IEEE Transactions on Network and Service Management

Papers
(The TQCC of IEEE Transactions on Network and Service Management is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Table of contents197
Delay-Aware Joint Microservice Deployment and Request Routing in Multi-Edge Environments Based on Reinforcement Learning176
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows168
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond149
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services130
Multi-Path Selection and Congestion Control for NDN: An Online Learning Approach121
Highly-Efficient and Adaptive Network Monitoring: When INT Meets Segment Routing118
LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data106
Real-Time Classification of Real-Time Communications105
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks95
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network93
Table of Contents87
Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-Attention83
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives81
Blockchain-Aided and Privacy-Preserving Data Governance in Multi-Stakeholder Applications80
Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain79
Blockchain-Based Computing Resource Trading in Autonomous Multi-Access Edge Network Slicing: A Dueling Double Deep Q-Learning Approach79
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment78
Cooperative Multi-UAV Positioning for Aerial Internet Service Management: A Multi-Agent Deep Reinforcement Learning Approach75
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms74
Table of Contents73
Table of Contents71
Table of Contents67
Autonomous Flow Routing for Near Real-Time Quality of Service Assurance63
HFL-TranWGAN: Knowledge-Driven Cross-Domain Collaborative Anomaly Detection for End-to-End Network Slicing63
Federated Learning Assisted Deep Q-Learning for Joint Task Offloading and Fronthaul Segment Routing in Open RAN62
PPTMon: Real-Time and Fine-Grained Packet Processing Time Monitoring in Virtual Network Functions61
Q-Secure-P²-SMA: Quantum-Secure Privacy- Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid61
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods57
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems56
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining54
zkFabLedger: Enabling Privacy Preserving and Regulatory Compliance in Hyperledger Fabric51
Auditable Homomorphic-Based Decentralized Collaborative AI with Attribute-based Differential Privacy51
JLOS: a Cooperative UAV-Based Optical Wireless Communication With Multi-Agent Reinforcement Learning50
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks50
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature?48
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds47
An Intelligent Scheme for Energy-Efficient Uplink Resource Allocation With QoS Constraints in 6G Networks47
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection47
UCBEE: A Multi Armed Bandit Approach for Early-Exit in Neural Networks47
Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks45
Table of Contents44
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access43
MTP-NT: A Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data43
Priority-Dominated Traffic Scheduling Enabled ATS in Time-Sensitive Networking42
A Packet Loss Monitoring System for In-Band Network Telemetry: Detection, Localization, Diagnosis and Recovery41
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks40
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks39
Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning39
Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks39
Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based Approach39
Optimization Model for Multiple Backup Resource Allocation With Workload-Dependent Failure Probability39
A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training39
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method39
Interference-Aware NFV-Enabled Multicast Service in Resource-Constrained Wireless Mesh Networks38
Deployable Models for Approximating Web QoE Metrics From Encrypted Traffic38
Diversity-by-Design for Dependable and Secure Cyber-Physical Systems: A Survey38
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs38
Fault Prediction for Heterogeneous Telecommunication Networks Using Machine Learning: A Survey37
Supporting Dynamic Insertions in xor and Binary Fuse Filters With the Integrated xor/BIF-Bloom Filter36
VNF Embedding and Assignment for Network Function Parallelism36
MARC: On Modeling and Analysis of Software-Defined Radio Access Network Controllers36
On the Upgrade of Service Function Chains With Heterogeneous NFV Platforms36
AI-driven, Context-Aware Profiling for 5G and Beyond Networks36
Reinforcement Learning-Based Adaptive Bitrate Caching at MEC Server36
Optimal Estimation of Link Delays Based on End-to-End Active Measurements36
Multi-Service Edge Computing Management With Multi-Stage Coalition Game Task Offloading36
CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN36
Predictive UAV Base Station Deployment and Service Offloading With Distributed Edge Learning36
Amount-Based Covert Communication Over Blockchain36
Accelerating Deep Packet Inspection With SIMD-Based Multi-Literal Matching Engine35
OptRISQL: Toward Performance Improvement of Time-Varying IoT Networks Using Q-Learning35
Service Chain Provisioning With Sub-Chain-Enabled Coordinated Protection to Satisfy Availability Requirements35
Self-Supervised Traffic Classification: Flow Embedding and Few-Shot Solutions34
Resource Breadcrumbs: Discovering Edge Computing Resources Over Named Data Networking34
Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference34
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture34
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers34
On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation, and Dataset33
Improve the Energy Efficiency of Datacenters With the Awareness of Workload Variability33
Energy and Delay Aware General Task Dependent Offloading in UAV-Aided Smart Farms33
VNF Placement and Dynamic NUMA Node Selection Through Core Consolidation at the Edge and Cloud33
Techno-Socio-Economic Impact of Joint Energy Resource Allocation Scheme in FiWi Network33
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things33
ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks33
ProactMP: A Proactive Multipath Transport Protocol for Low-Latency Datacenters33
Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future Internet32
A QoS Guaranteed Efficient Integration of UPF and LEO Satellite Networks32
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach32
Three-Dimensional Tradeoffs for Consensus Algorithms: A Review32
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation31
Large-Scale Machine Learning Cluster Scheduling via Multi-Agent Graph Reinforcement Learning31
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach31
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis31
Joint Bandwidth and Key on Demand (BKoD) Provisioning for Dynamic Service of Optical Transport Networks in F6G31
The Evolution of Mining Pools and Miners’ Behaviors in the Bitcoin Blockchain31
Deep Learning Model for Content Aware Caching at MEC Servers31
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold31
TPMCF: Temporal QoS Prediction Using Multi-Source Collaborative Features31
Memory Network Architecture for Packet Processing in Functions Virtualization30
GenSync: A New Framework for Benchmarking and Optimizing Reconciliation of Data30
Toward Adaptive Joint Node and Link Mapping Algorithms for Embedding Virtual Networks: A Conciliation Strategy30
Distributed Tactical TE With Segment Routing30
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks30
DeepAir: Deep Reinforcement Learning for Adaptive Intrusion Response in Software-Defined Networks30
A Semantic Detection Method for Network Flows With Global and Generalized Nature30
Performance Modeling and Analysis of P4 Programmable Devices With General Service Times30
Incremental Performance Analysis for Accelerating Verification of TSN Network Reconfigurations29
IntStream: Towards Flexible, Expressive, and Scalable Network Telemetry29
Control Message Quenching-Based Communication Protocol for Energy Management in SDWSN29
Selective Edge Computing for Mobile Analytics29
TINetS3: SDN-Driven Network Slicing Enabling Scenario-Based Applications in Tactile Internet29
Presync: An Efficient Transaction Synchronization Protocol to Accelerate Block Propagation29
Learning-Based Multi-Drone Network Edge Orchestration for Video Analytics29
Artificial Neural Network-Aided Multiclass Service Provisioning and Prioritization in EONs28
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion28
Availability-Aware and Delay-Sensitive RAN Slicing Mapping Based on Deep Reinforcement Learning in Elastic Optical Networks28
Multi-Domain TSN Orchestration and Management for Large-Scale Industrial Networks28
Traffic Engineering for Software-Defined LEO Constellations28
GreenShield: Optimizing Firewall Configuration for Sustainable Networks28
Over-the-Air Software-Defined Vehicle Updates Using Federated Fog Environment28
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay28
DGS: An Efficient Delay-Guaranteed Scheduling Framework for Wireless Deterministic Networking28
MPC-Based 5G uRLLC Rate Calculation27
Dynamic Flow Scheduling for DNN Training Workloads in Data Centers27
CoSIS: A Secure, Scalability, Decentralized Blockchain via Complexity Theory27
Resilient Control Plane Design for Virtualized 6G Core Networks27
DLLF-2EN: Energy-Efficient Next Generation Mobile Network With Deep Learning-Based Load Forecasting27
Robust Access Point Clustering in Edge Computing Resource Optimization27
QoE Estimation Across Different Cloud Gaming Services Using Transfer Learning27
Meta-Peering: Automating ISP Peering Decision Process26
Time-Distributed Feature Learning for Internet of Things Network Traffic Classification26
