11.6K(top 1%)
papers
139.0K(top 1%)
citations
126(top 1%)
h-index
205(top 1%)
g-index
55.1K
all documents
5.0K
doc citations

Top Articles

#TitleJournalYearCitations
1A study of low level vibrations as a power source for wireless sensor nodesComputer Communications20032,440
2A survey on clustering algorithms for wireless sensor networksComputer Communications20071,928
3Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standardsComputer Communications20071,218
4The Internet of Things vision: Key features, applications and open issuesComputer Communications20141,112
5Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networksComputer Communications2006952
6Wireless sensor networks for personal health monitoring: Issues and an implementationComputer Communications2006789
7EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networksComputer Communications2009594
8Energy-efficient coverage problems in wireless ad-hoc sensor networksComputer Communications2006495
9An overview of vertical handover decision strategies in heterogeneous wireless networksComputer Communications2008491
10A survey of key management schemes in wireless sensor networksComputer Communications2007490
11CSMA/CA performance under high traffic conditions: throughput and delay analysisComputer Communications2002475
12Vehicular Ad Hoc Networks: A New Challenge for Localization-Based SystemsComputer Communications2008457
13VANET security surveysComputer Communications2014425
14A survey of active and passive indoor localisation systemsComputer Communications2012420
15The design of the TAO real-time object request brokerComputer Communications1998416
16Path planning techniques for unmanned aerial vehicles: A review, solutions, and challengesComputer Communications2020414
17A case for stateful forwarding planeComputer Communications2013388
18Trends in worldwide ICT electricity consumption from 2007 to 2012Computer Communications2014385
19A survey of collaborative filtering based social recommender systemsComputer Communications2014383
20Survey on blockchain for Internet of ThingsComputer Communications2019351
21Applications of Artificial Intelligence and Machine learning in smart citiesComputer Communications2020349
22Flooding in wireless ad hoc networksComputer Communications2001330
23Object replication strategies in content distribution networksComputer Communications2002315
24A gap analysis of Internet-of-Things platformsComputer Communications2016305
25Taxonomy and survey of RFID anti-collision protocolsComputer Communications2006295
26Relay node placement in large scale wireless sensor networksComputer Communications2006288
27A more efficient and secure dynamic ID-based remote user authentication schemeComputer Communications2009283
28Key agreement in ad hoc networksComputer Communications2000280
29The role of communication systems in smart grids: Architectures, technical solutions and research challengesComputer Communications2013277
30A survey on IEEE 802.11ah: An enabling networking technology for smart citiesComputer Communications2015274
31Providing VANET security through active position detectionComputer Communications2008267
32A survey on wireless sensor networks for smart gridComputer Communications2015260
33Load balanced Birkhoff–von Neumann switches, part I: one-stage bufferingComputer Communications2002258
34BLR: beacon-less routing algorithm for mobile ad hoc networksComputer Communications2004251
35An exhaustive survey on security and privacy issues in Healthcare 4.0Computer Communications2020249
36Network of Information (NetInf) – An information-centric networking architectureComputer Communications2013246
37An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architectureComputer Communications2020245
38A survey of trust computation models for service management in internet of things systemsComputer Communications2017241
39Trust-based security for wireless ad hoc and sensor networksComputer Communications2007236
40A survey on architectures and energy efficiency in Data Center NetworksComputer Communications2014234
41Cache “less for more” in information-centric networks (extended version)Computer Communications2013230
42An intensive survey of fair non-repudiation protocolsComputer Communications2002225
43Dynamic QoS control of multimedia applications based on RTPComputer Communications1996212
44Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’Computer Communications2011210
45Deep learning and big data technologies for IoT securityComputer Communications2020209
46Blockchain for Internet of Energy management: Review, solutions, and challengesComputer Communications2020207
47Path planning of mobile landmarks for localization in wireless sensor networksComputer Communications2007205
48Minimum-cost network hardening using attack graphsComputer Communications2006204
49Blockchain platform for industrial healthcare: Vision and future opportunitiesComputer Communications2020204
50SURF: A distributed channel selection strategy for data dissemination in multi-hop cognitive radio networksComputer Communications2013203
