OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic
Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2020)
Closed Access | Times Cited: 152

Showing 1-25 of 152 citing articles:

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, et al.
IEEE Access (2022) Vol. 10, pp. 93104-93139
Open Access | Times Cited: 166

An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks
Tahmina Zebin, Shahadate Rezvy, Yuan Luo
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2339-2349
Open Access | Times Cited: 80

Interpretable Machine Learning Models for Malicious Domains Detection Using Explainable Artificial Intelligence (XAI)
Nida Aslam, Irfan Ullah Khan, Samiha Mirza, et al.
Sustainability (2022) Vol. 14, Iss. 12, pp. 7375-7375
Open Access | Times Cited: 47

Explainable artificial intelligence for cybersecurity: a literature survey
Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, et al.
Annals of Telecommunications (2022) Vol. 77, Iss. 11-12, pp. 789-812
Open Access | Times Cited: 45

A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques
Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-28
Open Access | Times Cited: 40

Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
IEEE Access (2022) Vol. 10, pp. 110362-110384
Open Access | Times Cited: 39

A Survey of Public IoT Datasets for Network Security Research
François De Keersmaeker, Yinan Cao, Gorby Kabasele Ndonda, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1808-1840
Closed Access | Times Cited: 30

Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms
Zihao Wang, Vrizlynn L. L. Thing
Computers & Security (2023) Vol. 128, pp. 103143-103143
Open Access | Times Cited: 25

Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems
Malek Barhoush, Bilal H. Abed-alguni, Nour Alqudah
The Journal of Supercomputing (2023) Vol. 79, Iss. 18, pp. 21265-21309
Closed Access | Times Cited: 24

A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
Qasem Abu Al‐Haija, Manar Alohaly, Ammar Odeh
Sensors (2023) Vol. 23, Iss. 7, pp. 3489-3489
Open Access | Times Cited: 23

Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review
Il Hwan Ji, Ju Hyeon Lee, Min Ji Kang, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 898-898
Open Access | Times Cited: 13

Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
Innocent Mbona, Jan H. P. Eloff
IEEE Access (2022) Vol. 10, pp. 69822-69838
Open Access | Times Cited: 35

VMFCVD: An Optimized Framework to Combat Volumetric DDoS Attacks using Machine Learning
Arvind Prasad, Shalini Chandra
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9965-9983
Open Access | Times Cited: 32

Detecting Malicious DNS over HTTPS Traffic in Domain Name System using Machine Learning Classifiers
Yaser M. Banadaki
Journal of Computer Sciences and Applications (2020) Vol. 8, Iss. 2, pp. 46-55
Open Access | Times Cited: 44

Detecting Malicious DNS over HTTPS Traffic Using Machine Learning
Sunil K. Singh, Pradeep Kumar Roy
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) (2020)
Closed Access | Times Cited: 42

Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1—A New IoT Dataset
Zhipeng Liu, Niraj Thapa, Addison Shaver, et al.
Sensors (2021) Vol. 21, Iss. 14, pp. 4834-4834
Open Access | Times Cited: 38

Efficient Classification of Enciphered SCADA Network Traffic in Smart Factory Using Decision Tree Algorithm
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Jae‐Min Lee, et al.
IEEE Access (2021) Vol. 9, pp. 154892-154901
Open Access | Times Cited: 36

Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey
Jacek Krupski, Waldemar Graniszewski, Marcin Iwanowski
Electronics (2021) Vol. 10, Iss. 16, pp. 2042-2042
Open Access | Times Cited: 34

Summary of DNS Over HTTPS Abuse
Karel Hynek, Dmitrii Vekshin, Jan Luxemburk, et al.
IEEE Access (2022) Vol. 10, pp. 54668-54680
Open Access | Times Cited: 23

Application of Machine Learning Algorithms for the Validation of a New CoAP-IoT Anomaly Detection Dataset
Laura Vigoya, Alberto Pardal, Diego Fernández, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4482-4482
Open Access | Times Cited: 13

Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol
Matthew Behnke, Nathan Briner, Drake Cullen, et al.
IEEE Access (2021) Vol. 9, pp. 129902-129916
Open Access | Times Cited: 32

Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis
Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 2086-2095
Open Access | Times Cited: 21

usfAD based effective unknown attack detection focused IDS framework
Md Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top