
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improved Network Monitoring Using Software-Defined Networking for DDoS Detection and Mitigation Evaluation
J. Ramprasath, V. Seethalakshmi
Wireless Personal Communications (2021) Vol. 116, Iss. 3, pp. 2743-2757
Closed Access | Times Cited: 22
J. Ramprasath, V. Seethalakshmi
Wireless Personal Communications (2021) Vol. 116, Iss. 3, pp. 2743-2757
Closed Access | Times Cited: 22
Showing 22 citing articles:
An optimized weighted voting based ensemble model for DDoS attack detection and mitigation in SDN environment
Aastha Maheshwari, Burhan Mehraj, Mohd Shaad Khan, et al.
Microprocessors and Microsystems (2022) Vol. 89, pp. 104412-104412
Closed Access | Times Cited: 46
Aastha Maheshwari, Burhan Mehraj, Mohd Shaad Khan, et al.
Microprocessors and Microsystems (2022) Vol. 89, pp. 104412-104412
Closed Access | Times Cited: 46
Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network
Senthil Prabakaran, R. Ramalakshmi, Irshad Hussain, et al.
Sensors (2022) Vol. 22, Iss. 3, pp. 709-709
Open Access | Times Cited: 45
Senthil Prabakaran, R. Ramalakshmi, Irshad Hussain, et al.
Sensors (2022) Vol. 22, Iss. 3, pp. 709-709
Open Access | Times Cited: 45
Malicious attack detection approach in cloud computing using machine learning techniques
M Arunkumar, K. Ashok Kumar
Soft Computing (2022) Vol. 26, Iss. 23, pp. 13097-13107
Closed Access | Times Cited: 30
M Arunkumar, K. Ashok Kumar
Soft Computing (2022) Vol. 26, Iss. 23, pp. 13097-13107
Closed Access | Times Cited: 30
A Comprehensive Analysis of Machine Learning- and Deep Learning-Based Solutions for DDoS Attack Detection in SDN
Naziya Aslam, Shashank Srivastava, Manoj Madhava Gore
Arabian Journal for Science and Engineering (2023) Vol. 49, Iss. 3, pp. 3533-3573
Closed Access | Times Cited: 18
Naziya Aslam, Shashank Srivastava, Manoj Madhava Gore
Arabian Journal for Science and Engineering (2023) Vol. 49, Iss. 3, pp. 3533-3573
Closed Access | Times Cited: 18
An integrated SDN framework for early detection of DDoS attacks in cloud computing
Asha Varma Songa, Ganesh Reddy Karri
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5
Asha Varma Songa, Ganesh Reddy Karri
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5
DDOS Attack Detection in Cloud Computing Architecture Using Deep Learning Algorithms
Lina Jamal Ibrahim, Almuntadher Alwhelat, Fadi Al‐Turjman
Sustainable civil infrastructures (2025), pp. 985-998
Closed Access
Lina Jamal Ibrahim, Almuntadher Alwhelat, Fadi Al‐Turjman
Sustainable civil infrastructures (2025), pp. 985-998
Closed Access
Real-Time Anomaly Detection of Network Traffic Based on CNN
Liu Hai-tao, Haifeng Wang
Symmetry (2023) Vol. 15, Iss. 6, pp. 1205-1205
Open Access | Times Cited: 11
Liu Hai-tao, Haifeng Wang
Symmetry (2023) Vol. 15, Iss. 6, pp. 1205-1205
Open Access | Times Cited: 11
An Adaptive Neuro-Fuzzy Based Region Selection and Authenticating Medical Image Through Watermarking for Secure Communication
K. Balasamy, N. Krishnaraj, K. Vijayalakshmi
Wireless Personal Communications (2021) Vol. 122, Iss. 3, pp. 2817-2837
Closed Access | Times Cited: 23
K. Balasamy, N. Krishnaraj, K. Vijayalakshmi
Wireless Personal Communications (2021) Vol. 122, Iss. 3, pp. 2817-2837
Closed Access | Times Cited: 23
Mitigation Services on SDN for Distributed Denial of Service and Denial of Service Attacks Using Machine Learning Techniques
J. Ramprasath, N. Krishnaraj, V. Seethalakshmi
IETE Journal of Research (2022) Vol. 70, Iss. 1, pp. 70-81
Closed Access | Times Cited: 18
J. Ramprasath, N. Krishnaraj, V. Seethalakshmi
IETE Journal of Research (2022) Vol. 70, Iss. 1, pp. 70-81
Closed Access | Times Cited: 18
Mitigation of Malicious Flooding in Software Defined Networks Using Dynamic Access Control List
J. Ramprasath, V. Seethalakshmi
Wireless Personal Communications (2021) Vol. 121, Iss. 1, pp. 107-125
Closed Access | Times Cited: 19
J. Ramprasath, V. Seethalakshmi
