OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms
Anupama Mishra, Neena Gupta, Brij B. Gupta
Telecommunication Systems (2022) Vol. 82, Iss. 2, pp. 229-244
Closed Access | Times Cited: 19

Showing 19 citing articles:

Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks
Ashfaq Ahmad Najar, S. Manohar Naik
Computers & Security (2024) Vol. 139, pp. 103716-103716
Closed Access | Times Cited: 26

Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP
Sajid Mehmood, Rashid Amin, Jamal Mustafa, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0312425-e0312425
Open Access | Times Cited: 2

DDoS attack detection and mitigation using deep neural network in SDN environment
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 34

A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks
Zhenpeng Liu, Yihang Wang, Fan Feng, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 6176-6176
Open Access | Times Cited: 27

An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 14

Comparing Metaheuristic Search Techniques in Addressing the Effectiveness of Clustering-Based DDoS Attack Detection Methods
Alireza Zeinalpour, C. McElroy
Electronics (2024) Vol. 13, Iss. 5, pp. 899-899
Open Access | Times Cited: 4

A new approach based on artificial neural networks and chaos for designing deterministic random number generator and its application in image encryption
Youcef Alloun, Mohamed Salah Azzaz, Abdenour Kifouche
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4

Spam Detection and Classification Based on Ensemble Methods Using Natural Language Processing
Anupama Mishra, Priyanka Chaurasia, Varsha Arya, et al.
Advances in intelligent systems and computing (2025), pp. 181-188
Closed Access

Classification of Multiclass DDOS Attack Detection Using Bayesian Weighted Random Forest Optimized With Gazelle Optimization Algorithm
R. Barona, E. Babu Raj
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access

Detection of DDoS attack in IoT traffic using ensemble machine learning techniques
Nimisha Pandey, Pramod Kumar Mishra
Networks and Heterogeneous Media (2023) Vol. 18, Iss. 4, pp. 1393-1409
Open Access | Times Cited: 9

Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta‐heuristic approach
Ahamed Ali S, V. Gowri, A. Arockia Abins
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 1
Closed Access | Times Cited: 2

Examining the Influence of AI Chatbots on Semantic Web-Based Global Information Management in Various Industries
Wang Xian, Guomin Chen, Varsha Arya, et al.
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-14
Open Access | Times Cited: 2

Ensemble of deep reinforcement learning with optimization model for DDoS attack detection and classification in cloud based software defined networks
Kiran Kumar Paidipati, Chinnarao Kurangi, J. Uthayakumar, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32367-32385
Closed Access | Times Cited: 5

Denial of Service Attack Analysis Using Machine Learning Techniques
S. Faizal Mukthar Hussain, R. Karthikeyan, S. Ramamoorthi, et al.
(2023), pp. 886-896
Closed Access | Times Cited: 4

A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration
Muhusina Ismail, Saed Alrabaee, Kim‐Kwang Raymond Choo, et al.
Mobile Networks and Applications (2024)
Closed Access | Times Cited: 1

A collaborative prediction approach to defend against amplified reflection and exploitation attacks
Arvind Prasad, Shalini Chandra, Ibrahim A. Atoum, et al.
Electronic Research Archive (2023) Vol. 31, Iss. 10, pp. 6045-6070
Open Access | Times Cited: 2

The Future of Metaverse Security
Brij B. Gupta, Arcangelo Castiglione
Advances in information security, privacy, and ethics book series (2024), pp. 253-279
Closed Access

Design of a Hypermodel using Transfer Learning to Detect DDoS Attacks in the Cloud Security
Marram Amitha, Muktevi Srivenkatesh
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 9
Open Access | Times Cited: 1

Page 1

Scroll to top