OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis
Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 2086-2095
Open Access | Times Cited: 21

Showing 21 citing articles:

A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
Qasem Abu Al‐Haija, Manar Alohaly, Ammar Odeh
Sensors (2023) Vol. 23, Iss. 7, pp. 3489-3489
Open Access | Times Cited: 23

DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks
Sanjay Adiwal, Balaji Rajendran, D. Pushparaj Shetty, et al.
Franklin Open (2023) Vol. 2, pp. 100010-100010
Open Access | Times Cited: 13

METC: A Hybrid Deep Learning Framework for Cross-Network Encrypted DNS over HTTPS Traffic Detection and Tunnel Identification
Ming Zuo, Changyong Guo, Haiyan Xu, et al.
Information Fusion (2025), pp. 103125-103125
Closed Access

Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1467-1467
Open Access | Times Cited: 12

An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic
Akarsh Aggarwal, Manoj Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32945-32972
Closed Access | Times Cited: 5

Real time detection of malicious DoH traffic using statistical analysis
Marta Moure-Garrido, Celeste Campo, Carlos García-Rubio
Computer Networks (2023) Vol. 234, pp. 109910-109910
Open Access | Times Cited: 4

Configuration anormaly detection and resolution risk assessment of authoritative domain name server
Chao Li, Yanan Cheng, Zhaoxin Zhang, et al.
Computers & Security (2023) Vol. 135, pp. 103426-103426
Closed Access | Times Cited: 2

Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Peer-to-Peer Networking and Applications (2023) Vol. 17, Iss. 1, pp. 507-531
Closed Access | Times Cited: 2

Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura
International Journal of Networking and Computing (2024) Vol. 14, Iss. 2, pp. 157-185
Open Access

Toward Real Time DGA Domains Detection in Encrypted Traffic
Abdou Romaric Tapsoba, Frédéric Ouédraogo, Mohamed Bobo Diallo, et al.
(2024), pp. 1-8
Closed Access

Real-Time Analysis of Encrypted DNS Traffic for Threat Detection
Marta Moure-Garrido, Sajal K. Das, Celeste Campo, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 3292-3297
Closed Access

Performance and efficacy of Snort versus Suricata in intrusion detection: A benchmark analysis
Dhuha Sabri Ghazi, Hamood Shehab Hamid, Mohammed Joudah Zaiter, et al.
AIP conference proceedings (2024) Vol. 3232, pp. 020024-020024
Closed Access

COMPARISON OF MACHINE LEARNING ALGORITHMS FOR DETECTION OF DATA EXFILTRATION OVER DNS
Enes Açıkgözoğlu
Yalvaç Akademi Dergisi (2024) Vol. 9, Iss. 2, pp. 61-70
Open Access

Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection
Jiawen Diao, Shengmin Zhao, Jianguo Xie, et al.
(2024), pp. 5012-5014
Open Access

Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted Network
Fatema Bannat Wala, Scott Campbell, Mariam Kiran
(2023), pp. 9-17
Open Access | Times Cited: 1

Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura
(2023), pp. 7-13
Closed Access | Times Cited: 1

A proposal of DoH-based domain name resolution architecture including authoritative DNS servers
Satoru Sunahara, Yong Jin, Katsuyoshi Iida
(2022), pp. 1-3
Open Access | Times Cited: 1

Performance of DNS Over HTTPS Implementation on Low-Power Devices
Ladislav Huraj, Dominik Hrinkino, Marek Šimon
Lecture notes in networks and systems (2023), pp. 415-425
Closed Access

Page 1

Scroll to top