Wireless Personal Communications (2021) Vol. 121, Iss. 1, pp. 107-125
Closed Access | Times Cited: 19
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review
Sarabjeet Kaur, Amanpreet Kaur Sandhu, Abhinav Bhandari
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1949-1988
Closed Access | Times Cited: 6
Sarabjeet Kaur, Amanpreet Kaur Sandhu, Abhinav Bhandari
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1949-1988
Closed Access | Times Cited: 6
RETRACTED: SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs
Saima Siraj Qureshi, Jingsha He, Sirajuddin Qureshi, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 10675-10687
Closed Access | Times Cited: 5
Saima Siraj Qureshi, Jingsha He, Sirajuddin Qureshi, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 44, Iss. 6, pp. 10675-10687
Closed Access | Times Cited: 5
Secured Data Transaction for Agriculture Harvesting using Blockchain Technology
J. Ramprasath, M. Mohamed Nishath, S. Varunkarthick, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 3
J. Ramprasath, M. Mohamed Nishath, S. Varunkarthick, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 3
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT
Man Xiao, Yunhe Cui, Qing Qian, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 23, pp. 23750-23771
Closed Access | Times Cited: 5
Man Xiao, Yunhe Cui, Qing Qian, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 23, pp. 23750-23771
Closed Access | Times Cited: 5
Identification and Mitigation of Phishing Email Attacks using Deep Learning
J. Ramprasath, S. Priyanka, R. Manudev, et al.
(2023), pp. 466-470
Closed Access | Times Cited: 2
J. Ramprasath, S. Priyanka, R. Manudev, et al.
(2023), pp. 466-470
Closed Access | Times Cited: 2
Denial of Service Malevolent Traffic Identification and Prevention in Software Defined Networking
J. Ramprasath, A. B. Arockia Christopher, M. Balakrishnan, et al.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (2022), pp. 400-405
Closed Access | Times Cited: 3
J. Ramprasath, A. B. Arockia Christopher, M. Balakrishnan, et al.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (2022), pp. 400-405
Closed Access | Times Cited: 3
Cloud Service Anomaly Traffic Detection Using Random Forest
J. Ramprasath, Sriraam Ramakrishnan, V. Tharani, et al.
Lecture notes in networks and systems (2022), pp. 269-279
Closed Access | Times Cited: 3
J. Ramprasath, Sriraam Ramakrishnan, V. Tharani, et al.
Lecture notes in networks and systems (2022), pp. 269-279
Closed Access | Times Cited: 3
Health Information Sharing in Cloud Environment Using Modular Encryption Standard
R. Sathya Prabha, K. Kanagasabapathi, K. Sajeeth, et al.
Advances in transdisciplinary engineering (2023)
Open Access | Times Cited: 1
R. Sathya Prabha, K. Kanagasabapathi, K. Sajeeth, et al.
Advances in transdisciplinary engineering (2023)
Open Access | Times Cited: 1
Virtual Guard Against DDoS Attack for IoT Network Using Supervised Learning Method
J. Ramprasath, Sriraam Ramakrishnan, S Nadarajan, et al.
(2022), pp. 1419-1424
Closed Access | Times Cited: 2
J. Ramprasath, Sriraam Ramakrishnan, S Nadarajan, et al.
(2022), pp. 1419-1424
Closed Access | Times Cited: 2
VN-IDS: An Integrated Virtual Node Protection in Cloud Environment using Intrusion Detection Systems
M Arunkumar, K. Ashok Kumar
(2023) Vol. 10, pp. 1-7
Closed Access
M Arunkumar, K. Ashok Kumar
(2023) Vol. 10, pp. 1-7
Closed Access
Machine Learning‐Based Malicious Threat Detection and Security Analysis on Software‐Defined Networking for Industry 4.0
J. Ramprasath, Navin Kumar, N. Krishnaraj, et al.
(2023), pp. 79-103
Closed Access
J. Ramprasath, Navin Kumar, N. Krishnaraj, et al.
(2023), pp. 79-103
Closed Access
Optimization of Multi Hop Data Aggregation in Medical Iot Using Trust Based Secure Routing
A Sunithanandhini, Krishnaraj Natarajan, J. Ramprasath
Research Square (Research Square) (2022)
Open Access
A Sunithanandhini, Krishnaraj Natarajan, J. Ramprasath
Research Square (Research Square) (2022)
Open Access