
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 116, pp. 102663-102663
Closed Access | Times Cited: 41
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 116, pp. 102663-102663
Closed Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28
Robust stacking ensemble model for darknet traffic classification under adversarial settings
Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari
Computers & Security (2022) Vol. 120, pp. 102830-102830
Closed Access | Times Cited: 25
Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari
Computers & Security (2022) Vol. 120, pp. 102830-102830
Closed Access | Times Cited: 25
DarkGuardNet: A deep learning framework for imbalanced dark web traffic identification and application classification
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
ATVITSC: A novel encrypted traffic classification method based on deep learning
Liu Ya, Xiao Wang, 博 名取, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 9374-9389
Closed Access | Times Cited: 4
Liu Ya, Xiao Wang, 博 名取, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 9374-9389
Closed Access | Times Cited: 4
HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems
Yanan Li, Tao Qin, Yongzhong Huang, et al.
Computers & Security (2022) Vol. 121, pp. 102842-102842
Closed Access | Times Cited: 17
Yanan Li, Tao Qin, Yongzhong Huang, et al.
Computers & Security (2022) Vol. 121, pp. 102842-102842
Closed Access | Times Cited: 17
Darknet Traffic Analysis: A Systematic Literature Review
Javeriah Saleem, Rafiqul Islam, Md Zahidul Islam
IEEE Access (2024) Vol. 12, pp. 42423-42452
Open Access | Times Cited: 3
Javeriah Saleem, Rafiqul Islam, Md Zahidul Islam
IEEE Access (2024) Vol. 12, pp. 42423-42452
Open Access | Times Cited: 3
DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification
Xinbo Han, Guizhong Xu, Meng Zhang, et al.
Computer Networks (2024) Vol. 245, pp. 110372-110372
Closed Access | Times Cited: 3
Xinbo Han, Guizhong Xu, Meng Zhang, et al.
Computer Networks (2024) Vol. 245, pp. 110372-110372
Closed Access | Times Cited: 3
Explainable artificial intelligence for feature selection in network traffic classification: A comparative study
Pouya Khani, Elham Moeinaddini, Narges Dehghan Abnavi, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 3
Pouya Khani, Elham Moeinaddini, Narges Dehghan Abnavi, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 3
The invisible arms race: digital trends in illicit goods trafficking and AI-enabled responses
Ioannis Mademlis, Marina Mancuso, Caterina Paternoster, et al.
(2023)
Open Access | Times Cited: 7
Ioannis Mademlis, Marina Mancuso, Caterina Paternoster, et al.
(2023)
Open Access | Times Cited: 7
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
Haizhen Wang, Jinying Yan, Jia Na
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 569-588
Open Access | Times Cited: 1
Haizhen Wang, Jinying Yan, Jia Na
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 569-588
Open Access | Times Cited: 1
iDetector: A Novel Real-Time Intrusion Detection Solution for IoT Networks
Xiangyu Kong, Y.-H. Zhou, Yilei Xiao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31153-31166
Closed Access | Times Cited: 1
Xiangyu Kong, Y.-H. Zhou, Yilei Xiao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31153-31166
Closed Access | Times Cited: 1
SFML: A personalized, efficient, and privacy-preserving collaborative traffic classification architecture based on split learning and mutual learning
Jiaqi Xia, Meng Wu, Pengyong Li
Future Generation Computer Systems (2024) Vol. 162, pp. 107487-107487
Closed Access | Times Cited: 1
Jiaqi Xia, Meng Wu, Pengyong Li
Future Generation Computer Systems (2024) Vol. 162, pp. 107487-107487
Closed Access | Times Cited: 1
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Liukun He, Liangmin Wang, Keyang Cheng, et al.
IET Information Security (2023) Vol. 17, Iss. 4, pp. 598-615
Open Access | Times Cited: 4
Liukun He, Liangmin Wang, Keyang Cheng, et al.
