
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Explainable AI-Based DDOS Attack Identification Method for IoT Networks
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
Computers (2023) Vol. 12, Iss. 2, pp. 32-32
Open Access | Times Cited: 37
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
Computers (2023) Vol. 12, Iss. 2, pp. 32-32
Open Access | Times Cited: 37
Showing 26-50 of 37 citing articles:
A collaborative prediction approach to defend against amplified reflection and exploitation attacks
Arvind Prasad, Shalini Chandra, Ibrahim A. Atoum, et al.
Electronic Research Archive (2023) Vol. 31, Iss. 10, pp. 6045-6070
Open Access | Times Cited: 2
Arvind Prasad, Shalini Chandra, Ibrahim A. Atoum, et al.
Electronic Research Archive (2023) Vol. 31, Iss. 10, pp. 6045-6070
Open Access | Times Cited: 2
Early Detection of DDoS Attacks in SDN using Machine Learning Techniques
Parvathi Sanjana Pericherla, Senthil Kumar Thangavel, Kartik Srinivasan, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023) Vol. 2013, pp. 1-7
Closed Access | Times Cited: 2
Parvathi Sanjana Pericherla, Senthil Kumar Thangavel, Kartik Srinivasan, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023) Vol. 2013, pp. 1-7
Closed Access | Times Cited: 2
Botnets in Healthcare: Threats, Vulnerabilities, and Mitigation Strategies
Michaela Barnett, James P. Womack, Christopher Brito, et al.
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 58-65
Open Access
Michaela Barnett, James P. Womack, Christopher Brito, et al.
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 58-65
Open Access
Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
IFIP advances in information and communication technology (2024), pp. 236-249
Closed Access
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
IFIP advances in information and communication technology (2024), pp. 236-249
Closed Access
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in computer science (2024), pp. 100-112
Closed Access
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in computer science (2024), pp. 100-112
Closed Access
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
Lecture notes in computer science (2024), pp. 125-139
Closed Access
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
Lecture notes in computer science (2024), pp. 125-139
Closed Access
A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in computer science (2024), pp. 70-81
Closed Access
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Lecture notes in computer science (2024), pp. 70-81
Closed Access
Research on Network Security Big Data Analysis Technology for Classification Fusion of Computer Artificial Intelligence
Xianglan Tian, Hong Zou, Yong Wu, et al.
(2024), pp. 1014-1017
Closed Access
Xianglan Tian, Hong Zou, Yong Wu, et al.
(2024), pp. 1014-1017
Closed Access
Towards a unified XAI-based framework for digital forensic investigations
Zainab Khalid, Farkhund Iqbal, Benjamin C. M. Fung
Forensic Science International Digital Investigation (2024) Vol. 50, pp. 301806-301806
Open Access
Zainab Khalid, Farkhund Iqbal, Benjamin C. M. Fung
Forensic Science International Digital Investigation (2024) Vol. 50, pp. 301806-301806
Open Access
Cyberattack event logs classification using deep learning with semantic feature analysis
Ahmad Alzu’bi, Omar Darwish, Amjad Albashayreh, et al.
Computers & Security (2024), pp. 104222-104222
Closed Access
Ahmad Alzu’bi, Omar Darwish, Amjad Albashayreh, et al.
Computers & Security (2024), pp. 104222-104222
Closed Access
“Air Hidup” Therapy Model based on Psalm 42-43 to Mitigate Depression in Church Congregations: An Explanatory - Confirmation Study
Simeon Sulistyo, Muner Daliman, GP Harianto, et al.
Pharos Journal of Theology (2023), Iss. 105(1)
Open Access
Simeon Sulistyo, Muner Daliman, GP Harianto, et al.
Pharos Journal of Theology (2023), Iss. 105(1)
Open Access
Analysis and Implementation of DDOS Attacks and Prevention
Aman Sharma, Pronika Chawla, Shobha Tyagi, et al.
(2023), pp. 956-961
Closed Access
Aman Sharma, Pronika Chawla, Shobha Tyagi, et al.
(2023), pp. 956-961
Closed Access