
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms
Zihao Wang, Vrizlynn L. L. Thing
Computers & Security (2023) Vol. 128, pp. 103143-103143
Open Access | Times Cited: 25
Zihao Wang, Vrizlynn L. L. Thing
Computers & Security (2023) Vol. 128, pp. 103143-103143
Open Access | Times Cited: 25
Showing 25 citing articles:
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review
Il Hwan Ji, Ju Hyeon Lee, Min Ji Kang, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 898-898
Open Access | Times Cited: 13
Il Hwan Ji, Ju Hyeon Lee, Min Ji Kang, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 898-898
Open Access | Times Cited: 13
Enhancing network intrusion detection performance using generative adversarial networks
Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing
Computers & Security (2024) Vol. 145, pp. 104005-104005
Open Access | Times Cited: 6
Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing
Computers & Security (2024) Vol. 145, pp. 104005-104005
Open Access | Times Cited: 6
HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access
TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification
Z. Liu, Yuanyuan Xie, Yanyan Luo, et al.
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 2977-2977
Open Access
Z. Liu, Yuanyuan Xie, Yanyan Luo, et al.
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 2977-2977
Open Access
EAMTI: A Novel Method Toward Early and Accurate Malicious Traffic Identification
Yuan Shen, Jun Tao, Linxiao Yu, et al.
Lecture notes in computer science (2025), pp. 417-429
Closed Access
Yuan Shen, Jun Tao, Linxiao Yu, et al.
Lecture notes in computer science (2025), pp. 417-429
Closed Access
End-to-End Network Intrusion Detection Based on Contrastive Learning
Longlong Li, Yuliang Lu, Guozheng Yang, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2122-2122
Open Access | Times Cited: 4
Longlong Li, Yuliang Lu, Guozheng Yang, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2122-2122
Open Access | Times Cited: 4
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
In-Su Jung, Yu-Rae Song, Lelisa Adeba Jilcha, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 733-733
Open Access | Times Cited: 1
In-Su Jung, Yu-Rae Song, Lelisa Adeba Jilcha, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 733-733
Open Access | Times Cited: 1
Malicious traffic detection for cloud-edge-end networks: A deep learning approach
Hanbing Liu, Han Fang, Yajuan Zhang
Computer Communications (2023) Vol. 215, pp. 150-156
Closed Access | Times Cited: 4
Hanbing Liu, Han Fang, Yajuan Zhang
Computer Communications (2023) Vol. 215, pp. 150-156
Closed Access | Times Cited: 4
Encrypted malicious traffic detection based on natural language processing and deep learning
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
Computer Networks (2024) Vol. 250, pp. 110598-110598
Closed Access | Times Cited: 1
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
Computer Networks (2024) Vol. 250, pp. 110598-110598
Closed Access | Times Cited: 1
PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics
Xiaodu Yang, Sijie Ruan, Yinliang Yue, et al.
Computer Networks (2023) Vol. 238, pp. 110120-110120
Closed Access | Times Cited: 3
Xiaodu Yang, Sijie Ruan, Yinliang Yue, et al.
Computer Networks (2023) Vol. 238, pp. 110120-110120
Closed Access | Times Cited: 3
Anomaly Detection Method for Integrated Encrypted Malicious Traffic Based on RFCNN-GRU
Huiqi Zhao, Yaowen Ma, Fang Fan, et al.
Communications in computer and information science (2024), pp. 457-471
Closed Access
Huiqi Zhao, Yaowen Ma, Fang Fan, et al.
Communications in computer and information science (2024), pp. 457-471
Closed Access
Exploring Emerging Trends in 5g Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies
Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing
(2024)
Open Access
Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing
(2024)
Open Access
HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection
Peng Xiao, Ying Yan, Jian Hu, et al.
Security and Communication Networks (2024) Vol. 2024, pp. 1-16
Open Access
Peng Xiao, Ying Yan, Jian Hu, et al.
