
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning
Saikat Das, Deepak Venugopal, Sajjan G. Shiva
Advances in intelligent systems and computing (2020), pp. 721-738
Closed Access | Times Cited: 28
Saikat Das, Deepak Venugopal, Sajjan G. Shiva
Advances in intelligent systems and computing (2020), pp. 721-738
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, et al.
Computers & Security (2020) Vol. 97, pp. 101994-101994
Closed Access | Times Cited: 93
Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, et al.
Computers & Security (2020) Vol. 97, pp. 101994-101994
Closed Access | Times Cited: 93
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection
Saikat Das, Sajal Saha, Annita Tahsin Priyoti, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 19, Iss. 4, pp. 4821-4833
Closed Access | Times Cited: 56
Saikat Das, Sajal Saha, Annita Tahsin Priyoti, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 19, Iss. 4, pp. 4821-4833
Closed Access | Times Cited: 56
Inter-dataset generalization strength of supervised machine learning methods for intrusion detection
Laurens D’hooge, Tim Wauters, Bruno Volckaert, et al.
Journal of Information Security and Applications (2020) Vol. 54, pp. 102564-102564
Closed Access | Times Cited: 60
Laurens D’hooge, Tim Wauters, Bruno Volckaert, et al.
Journal of Information Security and Applications (2020) Vol. 54, pp. 102564-102564
Closed Access | Times Cited: 60
Interpretable Machine Learning Tools: A Survey
Namita Agarwal, Saikat Das
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1528-1534
Closed Access | Times Cited: 55
Namita Agarwal, Saikat Das
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1528-1534
Closed Access | Times Cited: 55
Attack Detection System for Cloud-Based Wireless Sensor Networks Using the Proposed Fast Hyper Deep Learning Model
Hadeel M. Saleh, Hend Marouane, Ahmed Fakhfakh
Lecture notes in electrical engineering (2025), pp. 900-916
Closed Access
Hadeel M. Saleh, Hend Marouane, Ahmed Fakhfakh
Lecture notes in electrical engineering (2025), pp. 900-916
Closed Access
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack
Saikat Das, Deepak Venugopal, Sajjan G. Shiva, et al.
(2020), pp. 56-61
Closed Access | Times Cited: 34
Saikat Das, Deepak Venugopal, Sajjan G. Shiva, et al.
(2020), pp. 56-61
Closed Access | Times Cited: 34
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review
Priyanka Verma, Nitesh Bharot, John G. Breslin, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 3
Priyanka Verma, Nitesh Bharot, John G. Breslin, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 3
A Comprehensive Review of Machine Learning-Based Intrusion Detection Techniques for IoT Networks
Ghassan Samara, Mohammad Aljaidi, Raed Alazaidah, et al.
Studies in computational intelligence (2023), pp. 465-473
Closed Access | Times Cited: 9
Ghassan Samara, Mohammad Aljaidi, Raed Alazaidah, et al.
Studies in computational intelligence (2023), pp. 465-473
Closed Access | Times Cited: 9
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 829-835
Closed Access | Times Cited: 24
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 829-835
Closed Access | Times Cited: 24
Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, et al.
Algorithms (2024) Vol. 17, Iss. 3, pp. 99-99
Open Access | Times Cited: 2
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, et al.
Algorithms (2024) Vol. 17, Iss. 3, pp. 99-99
Open Access | Times Cited: 2
A Distributed Denial of Service Attack Detection System using Long Short Term Memory with Singular Value Decomposition
Chukwuemeka Christian Ugwu, Olumide Olayinka, Olugbemiga Solomon Popoqla, et al.
(2021), pp. 112-118
Closed Access | Times Cited: 14
Chukwuemeka Christian Ugwu, Olumide Olayinka, Olugbemiga Solomon Popoqla, et al.
(2021), pp. 112-118
Closed Access | Times Cited: 14
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems
Mohammad Ashrafuzzaman, Saikat Das, Ananth A. Jillepalli, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1131-1137
Closed Access | Times Cited: 15
Mohammad Ashrafuzzaman, Saikat Das, Ananth A. Jillepalli, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 1131-1137
Closed Access | Times Cited: 15
Taxonomy and Survey of Interpretable Machine Learning Method
Saikat Das, Namita Agarwal, Deepak Venugopal, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 670-677
Closed Access | Times Cited: 15
Saikat Das, Namita Agarwal, Deepak Venugopal, et al.
