
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
AP2Vec: An Unsupervised Approach for BGP Hijacking Detection
Tal Shapira, Yuval Shavitt
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2255-2268
Closed Access | Times Cited: 10
Tal Shapira, Yuval Shavitt
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2255-2268
Closed Access | Times Cited: 10
Showing 10 citing articles:
Estimating autonomous system risk levels by analyzing IXP route server RIB
Stefano Servillo, Pietro Spadaccino, Flavio Luciani, et al.
Computer Communications (2025), pp. 108154-108154
Closed Access
Stefano Servillo, Pietro Spadaccino, Flavio Luciani, et al.
Computer Communications (2025), pp. 108154-108154
Closed Access
Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures
Mikołaj Kowalski, Wojciech Mazurczyk
Computer Networks (2023) Vol. 230, pp. 109778-109778
Open Access | Times Cited: 6
Mikołaj Kowalski, Wojciech Mazurczyk
Computer Networks (2023) Vol. 230, pp. 109778-109778
Open Access | Times Cited: 6
Autonomous Systems Risk Level in the Route Server Infrastructure of an Internet Exchange Point
Stefano Servillo, Pietro Spadaccino, Francesca Cuomo, et al.
(2024), pp. 95-103
Closed Access | Times Cited: 1
Stefano Servillo, Pietro Spadaccino, Francesca Cuomo, et al.
(2024), pp. 95-103
Closed Access | Times Cited: 1
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques
Ben Scott, Michael N. Johnstone, Patryk Szewczyk
Sensors (2024) Vol. 24, Iss. 19, pp. 6414-6414
Open Access | Times Cited: 1
Ben Scott, Michael N. Johnstone, Patryk Szewczyk
Sensors (2024) Vol. 24, Iss. 19, pp. 6414-6414
Open Access | Times Cited: 1
The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment
Naoki Umeda, Taiji Kimura, Naoto Yanai
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 269-306
Open Access | Times Cited: 2
Naoki Umeda, Taiji Kimura, Naoto Yanai
IEEE Open Journal of the Communications Society (2023) Vol. 4, pp. 269-306
Open Access | Times Cited: 2
Blockchain-Based Self-Sovereign Identity for Routing in Inter-Domain Networks
Engin Zeydan, Josep Mangues, Şuayb Ş. Arslan, et al.
IEEE Communications Magazine (2023) Vol. 62, Iss. 1, pp. 96-102
Closed Access | Times Cited: 2
Engin Zeydan, Josep Mangues, Şuayb Ş. Arslan, et al.
IEEE Communications Magazine (2023) Vol. 62, Iss. 1, pp. 96-102
Closed Access | Times Cited: 2
Assessing and neutralizing multi-tiered security threats in blockchain systems
Yize Cai
Applied and Computational Engineering (2024) Vol. 49, Iss. 1, pp. 65-74
Closed Access
Yize Cai
Applied and Computational Engineering (2024) Vol. 49, Iss. 1, pp. 65-74
Closed Access
Abrindo a Caixa-Preta – Aplicando IA Explicável para Aprimorar a Detecção de Sequestros de Prefixo
Adriano Bastos de Carvalho, Brivaldo A. da Silva, Carlos Alberto da Silva, et al.
(2024), pp. 16-31
Closed Access
Adriano Bastos de Carvalho, Brivaldo A. da Silva, Carlos Alberto da Silva, et al.
(2024), pp. 16-31
Closed Access
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management
Rémi Badonnel, Carol Fung, Sandra Scott-Hayward, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2251-2254
Open Access | Times Cited: 2
Rémi Badonnel, Carol Fung, Sandra Scott-Hayward, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2251-2254
Open Access | Times Cited: 2
Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems
Zimian Liu, Han Qiu, Rui Wang, et al.
(2023), pp. 404-411
Closed Access
Zimian Liu, Han Qiu, Rui Wang, et al.
(2023), pp. 404-411
Closed Access