WiFi Device Fingerprinting Amid Hardware Warm-Up Effects47
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation46
On the Upgrade of Service Function Chains With Heterogeneous NFV Platforms46
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket46
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management46
XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P445
From the Beginning: Key Transitions in the First 15 Years of DNSSEC45
A Novel Hybrid Model for Docker Container Workload Prediction45
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars45
Quality and Diversity Balanced Neighbor Selection against Eclipse Attack in Blockchain System44
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC43
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner43
Metis: Selecting Diverse Atlas Vantage Points43
FLATWISE: Flow Latency and Throughput Aware Sensitive Routing for 6DoF VR over SDN43
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems43
Composing eBPF Programs Made Easy With HIKe and eCLAT42
Node-Oriented Slice Reconfiguration Based on Spatial and Temporal Traffic Prediction in Metro Optical Networks42
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs42
Know Where You are: A Practical Privacy-Preserving Semi-Supervised Indoor Positioning via Edge-Crowdsensing42
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection41
DRL-Based Dynamic Resource Allocation for Multi-Beam Satellite Systems41
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN41
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation41
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums41
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction41
Improving Address Clustering in Bitcoin by Proposing Heuristics40
Active Learning for Transformer-Based Fault Diagnosis in 5G and Beyond Mobile Networks40
Multi-Party Payment Channel Network Based on Smart Contract40
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks40
Improving the Stability of Intrusion Detection With Causal Deep Learning39
These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots39
Federated Intelligent Service Function Chain Orchestration in Future 6G Networks39
Robust Distributed Server Selection Model Against Delay Uncertainty38
Availability and Cost Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems38
CARRAS: Combined AOA and RBFNN for Resource Allocation in Single Site 5G Network38
Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques38
A Bi-Level Scheme for Mixed-Motive and Energy-Efficient Task Offloading in Vehicular Edge Computing Systems38
Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model38
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships37
An eBPF-XDP Hardware-Based Network Slicing Architecture for Future 6G Front- to Back-Haul Networks37
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts37
High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality37
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data37
Mobility Management for Cellular-Connected UAVs: Model-Based Versus Learning-Based Approaches for Service Availability37
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks37
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks37
MDU-CACS: A Coordinated Forecasting-Based Cloud-Assisted Dynamic Channel Assignment Mechanism for Wi-Fi Network Clusters36
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment36
A Channel Perceiving-Based Handover Management in Space–Ground Integrated Information Network36
Efficiency of BIER Multicast in Large Networks36
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach36
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms36
A Resource Allocation Model for Mixed-Grid Optical Networks36
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks36
Table of Contents35
Optimized Planning of DU/CU Placement and Flow Routing in 5G Packet Xhaul Networks35
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments35
Backhaul Traffic-Aware Edge Caching for Recommended Content With Personalized Privacy35
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks35
Novel Adaptive Multi-User Multi-Services Scheduling to Enhance Throughput in 5G-Advanced and Beyond35
Table of Contents35
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance34
ANFIS-DBA: ANFIS-Based Dynamic Bandwidth Allocation Scheme for Latency Driven Cost Effective Next Generation PON34
Multi-Agent DRL-Based Two-Timescale Resource Allocation for Network Slicing in V2X Communications34
Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems33
CASE: A Joint Traffic and Energy Optimization Framework Toward Grid Connected Green Future Networks33
Critical Limitations of the Least Outstanding Request Load Balancing Policy in Service Meshes for Large-Scale Microservice Applications33
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission33
A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT32
Detecting Service Disruptions in Large BGP/MPLS VPN Networks32
A Novel Framework for Optical Layer Device Board Failure Localization in Optical Transport Network32
Fair Scheduling and Computation Co-Offloading for Industrial Applications in Fog Networks32
FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC32
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network31
Deep Reinforcement Learning-Based Contract Incentive and Computation Offloading for Mobile Edge Computing-Enabled Blockchain31
Handover-Aware Scheduling for Small- and Large-Scale VLC Networks31
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds31
TraceDAE: Trace-Based Anomaly Detection in Microservice Systems via Dual Autoencoder31
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach31
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking31
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation31
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments30
Minimizing Update Makespan in SDNs Without TCAM Overhead30
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game30
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis30
Design of 5G MEC-Based Networks With 1:N:K Protection Scheme30
Data-Driven Intra-Autonomous Systems Graph Generator30
Managing a Resilient Multitier Architecture for Unstable IoT Networks in Location Based-Services30
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G30
Explainable GNN-Based Approach to Fault Forecasting in Cloud Service Debugging29
Dynamic Fog Federation Scheme for Internet of Vehicles29
Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks29
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain29
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN29
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services—Part II29
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure28
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location28
Estimating Video on Demand QoE From Network QoS Through ICMP Probes28
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things28
A Comprehensive Benchmark of Flannel CNI in SDN/non-SDN Enabled Cloud-Native Environments28
AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification28
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates28
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission27
