
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhancing DDoS Attack Detection Using Snake Optimizer With Ensemble Learning on Internet of Things Environment
Mohammed Aljebreen, Hanan Abdullah Mengash, Munya A. Arasi, et al.
IEEE Access (2023) Vol. 11, pp. 104745-104753
Open Access | Times Cited: 13
Mohammed Aljebreen, Hanan Abdullah Mengash, Munya A. Arasi, et al.
IEEE Access (2023) Vol. 11, pp. 104745-104753
Open Access | Times Cited: 13
Showing 13 citing articles:
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization
Muhammad Hussan, G. Vinoda Reddy, P. Anitha, et al.
Cluster Computing (2023) Vol. 27, Iss. 4, pp. 4469-4490
Closed Access | Times Cited: 17
Muhammad Hussan, G. Vinoda Reddy, P. Anitha, et al.
Cluster Computing (2023) Vol. 27, Iss. 4, pp. 4469-4490
Closed Access | Times Cited: 17
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit
Md. Mobin Akhtar, Sultan Alasmari, S. K. Wasim Haidar, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Md. Mobin Akhtar, Sultan Alasmari, S. K. Wasim Haidar, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access
Multi-task snake optimization algorithm for global optimization and planar kinematic arm control problem
Qingrui Li, Yongquan Zhou, Qifang Luo
PeerJ Computer Science (2025) Vol. 11, pp. e2688-e2688
Open Access
Qingrui Li, Yongquan Zhou, Qifang Luo
PeerJ Computer Science (2025) Vol. 11, pp. e2688-e2688
Open Access
Quadrotor attitude control by improved snake optimizer based adaptive switching disturbance rejection approach
Tao Zhou, Zhisheng Chen, Junjun Jiao
Measurement Science and Technology (2024) Vol. 35, Iss. 7, pp. 076203-076203
Open Access | Times Cited: 1
Tao Zhou, Zhisheng Chen, Junjun Jiao
Measurement Science and Technology (2024) Vol. 35, Iss. 7, pp. 076203-076203
Open Access | Times Cited: 1
Deep Learning Method for Detecting and Mitigating Distributed Denial of Service Attacks with Imbalanced Data
Yogesh B. Sanap, Pushpalata Aher
(2024), pp. 1-8
Closed Access | Times Cited: 1
Yogesh B. Sanap, Pushpalata Aher
(2024), pp. 1-8
Closed Access | Times Cited: 1
A Novel Intrusion Detection Model for Enhancing Security in Smart City
Majed Aborokbah
IEEE Access (2024) Vol. 12, pp. 107431-107444
Open Access | Times Cited: 1
Majed Aborokbah
IEEE Access (2024) Vol. 12, pp. 107431-107444
Open Access | Times Cited: 1
Computer vision based distributed denial of service attack detection for resource-limited devices
Hayelom Gebrye, Yong Wang, Fagen Li
Computers & Electrical Engineering (2024) Vol. 120, pp. 109716-109716
Closed Access | Times Cited: 1
Hayelom Gebrye, Yong Wang, Fagen Li
Computers & Electrical Engineering (2024) Vol. 120, pp. 109716-109716
Closed Access | Times Cited: 1
Enhancing Network Security in IoT Applications through DDoS Attack Detection Using ML
Ahmed M. Salama, Mohamed Abdel-Azim Mohamed, Eman AbdElhalim
مجلة کلية دار العلوم (2024) Vol. 49, Iss. 3
Open Access
Ahmed M. Salama, Mohamed Abdel-Azim Mohamed, Eman AbdElhalim
مجلة کلية دار العلوم (2024) Vol. 49, Iss. 3
Open Access
Aquila Optimization Algorithm based Feature Selection with Optimal Machine Learning for Security Internet of Things Environment
Prerana Nilesh Khairnar, S. Vidhya, D. Keerthana, et al.
(2024), pp. 1-6
Closed Access
Prerana Nilesh Khairnar, S. Vidhya, D. Keerthana, et al.
(2024), pp. 1-6
Closed Access
Deep Learning Algorithms for Detecting and Mitigating DDoS Attacks
Soran Hamad, Shavan Askar, Farah Sami Khoshaba, et al.
Indonesian Journal of Computer Science (2024) Vol. 13, Iss. 2
Open Access
Soran Hamad, Shavan Askar, Farah Sami Khoshaba, et al.
Indonesian Journal of Computer Science (2024) Vol. 13, Iss. 2
Open Access
Unsupervised Models with LOF and PCA for Robust DDOS Attack Detection
Oshin Dhiman, S. A. Sivakumar
Deleted Journal (2023) Vol. 4, Iss. 1, pp. 39-46
Open Access | Times Cited: 1
Oshin Dhiman, S. A. Sivakumar
Deleted Journal (2023) Vol. 4, Iss. 1, pp. 39-46
Open Access | Times Cited: 1