
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DDoS attack detection in Internet of Things using recurrent neural network
Omerah Yousuf, Roohie Naaz Mir
Computers & Electrical Engineering (2022) Vol. 101, pp. 108034-108034
Closed Access | Times Cited: 36
Omerah Yousuf, Roohie Naaz Mir
Computers & Electrical Engineering (2022) Vol. 101, pp. 108034-108034
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
IEEE Access (2023) Vol. 11, pp. 28934-28954
Open Access | Times Cited: 50
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
IEEE Access (2023) Vol. 11, pp. 28934-28954
Open Access | Times Cited: 50
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 18
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 18
MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks
Mohammad Al-Fawa’reh, Jumana Abu-Khalaf, Patryk Szewczyk, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 9610-9629
Open Access | Times Cited: 28
Mohammad Al-Fawa’reh, Jumana Abu-Khalaf, Patryk Szewczyk, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 9610-9629
Open Access | Times Cited: 28
Ishaani Priyadarshini, Pinaki Mohanty, Ahmed Alkhayyat, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 11
Closed Access | Times Cited: 26
A hybrid machine learning and embedded IoT-based water quality monitoring system
Ismail Adeniyi Adeleke, Nnamdi Nwulu, Omolola A. Ogbolumani
Internet of Things (2023) Vol. 22, pp. 100774-100774
Closed Access | Times Cited: 23
Ismail Adeniyi Adeleke, Nnamdi Nwulu, Omolola A. Ogbolumani
Internet of Things (2023) Vol. 22, pp. 100774-100774
Closed Access | Times Cited: 23
DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 22
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 22
Leveraging Deep Reinforcement Learning Technique for Intrusion Detection in SCADA Infrastructure
Frantzy Mesadieu, Damiano Torre, Anitha Chennamaneni
IEEE Access (2024) Vol. 12, pp. 63381-63399
Open Access | Times Cited: 8
Frantzy Mesadieu, Damiano Torre, Anitha Chennamaneni
IEEE Access (2024) Vol. 12, pp. 63381-63399
Open Access | Times Cited: 8
Mitigation of attacks via improved network security in IOT network environment using RNN
Surendra Yadav, M. Hashmi, Daxa Vekariya, et al.
Measurement Sensors (2024) Vol. 32, pp. 101046-101046
Open Access | Times Cited: 5
Surendra Yadav, M. Hashmi, Daxa Vekariya, et al.
Measurement Sensors (2024) Vol. 32, pp. 101046-101046
Open Access | Times Cited: 5
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure
Ahmed A. Toony, Fayez Alqahtani, Yasser M. Alginahi, et al.
Internet of Things (2024) Vol. 26, pp. 101231-101231
Closed Access | Times Cited: 5
Ahmed A. Toony, Fayez Alqahtani, Yasser M. Alginahi, et al.
Internet of Things (2024) Vol. 26, pp. 101231-101231
Closed Access | Times Cited: 5
MP-GUARD: A novel multi-pronged intrusion detection and mitigation framework for scalable SD-IoT networks using cooperative monitoring, ensemble learning, and new P4-extracted feature set
Ameer El-Sayed, Wael Said, Amr Tolba, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109484-109484
Closed Access | Times Cited: 5
Ameer El-Sayed, Wael Said, Amr Tolba, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109484-109484
Closed Access | Times Cited: 5
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Deep Learning based DDoS Attack Detection in Internet of Things: An Optimized CNN-BiLSTM Architecture with Transfer Learning and Regularization Techniques
Iqbal H. Jebril, M. Premkumar, Ghaida Muttashar Abdulsahib, et al.
Híradástechnika/Infocommunications journal (2024) Vol. 16, Iss. 1, pp. 2-11
Open Access | Times Cited: 4
Iqbal H. Jebril, M. Premkumar, Ghaida Muttashar Abdulsahib, et al.
Híradástechnika/Infocommunications journal (2024) Vol. 16, Iss. 1, pp. 2-11
Open Access | Times Cited: 4
An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model
Saurav Kumar, Ajit kumar Keshri
Knowledge-Based Systems (2024) Vol. 299, pp. 112052-112052
Closed Access | Times Cited: 4
Saurav Kumar, Ajit kumar Keshri
Knowledge-Based Systems (2024) Vol. 299, pp. 112052-112052
Closed Access | Times Cited: 4
CO-STOP: A Robust P4-Powered Adaptive Framework for Comprehensive Detection and Mitigation of Coordinated and Multi-Faceted Attacks in SD-IoT Networks
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access
Ameer El-Sayed, Ahmed A. Toony, Fayez Alqahtani, et al.
