
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A dynamic MLP-based DDoS attack detection method using feature selection and feedback
Meng Wang, Yiqin Lu, Jiancheng Qin
Computers & Security (2019) Vol. 88, pp. 101645-101645
Open Access | Times Cited: 174
Meng Wang, Yiqin Lu, Jiancheng Qin
Computers & Security (2019) Vol. 88, pp. 101645-101645
Open Access | Times Cited: 174
Showing 1-25 of 174 citing articles:
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey
Mahmoud Abbasi, Amin Shahraki, Amir Taherkordi
Computer Communications (2021) Vol. 170, pp. 19-41
Open Access | Times Cited: 282
Mahmoud Abbasi, Amin Shahraki, Amir Taherkordi
Computer Communications (2021) Vol. 170, pp. 19-41
Open Access | Times Cited: 282
A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning
Jesús Arturo Pérez-Díaz, Ismael Amezcua Valdovinos, Kim‐Kwang Raymond Choo, et al.
IEEE Access (2020) Vol. 8, pp. 155859-155872
Open Access | Times Cited: 230
Jesús Arturo Pérez-Díaz, Ismael Amezcua Valdovinos, Kim‐Kwang Raymond Choo, et al.
IEEE Access (2020) Vol. 8, pp. 155859-155872
Open Access | Times Cited: 230
The DDoS attacks detection through machine learning and statistical methods in SDN
Afsaneh Banitalebi Dehkordi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni
The Journal of Supercomputing (2020) Vol. 77, Iss. 3, pp. 2383-2415
Closed Access | Times Cited: 171
Afsaneh Banitalebi Dehkordi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni
The Journal of Supercomputing (2020) Vol. 77, Iss. 3, pp. 2383-2415
Closed Access | Times Cited: 171
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors (2022) Vol. 22, Iss. 13, pp. 4730-4730
Open Access | Times Cited: 128
Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors (2022) Vol. 22, Iss. 13, pp. 4730-4730
Open Access | Times Cited: 128
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments
Matheus P. Novaes, Luiz F. Carvalho, Jaime Lloret, et al.
Future Generation Computer Systems (2021) Vol. 125, pp. 156-167
Open Access | Times Cited: 120
Matheus P. Novaes, Luiz F. Carvalho, Jaime Lloret, et al.
Future Generation Computer Systems (2021) Vol. 125, pp. 156-167
Open Access | Times Cited: 120
A review of recent approaches on wrapper feature selection for intrusion detection
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 100
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 100
A Study on Different Deep Learning Algorithms Used in Deep Neural Nets: MLP SOM and DBN
J. Naskath, G. Sivakamasundari, A. Alif Siddiqua Begum
Wireless Personal Communications (2022) Vol. 128, Iss. 4, pp. 2913-2936
Open Access | Times Cited: 96
J. Naskath, G. Sivakamasundari, A. Alif Siddiqua Begum
Wireless Personal Communications (2022) Vol. 128, Iss. 4, pp. 2913-2936
Open Access | Times Cited: 96
Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud
Aanshi Bhardwaj, Veenu Mangat, Renu Vig
IEEE Access (2020) Vol. 8, pp. 181916-181929
Open Access | Times Cited: 109
Aanshi Bhardwaj, Veenu Mangat, Renu Vig
IEEE Access (2020) Vol. 8, pp. 181916-181929
Open Access | Times Cited: 109
Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment
Matheus P. Novaes, Luiz F. Carvalho, Jaime Lloret, et al.
IEEE Access (2020) Vol. 8, pp. 83765-83781
Open Access | Times Cited: 100
Matheus P. Novaes, Luiz F. Carvalho, Jaime Lloret, et al.
IEEE Access (2020) Vol. 8, pp. 83765-83781
Open Access | Times Cited: 100
Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 87
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 87
Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
Said El Kafhali, Iman El Mir, Mohamed Hanini
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 1, pp. 223-246
Closed Access | Times Cited: 83
Said El Kafhali, Iman El Mir, Mohamed Hanini
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 1, pp. 223-246
Closed Access | Times Cited: 83
Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices
Vimal Gaur, Rajneesh Kumar
Arabian Journal for Science and Engineering (2021) Vol. 47, Iss. 2, pp. 1353-1374
Closed Access | Times Cited: 78
Vimal Gaur, Rajneesh Kumar
Arabian Journal for Science and Engineering (2021) Vol. 47, Iss. 2, pp. 1353-1374
Closed Access | Times Cited: 78
A feature reduction based reflected and exploited DDoS attacks detection system
Deepak Kshirsagar, Sandeep Kumar
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 1, pp. 393-405
Closed Access | Times Cited: 69
Deepak Kshirsagar, Sandeep Kumar
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 1, pp. 393-405
Closed Access | Times Cited: 69
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
Vinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, et al.