51Load balanced Birkhoff–von Neumann switches, part II: multi-stage bufferingComputer Communications2002202
52A survey of calibration-free indoor positioning systemsComputer Communications2015202
53Intelligence in the Internet of Medical Things era: A systematic review of current and future trendsComputer Communications2020201
54Fault detection of wireless sensor networksComputer Communications2008200
55HCMM: Modelling spatial and temporal properties of human mobility driven by users’ social relationshipsComputer Communications2010200
56Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without KnowledgeComputer Communications2012198
57Industrial Internet of Things and its Applications in Industry 4.0: State of The ArtComputer Communications2021197
58Enabling Green cellular networks: A survey and outlookComputer Communications2014196
59A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networksComputer Communications2008195
60Cognitive radio for M2M and Internet of Things: A surveyComputer Communications2016194
61Cognitive Internet of VehiclesComputer Communications2018193
62Performance analysis of low rate wireless technologies for medical applicationsComputer Communications2005192
63Trust management systems for wireless sensor networks: Best practicesComputer Communications2010192
64DDoS attacks in cloud computing: Issues, taxonomy, and future directionsComputer Communications2017192
65A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiersComputer Communications2007191
66Practical real-time intrusion detection using machine learning approachesComputer Communications2011191
67Intrusion detection techniques and approachesComputer Communications2002190
68TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networksComputer Communications2011190
69Enhanced authentication scheme with anonymity for roaming service in global mobility networksComputer Communications2009187
70A survey on content-centric technologies for the current Internet: CDN and P2P solutionsComputer Communications2012185
71An overview of vertical handover techniques: Algorithms, protocols and toolsComputer Communications2011183
72Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman FilterComputer Communications2011182
73Planning roadside infrastructure for information dissemination in intelligent transportation systemsComputer Communications2010181
74Wearable eye tracking for mental health monitoringComputer Communications2012181
75Activities, context and ubiquitous computingComputer Communications2003180
76Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognitionComputer Communications2016179
77Drone-surveillance for search and rescue in natural disasterComputer Communications2020179
78Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approachComputer Communications2017178
79Blockchain envisioned UAV networks: Challenges, solutions, and comparisonsComputer Communications2020178
80IoT-aided robotics applications: Technological implications, target domains and open issuesComputer Communications2014175
81An improved DWT-SVD domain watermarking for medical information securityComputer Communications2020175
82Architectures for the future networks and the next generation Internet: A surveyComputer Communications2011174
83PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networksComputer Communications2007172
84Search: A routing protocol for mobile cognitive radio ad-hoc networksComputer Communications2009172
85OpenFlow: Meeting carrier-grade recovery requirementsComputer Communications2013172
86Cognitive computing and wireless communications on the edge for healthcare service robotsComputer Communications2020170
87A survey of intrusion detection in wireless network applicationsComputer Communications2014165
88Energetic sustainability of routing algorithms for energy-harvesting wireless sensor networksComputer Communications2007162
89Vehicular telematics over heterogeneous wireless networks: A surveyComputer Communications2010161
90A strong user authentication scheme with smart cards for wireless communicationsComputer Communications2011161
91Optimal virtual network function placement in multi-cloud service function chaining architectureComputer Communications2017161
92Using attack graphs for correlating, hypothesizing, and predicting intrusion alertsComputer Communications2006160
93Privacy, Security and Trust in Cloud ComputingComputer Communications and Networks2013157
94Directional geographical routing for real-time video communications in wireless sensor networksComputer Communications2007156
95A survey of movement strategies for improving network coverage in wireless sensor networksComputer Communications2009155
96Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networksComputer Communications2013155
97The next frontier for communications networks: power managementComputer Communications2004154
98INSENS: Intrusion-tolerant routing for wireless sensor networksComputer Communications2006154
99Mobile object tracking in wireless sensor networksComputer Communications2007152
100A review on mobility management and vertical handover solutions over heterogeneous wireless networksComputer Communications2012151