
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic
Akarsh Aggarwal, Manoj Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32945-32972
Closed Access | Times Cited: 5
Akarsh Aggarwal, Manoj Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32945-32972
Closed Access | Times Cited: 5
Showing 5 citing articles:
DarkGuardNet: A deep learning framework for imbalanced dark web traffic identification and application classification
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
Efficient DNS over HTTPS servers discovery method: A voting-based stacked ensemble model with secure connection metadata
ZunDong Zhang, Yanan Cheng, Haiyan Xu, et al.
Computer Networks (2025) Vol. 259, pp. 111073-111073
Closed Access
ZunDong Zhang, Yanan Cheng, Haiyan Xu, et al.
Computer Networks (2025) Vol. 259, pp. 111073-111073
Closed Access
MTL-DoHTA: Multi-Task Learning-Based DNS over HTTPS Traffic Analysis for Enhanced Network Security
Woong Jung, Byung Il Kwak
Sensors (2025) Vol. 25, Iss. 4, pp. 993-993
Open Access
Woong Jung, Byung Il Kwak
Sensors (2025) Vol. 25, Iss. 4, pp. 993-993
Open Access
Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access
Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms
Vajratiya Vajrobol, Geetika Jain Saxena, Amit Pundir, et al.
Journal of High Speed Networks (2024)
Closed Access
Vajratiya Vajrobol, Geetika Jain Saxena, Amit Pundir, et al.
Journal of High Speed Networks (2024)
Closed Access