
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
Danial Javaheri, Saeid Gorgin, Jeong–A Lee, et al.
Information Sciences (2023) Vol. 626, pp. 315-338
Closed Access | Times Cited: 66
Danial Javaheri, Saeid Gorgin, Jeong–A Lee, et al.
Information Sciences (2023) Vol. 626, pp. 315-338
Closed Access | Times Cited: 66
Showing 1-25 of 66 citing articles:
Group decision on rationalizing disease analysis using novel distance measure on Pythagorean fuzziness
B. Baranidharan, Jie Liu, G. S. Mahapatra, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 4373-4395
Open Access | Times Cited: 16
B. Baranidharan, Jie Liu, G. S. Mahapatra, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 4373-4395
Open Access | Times Cited: 16
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Kousik Barik, Sanjay Misra, Luis Fernández Sanz
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2353-2376
Open Access | Times Cited: 8
Kousik Barik, Sanjay Misra, Luis Fernández Sanz
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2353-2376
Open Access | Times Cited: 8
Lifelong Continual Learning for Anomaly Detection: New Challenges, Perspectives, and Insights
Kamil Faber, Roberto Corizzo, Bartłomiej Śnieżyński, et al.
IEEE Access (2024) Vol. 12, pp. 41364-41380
Open Access | Times Cited: 7
Kamil Faber, Roberto Corizzo, Bartłomiej Śnieżyński, et al.
IEEE Access (2024) Vol. 12, pp. 41364-41380
Open Access | Times Cited: 7
Cybersecurity threats in FinTech: A systematic review
Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122697-122697
Open Access | Times Cited: 20
Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122697-122697
Open Access | Times Cited: 20
Time Series Prediction in Industry 4.0: A Comprehensive Review and Prospects for Future Advancements
Nataliia Kashpruk, C. Piskor-Ignatowicz, Jerzy Baranowski
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12374-12374
Open Access | Times Cited: 17
Nataliia Kashpruk, C. Piskor-Ignatowicz, Jerzy Baranowski
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12374-12374
Open Access | Times Cited: 17
Enhancing Medical Image Reclamation for Chest Samples Using B-Coefficients, DT-CWT and EPS Algorithm
B. P. Pradeep Kumar, Pramod Rangaiah, Robin Augustine
IEEE Access (2023) Vol. 11, pp. 113360-113375
Open Access | Times Cited: 16
B. P. Pradeep Kumar, Pramod Rangaiah, Robin Augustine
IEEE Access (2023) Vol. 11, pp. 113360-113375
Open Access | Times Cited: 16
DoS/DDoS attacks in Software Defined Networks: Current situation, challenges and future directions
Mohamed Ali Setitra, Mingyu Fan, Ilyas Benkhaddra, et al.
Computer Communications (2024) Vol. 222, pp. 77-96
Closed Access | Times Cited: 5
Mohamed Ali Setitra, Mingyu Fan, Ilyas Benkhaddra, et al.
Computer Communications (2024) Vol. 222, pp. 77-96
Closed Access | Times Cited: 5
When bipartite graph learning meets anomaly detection in attributed networks: Understand abnormalities from each attribute
Zhen Peng, Yunfan Wang, Qiang Lin, et al.
Neural Networks (2025) Vol. 185, pp. 107194-107194
Closed Access
Zhen Peng, Yunfan Wang, Qiang Lin, et al.
Neural Networks (2025) Vol. 185, pp. 107194-107194
Closed Access
Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks
Daniel Spiekermann
International Journal of Network Management (2025) Vol. 35, Iss. 2
Open Access
Daniel Spiekermann
International Journal of Network Management (2025) Vol. 35, Iss. 2
Open Access
Enhanced Hybrid Approach for Multi-Class DDoS Attack Detection and Classification in Software-Defined Networks Using Remote Sensing and Data Analytics
S. Pradeesh, M. Jeyakarthic, A. Thirumalairaj
Remote Sensing in Earth Systems Sciences (2025)
Closed Access
S. Pradeesh, M. Jeyakarthic, A. Thirumalairaj
Remote Sensing in Earth Systems Sciences (2025)
Closed Access
An expert-aware Markovian system for end-user proactive troubleshooting in the Network and Security Operations Center
Alejandro Rojas León, Daniel Perdices, José Luis García‐Dorado, et al.
