
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
New Directions in Automated Traffic Analysis
Jordan Holland, Paul Schmitt, Nick Feamster, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 3366-3383
Open Access | Times Cited: 14
Jordan Holland, Paul Schmitt, Nick Feamster, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 3366-3383
Open Access | Times Cited: 14
Showing 14 citing articles:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
Chuanpu Fu, Qi Li, Ke Xu
(2023)
Open Access | Times Cited: 29
Chuanpu Fu, Qi Li, Ke Xu
(2023)
Open Access | Times Cited: 29
An Efficient One-Class SVM for Anomaly Detection in the Internet of Things
Kun Yang, Samory Kpotufe, Nick Feamster
arXiv (Cornell University) (2021)
Open Access | Times Cited: 31
Kun Yang, Samory Kpotufe, Nick Feamster
arXiv (Cornell University) (2021)
Open Access | Times Cited: 31
An Extreme Semi-supervised Framework Based on Transformer for Network Intrusion Detection
Yangmin Li, Xinhang Yuan, Wengen Li
Proceedings of the 31st ACM International Conference on Information & Knowledge Management (2022)
Closed Access | Times Cited: 12
Yangmin Li, Xinhang Yuan, Wengen Li
Proceedings of the 31st ACM International Conference on Information & Knowledge Management (2022)
Closed Access | Times Cited: 12
In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems
Roman Beltiukov, Wenbo Guo, Arpit Gupta, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 2217-2231
Open Access | Times Cited: 3
Roman Beltiukov, Wenbo Guo, Arpit Gupta, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 2217-2231
Open Access | Times Cited: 3
Synthetic Network Traffic Generation in IoT Supply Chain Environment
Heinrihs Kristians Skrodelis, Andrejs RomÄnovs
(2022)
Closed Access | Times Cited: 5
Heinrihs Kristians Skrodelis, Andrejs RomÄnovs
(2022)
Closed Access | Times Cited: 5
Towards Real-time Network Intrusion Detection with Image-based Sequential Packets Representation
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
(2023)
Open Access | Times Cited: 1
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
(2023)
Open Access | Times Cited: 1
Enabling Self-Driving Networks with Machine Learning
Arthur Selle Jacobs, Ronaldo A. Ferreira, Lisandro Zambenedetti Granville
(2023), pp. 96-103
Open Access | Times Cited: 1
Arthur Selle Jacobs, Ronaldo A. Ferreira, Lisandro Zambenedetti Granville
(2023), pp. 96-103
Open Access | Times Cited: 1
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022)
Open Access | Times Cited: 2
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022)
Open Access | Times Cited: 2
Towards Real-time Network Intrusion Detection with Image-based Sequential Packets Representation
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
(2023)
Open Access
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
(2023)
Open Access
Optimizing application and algorithm complexity of machine learning methods in traffic classification
Qiyuan Tan
Applied and Computational Engineering (2023) Vol. 21, Iss. 1, pp. 258-266
Open Access
Qiyuan Tan
Applied and Computational Engineering (2023) Vol. 21, Iss. 1, pp. 258-266
Open Access
Beyond Accuracy: Cost-Aware Data Representation Exploration for Network Traffic Model Performance.
Francesco Bronzino, Paul Schmitt, Sara Ayoubi, et al.
arXiv (Cornell University) (2020)
Closed Access
Francesco Bronzino, Paul Schmitt, Sara Ayoubi, et al.
arXiv (Cornell University) (2020)
Closed Access
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022)
Closed Access
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022)
Closed Access
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022)
Closed Access
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022)
Closed Access
Automating Internet of Things Network Traffic Collection with Robotic Arm Interactions
Xi Jiang, Noah Apthorpe
arXiv (Cornell University) (2021)
Open Access
Xi Jiang, Noah Apthorpe
arXiv (Cornell University) (2021)
Open Access