
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detecting Malicious DNS over HTTPS Traffic Using Machine Learning
Sunil K. Singh, Pradeep Kumar Roy
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (2020)
Closed Access | Times Cited: 42
Sunil K. Singh, Pradeep Kumar Roy
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (2020)
Closed Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
Interpretable Machine Learning Models for Malicious Domains Detection Using Explainable Artificial Intelligence (XAI)
Nida Aslam, Irfan Ullah Khan, Samiha Mirza, et al.
Sustainability (2022) Vol. 14, Iss. 12, pp. 7375-7375
Open Access | Times Cited: 47
Nida Aslam, Irfan Ullah Khan, Samiha Mirza, et al.
Sustainability (2022) Vol. 14, Iss. 12, pp. 7375-7375
Open Access | Times Cited: 47
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques
Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-28
Open Access | Times Cited: 41
Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-28
Open Access | Times Cited: 41
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
Qasem Abu Al‐Haija, Manar Alohaly, Ammar Odeh
Sensors (2023) Vol. 23, Iss. 7, pp. 3489-3489
Open Access | Times Cited: 23
Qasem Abu Al‐Haija, Manar Alohaly, Ammar Odeh
Sensors (2023) Vol. 23, Iss. 7, pp. 3489-3489
Open Access | Times Cited: 23
Intelligent Techniques for Detecting Network Attacks: Review and Research Directions
Malak Aljabri, Sumayh S. Aljameel, Rami Mustafa A. Mohammad, et al.
Sensors (2021) Vol. 21, Iss. 21, pp. 7070-7070
Open Access | Times Cited: 46
Malak Aljabri, Sumayh S. Aljameel, Rami Mustafa A. Mohammad, et al.
Sensors (2021) Vol. 21, Iss. 21, pp. 7070-7070
Open Access | Times Cited: 46
Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 6
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 6
Summary of DNS Over HTTPS Abuse
Karel Hynek, Dmitrii Vekshin, Jan Luxemburk, et al.
IEEE Access (2022) Vol. 10, pp. 54668-54680
Open Access | Times Cited: 23
Karel Hynek, Dmitrii Vekshin, Jan Luxemburk, et al.
IEEE Access (2022) Vol. 10, pp. 54668-54680
Open Access | Times Cited: 23
CLAM – CNN and LSTM with Attention Mechanism for DNS Data Exfiltration Detection
J. Joy, Shivani Jaswal
Communications in computer and information science (2025), pp. 130-144
Closed Access
J. Joy, Shivani Jaswal
Communications in computer and information science (2025), pp. 130-144
Closed Access
MTL-DoHTA: Multi-Task Learning-Based DNS over HTTPS Traffic Analysis for Enhanced Network Security
Woong Jung, Byung Il Kwak
Sensors (2025) Vol. 25, Iss. 4, pp. 993-993
Open Access
Woong Jung, Byung Il Kwak
Sensors (2025) Vol. 25, Iss. 4, pp. 993-993
Open Access
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis
Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 2086-2095
Open Access | Times Cited: 21
Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 2086-2095
Open Access | Times Cited: 21
DoH Tunneling Detection System for Enterprise Network Using Deep Learning Technique
Tuấn Anh Nguyễn, Minho Park
Applied Sciences (2022) Vol. 12, Iss. 5, pp. 2416-2416
Open Access | Times Cited: 18
Tuấn Anh Nguyễn, Minho Park
Applied Sciences (2022) Vol. 12, Iss. 5, pp. 2416-2416
Open Access | Times Cited: 18
Classification and characterization of encoded traffic in SCADA network using hybrid deep learning scheme
Love Allen Chijioke Ahakonye, Gabriel Chukwunonso Amaizu, Cosmas Ifeanyi Nwakanma, et al.
Journal of Communications and Networks (2024) Vol. 26, Iss. 1, pp. 65-79
Open Access | Times Cited: 3
Love Allen Chijioke Ahakonye, Gabriel Chukwunonso Amaizu, Cosmas Ifeanyi Nwakanma, et al.
Journal of Communications and Networks (2024) Vol. 26, Iss. 1, pp. 65-79
Open Access | Times Cited: 3
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels
Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, et al.
Annals of Telecommunications (2024) Vol. 80, Iss. 3-4, pp. 227-249
Closed Access | Times Cited: 3
Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, et al.
