
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SmartDefense: A distributed deep defense against DDoS attacks with edge computing
Sowmya Myneni, Ankur Chowdhary, Dijiang Huang, et al.
Computer Networks (2022) Vol. 209, pp. 108874-108874
Closed Access | Times Cited: 18
Sowmya Myneni, Ankur Chowdhary, Dijiang Huang, et al.
Computer Networks (2022) Vol. 209, pp. 108874-108874
Closed Access | Times Cited: 18
Showing 18 citing articles:
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 19
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
IEEE Access (2023) Vol. 11, pp. 121118-121141
Open Access | Times Cited: 19
Mitigation of attacks via improved network security in IOT network environment using RNN
Surendra Yadav, M. Hashmi, Daxa Vekariya, et al.
Measurement Sensors (2024) Vol. 32, pp. 101046-101046
Open Access | Times Cited: 5
Surendra Yadav, M. Hashmi, Daxa Vekariya, et al.
Measurement Sensors (2024) Vol. 32, pp. 101046-101046
Open Access | Times Cited: 5
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Online and Predictive Coordinated Cloud-Edge Scrubbing for DDoS Mitigation
Ruiting Zhou, Yifan Zeng, Lei Jiao, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 9208-9223
Closed Access | Times Cited: 3
Ruiting Zhou, Yifan Zeng, Lei Jiao, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 9208-9223
Closed Access | Times Cited: 3
Predicting DDoS Attacks Using Machine Learning Algorithms in Building Management Systems
İsa AVCI, Murat Koca
Electronics (2023) Vol. 12, Iss. 19, pp. 4142-4142
Open Access | Times Cited: 7
İsa AVCI, Murat Koca
Electronics (2023) Vol. 12, Iss. 19, pp. 4142-4142
Open Access | Times Cited: 7
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing
Haiyang Huang, Tianhui Meng, Jianxiong Guo, et al.
ACM Transactions on Sensor Networks (2024) Vol. 20, Iss. 3, pp. 1-21
Closed Access | Times Cited: 2
Haiyang Huang, Tianhui Meng, Jianxiong Guo, et al.
ACM Transactions on Sensor Networks (2024) Vol. 20, Iss. 3, pp. 1-21
Closed Access | Times Cited: 2
Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices
Swati Kumari, Vatsal Tulshyan, Hitesh Tewari
Information (2024) Vol. 15, Iss. 3, pp. 126-126
Open Access | Times Cited: 1
Swati Kumari, Vatsal Tulshyan, Hitesh Tewari
Information (2024) Vol. 15, Iss. 3, pp. 126-126
Open Access | Times Cited: 1
Mean-Field Stackelberg Game-Based Security Defense and Resource Optimization in Edge Computing
Li Miao, Shuai Li, Xiangjuan Wu, et al.
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3538-3538
Open Access | Times Cited: 1
Li Miao, Shuai Li, Xiangjuan Wu, et al.
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3538-3538
Open Access | Times Cited: 1
Evaluation of machine learning and deep learning methods for early detection of internet of things botnets
Ashraf S. Mashaleh, Noor Farizah Ibrahim, Mohammad Alauthman, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 4, pp. 4732-4732
Open Access | Times Cited: 1
Ashraf S. Mashaleh, Noor Farizah Ibrahim, Mohammad Alauthman, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 4, pp. 4732-4732
Open Access | Times Cited: 1
Towards Detection of DDoS Attacks in IoT with Optimal Features Selection
Pooja Kumari, Ankit Kumar Jain, Yash Pal, et al.
Wireless Personal Communications (2024) Vol. 137, Iss. 2, pp. 951-976
Closed Access | Times Cited: 1
Pooja Kumari, Ankit Kumar Jain, Yash Pal, et al.
Wireless Personal Communications (2024) Vol. 137, Iss. 2, pp. 951-976
Closed Access | Times Cited: 1
Multi-domain authorization and decision-making method of access control in the edge environment
Yongxia Sun, Weijin Jiang, Ying Yang, et al.
Computer Networks (2023) Vol. 228, pp. 109721-109721
Closed Access | Times Cited: 3
Yongxia Sun, Weijin Jiang, Ying Yang, et al.
Computer Networks (2023) Vol. 228, pp. 109721-109721
Closed Access | Times Cited: 3
Cyber Awareness Learning Imitation Environment (CALIE): A Card Game to provide Cyber Security Awareness for Various Group of Practitioners
P.Mohana Priya, Abhijit Ranganathan
International Journal of Advanced Networking and Applications (2022) Vol. 14, Iss. 02, pp. 5334-5341
Open Access | Times Cited: 5
P.Mohana Priya, Abhijit Ranganathan
International Journal of Advanced Networking and Applications (2022) Vol. 14, Iss. 02, pp. 5334-5341
Open Access | Times Cited: 5
Emulation of Denial-of-Service Attacks for Software Defined Networks
Marcel Großmann, Noelle Weinmann
Communications in computer and information science (2024), pp. 275-285
Closed Access
Marcel Großmann, Noelle Weinmann
Communications in computer and information science (2024), pp. 275-285
Closed Access
A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs
Zhenyong Yang, Changzhong Gao, Yong Wang, et al.
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access
Zhenyong Yang, Changzhong Gao, Yong Wang, et al.
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access
MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA
Natalia Yakymchuk, Yosyp Selepyna, Mykola Yevsiuk, et al.
Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska (2022) Vol. 12, Iss. 4, pp. 26-30
Open Access | Times Cited: 1
Natalia Yakymchuk, Yosyp Selepyna, Mykola Yevsiuk, et al.
Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska (2022) Vol. 12, Iss. 4, pp. 26-30
Open Access | Times Cited: 1
An efficient IDS using FIS to detect DDoS in IoT networks
Trong-Minh Hoang, Nhat-Hoang Tran, Vu-Long Thai, et al.
2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (2022), pp. 193-198
Closed Access | Times Cited: 1
Trong-Minh Hoang, Nhat-Hoang Tran, Vu-Long Thai, et al.
2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (2022), pp. 193-198
Closed Access | Times Cited: 1
Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence
Lu Changkai, Yiwen Liu, Yanxia Gao, et al.
(2023), pp. 213-225
Closed Access
Lu Changkai, Yiwen Liu, Yanxia Gao, et al.
(2023), pp. 213-225
Closed Access
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis
Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, et al.
(2023), pp. 485-494
Closed Access
Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, et al.
(2023), pp. 485-494
Closed Access