Computer Networks (2021) Vol. 186, pp. 107792-107792
Open Access | Times Cited: 64
Vinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, et al.
Computer Networks (2021) Vol. 186, pp. 107792-107792
Open Access | Times Cited: 64
Towards DDoS detection mechanisms in Software-Defined Networking
Yunhe Cui, Qing Qian, Chun Guo, et al.
Journal of Network and Computer Applications (2021) Vol. 190, pp. 103156-103156
Closed Access | Times Cited: 63
Yunhe Cui, Qing Qian, Chun Guo, et al.
Journal of Network and Computer Applications (2021) Vol. 190, pp. 103156-103156
Closed Access | Times Cited: 63
A hybrid machine learning approach for detecting unprecedented DDoS attacks
Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8106-8136
Open Access | Times Cited: 50
Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8106-8136
Open Access | Times Cited: 50
Perceptron: Learning, Generalization, Model Selection, Fault Tolerance, and Role in the Deep Learning Era
Ke-Lin Du, Chi-Sing Leung, Wai Ho Mow, et al.
Mathematics (2022) Vol. 10, Iss. 24, pp. 4730-4730
Open Access | Times Cited: 38
Ke-Lin Du, Chi-Sing Leung, Wai Ho Mow, et al.
Mathematics (2022) Vol. 10, Iss. 24, pp. 4730-4730
Open Access | Times Cited: 38
An Intelligent Agent-Based Detection System for DDoS Attacks Using Automatic Feature Extraction and Selection
Rana Abu Bakar, Xin Huang, Muhammad Saqib Javed, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 3333-3333
Open Access | Times Cited: 26
Rana Abu Bakar, Xin Huang, Muhammad Saqib Javed, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 3333-3333
Open Access | Times Cited: 26
Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems
Islam Debicha, Benjamin Cochez, Tayeb Kenaza, et al.
Computers & Security (2023) Vol. 129, pp. 103176-103176
Open Access | Times Cited: 24
Islam Debicha, Benjamin Cochez, Tayeb Kenaza, et al.
Computers & Security (2023) Vol. 129, pp. 103176-103176
Open Access | Times Cited: 24
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
Aanshi Bhardwaj, Veenu Mangat, Renu Vig, et al.
Computer Science Review (2020) Vol. 39, pp. 100332-100332
Closed Access | Times Cited: 63
Aanshi Bhardwaj, Veenu Mangat, Renu Vig, et al.
Computer Science Review (2020) Vol. 39, pp. 100332-100332
Closed Access | Times Cited: 63
DDoS Detection in SDN using Machine Learning Techniques
Sunil Kumar, Hanumat Sastry G, Venkatadri Marriboyina, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 71, Iss. 1, pp. 771-789
Open Access | Times Cited: 48
Sunil Kumar, Hanumat Sastry G, Venkatadri Marriboyina, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 71, Iss. 1, pp. 771-789
Open Access | Times Cited: 48
Mapping and analyzing the local climate zones in China’s 32 major cities using Landsat imagery based on a novel convolutional neural network
Xin Huang, Anling Liu, Jiayi Li
Geo-spatial Information Science (2021) Vol. 24, Iss. 4, pp. 528-557
Open Access | Times Cited: 41
Xin Huang, Anling Liu, Jiayi Li
Geo-spatial Information Science (2021) Vol. 24, Iss. 4, pp. 528-557
Open Access | Times Cited: 41
DDoS attack detection in Internet of Things using recurrent neural network
Omerah Yousuf, Roohie Naaz Mir
Computers & Electrical Engineering (2022) Vol. 101, pp. 108034-108034
Closed Access | Times Cited: 36
Omerah Yousuf, Roohie Naaz Mir
Computers & Electrical Engineering (2022) Vol. 101, pp. 108034-108034
Closed Access | Times Cited: 36
DDoS attack detection using MLP and Random Forest Algorithms
Ashfaq Ahmad Najar, S. Manohar Naik
International Journal of Information Technology (2022) Vol. 14, Iss. 5, pp. 2317-2327
Closed Access | Times Cited: 33
Ashfaq Ahmad Najar, S. Manohar Naik
International Journal of Information Technology (2022) Vol. 14, Iss. 5, pp. 2317-2327
Closed Access | Times Cited: 33
A comprehensive review on data preprocessing techniques in data analysis
Volkan Çetin, Oktay Yıldız
Pamukkale University Journal of Engineering Sciences (2022) Vol. 28, Iss. 2, pp. 299-312
Open Access | Times Cited: 31
Volkan Çetin, Oktay Yıldız
Pamukkale University Journal of Engineering Sciences (2022) Vol. 28, Iss. 2, pp. 299-312
Open Access | Times Cited: 31