- Muhammad Hasnain, Nadeem Javaid, Abdul Khader Jilani Saudagar, Neeraj Kumar. An intelligent and explainable intrusion detection framework for Internet of Sensor Things using generalizable optimized active Machine Learning. J. Network and Computer Applications, 245:104358, 2026.
- Shi-Yu Zhang, Chun-Cheng Lin, Zhen-Yin Annie Chen, Der-Jiunn Deng. Optimal multi-access edge computing system deployment in private 5G networks for multi-story construction sites. J. Network and Computer Applications, 245:104384, 2026.
- Huseyin Ozgur Kamali, Ali Berkay Gorgulu, Murat Karakus 0001, Evrim Guler, Suleyman Uludag. Smart parking optimization with software defined networking and blockchain: SPOSChain. J. Network and Computer Applications, 247:104414, 2026.
- Sani Umar, Ahmed Alagha, Rabeb Mizouni, Shakti Singh, Jamal Bentahar, Hadi Otrok. A two-sided client-server matching mechanism for resilient Federated Learning. J. Network and Computer Applications, 250:104476, 2026.
- Faithful Chiagoziem Onwuegbuche, Sunday Olaoluwa Adelodun, Anca Delia Jurcut, Liliana Pasquale. MLRan: A behavioural dataset for ransomware analysis and detection. J. Network and Computer Applications, 250:104475, 2026.
- Amel Ali Alhussan, El-Sayed M. El-Kenawy, Marwa Metwally Eid, Nima Khodadadi. Hybrid Al-Biruni and Puma Optimization (BERPO) for boosting the classification of Quality-of-Service (QoS) in 5G networks. J. Network and Computer Applications, 250:104462, 2026.
- Xinyu Fan, Shiyuan Xu, Yibo Cao, Xue Chen, Yu Chen, Tianrun Xu. CPPA-SKU: Towards efficient conditional privacy-preserving authentication protocol with secret key update in VANET. J. Network and Computer Applications, 245:104369, 2026.
- Hao-Ming Song, Si-Wen Zhang, Jie-Sheng Wang, Cheng Xing, Yu-Feng Sun, Yu-Cai Wang, Xiao-Fei Sui. Task scheduling of cloud computing system by frilled lizard optimization with time varying expansion mixed function oscillation and horned lizard camouflage strategy. J. Network and Computer Applications, 245:104386, 2026.
- Yilun Ma, Yuanming Wu. The DPC-LSTM-MD scheme for detecting selective forwarding attack under variable environment in event-driven wireless sensor networks. J. Network and Computer Applications, 247:104411, 2026.
- Ronghua Yuan, Zian Le, Mingyang Zhou 0001, Hao Liao. Accelerating the consensus speed of complex networked system via reweighting the edges. J. Network and Computer Applications, 249:104456, 2026.