
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Robust stacking ensemble model for darknet traffic classification under adversarial settings
Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari
Computers & Security (2022) Vol. 120, pp. 102830-102830
Closed Access | Times Cited: 24
Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari
Computers & Security (2022) Vol. 120, pp. 102830-102830
Closed Access | Times Cited: 24
Showing 24 citing articles:
Traffic classification in SDN-based IoT network using two-level fused network with self-adaptive manta ray foraging
Mohammed A. Aleisa
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Mohammed A. Aleisa
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
DarkGuardNet: A deep learning framework for imbalanced dark web traffic identification and application classification
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
A Lightweight Machine Learning Approach for Anomalous Unsolicited Network Traffic Detection by Observing Network Telescopes
Shereen Ismail, Salah Dandan, Mark King
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2025), pp. 00407-00413
Closed Access
Shereen Ismail, Salah Dandan, Mark King
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2025), pp. 00407-00413
Closed Access
ADHS-EL: Dynamic ensemble learning with adversarial augmentation for accurate and robust network intrusion detection
Huajuan Ren, Yonghe Tang, Shuai Ren, et al.
Journal of King Saud University - Computer and Information Sciences (2025) Vol. 37, Iss. 1-2
Open Access
Huajuan Ren, Yonghe Tang, Shuai Ren, et al.
Journal of King Saud University - Computer and Information Sciences (2025) Vol. 37, Iss. 1-2
Open Access
Darknet Traffic Analysis: A Systematic Literature Review
Javeriah Saleem, Rafiqul Islam, Md Zahidul Islam
IEEE Access (2024) Vol. 12, pp. 42423-42452
Open Access | Times Cited: 3
Javeriah Saleem, Rafiqul Islam, Md Zahidul Islam
IEEE Access (2024) Vol. 12, pp. 42423-42452
Open Access | Times Cited: 3
Network anomaly detection via similarity-aware ensemble learning with ADSim
Wenqi Chen, Zhiliang Wang, Liyuan Chang, et al.
Computer Networks (2024) Vol. 247, pp. 110423-110423
Closed Access | Times Cited: 3
Wenqi Chen, Zhiliang Wang, Liyuan Chang, et al.
Computer Networks (2024) Vol. 247, pp. 110423-110423
Closed Access | Times Cited: 3
Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning
Dazhou Liu, Younghee Park
Sensors (2024) Vol. 24, Iss. 7, pp. 2295-2295
Open Access | Times Cited: 1
Dazhou Liu, Younghee Park
Sensors (2024) Vol. 24, Iss. 7, pp. 2295-2295
Open Access | Times Cited: 1
Botnet Attack Detection in IoT Devices using Ensemble Classifiers with Reduced Feature Space
N. Dharini, Jeevaa Katiravan, Shakthi S.P
International Research Journal of Multidisciplinary Technovation (2024), pp. 274-295
Open Access | Times Cited: 1
N. Dharini, Jeevaa Katiravan, Shakthi S.P
International Research Journal of Multidisciplinary Technovation (2024), pp. 274-295
Open Access | Times Cited: 1
Robust Decentralized Online Learning against Malicious Data Generators and Dynamic Feedback Delays with Application to Traffic Classification
Yupeng Li, Dacheng Wen, Mengjia Xia
(2023), pp. 465-473
Closed Access | Times Cited: 4
Yupeng Li, Dacheng Wen, Mengjia Xia
(2023), pp. 465-473
Closed Access | Times Cited: 4
Determining susceptible body parts of construction workers due to occupational injuries using inclusive modelling
Kerim Koç, Ömer Ekmekcioğlu, Aslı Pelin Gürgün
Safety Science (2023) Vol. 164, pp. 106157-106157
Closed Access | Times Cited: 3
Kerim Koç, Ömer Ekmekcioğlu, Aslı Pelin Gürgün
Safety Science (2023) Vol. 164, pp. 106157-106157
Closed Access | Times Cited: 3
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1293-1316
Closed Access | Times Cited: 2
