
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
IEEE Access (2021) Vol. 9, pp. 90603-90615
Open Access | Times Cited: 43
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
IEEE Access (2021) Vol. 9, pp. 90603-90615
Open Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection
Tommaso Zoppi, Andrea Ceccarelli, Tommaso Puccetti, et al.
Computers & Security (2023) Vol. 127, pp. 103107-103107
Open Access | Times Cited: 40
Tommaso Zoppi, Andrea Ceccarelli, Tommaso Puccetti, et al.
Computers & Security (2023) Vol. 127, pp. 103107-103107
Open Access | Times Cited: 40
Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning
Francisco L. de Caldas Filho, Samuel Carlos Meneses Soares, Elder Oroski, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6305-6305
Open Access | Times Cited: 25
Francisco L. de Caldas Filho, Samuel Carlos Meneses Soares, Elder Oroski, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6305-6305
Open Access | Times Cited: 25
Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
Innocent Mbona, Jan H. P. Eloff
IEEE Access (2022) Vol. 10, pp. 69822-69838
Open Access | Times Cited: 35
Innocent Mbona, Jan H. P. Eloff
IEEE Access (2022) Vol. 10, pp. 69822-69838
Open Access | Times Cited: 35
Reliable Detection of Location Spoofing and Variation Attacks
Chiho Kim, Sang‐Yoon Chang, Dongeun Lee, et al.
IEEE Access (2023) Vol. 11, pp. 10813-10825
Open Access | Times Cited: 17
Chiho Kim, Sang‐Yoon Chang, Dongeun Lee, et al.
IEEE Access (2023) Vol. 11, pp. 10813-10825
Open Access | Times Cited: 17
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
Manish Snehi, Abhinav Bhandari, Jyoti Verma
Computers & Security (2024) Vol. 139, pp. 103702-103702
Closed Access | Times Cited: 6
Manish Snehi, Abhinav Bhandari, Jyoti Verma
Computers & Security (2024) Vol. 139, pp. 103702-103702
Closed Access | Times Cited: 6
Enhanced Network Metric Prediction for Machine Learning-Based Cyber Security of a Software-Defined UAV Relay Network
Dennis Agnew, Álvaro Del Águila, Janise McNair
IEEE Access (2024) Vol. 12, pp. 54202-54219
Open Access | Times Cited: 6
Dennis Agnew, Álvaro Del Águila, Janise McNair
IEEE Access (2024) Vol. 12, pp. 54202-54219
Open Access | Times Cited: 6
Robust Botnet Detection Approach for Known and Unknown Attacks in IoT Networks Using Stacked Multi-classifier and Adaptive Thresholding
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 4
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 4
Efficacy of Tree-Based Models for Pipe Failure Prediction and Condition Assessment: A Comprehensive Review
Milad Latifi, Ramiz Beig Zali, Akbar A. Javadi, et al.
Journal of Water Resources Planning and Management (2024) Vol. 150, Iss. 7
Open Access | Times Cited: 4
Milad Latifi, Ramiz Beig Zali, Akbar A. Javadi, et al.
Journal of Water Resources Planning and Management (2024) Vol. 150, Iss. 7
Open Access | Times Cited: 4
MTCR-AE: A Multiscale Temporal Convolutional Recurrent Autoencoder for unsupervised malicious network traffic detection
Mukhtar Ahmed, Jinfu Chen, Ernest Akpaku, et al.
Computer Networks (2025), pp. 111147-111147
Closed Access
Mukhtar Ahmed, Jinfu Chen, Ernest Akpaku, et al.
Computer Networks (2025), pp. 111147-111147
Closed Access
A Cloud Based Optimization Method for Zero-Day Threats Detection Using Genetic Algorithm and Ensemble Learning
Mike Nkongolo, J. P. van Deventer, Sydney Mambwe Kasongo, et al.
Electronics (2022) Vol. 11, Iss. 11, pp. 1749-1749
Open Access | Times Cited: 17
Mike Nkongolo, J. P. van Deventer, Sydney Mambwe Kasongo, et al.
Electronics (2022) Vol. 11, Iss. 11, pp. 1749-1749
Open Access | Times Cited: 17
A framework for detecting zero-day exploits in network flows
Almamy Touré, Youcef Imine, Alexis Semnont, et al.
Computer Networks (2024) Vol. 248, pp. 110476-110476
Open Access | Times Cited: 3
Almamy Touré, Youcef Imine, Alexis Semnont, et al.
