
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis
Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 2086-2095
Open Access | Times Cited: 21
Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 20, Iss. 2, pp. 2086-2095
Open Access | Times Cited: 21
Showing 21 citing articles:
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
Qasem Abu Al‐Haija, Manar Alohaly, Ammar Odeh
Sensors (2023) Vol. 23, Iss. 7, pp. 3489-3489
Open Access | Times Cited: 23
Qasem Abu Al‐Haija, Manar Alohaly, Ammar Odeh
Sensors (2023) Vol. 23, Iss. 7, pp. 3489-3489
Open Access | Times Cited: 23
DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks
Sanjay Adiwal, Balaji Rajendran, D. Pushparaj Shetty, et al.
Franklin Open (2023) Vol. 2, pp. 100010-100010
Open Access | Times Cited: 13
Sanjay Adiwal, Balaji Rajendran, D. Pushparaj Shetty, et al.
Franklin Open (2023) Vol. 2, pp. 100010-100010
Open Access | Times Cited: 13
MTL-DoHTA: Multi-Task Learning-Based DNS over HTTPS Traffic Analysis for Enhanced Network Security
Woong Jung, Byung Il Kwak
Sensors (2025) Vol. 25, Iss. 4, pp. 993-993
Open Access
Woong Jung, Byung Il Kwak
Sensors (2025) Vol. 25, Iss. 4, pp. 993-993
Open Access
METC: A Hybrid Deep Learning Framework for Cross-Network Encrypted DNS over HTTPS Traffic Detection and Tunnel Identification
Ming Zuo, Changyong Guo, Haiyan Xu, et al.
Information Fusion (2025), pp. 103125-103125
Closed Access
Ming Zuo, Changyong Guo, Haiyan Xu, et al.
Information Fusion (2025), pp. 103125-103125
Closed Access
Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1467-1467
Open Access | Times Cited: 12
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1467-1467
Open Access | Times Cited: 12
DarkGuardNet: A deep learning framework for imbalanced dark web traffic identification and application classification
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
Teng Niu, Wei Li, Yazhi Liu
Research Square (Research Square) (2024)
Open Access | Times Cited: 4
An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic
Akarsh Aggarwal, Manoj Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32945-32972
Closed Access | Times Cited: 5
Akarsh Aggarwal, Manoj Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32945-32972
Closed Access | Times Cited: 5
Real time detection of malicious DoH traffic using statistical analysis
Marta Moure-Garrido, Celeste Campo, Carlos García-Rubio
Computer Networks (2023) Vol. 234, pp. 109910-109910
Open Access | Times Cited: 4
Marta Moure-Garrido, Celeste Campo, Carlos García-Rubio
Computer Networks (2023) Vol. 234, pp. 109910-109910
Open Access | Times Cited: 4
Configuration anormaly detection and resolution risk assessment of authoritative domain name server
Chao Li, Yanan Cheng, Zhaoxin Zhang, et al.
Computers & Security (2023) Vol. 135, pp. 103426-103426
Closed Access | Times Cited: 2
Chao Li, Yanan Cheng, Zhaoxin Zhang, et al.
Computers & Security (2023) Vol. 135, pp. 103426-103426
Closed Access | Times Cited: 2
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Peer-to-Peer Networking and Applications (2023) Vol. 17, Iss. 1, pp. 507-531
Closed Access | Times Cited: 2
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Peer-to-Peer Networking and Applications (2023) Vol. 17, Iss. 1, pp. 507-531
Closed Access | Times Cited: 2
Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura
International Journal of Networking and Computing (2024) Vol. 14, Iss. 2, pp. 157-185
Open Access
Yuya Takanashi, Shigetomo Kimura
International Journal of Networking and Computing (2024) Vol. 14, Iss. 2, pp. 157-185
Open Access
Toward Real Time DGA Domains Detection in Encrypted Traffic
Abdou Romaric Tapsoba, Frédéric Ouédraogo, Mohamed Bobo Diallo, et al.
(2024), pp. 1-8
Closed Access
Abdou Romaric Tapsoba, Frédéric Ouédraogo, Mohamed Bobo Diallo, et al.
(2024), pp. 1-8
Closed Access
Real-Time Analysis of Encrypted DNS Traffic for Threat Detection
Marta Moure-Garrido, Sajal K. Das, Celeste Campo, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 3292-3297
Closed Access
Marta Moure-Garrido, Sajal K. Das, Celeste Campo, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 3292-3297
Closed Access
Performance and efficacy of Snort versus Suricata in intrusion detection: A benchmark analysis
Dhuha Sabri Ghazi, Hamood Shehab Hamid, Mohammed Joudah Zaiter, et al.
AIP conference proceedings (2024) Vol. 3232, pp. 020024-020024
Closed Access
Dhuha Sabri Ghazi, Hamood Shehab Hamid, Mohammed Joudah Zaiter, et al.
AIP conference proceedings (2024) Vol. 3232, pp. 020024-020024
Closed Access
COMPARISON OF MACHINE LEARNING ALGORITHMS FOR DETECTION OF DATA EXFILTRATION OVER DNS
Enes Açıkgözoğlu
Yalvaç Akademi Dergisi (2024) Vol. 9, Iss. 2, pp. 61-70
Open Access
Enes Açıkgözoğlu
Yalvaç Akademi Dergisi (2024) Vol. 9, Iss. 2, pp. 61-70
Open Access
Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection
Jiawen Diao, Shengmin Zhao, Jianguo Xie, et al.
(2024), pp. 5012-5014
Open Access
Jiawen Diao, Shengmin Zhao, Jianguo Xie, et al.
(2024), pp. 5012-5014
Open Access
Insights into DoH: Traffic Classification for DNS over HTTPS in an Encrypted Network
Fatema Bannat Wala, Scott Campbell, Mariam Kiran
(2023), pp. 9-17
Open Access | Times Cited: 1
Fatema Bannat Wala, Scott Campbell, Mariam Kiran
(2023), pp. 9-17
Open Access | Times Cited: 1
Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura
(2023), pp. 7-13
Closed Access | Times Cited: 1
Yuya Takanashi, Shigetomo Kimura
(2023), pp. 7-13
Closed Access | Times Cited: 1
A proposal of DoH-based domain name resolution architecture including authoritative DNS servers
Satoru Sunahara, Yong Jin, Katsuyoshi Iida
(2022), pp. 1-3
Open Access | Times Cited: 1
Satoru Sunahara, Yong Jin, Katsuyoshi Iida
(2022), pp. 1-3
Open Access | Times Cited: 1
A Framework for Institutional Privacy Considered Domain Name Resolution: Full-DoH DNS Architecture
Satoru Sunahara, Yong Jin, Katsuyoshi Iida
(2023)
Open Access
Satoru Sunahara, Yong Jin, Katsuyoshi Iida
(2023)
Open Access
Performance of DNS Over HTTPS Implementation on Low-Power Devices
Ladislav Huraj, Dominik Hrinkino, Marek Šimon
Lecture notes in networks and systems (2023), pp. 415-425
Closed Access
Ladislav Huraj, Dominik Hrinkino, Marek Šimon
Lecture notes in networks and systems (2023), pp. 415-425
Closed Access