Resilience of Delay-Sensitive Services With Transport-Layer Monitoring in SD-WAN26
Distributed Learning Framework for eMBB-URLLC Multiplexing in Open Radio Access Networks26
LRB: Locally Repairable Blockchain for IoT Integration26
Investigating the Dependability of Software-Defined IIoT-Edge Networks for Next-Generation Offshore Wind Farms26
Restoring Application Traffic of Latency-Sensitive Networked Systems Using Adversarial Autoencoders26
ML-Based Performance Modeling in SDN-Enabled Data Center Networks25
Multiobjective Genetic Algorithm for Fast Service Function Chain Reconfiguration25
Spatial-Temporal Edge User Allocation: An Expectation Confirmation Perspective Approach25
Dynamic Application Call Graph Formation and Service Identification in Cloud Data Centers25
Reliable Backhauling in Aerial Communication Networks Against UAV Failures: A Deep Reinforcement Learning Approach25
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy25
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network25
Accelerating Protocol Oblivious Forwarding Programmable Data Plane With Flow Cache25
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks25
REVAL: Recommend Which Variables to Log With Pretrained Model and Graph Neural Network24
DRel: Dynamically Assigning Per-Packet Reliability at the Transport Layer24
Energy-Efficient Joint Task Assignment and Migration in Data Centers: A Deep Reinforcement Learning Approach24
FeD-TST: Federated Temporal Sparse Transformers for QoS prediction in Dynamic IoT Networks24
SHAPE: A Simultaneous Header and Payload Encoding Model for Encrypted Traffic Classification24
UaaS-SFL: Unlearning as a Service for Safeguarding Federated Learning24
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things24
A Software-Defined Networking Solution for Transparent Session and Service Continuity in Dynamic Multi-Access Edge Computing24
Service Deployment Model Based on Virtual Network Function Resizing24
Toward Security-Enhanced In-band Network Telemetry in Programmable Networks24
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge24
A Price-Incentive Resource Auction Mechanism Balancing the Interests Between Users and Cloud Service Provider24
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling23
Robust Deployment Model for Parallelized Service Function Chains Against Uncertain Traffic Arrival Rates23
Modeling MTC and HTC Radio Access in a Sliced 5G Base Station23
Fault Diagnosis in Industrial Control Networks Using Transferability-Measured Adversarial Adaptation Network23
Adaptive Scheduling of Shared Grant-Free Resources for Heterogeneous Massive Machine type Communication in 5G and Beyond Networks23
Influence- and Interest-Based Worker Recruitment in Crowdsourcing Using Online Social Networks23
Notice of Violation of IEEE Publication Principles: Data Trading with Competitive Social Platforms: Outcomes are Mostly Privacy Welfare Damaging23
A Receiver-Driven Transport Protocol With High Link Utilization Using Anti-ECN Marking in Data Center Networks23
Delay-Aware Control Plane Virtual Topology Design of Software Defined-Elastic Optical Network23
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain23
Supervised and Semi-Supervised Learning for Failure Identification in Microwave Networks23
Adaptive and Reinforcement Learning Approaches for Online Network Monitoring and Analysis22
Virtual Network Embedding for NGSO Systems: Algorithmic Solution and SDN-Testbed Validation22
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management22
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows22
Application-Driven Provisioning of Service Function Chains Over Heterogeneous NFV Platforms22
Understanding Data Usage Patterns of Geographically Diverse Mobile Users22
On the Cross-Layer Network Planning for Flexible Ethernet Over Elastic Optical Networks22
Balancing Performance and Energy Consumption of Bagging Ensembles for the Classification of Data Streams in Edge Computing22
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket22
On the Bilevel Optimization to Design Control Plane for SDONs in Consideration of Planned Physical-Layer Attacks22
Detecting Unseen Anomalies in Network Systems by Leveraging Neural Networks22
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment22
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection22
Reducing Microservices Interference and Deployment Time in Resource-Constrained Cloud Systems22
IEEE 802.11ax Meet Edge Computing: AP Seamless Handover for Multi-Service Communications in Industrial WLAN22
Communitychain: Toward a Scalable Blockchain in Smart Home21
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection21
Renewable Energy Provision and Energy-Efficient Operational Management for Sustainable 5G Infrastructures21
Supporting Sustainable Virtual Network Mutations With Mystique21
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks21
Low-Latency Dimensional Expansion and Anomaly Detection Empowered Secure IoT Network21
Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management21
Resilient Control Plane Design for Virtual Software Defined Networks21
MiddleNet: A Unified, High-Performance NFV and Middlebox Framework With eBPF and DPDK21
Joint Dataset Reconstruction and Power Control for Distributed Training in D2D Edge Network20
Smart Policy Control for Securing Federated Learning Management System20
Programmable Name Obfuscation Framework for Controlling Privacy and Performance on CCN20
Re-Scheduling IoT Services in Edge Networks20
On the Optimal Deployment of Virtual Network Functions in Non-Terrestrial Segments20
Unavailability-Aware Backup Allocation Model Based on Two-Stage Shared Protection for Middleboxes20
Integrated Sensing, Localization, and Communication in Holographic MIMO-Enabled Wireless Network: A Deep Learning Approach20
FortunChain: EC-VRF-Based Scalable Blockchain System for Realizing State Sharding20
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks20
User-Centric Slice Allocation Scheme in 5G Networks and Beyond20
Cost-Efficient Cluster Migration of VNFs for Service Function Chain Embedding20
DECC: Achieving Low Latency in Data Center Networks With Deep Reinforcement Learning20
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources20
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments20
Accelerating Reinforcement Learning via Predictive Policy Transfer in 6G RAN Slicing20
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification20
HVMM: A Holistic Virtual Machine Management Strategy for Cloud Data Centers20
Performance of Spatially Diverse URLLC and eMBB Traffic in Cell Free Massive MIMO Environments19
Adaptive Reliability for the Automated Control of Human–Robot Collaboration in Beyond-5G Networks19
Planning of Survivable Wavelength-Switched Optical Networks Based on P2MP Transceivers19
Energy Efficient Clustering and Resource Allocation Strategy for Ultra-Dense Networks: A Machine Learning Framework19
IoMT: A Medical Resource Management System Using Edge Empowered Blockchain Federated Learning19
QSKA: A Quantum Secured Privacy-Preserving Mutual Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication19
A Neighborhood Aware Caching and Interest Dissemination Scheme for Content Centric Networks19
Multi-Agent Deep Reinforcement Learning for Coordinated Multipoint in Mobile Networks19
Joint Optimization of Radio Resources and Coverage Enhancement in Massive Microgrid Networks19
Improved Chemical Reaction Optimization With Fitness-Based Quasi-Reflection Method for Scheduling in Hybrid Cloud-Fog Environment19
SecEdge: Secure Edge-Computing-Based Hybrid Approach for Data Collection and Searching in IoV19
Graph-Based Data Publication via Differentially Structural Inference19
OROS: Online Operation and Orchestration of Collaborative Robots Using 5G19
ROBUST: A Reliable and Flexible Media Transport for Real-Time Services19
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security19
Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games19
CauseFormer: Interpretable Anomaly Detection With Stepwise Attention for Cloud Service19
FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource-Constrained Devices Using Divide and Collaborative Training19
Semi-Decentralized Federated Edge Learning With Data and Device Heterogeneity18
A Cooperative Computation Offloading Strategy With On-Demand Deployment of Multi-UAVs in UAV-Aided Mobile Edge Computing18
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation18
Service Prioritization in Information Centric Networking With Heterogeneous Content Providers18
Reliable Federated Learning With GAN Model for Robust and Resilient Future Healthcare System18
Optimal Network Slicing for Service-Oriented Networks With Flexible Routing and Guaranteed E2E Latency18
Dependency-Aware Dynamic Task Offloading Based on Deep Reinforcement Learning in Mobile-Edge Computing18
Avoiding Flow Size Overestimation in Count-Min Sketch With Bloom Filter Constructions18
CD-LwTE: Cost- and Delay-Aware Light-Weight Transcoding at the Edge18
A Novel Hybrid Model for Docker Container Workload Prediction18
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid18
Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification18
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior18
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets18
Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method18
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns18
A Hierarchical and Location-Aware Consensus Protocol for IoT-Blockchain Applications18
BECHAIN: A Sharding Blockchain With Higher Security17
Federated Policy Distillation for Digital Twin-Enabled Intelligent Resource Trading in 5G Network Slicing17
R1DIT: Privacy-Preserving Malware Traffic Classification With Attention-Based Neural Networks17
Swarm of UAVs for Network Management in 6G: A Technical Review17
A Hybrid Blockchain-Edge Architecture for Electronic Health Record Management With Attribute-Based Cryptographic Mechanisms17
0.23968005180359