# | Title | Journal | Year | Citations |
---|
1 | A study of low level vibrations as a power source for wireless sensor nodes | Computer Communications | 2003 | 2,440 |
2 | A survey on clustering algorithms for wireless sensor networks | Computer Communications | 2007 | 1,928 |
3 | Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards | Computer Communications | 2007 | 1,218 |
4 | The Internet of Things vision: Key features, applications and open issues | Computer Communications | 2014 | 1,112 |
5 | Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks | Computer Communications | 2006 | 952 |
6 | Wireless sensor networks for personal health monitoring: Issues and an implementation | Computer Communications | 2006 | 789 |
7 | EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks | Computer Communications | 2009 | 594 |
8 | Energy-efficient coverage problems in wireless ad-hoc sensor networks | Computer Communications | 2006 | 495 |
9 | An overview of vertical handover decision strategies in heterogeneous wireless networks | Computer Communications | 2008 | 491 |
10 | A survey of key management schemes in wireless sensor networks | Computer Communications | 2007 | 490 |
11 | CSMA/CA performance under high traffic conditions: throughput and delay analysis | Computer Communications | 2002 | 475 |
12 | Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems | Computer Communications | 2008 | 457 |
13 | VANET security surveys | Computer Communications | 2014 | 425 |
14 | A survey of active and passive indoor localisation systems | Computer Communications | 2012 | 420 |
15 | The design of the TAO real-time object request broker | Computer Communications | 1998 | 416 |
16 | Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges | Computer Communications | 2020 | 414 |
17 | A case for stateful forwarding plane | Computer Communications | 2013 | 388 |
18 | Trends in worldwide ICT electricity consumption from 2007 to 2012 | Computer Communications | 2014 | 385 |
19 | A survey of collaborative filtering based social recommender systems | Computer Communications | 2014 | 383 |
20 | Survey on blockchain for Internet of Things | Computer Communications | 2019 | 351 |
21 | Applications of Artificial Intelligence and Machine learning in smart cities | Computer Communications | 2020 | 349 |
22 | Flooding in wireless ad hoc networks | Computer Communications | 2001 | 330 |
23 | Object replication strategies in content distribution networks | Computer Communications | 2002 | 315 |
24 | A gap analysis of Internet-of-Things platforms | Computer Communications | 2016 | 305 |
25 | Taxonomy and survey of RFID anti-collision protocols | Computer Communications | 2006 | 295 |
26 | Relay node placement in large scale wireless sensor networks | Computer Communications | 2006 | 288 |
27 | A more efficient and secure dynamic ID-based remote user authentication scheme | Computer Communications | 2009 | 283 |
28 | Key agreement in ad hoc networks | Computer Communications | 2000 | 280 |
29 | The role of communication systems in smart grids: Architectures, technical solutions and research challenges | Computer Communications | 2013 | 277 |
30 | A survey on IEEE 802.11ah: An enabling networking technology for smart cities | Computer Communications | 2015 | 274 |
31 | Providing VANET security through active position detection | Computer Communications | 2008 | 267 |
32 | A survey on wireless sensor networks for smart grid | Computer Communications | 2015 | 260 |
33 | Load balanced Birkhoff–von Neumann switches, part I: one-stage buffering | Computer Communications | 2002 | 258 |
34 | BLR: beacon-less routing algorithm for mobile ad hoc networks | Computer Communications | 2004 | 251 |
35 | An exhaustive survey on security and privacy issues in Healthcare 4.0 | Computer Communications | 2020 | 249 |
36 | Network of Information (NetInf) – An information-centric networking architecture | Computer Communications | 2013 | 246 |
37 | An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture | Computer Communications | 2020 | 245 |
38 | A survey of trust computation models for service management in internet of things systems | Computer Communications | 2017 | 241 |
39 | Trust-based security for wireless ad hoc and sensor networks | Computer Communications | 2007 | 236 |
40 | A survey on architectures and energy efficiency in Data Center Networks | Computer Communications | 2014 | 234 |
41 | Cache “less for more” in information-centric networks (extended version) | Computer Communications | 2013 | 230 |
42 | An intensive survey of fair non-repudiation protocols | Computer Communications | 2002 | 225 |
43 | Dynamic QoS control of multimedia applications based on RTP | Computer Communications | 1996 | 212 |
44 | Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’ | Computer Communications | 2011 | 210 |
45 | Deep learning and big data technologies for IoT security | Computer Communications | 2020 | 209 |
46 | Blockchain for Internet of Energy management: Review, solutions, and challenges | Computer Communications | 2020 | 207 |
47 | Path planning of mobile landmarks for localization in wireless sensor networks | Computer Communications | 2007 | 205 |
48 | Minimum-cost network hardening using attack graphs | Computer Communications | 2006 | 204 |
49 | Blockchain platform for industrial healthcare: Vision and future opportunities | Computer Communications | 2020 | 204 |
50 | SURF: A distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks | Computer Communications | 2013 | 203 |
51 | Load balanced Birkhoff–von Neumann switches, part II: multi-stage buffering | Computer Communications | 2002 | 202 |