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1293-1316
Closed Access | Times Cited: 2
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
James Msughter Adeke, Guangjie Liu, Junjie Zhao, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 405-405
Open Access | Times Cited: 2
James Msughter Adeke, Guangjie Liu, Junjie Zhao, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 405-405
Open Access | Times Cited: 2
DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network
Yuehao Zhu, Jun Tao, Haotian Wang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 1660-1671
Closed Access | Times Cited: 2
Yuehao Zhu, Jun Tao, Haotian Wang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 1660-1671
Closed Access | Times Cited: 2
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Peer-to-Peer Networking and Applications (2023) Vol. 17, Iss. 1, pp. 507-531
Closed Access | Times Cited: 2
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Peer-to-Peer Networking and Applications (2023) Vol. 17, Iss. 1, pp. 507-531
Closed Access | Times Cited: 2
A Real-Time Anonymous Traffic Detection Based on Reinforcement Learning
Dazhou Liu, Younghee Park
(2024), pp. 574-577
Closed Access
Dazhou Liu, Younghee Park
(2024), pp. 574-577
Closed Access
Classification of Darknet Traffic Using the AdaBoost Classifier Method
Risna Sari, Deris Stiawan, Nurul Afifah, et al.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) (2024) Vol. 12, Iss. 2
Open Access
Risna Sari, Deris Stiawan, Nurul Afifah, et al.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) (2024) Vol. 12, Iss. 2
Open Access
Discretization-Based Ensemble Model for Robust Learning in IoT
Anahita Namvar, Chandra Thapa, Salil S. Kanhere
(2024), pp. 353-367
Closed Access
Anahita Namvar, Chandra Thapa, Salil S. Kanhere
(2024), pp. 353-367
Closed Access
Reinterpreting usability of semantic segmentation approach for darknet traffic analysis
Anzhelika Mezina, Radim Bürget, Aleksandr Ometov
Computer Networks (2024) Vol. 249, pp. 110493-110493
Open Access
Anzhelika Mezina, Radim Bürget, Aleksandr Ometov
Computer Networks (2024) Vol. 249, pp. 110493-110493
Open Access
Robust IoT Botnet Detection Framework Resilient to Gradient Based Adversarial Attacks
Deepa Krishnan, Pravin Shrinath
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Deepa Krishnan, Pravin Shrinath
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Secure Federated Distillation Framework for Encrypted Traffic Classification
Long Teng, Qi Feng, Wei Zhao, et al.
Lecture notes in computer science (2024), pp. 1-19
Closed Access
Long Teng, Qi Feng, Wei Zhao, et al.
Lecture notes in computer science (2024), pp. 1-19
Closed Access
Robustness of Machine Learning-Based Intrusion Detection Systems Against Adversarial Attacks in Cyber-Physical Systems
Antônio Carlos da Silva, Silvio E. Quincozes, Renan G. Cattelan, et al.
(2024), pp. 227-238
Closed Access
Antônio Carlos da Silva, Silvio E. Quincozes, Renan G. Cattelan, et al.
(2024), pp. 227-238
Closed Access
TAVo: Tor Application Detection with Voting Critic
Gautam Vira, Samik Pal, Behdad Mansouri, et al.
(2023)
Open Access
Gautam Vira, Samik Pal, Behdad Mansouri, et al.
(2023)
Open Access
A SURVEY ON DEEP LEARNING TECHNIQUES FOR DARKNET TRAFFIC MALWARE DETECTION
J. Sybi Cynthia
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2023) Vol. 07, Iss. 07
Open Access
J. Sybi Cynthia
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2023) Vol. 07, Iss. 07
Open Access
Makine Öğrenme Yöntemi Kullanılarak DarkWEB Trafiği Tespiti ve Sınıflandırılması
Esen Gül İLGÜN, Yusuf Sönmez, Murat Dener
Gazi Journal of Engineering Sciences (2023) Vol. 9, Iss. 4, pp. 126-140
Open Access
Esen Gül İLGÜN, Yusuf Sönmez, Murat Dener
Gazi Journal of Engineering Sciences (2023) Vol. 9, Iss. 4, pp. 126-140
Open Access