Security and Communication Networks (2024) Vol. 2024, pp. 1-16
Open Access
Growth-Adaptive Distillation Compressed Fusion Model for Network Traffic Identification Based on Iot Cloud-Edge Collaboration
Yang Yang, Chengwen Fan, Shaoyin Chen, et al.
(2024)
Closed Access
Yang Yang, Chengwen Fan, Shaoyin Chen, et al.
(2024)
Closed Access
A Graph Representation Framework for Encrypted Network Traffic Classification
Zulu Okonkwo, Ernest Foo, Zhé Hóu, et al.
(2024)
Closed Access
Zulu Okonkwo, Ernest Foo, Zhé Hóu, et al.
(2024)
Closed Access
Encrypted Network Traffic Analysis
Aswani Kumar Cherukuri, I. Sumaiya Thaseen, Gang Li, et al.
SpringerBriefs in computer science (2024), pp. 19-45
Closed Access
Aswani Kumar Cherukuri, I. Sumaiya Thaseen, Gang Li, et al.
SpringerBriefs in computer science (2024), pp. 19-45
Closed Access
Intelligent botnet detection in IoT networks using parallel CNN‐LSTM fusion
Rongrong Jiang, Zhengqiu Weng, Lili Shi, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access
Rongrong Jiang, Zhengqiu Weng, Lili Shi, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access
Video stalling identification for web live streaming under HTTP-FLV
Dandan Niu, Guang Cheng, Zihan Chen, et al.
Computer Networks (2024) Vol. 254, pp. 110714-110714
Closed Access
Dandan Niu, Guang Cheng, Zihan Chen, et al.
Computer Networks (2024) Vol. 254, pp. 110714-110714
Closed Access
An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices
Ao Yu, Jun Tao, Dikai Zou, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 34, pp. 1-8
Closed Access
Ao Yu, Jun Tao, Dikai Zou, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 34, pp. 1-8
Closed Access
A graph representation framework for encrypted network traffic classification
Zulu Okonkwo, Ernest Foo, Zhé Hóu, et al.
Computers & Security (2024), pp. 104134-104134
Open Access
Zulu Okonkwo, Ernest Foo, Zhé Hóu, et al.
Computers & Security (2024), pp. 104134-104134
Open Access
Growth-adaptive distillation compressed fusion model for network traffic identification based on IoT cloud-edge collaboration
Yang Yang, Chengwen Fan, Shaoyin Chen, et al.
Ad Hoc Networks (2024), pp. 103676-103676
Open Access
Yang Yang, Chengwen Fan, Shaoyin Chen, et al.
Ad Hoc Networks (2024), pp. 103676-103676
Open Access
AI-Based Malicious Encrypted Traffic Detection in 5G Data Collection and Secure Sharing
Gang Han, Hailin Zhang, Zhong-Liang Zhang, et al.
Electronics (2024) Vol. 14, Iss. 1, pp. 51-51
Open Access
Gang Han, Hailin Zhang, Zhong-Liang Zhang, et al.
Electronics (2024) Vol. 14, Iss. 1, pp. 51-51
Open Access
Synthesis of Nanofiber Catalyst in AI-Based Electrospinning Process for Sustainable Biodiesel Production
Christie Ng, Wing Tung Ho, Yuen On Fung, et al.
Lecture notes in networks and systems (2024), pp. 365-374
Closed Access
Christie Ng, Wing Tung Ho, Yuen On Fung, et al.
Lecture notes in networks and systems (2024), pp. 365-374
Closed Access
Encrypted Malicious Traffic Detection Based on Albert and Deep Learning
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
(2024)
Closed Access
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
(2024)
Closed Access
Research on the Application and Testing Method of AI Firewalls in Network Attack Detection
Zhijia Wang, Qi Deng
2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (2023), pp. 753-757
Closed Access
Zhijia Wang, Qi Deng
2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (2023), pp. 753-757
Closed Access