52 | A survey of calibration-free indoor positioning systems | Computer Communications | 2015 | 202 |
53 | Intelligence in the Internet of Medical Things era: A systematic review of current and future trends | Computer Communications | 2020 | 201 |
54 | Fault detection of wireless sensor networks | Computer Communications | 2008 | 200 |
55 | HCMM: Modelling spatial and temporal properties of human mobility driven by users’ social relationships | Computer Communications | 2010 | 200 |
56 | Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge | Computer Communications | 2012 | 198 |
57 | Industrial Internet of Things and its Applications in Industry 4.0: State of The Art | Computer Communications | 2021 | 197 |
58 | Enabling Green cellular networks: A survey and outlook | Computer Communications | 2014 | 196 |
59 | A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks | Computer Communications | 2008 | 195 |
60 | Cognitive radio for M2M and Internet of Things: A survey | Computer Communications | 2016 | 194 |
61 | Cognitive Internet of Vehicles | Computer Communications | 2018 | 193 |
62 | Performance analysis of low rate wireless technologies for medical applications | Computer Communications | 2005 | 192 |
63 | Trust management systems for wireless sensor networks: Best practices | Computer Communications | 2010 | 192 |
64 | DDoS attacks in cloud computing: Issues, taxonomy, and future directions | Computer Communications | 2017 | 192 |
65 | A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers | Computer Communications | 2007 | 191 |
66 | Practical real-time intrusion detection using machine learning approaches | Computer Communications | 2011 | 191 |
67 | Intrusion detection techniques and approaches | Computer Communications | 2002 | 190 |
68 | TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks | Computer Communications | 2011 | 190 |
69 | Enhanced authentication scheme with anonymity for roaming service in global mobility networks | Computer Communications | 2009 | 187 |
70 | A survey on content-centric technologies for the current Internet: CDN and P2P solutions | Computer Communications | 2012 | 185 |
71 | An overview of vertical handover techniques: Algorithms, protocols and tools | Computer Communications | 2011 | 183 |
72 | Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter | Computer Communications | 2011 | 182 |
73 | Planning roadside infrastructure for information dissemination in intelligent transportation systems | Computer Communications | 2010 | 181 |
74 | Wearable eye tracking for mental health monitoring | Computer Communications | 2012 | 181 |
75 | Activities, context and ubiquitous computing | Computer Communications | 2003 | 180 |
76 | Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition | Computer Communications | 2016 | 179 |
77 | Drone-surveillance for search and rescue in natural disaster | Computer Communications | 2020 | 179 |
78 | Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach | Computer Communications | 2017 | 178 |
79 | Blockchain envisioned UAV networks: Challenges, solutions, and comparisons | Computer Communications | 2020 | 178 |
80 | IoT-aided robotics applications: Technological implications, target domains and open issues | Computer Communications | 2014 | 175 |
81 | An improved DWT-SVD domain watermarking for medical information security | Computer Communications | 2020 | 175 |
82 | Architectures for the future networks and the next generation Internet: A survey | Computer Communications | 2011 | 174 |
83 | PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks | Computer Communications | 2007 | 172 |
84 | Search: A routing protocol for mobile cognitive radio ad-hoc networks | Computer Communications | 2009 | 172 |
85 | OpenFlow: Meeting carrier-grade recovery requirements | Computer Communications | 2013 | 172 |
86 | Cognitive computing and wireless communications on the edge for healthcare service robots | Computer Communications | 2020 | 170 |
87 | A survey of intrusion detection in wireless network applications | Computer Communications | 2014 | 165 |
88 | Energetic sustainability of routing algorithms for energy-harvesting wireless sensor networks | Computer Communications | 2007 | 162 |
89 | Vehicular telematics over heterogeneous wireless networks: A survey | Computer Communications | 2010 | 161 |
90 | A strong user authentication scheme with smart cards for wireless communications | Computer Communications | 2011 | 161 |
91 | Optimal virtual network function placement in multi-cloud service function chaining architecture | Computer Communications | 2017 | 161 |
92 | Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts | Computer Communications | 2006 | 160 |
93 | Privacy, Security and Trust in Cloud Computing | Computer Communications and Networks | 2013 | 157 |
94 | Directional geographical routing for real-time video communications in wireless sensor networks | Computer Communications | 2007 | 156 |
95 | A survey of movement strategies for improving network coverage in wireless sensor networks | Computer Communications | 2009 | 155 |
96 | Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks | Computer Communications | 2013 | 155 |
97 | The next frontier for communications networks: power management | Computer Communications | 2004 | 154 |
98 | INSENS: Intrusion-tolerant routing for wireless sensor networks | Computer Communications | 2006 | 154 |
99 | Mobile object tracking in wireless sensor networks | Computer Communications | 2007 | 152 |
100 | A review on mobility management and vertical handover solutions over heterogeneous wireless networks | Computer Communications | 2012 | 151 |