OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mohamed Mostafa A. Azim, et al.
Symmetry (2022) Vol. 14, Iss. 8, pp. 1563-1563
Open Access | Times Cited: 55

Showing 26-50 of 55 citing articles:

Exploration of Various Machine Learning Techniques for Identifying and Mitigating DDoS Attacks
Olufunsho I. Falowo, Izunna Okpala, Emmanuel Kojo, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3

One-Parameter Statistical Methods to Recognize DDoS Attacks
Roman Hajtmanek, Martin Kontšek, Juraj Smieško, et al.
Symmetry (2022) Vol. 14, Iss. 11, pp. 2388-2388
Open Access | Times Cited: 5

FEAROL: Aging Flow Entries Based on Local Staircase Randomized Response for Secure SDN Flow Tables
Ling Xia Liao, Xiaohang Ma, Zhao Changqing, et al.
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 2985-2985
Open Access | Times Cited: 2

An Adaptive Symmetrical Load Balancing Scheme for Next Generation Wireless Networks
Sohaib Manzoor, Farrukh Mazhar, Abdullah Binaris, et al.
Symmetry (2023) Vol. 15, Iss. 7, pp. 1316-1316
Open Access | Times Cited: 2

Low-rate DDoS attack Detection using Deep Learning for SDN-enabled IoT Networks
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Amgad Muneer, et al.
(2024)
Open Access

Countering DDoS threats: leveraging ensemble methods for detection and mitigation
Zafar Iqbal
Lahore Garrison University Research Journal of Computer Science and Information Technology (2024) Vol. 8, Iss. 1
Open Access

Reduce Low-Frequency Distributed Denial of Service Threats by Combining Deep and Active Learning
Aditya Kumar Shukla, Ashish Sharma, Sandeep Singh Sengar
Lecture notes in networks and systems (2024), pp. 85-100
Closed Access

Quality of services in software defined networking: challenges and controller placement problems
Siham Aouad, Issam El Meghrouni, Yassine Sabri, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 2, pp. 951-951
Open Access

An ensemble-based approach for effective distributed denial of service attack detection in software defined networking
Mohammed Majid Ahmed, Hasan Abdulkader
IAES International Journal of Artificial Intelligence (2024) Vol. 13, Iss. 2, pp. 2019-2019
Open Access

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions
Winnie Owoko
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 2, pp. 454-475
Open Access

Denial of Service Attack Detection and Mitigation using Ensemble based ML in Software Defined Network
N. Sathish, K. Valarmathi, R. Nagalakshmi, et al.
(2024), pp. 405-412
Closed Access

COMMON CYBERSECURITY VULNERABILITIES: SOFTWARE BUGS, WEAK PASSWORDS, MISCONFIGURATIONS, SOCIAL ENGINEERING
Mahmudul Hasan, Farhana Zaman Rozony, Md. Kamruzzaman, et al.
Deleted Journal (2024) Vol. 3, Iss. 4, pp. 42-57
Open Access

Balancing DDoS Protection and SDN Control Functions: An Analysis
Joseph A. Abandoh-Sam, Jamal‐Deen Abdulai, Ferdinand Apietu Katsriku, et al.
Authorea (Authorea) (2024)
Open Access

A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning
Dhruv Kalambe, Divyansh Sharma, Pushkar Kadam, et al.
Journal of Network and Computer Applications (2024) Vol. 235, pp. 104081-104081
Closed Access

Enhancing Network Security: A Strategic SDN and Genetic Algorithm Approach for Countering DDoS Attacks
Kumbhar Kalpana, Prachi Mukherji, Sachin Y. Paranjape
Lecture notes in networks and systems (2024), pp. 617-627
Closed Access

Detection of DDOS Attack using Decision Tree Classifier in SDN Environment
Nithish Babu S, Vinish Yogesh, S Mariswaran, et al.
Journal of Ubiquitous Computing and Communication Technologies (2023) Vol. 5, Iss. 2, pp. 193-202
Open Access | Times Cited: 1

Improving the Detection of Unknown DDoS Attacks through Continual Learning
Beny Nugraha, Krishna Yadav, Parag Patil, et al.
(2023), pp. 477-483
Closed Access | Times Cited: 1

Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks
Ashutosh Dutta, Ehab Al‐Shaer, Samrat Chatterjee, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 1

Machine Recognition of DDoS Attacks Using Statistical Parameters
Juraj Smieško, Pavel Segeč, Martin Kontšek
Mathematics (2023) Vol. 12, Iss. 1, pp. 142-142
Open Access | Times Cited: 1

DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks
Wenjiang Ji, Yixin Yang, Yaling Zhang, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2023), pp. 459-464
Closed Access | Times Cited: 1

Enhancing Cybersecurity: A Pipeline Approach for Efficient Machine Learning Intrusion Detection
Ethan Berei, Ahmed Oun, M. Ajmal Khan
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2023), pp. 0495-0501
Closed Access | Times Cited: 1

Securing Smart City Networks - Intelligent Detection Of DDoS Cyber Attacks
Deepthi Tabitha Bennet, Preethi Samantha Bennet, D Anitha
(2022), pp. 1575-1580
Closed Access | Times Cited: 2

MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA
Natalia Yakymchuk, Yosyp Selepyna, Mykola Yevsiuk, et al.
Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska (2022) Vol. 12, Iss. 4, pp. 26-30
Open Access | Times Cited: 1

Machine Learning Approach for Securing of IoT Environment
Amit Sagu, Nasib Singh Gill, Preeti Gulia, et al.
Lecture notes in networks and systems (2023), pp. 849-858
Closed Access

Scroll to top