# | Title | Journal | Year | Citations |
---|
1 | A survey on security issues in service delivery models of cloud computing | Journal of Network and Computer Applications | 2011 | 1,932 |
2 | A comprehensive survey on vehicular Ad Hoc network | Journal of Network and Computer Applications | 2014 | 1,142 |
3 | Intrusion detection system: A comprehensive review | Journal of Network and Computer Applications | 2013 | 984 |
4 | A survey of network anomaly detection techniques | Journal of Network and Computer Applications | 2016 | 926 |
5 | A survey on trust management for Internet of Things | Journal of Network and Computer Applications | 2014 | 909 |
6 | Internet of Things security: A survey | Journal of Network and Computer Applications | 2017 | 822 |
7 | The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets | Journal of Network and Computer Applications | 2000 | 802 |
8 | A service‐oriented middleware for building context‐aware services | Journal of Network and Computer Applications | 2005 | 729 |
9 | A survey of intrusion detection techniques in Cloud | Journal of Network and Computer Applications | 2013 | 678 |
10 | A survey of intrusion detection in Internet of Things | Journal of Network and Computer Applications | 2017 | 674 |
11 | A survey on vehicular cloud computing | Journal of Network and Computer Applications | 2014 | 665 |
12 | Survey on fog computing: architecture, key technologies, applications and open issues | Journal of Network and Computer Applications | 2017 | 640 |
13 | Applications of wireless sensor networks for urban areas: A survey | Journal of Network and Computer Applications | 2016 | 624 |
14 | State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing | Journal of Network and Computer Applications | 2016 | 569 |
15 | Blockchain in healthcare applications: Research challenges and opportunities | Journal of Network and Computer Applications | 2019 | 543 |
16 | An overview of the Internet of Things for people with disabilities | Journal of Network and Computer Applications | 2012 | 531 |
17 | A survey on privacy protection in blockchain system | Journal of Network and Computer Applications | 2019 | 512 |
18 | A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT | Journal of Network and Computer Applications | 2020 | 497 |
19 | An efficient biometrics-based remote user authentication scheme using smart cards | Journal of Network and Computer Applications | 2010 | 470 |
20 | Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey | Journal of Network and Computer Applications | 2014 | 470 |
21 | A survey on coverage and connectivity issues in wireless sensor networks | Journal of Network and Computer Applications | 2012 | 457 |
22 | Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing | Journal of Network and Computer Applications | 2016 | 435 |
23 | A review of smart home applications based on Internet of Things | Journal of Network and Computer Applications | 2017 | 419 |
24 | Clustering in sensor networks: A literature survey | Journal of Network and Computer Applications | 2014 | 412 |
25 | A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks | Journal of Network and Computer Applications | 2013 | 374 |
26 | Mutual information-based feature selection for intrusion detection systems | Journal of Network and Computer Applications | 2011 | 358 |
27 | A survey on virtual machine migration and server consolidation frameworks for cloud data centers | Journal of Network and Computer Applications | 2015 | 358 |
28 | Mobile recommender systems in tourism | Journal of Network and Computer Applications | 2014 | 353 |
29 | Fraud detection system: A survey | Journal of Network and Computer Applications | 2016 | 347 |
30 | Modeling intrusion detection system using hybrid intelligent systems | Journal of Network and Computer Applications | 2007 | 333 |
31 | Learning using an artificial immune system | Journal of Network and Computer Applications | 1996 | 332 |
32 | Blockchain's adoption in IoT: The challenges, and a way forward | Journal of Network and Computer Applications | 2019 | 330 |
33 | A survey on cloud computing security: Issues, threats, and solutions | Journal of Network and Computer Applications | 2016 | 328 |
34 | An intrusion detection and prevention system in cloud computing: A systematic review | Journal of Network and Computer Applications | 2013 | 319 |
35 | BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 | Journal of Network and Computer Applications | 2018 | 313 |
36 | Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things | Journal of Network and Computer Applications | 2013 | 308 |
37 | Cloud security issues and challenges: A survey | Journal of Network and Computer Applications | 2017 | 307 |
38 | A survey on FinTech | Journal of Network and Computer Applications | 2018 | 303 |
39 | Community detection in networks: A multidisciplinary review | Journal of Network and Computer Applications | 2018 | 296 |
40 | An overview of the internet of underwater things | Journal of Network and Computer Applications | 2012 | 294 |
41 | Bi-modal emotion recognition from expressive face and body gestures | Journal of Network and Computer Applications | 2007 | 293 |
42 | A survey on routing techniques in underwater wireless sensor networks | Journal of Network and Computer Applications | 2011 | 292 |
43 | Quality of Service (QoS) in Software Defined Networking (SDN): A survey | Journal of Network and Computer Applications | 2017 | 286 |
44 | Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures | Journal of Network and Computer Applications | 2012 | 284 |
45 | Distributed learning of deep neural network over multiple agents | Journal of Network and Computer Applications | 2018 | 284 |
46 | Primary radio user activity models for cognitive radio networks: A survey | Journal of Network and Computer Applications | 2014 | 282 |
47 | The rise of machine learning for detection and classification of malware: Research developments, trends and challenges | Journal of Network and Computer Applications | 2020 | 279 |
48 | Vehicular communication ad hoc routing protocols: A survey | Journal of Network and Computer Applications | 2014 | 274 |
49 | Intrusion detection using an ensemble of intelligent paradigms | Journal of Network and Computer Applications | 2005 | 273 |
50 | Wireless sensor network key management survey and taxonomy | Journal of Network and Computer Applications | 2010 | 273 |