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers27
Correction to “Optimal Subscription Policies for Participation-Dependent Social-Learning Markets”27
Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows27
Extending WebAssembly for Deep-Learning Inference Across the Cloud Continuum27
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing27
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning27
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping27
Collaborative Cloud Resource Management and Task Consolidation Using JAYA Variants27
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks27
Redactable Blockchain-Based Secure and Accountable Data Management27
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing27
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory27
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems27
Neural Attention Networks for Recommendation With Auxiliary Data27
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA27
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results27
Key Flow First Prioritized Flow Scheduling Strategy in Multi-Tenant Data Centers27
Incremental Survivability Enhancement in Mobile Crowdsensing Systems26
Adaptive One Memory Access Bloom Filters26
An RL-based Framework for Task Offloading and Resource Allocation in Energy Harvesting-based Multi-Access Edge Computing26
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation26
Automated Service Provisioning and Hierarchical SLA Management in 5G Systems26
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System26
Urban Mobile Data Prediction With Geospatial Clustering and Dual Residual Learning26
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering26
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning26
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation26
Distributed Model Training Task Migration for Hotspot Management in Intelligent Computing Center Interconnection with Tidal Characteristics25
Scalable Storage Optimization for Blockchain-Based Cross-Domain Authentication in IoT25
A Dynamic Cascading Failure Model for LEO Satellite Networks25
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain25
FastScheduler: Polynomial-Time Scheduling for Time-Triggered Flows in TSN25
A Deep RL Approach on Task Placement and Scaling of Edge Resources for Cellular Vehicle-to-Network Service Provisioning25
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane25
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment25
AI Anomaly Detection for Cloudified Mobile Core Architectures25
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas25
Identifying a Malicious Node in a UAV Network25
From an In-Depth Understanding of Multipath TCP Enhancement Schemes to an Adaptive Control Framework in Wireless Networks25
Age of Information Optimization in RIS-Assisted Wireless Networks25
Dynamic Management of Constrained Computing Resources for Serverless Services25
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus25
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks24
End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows24
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing24
Self-Imitation Learning-Based Inter-Cell Interference Coordination in Autonomous HetNets24
TSEngine: Enable Efficient Communication Overlay in Distributed Machine Learning in WANs24
On Demand Fog Federations for Horizontal Federated Learning in IoV24
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management24
Proactive and AoI-Aware Failure Recovery for Stateful NFV-Enabled Zero-Touch 6G Networks: Model-Free DRL Approach24
Towards a Distributed Caching Service at the WiFi Edge Using Wi-Cache24
Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security24
Maximizing Utility Joint Optimization Based on Edge Full Cooperation23
Table of Contents23
Paxos With Priorities for Blockchain Applications23
An Intelligent Blockchain-Assisted Cooperative Framework for Industry 4.0 Service Management23
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing23
Efficient Multi-Broker Load Balancing in Event Driven Pub-Sub Networks23
Detecting Cloud Anomaly via Broad Network-Based Contrastive Autoencoder23
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring23
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul23
Table of Contents23
Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach23
SFCache: Hybrid NF Synthesization in Runtime With Rule-Caching in Programmable Switches23
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process22
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G22
Cluster and Conquer: Malicious Traffic Classification at the Edge22
Blockchain Storage Optimisation With Multi-Level Distributed Caching22
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services22
Intent-Based Service Provisioning and Closed-Loop Automation for Cobot Service Migration in a Multi-Stakeholder Environment22
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks22
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning22
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks21
RibsNet: A Scalable, High-Performance, and Cost-Effective Two-Layer-Based Cloud Data Center Network Architecture21
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning21
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment21
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking21
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning21
Optimized FlexEthernet for Inter-Domain Traffic Restoration21
A GNN-Based Autopilot Recommendation Strategy to Mitigate Payment Channel Imbalance Problem in Bitcoin Lightning Network21
Fed-RWM: A Robust WaterMarking Approach for Federated Learning Model Ownership Protection21
P4-Secure: In-Band DDoS Detection in Software Defined Networks21
Mobility-Aware MEC Planning With a GNN-Based Graph Partitioning Framework21
Towards Reliable Remote Health Monitoring in Fog Computing Networks21
An Efficient Website Fingerprinting for New Websites Emerging Based on Incremental Learning21
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks21
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction21
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks21
Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT21
Privacy-Preserving Deployment Mechanism for Service Function Chains Across Multiple Domains21
Embracing Complexity: Agent-Based Modeling for HetNets Design and Optimization via Concurrent Reinforcement Learning Algorithms20
ML-Based Handover Prediction Over a Real O-RAN Deployment Using RAN Intelligent Controller20
A Group-Based Block Storage Model With Block Splitting and Unit Encoding for Consortium Blockchains20
Table of Contents20
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks20
Practical Intrusion Detection of Emerging Threats20
Table of Contents20
Multi-Beam Satellite Optical Networks: A Joint Time-Slot Resource Scheduling for End-to-End Services From a Networking Perspective20
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey20
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning20
KDN-Based Fault-Tolerant Scheduling for VNFs in Data Centers20
RoPA: Robust Privacy-Preserving Forward Aggregation for Split Vertical Federated Learning20
0.22711205482483