Computers & Security (2025), pp. 104349-104349
Closed Access
P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
Mathematics (2023) Vol. 11, Iss. 16, pp. 3552-3552
Open Access | Times Cited: 10
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
Mathematics (2023) Vol. 11, Iss. 16, pp. 3552-3552
Open Access | Times Cited: 10
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
Ankit Sharma, Kriti Bhushan
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13809-13834
Closed Access | Times Cited: 3
Ankit Sharma, Kriti Bhushan
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13809-13834
Closed Access | Times Cited: 3
Detection and Mitigation of DDOS Attack in SDN Environment Using Hybrid CNN-LSTM
Dhanya M Rajan, Dr.D. John Aravindhar
MIGRATION LETTERS (2023) Vol. 20, Iss. S13, pp. 407-419
Open Access | Times Cited: 8
Dhanya M Rajan, Dr.D. John Aravindhar
MIGRATION LETTERS (2023) Vol. 20, Iss. S13, pp. 407-419
Open Access | Times Cited: 8
Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment
Mahmoud Ragab, Sultanah M. Alshammari, Louai A. Maghrabi, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4448-4448
Open Access | Times Cited: 6
Mahmoud Ragab, Sultanah M. Alshammari, Louai A. Maghrabi, et al.
Mathematics (2023) Vol. 11, Iss. 21, pp. 4448-4448
Open Access | Times Cited: 6
DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset
Yagiz Alp Anli, Zeki Çıplak, Murat Sakaliuzun, et al.
Internet of Things (2024) Vol. 28, pp. 101343-101343
Closed Access | Times Cited: 2
Yagiz Alp Anli, Zeki Çıplak, Murat Sakaliuzun, et al.
Internet of Things (2024) Vol. 28, pp. 101343-101343
Closed Access | Times Cited: 2
Computer vision based distributed denial of service attack detection for resource-limited devices
Hayelom Gebrye, Yong Wang, Fagen Li
Computers & Electrical Engineering (2024) Vol. 120, pp. 109716-109716
Closed Access | Times Cited: 2
Hayelom Gebrye, Yong Wang, Fagen Li
Computers & Electrical Engineering (2024) Vol. 120, pp. 109716-109716
Closed Access | Times Cited: 2
Evaluation of machine learning and deep learning methods for early detection of internet of things botnets
Ashraf S. Mashaleh, Noor Farizah Ibrahim, Mohammad Alauthman, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 4, pp. 4732-4732
Open Access | Times Cited: 1
Ashraf S. Mashaleh, Noor Farizah Ibrahim, Mohammad Alauthman, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 4, pp. 4732-4732
Open Access | Times Cited: 1
Integrating Machine Learning for Sustaining Cybersecurity in Digital Banks
Muath Asmar, Alia Tuqan
Heliyon (2024), pp. e37571-e37571
Open Access | Times Cited: 1
Muath Asmar, Alia Tuqan
Heliyon (2024), pp. e37571-e37571
Open Access | Times Cited: 1
Harnessing Blockchain with Ensemble Deep Learning based Distributed DoS Attack Detection in IoT-Assisted Secure Consumer Electronics Systems
Fatma S. Alrayes, Mohammed Aljebreen, MOHAMMED ALGHAMDI, et al.
Fractals (2024) Vol. 32, Iss. 09n10
Closed Access | Times Cited: 1
Fatma S. Alrayes, Mohammed Aljebreen, MOHAMMED ALGHAMDI, et al.
Fractals (2024) Vol. 32, Iss. 09n10
Closed Access | Times Cited: 1
Towards Autonomous Cybersecurity: A Comparative Analysis of Agnostic and Hybrid AI Approaches for Advanced Persistent Threat Detection
Adrián Hernández-Rivas, Víctor Morales-Rocha, J. Patricia Sánchez-Solís
Studies in computational intelligence (2024), pp. 181-219
Closed Access | Times Cited: 1
Adrián Hernández-Rivas, Víctor Morales-Rocha, J. Patricia Sánchez-Solís
Studies in computational intelligence (2024), pp. 181-219
Closed Access | Times Cited: 1
Enhancing IoT Security with Deep Stack Encoder using Various Optimizers for Botnet Attack Prediction
Archana Kalidindi, Mahesh Babu Arrama
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 3
Archana Kalidindi, Mahesh Babu Arrama
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 3