Expert Systems with Applications (2025), pp. 127072-127072
Closed Access
Alejandro Rojas León, Daniel Perdices, José Luis García‐Dorado, et al.
Expert Systems with Applications (2025), pp. 127072-127072
Closed Access
A novel immune detector training method for network anomaly detection
Xiaowen Liu, Geying Yang, Lina Wang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 2, pp. 2009-2030
Closed Access | Times Cited: 4
Xiaowen Liu, Geying Yang, Lina Wang, et al.
Applied Intelligence (2024) Vol. 54, Iss. 2, pp. 2009-2030
Closed Access | Times Cited: 4
Knowledge-based anomaly detection: Survey, challenges, and future directions
Abdul Qadir Khan, Saad El Jaouhari, Nouredine Tamani, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108996-108996
Closed Access | Times Cited: 4
Abdul Qadir Khan, Saad El Jaouhari, Nouredine Tamani, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108996-108996
Closed Access | Times Cited: 4
Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph
Yang Zhang, Jiarui Chen, Zhe Cheng, et al.
Information Sciences (2023) Vol. 653, pp. 119770-119770
Closed Access | Times Cited: 11
Yang Zhang, Jiarui Chen, Zhe Cheng, et al.
Information Sciences (2023) Vol. 653, pp. 119770-119770
Closed Access | Times Cited: 11
PCFS: An Intelligent Imbalanced Classification Scheme with Noisy Samples
Lei Jiang, Peng Chen, Jing Liao, et al.
Information Sciences (2024) Vol. 679, pp. 121020-121020
Closed Access | Times Cited: 3
Lei Jiang, Peng Chen, Jing Liao, et al.
Information Sciences (2024) Vol. 679, pp. 121020-121020
Closed Access | Times Cited: 3
Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
Information Sciences (2023) Vol. 656, pp. 119914-119914
Closed Access | Times Cited: 8
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
Information Sciences (2023) Vol. 656, pp. 119914-119914
Closed Access | Times Cited: 8
Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta‐heuristic approach
Ahamed Ali S, V. Gowri, A. Arockia Abins
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 1
Closed Access | Times Cited: 2
Ahamed Ali S, V. Gowri, A. Arockia Abins
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 1
Closed Access | Times Cited: 2
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2
DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment
Goda Srinivasa Rao, Priyadarsan Patra, V. A. Narayana, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100526-100526
Open Access | Times Cited: 2
Goda Srinivasa Rao, Priyadarsan Patra, V. A. Narayana, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100526-100526
Open Access | Times Cited: 2
Zero-Day Threats Detection for Critical Infrastructures
Mike Nkongolo, Mahmut TOKMAK
Communications in computer and information science (2023), pp. 32-47
Closed Access | Times Cited: 7
Mike Nkongolo, Mahmut TOKMAK
Communications in computer and information science (2023), pp. 32-47
Closed Access | Times Cited: 7
Assessing the impacts of climate change on streamflow dynamics: A machine learning perspective
Mehran Khan, Afed Ullah Khan, Sunaid Khan, et al.
Water Science & Technology (2023) Vol. 88, Iss. 9, pp. 2309-2331
Open Access | Times Cited: 7
Mehran Khan, Afed Ullah Khan, Sunaid Khan, et al.
Water Science & Technology (2023) Vol. 88, Iss. 9, pp. 2309-2331
Open Access | Times Cited: 7
DBSTGNN-Att: Dual Branch Spatio-Temporal Graph Neural Network with an Attention Mechanism for Cellular Network Traffic Prediction
Zengyu Cai, Chunchen Tan, Jianwei Zhang, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2173-2173
Open Access | Times Cited: 2
Zengyu Cai, Chunchen Tan, Jianwei Zhang, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2173-2173
Open Access | Times Cited: 2
Cryptographic evidence-based cybersecurity for smart healthcare systems
Hubert Szczepaniuk, Edyta Karolina Szczepaniuk
Information Sciences (2023) Vol. 649, pp. 119633-119633
Open Access | Times Cited: 5
Hubert Szczepaniuk, Edyta Karolina Szczepaniuk
Information Sciences (2023) Vol. 649, pp. 119633-119633
Open Access | Times Cited: 5