
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems
Islam Debicha, Benjamin Cochez, Tayeb Kenaza, et al.
Computers & Security (2023) Vol. 129, pp. 103176-103176
Open Access | Times Cited: 24
Islam Debicha, Benjamin Cochez, Tayeb Kenaza, et al.
Computers & Security (2023) Vol. 129, pp. 103176-103176
Open Access | Times Cited: 24
Showing 24 citing articles:
A novel ensemble method for enhancing Internet of Things device security against botnet attacks
Amina Arshad, Maira Jabeen, Saqib Ubaid, et al.
Decision Analytics Journal (2023) Vol. 8, pp. 100307-100307
Open Access | Times Cited: 24
Amina Arshad, Maira Jabeen, Saqib Ubaid, et al.
Decision Analytics Journal (2023) Vol. 8, pp. 100307-100307
Open Access | Times Cited: 24
Boosting robustness of network intrusion detection systems: A novel two phase defense strategy against untargeted white-box optimization adversarial attack
Khushnaseeb Roshan, Aasim Zafar
Expert Systems with Applications (2024) Vol. 249, pp. 123567-123567
Closed Access | Times Cited: 7
Khushnaseeb Roshan, Aasim Zafar
Expert Systems with Applications (2024) Vol. 249, pp. 123567-123567
Closed Access | Times Cited: 7
Baishun Dong, Hongsen Wang, R. Luo
Internet Technology Letters (2025)
Closed Access
Investigating the impact of feature selection on adversarial transferability in intrusion detection system
James Msughter Adeke, Guangjie Liu, Lord Amoah, et al.
Computers & Security (2025), pp. 104327-104327
Closed Access
James Msughter Adeke, Guangjie Liu, Lord Amoah, et al.
Computers & Security (2025), pp. 104327-104327
Closed Access
NIDS-DA: Detecting functionally preserved adversarial examples for network intrusion detection system using deep autoencoders
Vivek Kumar, Kamal Kumar, Maheep Singh, et al.
Expert Systems with Applications (2025), pp. 126513-126513
Closed Access
Vivek Kumar, Kamal Kumar, Maheep Singh, et al.
Expert Systems with Applications (2025), pp. 126513-126513
Closed Access
Building and Designing an Intrusion Detection System in Software Defined Networks Against Denial-of-Service Attacks Using Deep Learning Techniques
Thura Jabbar Khaleel, Nadia Adnan Shiltagh Al-Jamali
Lecture notes in networks and systems (2025), pp. 187-206
Closed Access
Thura Jabbar Khaleel, Nadia Adnan Shiltagh Al-Jamali
Lecture notes in networks and systems (2025), pp. 187-206
Closed Access
Black-box adversarial transferability: An empirical study in cybersecurity perspective
Khushnaseeb Roshan, Aasim Zafar
Computers & Security (2024) Vol. 141, pp. 103853-103853
Open Access | Times Cited: 3
Khushnaseeb Roshan, Aasim Zafar
Computers & Security (2024) Vol. 141, pp. 103853-103853
Open Access | Times Cited: 3
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3
Network Security Threat Detection: Leveraging Machine Learning Algorithms for Effective Prediction
Kumar T Nitesh, Akash K Thirumala, U. F. Mohammed, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 5
Kumar T Nitesh, Akash K Thirumala, U. F. Mohammed, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 5
Analyzing and detecting Botnet Attacks using Anomaly Detection with Machine Learning
R. Barath Ramesh, S. John Justin Thangaraj
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 911-915
Closed Access | Times Cited: 4
R. Barath Ramesh, S. John Justin Thangaraj
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 911-915
Closed Access | Times Cited: 4
Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks
Shahad Alahmed, Qutaiba Alasad, J.S. Yuan, et al.
Algorithms (2024) Vol. 17, Iss. 4, pp. 155-155
Open Access | Times Cited: 1
Shahad Alahmed, Qutaiba Alasad, J.S. Yuan, et al.
Algorithms (2024) Vol. 17, Iss. 4, pp. 155-155
Open Access | Times Cited: 1
Adversarial attacks based on time-series features for traffic detection
Hongyu Lu, Jiajia Liu, Jimin Peng, et al.
Computers & Security (2024), pp. 104175-104175
Closed Access | Times Cited: 1
Hongyu Lu, Jiajia Liu, Jimin Peng, et al.
Computers & Security (2024), pp. 104175-104175
Closed Access | Times Cited: 1
Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing
Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi
Internet Technology Letters (2023) Vol. 6, Iss. 4
Closed Access | Times Cited: 2
Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi
Internet Technology Letters (2023) Vol. 6, Iss. 4
Closed Access | Times Cited: 2
Network Intrusion Detection for IoT-Botnet Attacks Using ML Algorithms
Vaishnavi Shravan A Raju, B Suma
(2023), pp. 1-6
Closed Access | Times Cited: 2
Vaishnavi Shravan A Raju, B Suma
(2023), pp. 1-6
Closed Access | Times Cited: 2
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
James Msughter Adeke, Guangjie Liu, Junjie Zhao, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 405-405
Open Access | Times Cited: 2
James Msughter Adeke, Guangjie Liu, Junjie Zhao, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 405-405
Open Access | Times Cited: 2
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers
Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, et al.
Information Fusion (2024) Vol. 111, pp. 102529-102529
Open Access
Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, et al.
Information Fusion (2024) Vol. 111, pp. 102529-102529
Open Access
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability
Mohammed M. Alani, Atefeh Mashatan, Ali Miri
(2024), pp. 16-23
Closed Access
Mohammed M. Alani, Atefeh Mashatan, Ali Miri
(2024), pp. 16-23
Closed Access
Evasion Scheme for Intrusion Detection System Based on Demgan
Dawei Xu, Yue Lv, Chuan Zhang, et al.
(2024)
Closed Access
Dawei Xu, Yue Lv, Chuan Zhang, et al.
(2024)
Closed Access
Internet of Things (IoT) Technologies With Intrusion Detection Systems in Deep Learning
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access
Optimisation of multiple clustering based undersampling using artificial bee colony: Application to improved detection of obfuscated patterns without adversarial training
Tonkla Maneerat, Natthakan Iam-On, Tossapon Boongoen, et al.
Information Sciences (2024) Vol. 687, pp. 121407-121407
Open Access
Tonkla Maneerat, Natthakan Iam-On, Tossapon Boongoen, et al.
Information Sciences (2024) Vol. 687, pp. 121407-121407
Open Access
Robust IoT Botnet Detection Framework Resilient to Gradient Based Adversarial Attacks
Deepa Krishnan, Pravin Shrinath
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Deepa Krishnan, Pravin Shrinath
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
A destructive active defense algorithm for deepfake face images
Yang Yang, Norisma Idris, Chang Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2356-e2356
Open Access
Yang Yang, Norisma Idris, Chang Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2356-e2356
Open Access
Addressing Poisoning Attacks Against Federated Intrusion Detection Systems in Internet of Healthcare Things
Takieddine Boumediri, Islam Debicha, Tayeb Kenaza
Lecture notes in networks and systems (2024), pp. 270-281
Closed Access
Takieddine Boumediri, Islam Debicha, Tayeb Kenaza
Lecture notes in networks and systems (2024), pp. 270-281
Closed Access
The Construction of Network Domain Name Security Access Identification System Based on Artificial Intelligence
Lin Li
International Journal of Information Technology and Web Engineering (2023) Vol. 18, Iss. 1, pp. 1-13
Open Access
Lin Li
International Journal of Information Technology and Web Engineering (2023) Vol. 18, Iss. 1, pp. 1-13
Open Access