IET Information Security (2023) Vol. 17, Iss. 4, pp. 598-615
Open Access | Times Cited: 4
A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features
Yanjie He, Wei Li
Sensors (2022) Vol. 22, Iss. 11, pp. 4216-4216
Open Access | Times Cited: 7
Yanjie He, Wei Li
Sensors (2022) Vol. 22, Iss. 11, pp. 4216-4216
Open Access | Times Cited: 7
Bidirectional Statistical Feature Extraction Based on Time Window for Tor Flow Classification
Yan Hong-ping, Liukun He, Xiangmei Song, et al.
Symmetry (2022) Vol. 14, Iss. 10, pp. 2002-2002
Open Access | Times Cited: 5
Yan Hong-ping, Liukun He, Xiangmei Song, et al.
Symmetry (2022) Vol. 14, Iss. 10, pp. 2002-2002
Open Access | Times Cited: 5
Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks
Nathan Briner, Drake Cullen, James Halladay, et al.
IEEE Access (2023) Vol. 11, pp. 113100-113113
Open Access | Times Cited: 2
Nathan Briner, Drake Cullen, James Halladay, et al.
IEEE Access (2023) Vol. 11, pp. 113100-113113
Open Access | Times Cited: 2
An adaptive classification and updating method for unknown network traffic in open environments
Siqi Le, Yingxu Lai, Yipeng Wang, et al.
Computer Networks (2023) Vol. 238, pp. 110114-110114
Closed Access | Times Cited: 2
Siqi Le, Yingxu Lai, Yipeng Wang, et al.
Computer Networks (2023) Vol. 238, pp. 110114-110114
Closed Access | Times Cited: 2
DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network
Yuehao Zhu, Jun Tao, Haotian Wang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 1660-1671
Closed Access | Times Cited: 2
Yuehao Zhu, Jun Tao, Haotian Wang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 1660-1671
Closed Access | Times Cited: 2
Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic
Ivan Kawaminami, Arminda Estrada, Youssef Elsakkary, et al.
(2022), pp. 1-7
Open Access | Times Cited: 3
Ivan Kawaminami, Arminda Estrada, Youssef Elsakkary, et al.
(2022), pp. 1-7
Open Access | Times Cited: 3
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack
Qiang Zhou, Liangmin Wang, Huijuan Zhu, et al.
The Computer Journal (2024) Vol. 67, Iss. 6, pp. 2331-2345
Closed Access
Qiang Zhou, Liangmin Wang, Huijuan Zhu, et al.
The Computer Journal (2024) Vol. 67, Iss. 6, pp. 2331-2345
Closed Access
Hierarchical Perception for Encrypted Traffic Classification via Class Incremental Learning
Zhiyuan Li, Lingbin Bu, Yifan Wang, et al.
Computers & Security (2024) Vol. 149, pp. 104195-104195
Closed Access
Zhiyuan Li, Lingbin Bu, Yifan Wang, et al.
Computers & Security (2024) Vol. 149, pp. 104195-104195
Closed Access
Reinterpreting usability of semantic segmentation approach for darknet traffic analysis
Anzhelika Mezina, Radim Bürget, Aleksandr Ometov
Computer Networks (2024) Vol. 249, pp. 110493-110493
Open Access
Anzhelika Mezina, Radim Bürget, Aleksandr Ometov
Computer Networks (2024) Vol. 249, pp. 110493-110493
Open Access
Context-Aggregated and SAM-Guided Network for ViT-Based Instance Segmentation in Remote Sensing Images
Shuangzhou Liu, Feng Wang, Hongjian You, et al.
Remote Sensing (2024) Vol. 16, Iss. 13, pp. 2472-2472
Open Access
Shuangzhou Liu, Feng Wang, Hongjian You, et al.
Remote Sensing (2024) Vol. 16, Iss. 13, pp. 2472-2472
Open Access
Ship detection in optical remote sensing images based on YOLOv7
C. Wang, Qiming Li
(2024), pp. 293-293
Closed Access
C. Wang, Qiming Li
(2024), pp. 293-293
Closed Access
The Detection of Abnormal Behavior by Artificial Intelligence Algorithms Under Network Security
Hui Cao
IEEE Access (2024) Vol. 12, pp. 118605-118617
Open Access
Hui Cao
IEEE Access (2024) Vol. 12, pp. 118605-118617
Open Access