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2020), pp. 670-677
Closed Access | Times Cited: 15
A Novel Deep Learning Approach for Detecting Types of Attacks in the NSL-KDD Dataset
HADEEL M SALEH SALEEH, Hend Marouane, Ahmed Fakhfakh
Deleted Journal (2024) Vol. 2024, pp. 171-181
Open Access | Times Cited: 1
HADEEL M SALEH SALEEH, Hend Marouane, Ahmed Fakhfakh
Deleted Journal (2024) Vol. 2024, pp. 171-181
Open Access | Times Cited: 1
OCEAn: Ordinal classification with an ensemble approach
Belén Vega-Márquez, Isabel A. Nepomuceno-Chamorro, Cristina Rubio-Escudero, et al.
Information Sciences (2021) Vol. 580, pp. 221-242
Open Access | Times Cited: 11
Belén Vega-Márquez, Isabel A. Nepomuceno-Chamorro, Cristina Rubio-Escudero, et al.
Information Sciences (2021) Vol. 580, pp. 221-242
Open Access | Times Cited: 11
Anomaly Detection in IoT Using Extended Isolation Forest
Subir Panja, Nituraj Patowary, Sanchita Saha, et al.
Communications in computer and information science (2022), pp. 3-14
Closed Access | Times Cited: 7
Subir Panja, Nituraj Patowary, Sanchita Saha, et al.
Communications in computer and information science (2022), pp. 3-14
Closed Access | Times Cited: 7
Performance Analysis of Unsupervised Machine Learning Methods for Mobile Malware Detection
G. Padmavathi, D. Shanmugapriya, A. Roshni
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2022), pp. 201-206
Closed Access | Times Cited: 5
G. Padmavathi, D. Shanmugapriya, A. Roshni
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2022), pp. 201-206
Closed Access | Times Cited: 5
Machine Learning application lifecycle augmented with explanation and security
Saikat Das, Sajjan G. Shiva
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2021), pp. 0171-0177
Closed Access | Times Cited: 6
Saikat Das, Sajjan G. Shiva
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2021), pp. 0171-0177
Closed Access | Times Cited: 6
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge
Xuan-Son Vu, Maode Ma, Monowar Bhuyan
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 1625-1643
Closed Access | Times Cited: 4
Xuan-Son Vu, Maode Ma, Monowar Bhuyan
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 1625-1643
Closed Access | Times Cited: 4
DDoS Explainer using Interpretable Machine Learning
Saikat Das, Namita Agarwal, Sajjan G. Shiva
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (2021), pp. 0001-0007
Closed Access | Times Cited: 5
Saikat Das, Namita Agarwal, Sajjan G. Shiva
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (2021), pp. 0001-0007
Closed Access | Times Cited: 5
An ensemble method for feature selection and an integrated approach for mitigation of distributed denial of service attacks
Usham Sanjota Chanu, Khundrakpam Johnson Singh, Yambem Jina Chanu
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 13
Closed Access | Times Cited: 3
Usham Sanjota Chanu, Khundrakpam Johnson Singh, Yambem Jina Chanu
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 13
Closed Access | Times Cited: 3
Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation
Saikat Das, Raktim Ranjan Das, Frederick T. Sheldon, et al.
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0527-0533
Closed Access
Saikat Das, Raktim Ranjan Das, Frederick T. Sheldon, et al.
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2024), pp. 0527-0533
Closed Access
Cyber-attack Detection and Isolation
Chetanpal Singh, Rahul Thakkar
International Journal of Advanced Engineering and Management Research (2024) Vol. 09, Iss. 01, pp. 109-142
Open Access
Chetanpal Singh, Rahul Thakkar
International Journal of Advanced Engineering and Management Research (2024) Vol. 09, Iss. 01, pp. 109-142
Open Access
DDoS Attack Detection Using Ensemble Machine Learning
Adeeba Anis, Md. Shohrab Hossain
Algorithms for intelligent systems (2024), pp. 531-546
Closed Access
Adeeba Anis, Md. Shohrab Hossain
Algorithms for intelligent systems (2024), pp. 531-546
Closed Access
Review of hybrid face-based recognition system
Heba Jabbar Hassan, Mousa K. Wali, Mohamed Ibrahim Shujaa
AIP conference proceedings (2024) Vol. 3219, pp. 020115-020115
Closed Access
Heba Jabbar Hassan, Mousa K. Wali, Mohamed Ibrahim Shujaa
AIP conference proceedings (2024) Vol. 3219, pp. 020115-020115
Closed Access