OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms
Zihao Wang, Vrizlynn L. L. Thing
Computers & Security (2023) Vol. 128, pp. 103143-103143
Open Access | Times Cited: 25

Showing 25 citing articles:

Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review
Il Hwan Ji, Ju Hyeon Lee, Min Ji Kang, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 898-898
Open Access | Times Cited: 13

Enhancing network intrusion detection performance using generative adversarial networks
Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing
Computers & Security (2024) Vol. 145, pp. 104005-104005
Open Access | Times Cited: 6

HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access

TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification
Z. Liu, Yuanyuan Xie, Yanyan Luo, et al.
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 2977-2977
Open Access

EAMTI: A Novel Method Toward Early and Accurate Malicious Traffic Identification
Yuan Shen, Jun Tao, Linxiao Yu, et al.
Lecture notes in computer science (2025), pp. 417-429
Closed Access

End-to-End Network Intrusion Detection Based on Contrastive Learning
Longlong Li, Yuliang Lu, Guozheng Yang, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2122-2122
Open Access | Times Cited: 4

Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
In-Su Jung, Yu-Rae Song, Lelisa Adeba Jilcha, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 733-733
Open Access | Times Cited: 1

Malicious traffic detection for cloud-edge-end networks: A deep learning approach
Hanbing Liu, Han Fang, Yajuan Zhang
Computer Communications (2023) Vol. 215, pp. 150-156
Closed Access | Times Cited: 4

Encrypted malicious traffic detection based on natural language processing and deep learning
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
Computer Networks (2024) Vol. 250, pp. 110598-110598
Closed Access | Times Cited: 1

PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics
Xiaodu Yang, Sijie Ruan, Yinliang Yue, et al.
Computer Networks (2023) Vol. 238, pp. 110120-110120
Closed Access | Times Cited: 3

Anomaly Detection Method for Integrated Encrypted Malicious Traffic Based on RFCNN-GRU
Huiqi Zhao, Yaowen Ma, Fang Fan, et al.
Communications in computer and information science (2024), pp. 457-471
Closed Access

HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection
Peng Xiao, Ying Yan, Jian Hu, et al.
Security and Communication Networks (2024) Vol. 2024, pp. 1-16
Open Access

A Graph Representation Framework for Encrypted Network Traffic Classification
Zulu Okonkwo, Ernest Foo, Zhé Hóu, et al.
(2024)
Closed Access

Encrypted Network Traffic Analysis
Aswani Kumar Cherukuri, I. Sumaiya Thaseen, Gang Li, et al.
SpringerBriefs in computer science (2024), pp. 19-45
Closed Access

Intelligent botnet detection in IoT networks using parallel CNN‐LSTM fusion
Rongrong Jiang, Zhengqiu Weng, Lili Shi, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access

Video stalling identification for web live streaming under HTTP-FLV
Dandan Niu, Guang Cheng, Zihan Chen, et al.
Computer Networks (2024) Vol. 254, pp. 110714-110714
Closed Access

An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices
Ao Yu, Jun Tao, Dikai Zou, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 34, pp. 1-8
Closed Access

A graph representation framework for encrypted network traffic classification
Zulu Okonkwo, Ernest Foo, Zhé Hóu, et al.
Computers & Security (2024), pp. 104134-104134
Open Access

AI-Based Malicious Encrypted Traffic Detection in 5G Data Collection and Secure Sharing
Gang Han, Hailin Zhang, Zhong-Liang Zhang, et al.
Electronics (2024) Vol. 14, Iss. 1, pp. 51-51
Open Access

Synthesis of Nanofiber Catalyst in AI-Based Electrospinning Process for Sustainable Biodiesel Production
Christie Ng, Wing Tung Ho, Yuen On Fung, et al.
Lecture notes in networks and systems (2024), pp. 365-374
Closed Access

Encrypted Malicious Traffic Detection Based on Albert and Deep Learning
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
(2024)
Closed Access

Research on the Application and Testing Method of AI Firewalls in Network Attack Detection
Zhijia Wang, Qi Deng
2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (2023), pp. 753-757
Closed Access

Page 1

Scroll to top