Annals of Telecommunications (2024) Vol. 80, Iss. 3-4, pp. 227-249
Closed Access | Times Cited: 3
Large Scale Measurement on the Adoption of Encrypted DNS
Sebastián García, Karel Hynek, Dmitrii Vekshin, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 21
Sebastián García, Karel Hynek, Dmitrii Vekshin, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 21
Improved Intrusion Detection System to Alleviate Attacks on DNS Service
Hani Almimi, Nesreen A. Hamad, Mosleh M. Abualhaj, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 12, pp. 1549-1560
Open Access | Times Cited: 6
Hani Almimi, Nesreen A. Hamad, Mosleh M. Abualhaj, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 12, pp. 1549-1560
Open Access | Times Cited: 6
Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification
Ahmad Reda Alzighaibi
Computers (2023) Vol. 12, Iss. 3, pp. 47-47
Open Access | Times Cited: 5
Ahmad Reda Alzighaibi
Computers (2023) Vol. 12, Iss. 3, pp. 47-47
Open Access | Times Cited: 5
Improvising Encrypted Traffic Analysis Using Stacking Ensemble Model
P. Pavan, M. A. Saifulla, Nemalikanti Anand
Lecture notes in networks and systems (2024), pp. 387-394
Closed Access | Times Cited: 1
P. Pavan, M. A. Saifulla, Nemalikanti Anand
Lecture notes in networks and systems (2024), pp. 387-394
Closed Access | Times Cited: 1
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels
Yulduz Khodjaeva, A. Nur Zincir‐Heywood
Proceedings of the 17th International Conference on Availability, Reliability and Security (2021), pp. 1-7
Closed Access | Times Cited: 11
Yulduz Khodjaeva, A. Nur Zincir‐Heywood
Proceedings of the 17th International Conference on Availability, Reliability and Security (2021), pp. 1-7
Closed Access | Times Cited: 11
Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification
Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, et al.
Lecture notes in computer science (2021), pp. 238-256
Closed Access | Times Cited: 11
Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, et al.
Lecture notes in computer science (2021), pp. 238-256
Closed Access | Times Cited: 11
Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection
Shaoqian Wu, Wei Wang, Zhanmeng Ding
Journal of Information Security and Applications (2024) Vol. 84, pp. 103827-103827
Closed Access | Times Cited: 1
Shaoqian Wu, Wei Wang, Zhanmeng Ding
Journal of Information Security and Applications (2024) Vol. 84, pp. 103827-103827
Closed Access | Times Cited: 1
MFC-DoH: DoH Tunnel Detection Based on the Fusion of MAML and F-CNN
Xiaoyu Liu, Yijing Zhang, Xiaodu Yang, et al.
(2024), pp. 267-275
Closed Access | Times Cited: 1
Xiaoyu Liu, Yijing Zhang, Xiaodu Yang, et al.
(2024), pp. 267-275
Closed Access | Times Cited: 1
Classifying DNS Tunneling Tools For Malicious DoH Traffic
Rafa Alenezi, Simone A. Ludwig
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2021)
Closed Access | Times Cited: 10
Rafa Alenezi, Simone A. Ludwig
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2021)
Closed Access | Times Cited: 10
Malicious traffic Detection of DNS over HTTPS using Ensemble Machine Learning
Sunil Kumar Singh, Pradeep Kumar Roy
International Journal of Computing and Digital Systems (2022) Vol. 11, Iss. 1, pp. 1061-1069
Open Access | Times Cited: 6
Sunil Kumar Singh, Pradeep Kumar Roy
International Journal of Computing and Digital Systems (2022) Vol. 11, Iss. 1, pp. 1061-1069
Open Access | Times Cited: 6
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1293-1316
Closed Access | Times Cited: 3
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1293-1316
Closed Access | Times Cited: 3
Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range
Alberto Mozó, Antonio Pastor, Amit Karamchandani, et al.
Applied Sciences (2022) Vol. 12, Iss. 20, pp. 10349-10349
Open Access | Times Cited: 5
Alberto Mozó, Antonio Pastor, Amit Karamchandani, et al.
Applied Sciences (2022) Vol. 12, Iss. 20, pp. 10349-10349
Open Access | Times Cited: 5
Detecting Malware with Classification Machine Learning Techniques
Mohd Azahari Mohd Yusof, Zubaile Abdullah, Firkhan Ali Hamid Ali, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 2
Mohd Azahari Mohd Yusof, Zubaile Abdullah, Firkhan Ali Hamid Ali, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 6
Open Access | Times Cited: 2