
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks
Amara Dinesh Kumar, Harish Thodupunoori, R. Vinayakumar, et al.
Advanced sciences and technologies for security applications (2019), pp. 151-173
Closed Access | Times Cited: 16
Amara Dinesh Kumar, Harish Thodupunoori, R. Vinayakumar, et al.
Advanced sciences and technologies for security applications (2019), pp. 151-173
Closed Access | Times Cited: 16
Showing 16 citing articles:
Real-Time Detection of Dictionary DGA Network Traffic Using Deep Learning
Kate Highnam, Domenic Puzio, Song Luo, et al.
SN Computer Science (2021) Vol. 2, Iss. 2
Open Access | Times Cited: 49
Kate Highnam, Domenic Puzio, Song Luo, et al.
SN Computer Science (2021) Vol. 2, Iss. 2
Open Access | Times Cited: 49
Deep Learning Approach to DGA Classification for Effective Cyber Security
Priya Karunakaran
Journal of Ubiquitous Computing and Communication Technologies (2021) Vol. 2, Iss. 4, pp. 203-213
Open Access | Times Cited: 36
Priya Karunakaran
Journal of Ubiquitous Computing and Communication Technologies (2021) Vol. 2, Iss. 4, pp. 203-213
Open Access | Times Cited: 36
Analysis of the Construction of Dance Teaching System Based on Digital Media Technology
Xuan Yang
Journal of Interconnection Networks (2022) Vol. 22, Iss. Supp05
Closed Access | Times Cited: 17
Xuan Yang
Journal of Interconnection Networks (2022) Vol. 22, Iss. Supp05
Closed Access | Times Cited: 17
Hybridized classification algorithms for data classification applications: A review
Fahad Sherwani, B. S. K. K. Ibrahim, Muhammad Mujtaba Asad
Egyptian Informatics Journal (2020) Vol. 22, Iss. 2, pp. 185-192
Open Access | Times Cited: 27
Fahad Sherwani, B. S. K. K. Ibrahim, Muhammad Mujtaba Asad
Egyptian Informatics Journal (2020) Vol. 22, Iss. 2, pp. 185-192
Open Access | Times Cited: 27
Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment
Jannath Nisha O.S., Mary Saira Bhanu S
Journal of Information Security and Applications (2021) Vol. 58, pp. 102751-102751
Closed Access | Times Cited: 16
Jannath Nisha O.S., Mary Saira Bhanu S
Journal of Information Security and Applications (2021) Vol. 58, pp. 102751-102751
Closed Access | Times Cited: 16
Leveraging n-gram neural embeddings to improve deep learning DGA detection
Christian Morbidoni, Luca Spalazzi, Antonio Teti, et al.
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing (2022)
Closed Access | Times Cited: 9
Christian Morbidoni, Luca Spalazzi, Antonio Teti, et al.
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing (2022)
Closed Access | Times Cited: 9
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 14
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 14
Use of supervised machine learning to detect abuse of COVID-19 related domain names
Zheng Wang
Computers & Electrical Engineering (2022) Vol. 100, pp. 107864-107864
Open Access | Times Cited: 7
Zheng Wang
Computers & Electrical Engineering (2022) Vol. 100, pp. 107864-107864
Open Access | Times Cited: 7
A Survey of Machine Learning and Deep Learning Based DGA Detection Techniques
Amr M. H. Saeed, Danghui Wang, Hamas A. M. Alnedhari, et al.
Lecture notes in computer science (2022), pp. 133-143
Closed Access | Times Cited: 7
Amr M. H. Saeed, Danghui Wang, Hamas A. M. Alnedhari, et al.
Lecture notes in computer science (2022), pp. 133-143
Closed Access | Times Cited: 7
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 6
Vinayakumar Ravi, Soman KP, Mamoun Alazab, et al.
(2020)
Open Access | Times Cited: 6
Analyzing the mental states of the sports student based on augmentative communication with human–computer interaction
Xiang Lan, Zhongwang Cao, Le Yu
International Journal of Speech Technology (2022) Vol. 25, Iss. 2, pp. 355-365
Closed Access | Times Cited: 3
Xiang Lan, Zhongwang Cao, Le Yu
International Journal of Speech Technology (2022) Vol. 25, Iss. 2, pp. 355-365
Closed Access | Times Cited: 3
A Comprehensive Review of DNS-based Distributed Reflection Denial of Service (DRDoS) Attacks: State-of-the-Art
Riyadh Rahef Nuiaa, Selvakumar Manickam, Ali Hakem ALsaeedi
International Journal on Advanced Science Engineering and Information Technology (2022) Vol. 12, Iss. 6, pp. 2452-2461
Open Access | Times Cited: 3
Riyadh Rahef Nuiaa, Selvakumar Manickam, Ali Hakem ALsaeedi
International Journal on Advanced Science Engineering and Information Technology (2022) Vol. 12, Iss. 6, pp. 2452-2461
Open Access | Times Cited: 3
Toward a Hybrid Cybersecurity Framework of Machine Learning and Business Intelligence into Supply Chain Risk Management
Rasha Aljaafreh, Firas Al-Doghman, Farookh Khadeer Hussain
Studies in systems, decision and control (2024), pp. 1021-1029
Closed Access
Rasha Aljaafreh, Firas Al-Doghman, Farookh Khadeer Hussain
Studies in systems, decision and control (2024), pp. 1021-1029
Closed Access
Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning
Kate Highnam, Domenic Puzio, Song Luo, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 1
Kate Highnam, Domenic Puzio, Song Luo, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 1
Domain Generation Algorithm Detection Utilizing Model Hardening Through GAN-Generated Adversarial Examples
Nathaniel Gould, Taishi Nishiyama, Kazunori Kamiya
Communications in computer and information science (2020), pp. 84-101
Closed Access | Times Cited: 1
Nathaniel Gould, Taishi Nishiyama, Kazunori Kamiya
Communications in computer and information science (2020), pp. 84-101
Closed Access | Times Cited: 1
Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique
S.M. Abdullahi, Alaa Hamid Mohammed, Rauf Ibrahim, et al.
Advances in Multidisciplinary & Scientific Research Journal Publication (2023) Vol. 2, Iss. 2, pp. 27-34
Open Access
S.M. Abdullahi, Alaa Hamid Mohammed, Rauf Ibrahim, et al.
Advances in Multidisciplinary & Scientific Research Journal Publication (2023) Vol. 2, Iss. 2, pp. 27-34
Open Access