
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques
Zaid Mustafa, Rashid Amin, Hamza Aldabbas, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9635-9661
Closed Access | Times Cited: 4
Zaid Mustafa, Rashid Amin, Hamza Aldabbas, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9635-9661
Closed Access | Times Cited: 4
Showing 4 citing articles:
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP
Sajid Mehmood, Rashid Amin, Jamal Mustafa, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0312425-e0312425
Open Access | Times Cited: 2
Sajid Mehmood, Rashid Amin, Jamal Mustafa, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0312425-e0312425
Open Access | Times Cited: 2
Classifications and Analysis of Caching Strategies in InformationāCentric Networking for Modern Communication Systems
Firdous Qaiser, Khoula Said Al Harthy, Mudassar Hussain, et al.
Engineering Reports (2025) Vol. 7, Iss. 2
Open Access | Times Cited: 1
Firdous Qaiser, Khoula Said Al Harthy, Mudassar Hussain, et al.
Engineering Reports (2025) Vol. 7, Iss. 2
Open Access | Times Cited: 1
Chaotic Adaptive Particle Swarm Optimization and Quantum-Inspired Genetic Algorithm for Robust Feature Selection in IoT Intrusion Detection
Padmasri Turaka, Saroj Kumar Panigrahy
(2025), pp. 1-6
Closed Access
Padmasri Turaka, Saroj Kumar Panigrahy
(2025), pp. 1-6
Closed Access
Improving Intrusion Detection in a Software Defined Network using Hybrid CNN and Bi-LSTM
Ashutosh Bhattarai, Unmik Gyawali, Abhishek Verma, et al.
(2024), pp. 117-122
Closed Access
Ashutosh Bhattarai, Unmik Gyawali, Abhishek Verma, et al.
(2024), pp. 117-122
Closed Access