
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network
Muder Almiani, Alia AbuGhazleh, Yaser Jararweh, et al.
International Journal of Machine Learning and Cybernetics (2021) Vol. 12, Iss. 11, pp. 3337-3349
Closed Access | Times Cited: 41
Muder Almiani, Alia AbuGhazleh, Yaser Jararweh, et al.
International Journal of Machine Learning and Cybernetics (2021) Vol. 12, Iss. 11, pp. 3337-3349
Closed Access | Times Cited: 41
Showing 26-50 of 41 citing articles:
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks
Ala Mughaid, Asma Alnajjar, Subhieh El-Salhi, et al.
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10359-10375
Open Access
Ala Mughaid, Asma Alnajjar, Subhieh El-Salhi, et al.
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10359-10375
Open Access
Enhanced Security Attack Detection and Prevention in 5G Networks Using CD-GELU-CNN and FMLRQC with HDFS-ECH-KMEANS
Vinay Gugueoth
(2024), pp. 36-43
Closed Access
Vinay Gugueoth
(2024), pp. 36-43
Closed Access
SCDAE-MLP Design for Detecting and Classifying DDoS Attack
Hongkai Ye, Jie Zuo, YangâYang Chen
Lecture notes in electrical engineering (2024), pp. 211-223
Closed Access
Hongkai Ye, Jie Zuo, YangâYang Chen
Lecture notes in electrical engineering (2024), pp. 211-223
Closed Access
5G core network control plane: Network security challenges and solution requirements
Rajendra Patil, Zixu Tian, Mohan Gurusamy, et al.
Computer Communications (2024) Vol. 229, pp. 107982-107982
Closed Access
Rajendra Patil, Zixu Tian, Mohan Gurusamy, et al.
Computer Communications (2024) Vol. 229, pp. 107982-107982
Closed Access
Industrial technology network security measurement in international trade under discrete hopfield neural network
Furong Huang
Journal of Computational Methods in Sciences and Engineering (2024) Vol. 24, Iss. 2, pp. 657-674
Closed Access
Furong Huang
Journal of Computational Methods in Sciences and Engineering (2024) Vol. 24, Iss. 2, pp. 657-674
Closed Access
Leveraging datasets for effective mitigation of DDoS attacks in software-defined networking: significance and challenges
Hema Dhadhal, Paresh Kotak
RADIOELECTRONIC AND COMPUTER SYSTEMS (2024) Vol. 2024, Iss. 2, pp. 136-146
Open Access
Hema Dhadhal, Paresh Kotak
RADIOELECTRONIC AND COMPUTER SYSTEMS (2024) Vol. 2024, Iss. 2, pp. 136-146
Open Access
An Artificial Intelligence (AI) Enabled Framework for Cyber Security Using Machine Learning Techniques
Syed Shabbeer Ahmad, Krishna Prasad K.
International Research Journal of Parroha Multiple Campus (2023) Vol. 2, Iss. 1, pp. 93-104
Open Access | Times Cited: 1
Syed Shabbeer Ahmad, Krishna Prasad K.
International Research Journal of Parroha Multiple Campus (2023) Vol. 2, Iss. 1, pp. 93-104
Open Access | Times Cited: 1
Energy efficiency in 5G systems: A systematic literature review
Umar Danjuma Maiwada, Kamaluddeen Usman Danyaro, Aliza Sarlan, et al.
International Journal of Knowledge-based and Intelligent Engineering Systems (2023) Vol. 28, Iss. 1, pp. 93-132
Open Access | Times Cited: 1
Umar Danjuma Maiwada, Kamaluddeen Usman Danyaro, Aliza Sarlan, et al.
International Journal of Knowledge-based and Intelligent Engineering Systems (2023) Vol. 28, Iss. 1, pp. 93-132
Open Access | Times Cited: 1
Photonic-aware Neural Networks for Packet Classification in Beyond 5G Networks
Emilio Paolini, Federico Civerchia, Lorenzo De Marinis, et al.
(2022) Vol. abs 1606 6160, pp. 1-5
Closed Access | Times Cited: 1
Emilio Paolini, Federico Civerchia, Lorenzo De Marinis, et al.
(2022) Vol. abs 1606 6160, pp. 1-5
Closed Access | Times Cited: 1
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Jiahao Xue, Zhe Qu, Shangqing Zhao, et al.
(2023), pp. 1-10
Open Access
Jiahao Xue, Zhe Qu, Shangqing Zhao, et al.
(2023), pp. 1-10
Open Access
Towards Security Enhancement for NFV-Based IoT Networks Using Machine Learning
Sandeep N. Gite, Smita Kasar
Advances in engineering research/Advances in Engineering Research (2023), pp. 361-369
Closed Access
Sandeep N. Gite, Smita Kasar
Advances in engineering research/Advances in Engineering Research (2023), pp. 361-369
Closed Access
A Cutting-Edge Intelligent Cyber Model for Intrusion Detection in IoT Environments Leveraging Future Generations Networks
Ala Mughaid, Asma Alnajjar, Subhieh El-Salhi, et al.
Research Square (Research Square) (2023)
Open Access
Ala Mughaid, Asma Alnajjar, Subhieh El-Salhi, et al.
Research Square (Research Square) (2023)
Open Access
A Hybrid Intrusion Detection Model to Alleviate Denial of Service and Distributed Denial of Service Attacks in Internet of Things
Samera Otor, Beatrice O. Akumba, Adekunle Adeyelu, et al.
International Journal of Advanced Trends in Computer Science and Engineering (2023) Vol. 12, Iss. 6, pp. 277-283
Open Access
Samera Otor, Beatrice O. Akumba, Adekunle Adeyelu, et al.
International Journal of Advanced Trends in Computer Science and Engineering (2023) Vol. 12, Iss. 6, pp. 277-283
Open Access
Internet of Things Intrusion Detection System based on Transfer Learning
Wang Yutao, Li Zhongtian, Yi Bu, et al.
2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI) (2022) Vol. se 13, pp. 25-30
Closed Access
Wang Yutao, Li Zhongtian, Yi Bu, et al.
2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI) (2022) Vol. se 13, pp. 25-30
Closed Access
A node trust factor linked privacy preservation model in 5G networks with a multi-stage authentication model
Mohan Ranga Rao Dontineni
Optik (2022) Vol. 271, pp. 170135-170135
Closed Access
Mohan Ranga Rao Dontineni
Optik (2022) Vol. 271, pp. 170135-170135
Closed Access
Multi-stage ARSVAE-based Detection Framework for DDoS Attack of Cyber-Energy System in Industrial Park
Xiaoquan Lv, Feng Jin, Lie Chen, et al.
2021 China Automation Congress (CAC) (2022), pp. 1514-1519
Closed Access
Xiaoquan Lv, Feng Jin, Lie Chen, et al.
2021 China Automation Congress (CAC) (2022), pp. 1514-1519
Closed Access