Computer Networks (2024) Vol. 248, pp. 110476-110476
Open Access | Times Cited: 3
Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined Networks
Sami Alsaadi, Tertsegha J. Anande, Mark S. Leeson
Lecture notes on data engineering and communications technologies (2024), pp. 480-491
Closed Access | Times Cited: 2
Sami Alsaadi, Tertsegha J. Anande, Mark S. Leeson
Lecture notes on data engineering and communications technologies (2024), pp. 480-491
Closed Access | Times Cited: 2
Swarm-intelligence for the modern ICT ecosystems
George Hatzivasilis, Eftychia Lakka, Manos Athanatos, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2951-2975
Closed Access | Times Cited: 2
George Hatzivasilis, Eftychia Lakka, Manos Athanatos, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2951-2975
Closed Access | Times Cited: 2
Zero Day Attack Detection and Simulation through Deep Learning Techniques
Aalap Arun, Anjaly S. Nair, A. G. Sreedevi
(2024), pp. 852-857
Closed Access | Times Cited: 1
Aalap Arun, Anjaly S. Nair, A. G. Sreedevi
(2024), pp. 852-857
Closed Access | Times Cited: 1
Detection of Zero-Day Attacks in a Software-Defined LEO Constellation Network Using Enhanced Network Metric Predictions
Dennis Agnew, Ashlee Rice-Bladykas, Janise McNair
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6611-6634
Open Access | Times Cited: 1
Dennis Agnew, Ashlee Rice-Bladykas, Janise McNair
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6611-6634
Open Access | Times Cited: 1
Cyber security: performance analysis and challenges for cyber attacks detection
Azar Abid Salih, Maiwan Bahjat Abdulrazzaq
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 3, pp. 1763-1763
Open Access | Times Cited: 4
Azar Abid Salih, Maiwan Bahjat Abdulrazzaq
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 3, pp. 1763-1763
Open Access | Times Cited: 4
Machine and Representation Learning-Based GNSS Spoofing Detectors Utilizing Feature Set From Generic GNSS Receivers
Asif Iqbal, Muhammad Naveed Aman, Biplab Sikdar
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 574-583
Closed Access | Times Cited: 4
Asif Iqbal, Muhammad Naveed Aman, Biplab Sikdar
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 574-583
Closed Access | Times Cited: 4
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers
Alfonso Iacovazzi, Shahid Raza
(2022), pp. 30-37
Open Access | Times Cited: 7
Alfonso Iacovazzi, Shahid Raza
(2022), pp. 30-37
Open Access | Times Cited: 7
Implementation and Design of a Zero-Day Intrusion Detection and Response System for Responding to Network Security Blind Spots
Won-Seok Choi, Siyoung Lee, Seong Gon Choi
Mobile Information Systems (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 6
Won-Seok Choi, Siyoung Lee, Seong Gon Choi
Mobile Information Systems (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 6
Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT
Priyanka Verma, Nitesh Bharot, John G. Breslin, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3856-3866
Open Access | Times Cited: 3
Priyanka Verma, Nitesh Bharot, John G. Breslin, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3856-3866
Open Access | Times Cited: 3
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems
Mohamad Gharib, Tommaso Zoppi, Andrea Bondavalli
IEEE Transactions on Emerging Topics in Computing (2022) Vol. 10, Iss. 4, pp. 1671-1686
Open Access | Times Cited: 5
Mohamad Gharib, Tommaso Zoppi, Andrea Bondavalli
IEEE Transactions on Emerging Topics in Computing (2022) Vol. 10, Iss. 4, pp. 1671-1686
Open Access | Times Cited: 5
Comparative analysis of soft computing approaches of zero-day-attack detection
Misbah Anwer, Ghufran Ahmed, Adnan Akhunzada, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 5
Misbah Anwer, Ghufran Ahmed, Adnan Akhunzada, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 5
An Adversarial Approach for Intrusion Detection Using Hybrid Deep Learning Model
Md Asaduzzaman, Md. Mahbubur Rahman
(2022), pp. 18-23
Closed Access | Times Cited: 5
Md Asaduzzaman, Md. Mahbubur Rahman
(2022), pp. 18-23
Closed Access | Times Cited: 5
Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers
Kwitee D. Gaylah, Ravirajsinh Vaghela
Communications in computer and information science (2022), pp. 70-82
Closed Access | Times Cited: 4
Kwitee D. Gaylah, Ravirajsinh Vaghela
Communications in computer and information science (2022), pp. 70-82
Closed Access | Times Cited: 4
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks using Machine Learning Algorithms
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, et al.
(2023)
Open Access | Times Cited: 2
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, et al.
(2023)
Open Access | Times Cited: 2