
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)
Tiago Linhares, Ahmed Patel, Ana Luiza Barros, et al.
Journal of Network and Systems Management (2023) Vol. 31, Iss. 3
Open Access | Times Cited: 17
Tiago Linhares, Ahmed Patel, Ana Luiza Barros, et al.
Journal of Network and Systems Management (2023) Vol. 31, Iss. 3
Open Access | Times Cited: 17
Showing 17 citing articles:
Analysis of the Use of Artificial Intelligence in Software-Defined Intelligent Networks: A Survey
Bayron Jesit Ospina Cifuentes, Álvaro Suárez, Vanessa García Pineda, et al.
Technologies (2024) Vol. 12, Iss. 7, pp. 99-99
Open Access | Times Cited: 6
Bayron Jesit Ospina Cifuentes, Álvaro Suárez, Vanessa García Pineda, et al.
Technologies (2024) Vol. 12, Iss. 7, pp. 99-99
Open Access | Times Cited: 6
Overview of DDoS Attack Detection in Software-Defined Networks
Heyu Wang, Yixuan Li
IEEE Access (2024) Vol. 12, pp. 38351-38381
Open Access | Times Cited: 5
Heyu Wang, Yixuan Li
IEEE Access (2024) Vol. 12, pp. 38351-38381
Open Access | Times Cited: 5
Cost-Sensitive Detection of DoS Attacks in Automotive Cybersecurity Using Artificial Neural Networks and CatBoost
Nabil Nissar, Naja Najib, Abdellah Jamali
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
Nabil Nissar, Naja Najib, Abdellah Jamali
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
Hussein Younis, Mohammad M. N. Hamarsheh
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Med-DDoS-SDN: A Kafka Streams-Based Distributed Approach for Protecting Healthcare SDN Environments Against DDoS Attacks
Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
Smart innovation, systems and technologies (2025), pp. 49-60
Closed Access
Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
Smart innovation, systems and technologies (2025), pp. 49-60
Closed Access
Network intrusion detection and mitigation in SDN using deep learning models
Mamatha Maddu, Yamarthi Narasimha Rao
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 849-862
Closed Access | Times Cited: 12
Mamatha Maddu, Yamarthi Narasimha Rao
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 849-862
Closed Access | Times Cited: 12
Evaluating the impact of filter-based feature selection in intrusion detection systems
Houssam Zouhri, Ali Idri, Ahmed Ratnani
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 759-785
Closed Access | Times Cited: 9
Houssam Zouhri, Ali Idri, Ahmed Ratnani
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 759-785
Closed Access | Times Cited: 9
Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks
Alexandro M. Zacaron, Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 3
Alexandro M. Zacaron, Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 3
SDBlock-IoT: A Blockchain-Enabled Software-Defined Multicontroller Architecture to Safeguard OpenFlow Tables
Birglang Bargayary, Nabajyoti Medhi
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1
Birglang Bargayary, Nabajyoti Medhi
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1
Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-Optimized LightGBM Algorithm
Daoqi Han, Honghui Li, Xueliang Fu
Sensors (2024) Vol. 24, Iss. 19, pp. 6179-6179
Open Access
Daoqi Han, Honghui Li, Xueliang Fu
Sensors (2024) Vol. 24, Iss. 19, pp. 6179-6179
Open Access
D. Sendil Vadivu, Narendran Rajagopalan
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 28
Open Access
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models
Nguyen Tan Cam, Tran Duc Viet
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Nguyen Tan Cam, Tran Duc Viet
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks
Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements
Ashutosh Kumar, L. Kavisankar, Srikanth Venkatesan, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Ashutosh Kumar, L. Kavisankar, Srikanth Venkatesan, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach
Raed Basfar, Mohamed Yehia Dahab, Abdullah Ali, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 19001-19008
Open Access
Raed Basfar, Mohamed Yehia Dahab, Abdullah Ali, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 19001-19008
Open Access
CDCA: Transparent Cache Architecture to Improve Content Delivery by Internet Service Providers
Alwi M. Bamhdi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 10
Open Access | Times Cited: 1
Alwi M. Bamhdi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 10
Open Access | Times Cited: 1
Research on the control strategies of data flow transmission paths for MPTCP-based communication networks
Zhong Shu, Hua-Bing Du, Xinyu Zhu, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1716-e1716
Open Access | Times Cited: 1
Zhong Shu, Hua-Bing Du, Xinyu Zhu, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1716-e1716
Open Access | Times Cited: 1