OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning
Zengguang Liu, Xiaochun Yin, Yuemei Hu
IEEE Access (2020) Vol. 8, pp. 42120-42130
Open Access | Times Cited: 70

Showing 1-25 of 70 citing articles:

A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning
Jesús Arturo Pérez-Díaz, Ismael Amezcua Valdovinos, Kim‐Kwang Raymond Choo, et al.
IEEE Access (2020) Vol. 8, pp. 155859-155872
Open Access | Times Cited: 230

Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects
Iqbal H. Sarker
Annals of Data Science (2022) Vol. 10, Iss. 6, pp. 1473-1498
Open Access | Times Cited: 115

Systemic formalisation of Cyber-Physical-Social System (CPSS): A systematic literature review
Bereket Abera Yilma, Hervé Panetto, Yannick Naudet
Computers in Industry (2021) Vol. 129, pp. 103458-103458
Open Access | Times Cited: 88

Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey
Shivani Singh, A. Razia Sulthana, Tanvi Shewale, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 1, pp. 236-260
Closed Access | Times Cited: 77

Observer-Based Attack Detection and Mitigation for Cyberphysical Systems: A Review
Mojtaba Kordestani, Mehrdad Saif
IEEE Systems Man and Cybernetics Magazine (2021) Vol. 7, Iss. 2, pp. 35-60
Closed Access | Times Cited: 56

Reinforcement Learning for feedback-enabled cyber resilience
Yunhan Huang, Linan Huang, Quanyan Zhu
Annual Reviews in Control (2022) Vol. 53, pp. 273-295
Open Access | Times Cited: 56

ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD
Mona Esmaeili, Seyedamiryousef Hosseini Goki, Behnam Hajipour Khire Masjidi, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 41

Survey on Edge Computing Security
Zeyu Huang, Geming Xia, Zhaohang Wang, et al.
(2020), pp. 96-105
Closed Access | Times Cited: 65

Securing Heterogeneous IoT With Intelligent DDoS Attack Behavior Learning
Nhu–Ngoc Dao, Trung V. Phan, Umar Sa'ad, et al.
IEEE Systems Journal (2021) Vol. 16, Iss. 2, pp. 1974-1983
Open Access | Times Cited: 49

An Asynchronous Federated Learning Arbitration Model for Low-Rate DDoS Attack Detection
Zengguang Liu, Cuiyun Guo, D. Liu, et al.
IEEE Access (2023) Vol. 11, pp. 18448-18460
Open Access | Times Cited: 20

A secure edge computing model using machine learning and IDS to detect and isolate intruders
Poornima Mahadevappa, Raja Kumar Murugesan, Redhwan Al-amri, et al.
MethodsX (2024) Vol. 12, pp. 102597-102597
Open Access | Times Cited: 6

LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments
M. Jahir Pasha, K.Prasada Rao, A. Mallareddy, et al.
Measurement Sensors (2023) Vol. 28, pp. 100828-100828
Open Access | Times Cited: 15

A Multi-Agents Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things
Bin Ren, Yunlong Tang, Huan Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25600-25612
Closed Access | Times Cited: 5

A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection
Xiaochun Yin, Fang Wei, Zengguang Liu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4

SmartDefense: A distributed deep defense against DDoS attacks with edge computing
Sowmya Myneni, Ankur Chowdhary, Dijiang Huang, et al.
Computer Networks (2022) Vol. 209, pp. 108874-108874
Closed Access | Times Cited: 18

AIMM: Artificial Intelligence Merged Methods for flood DDoS attacks detection
Antoni Jaszcz, Dawid Połap
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 8090-8101
Open Access | Times Cited: 17

Indoor Emergency Path Planning Based on the Q-Learning Optimization Algorithm
Shenghua Xu, Yang Gu, Xiaoyan Li, et al.
ISPRS International Journal of Geo-Information (2022) Vol. 11, Iss. 1, pp. 66-66
Open Access | Times Cited: 16

Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 3

Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta‐heuristic approach
Ahamed Ali S, V. Gowri, A. Arockia Abins
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 1
Closed Access | Times Cited: 2

A model for new media data mining and analysis in online English teaching using long short-term memory (LSTM) network
Chen Chen, Muhammad Aleem
PeerJ Computer Science (2024) Vol. 10, pp. e1869-e1869
Open Access | Times Cited: 2

A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning
Yunlong Tang, Jing Sun, Huan Wang, et al.
Computers & Security (2024) Vol. 142, pp. 103871-103871
Closed Access | Times Cited: 2

Security in edge-assisted Internet of Things: challenges and solutions
Shuaiqi Shen, Kuan Zhang, Yi Zhou, et al.
Science China Information Sciences (2020) Vol. 63, Iss. 12
Closed Access | Times Cited: 20

Page 1 - Next Page

Scroll to top