
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Aggregate-based congestion control for pulse-wave DDoS defense
Albert Gran Alcoz, Martin Strohmeier, Vincent Lenders, et al.
(2022)
Open Access | Times Cited: 33
Albert Gran Alcoz, Martin Strohmeier, Vincent Lenders, et al.
(2022)
Open Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
A comprehensive survey on DDoS defense systems: New trends and challenges
Qing Li, He Huang, Ruoyu Li, et al.
Computer Networks (2023) Vol. 233, pp. 109895-109895
Closed Access | Times Cited: 20
Qing Li, He Huang, Ruoyu Li, et al.
Computer Networks (2023) Vol. 233, pp. 109895-109895
Closed Access | Times Cited: 20
Offloading Machine Learning to Programmable Data Planes: A Systematic Survey
Ricardo Parizotto, Bruno Loureiro Coelho, Diego Cardoso Nunes, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 1, pp. 1-34
Closed Access | Times Cited: 18
Ricardo Parizotto, Bruno Loureiro Coelho, Diego Cardoso Nunes, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 1, pp. 1-34
Closed Access | Times Cited: 18
A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection
Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
IEEE Access (2024) Vol. 12, pp. 89363-89383
Open Access | Times Cited: 6
Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
IEEE Access (2024) Vol. 12, pp. 89363-89383
Open Access | Times Cited: 6
Planter: Rapid Prototyping of In-Network Machine Learning Inference
Changgang Zheng, Mingyuan Zang, Xinpeng Hong, et al.
ACM SIGCOMM Computer Communication Review (2024) Vol. 54, Iss. 1, pp. 2-21
Open Access | Times Cited: 5
Changgang Zheng, Mingyuan Zang, Xinpeng Hong, et al.
ACM SIGCOMM Computer Communication Review (2024) Vol. 54, Iss. 1, pp. 2-21
Open Access | Times Cited: 5
ML-NIC: accelerating machine learning inference using smart network interface cards
Raghav Kapoor, David C. Anastasiu, Sean Choi
Frontiers in Computer Science (2025) Vol. 6
Open Access
Raghav Kapoor, David C. Anastasiu, Sean Choi
Frontiers in Computer Science (2025) Vol. 6
Open Access
Toward Continuous Threat Defense: in-Network Traffic Analysis for IoT Gateways
Mingyuan Zang, Changgang Zheng, Lars Dittmann, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 9244-9257
Closed Access | Times Cited: 9
Mingyuan Zang, Changgang Zheng, Lars Dittmann, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 9244-9257
Closed Access | Times Cited: 9
A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid
Guo Wei, Zhi Zhang, Liyuan Chang, et al.
Drones (2024) Vol. 8, Iss. 9, pp. 437-437
Open Access | Times Cited: 3
Guo Wei, Zhi Zhang, Liyuan Chang, et al.
Drones (2024) Vol. 8, Iss. 9, pp. 437-437
Open Access | Times Cited: 3
SatShield: In-Network Mitigation of Link Flooding Attacks for LEO Constellation Networks
Wei Jiang, Hao Jiang, Yulai Xie, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 16, pp. 27340-27355
Closed Access
Wei Jiang, Hao Jiang, Yulai Xie, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 16, pp. 27340-27355
Closed Access
An End-to-end Online DDoS Mitigation Scheme for Network Forwarding Devices
Geng Zhang, Meng Wu, Lin Zhang, et al.
(2024), pp. 1-5
Closed Access
Geng Zhang, Meng Wu, Lin Zhang, et al.
(2024), pp. 1-5
Closed Access
SAROS: A Self-Adaptive Routing Oblivious Sampling Method for Network-wide Heavy Hitter Detection
Enhan Li, W. Wu, Zhaohua Wang, et al.
(2024), pp. 142-148
Closed Access
Enhan Li, W. Wu, Zhaohua Wang, et al.
(2024), pp. 142-148
Closed Access
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane
Dan Tang, Hongbo Cao, Jiliang Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110666-110666
Closed Access
Dan Tang, Hongbo Cao, Jiliang Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110666-110666
Closed Access
EdgeShield: Enabling Collaborative DDoS Mitigation at the Edge
Xiaoyu Xia, Feifei Chen, Qiang He, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14502-14513
Closed Access
Xiaoyu Xia, Feifei Chen, Qiang He, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14502-14513
Closed Access
AdaFlow: Efficient In-Network Traffic Classification using Programmable Switches
Sankalp Mittal, Harshith Kotha, M. Anand Krishna, et al.
(2024), pp. 258-266
Closed Access
Sankalp Mittal, Harshith Kotha, M. Anand Krishna, et al.
(2024), pp. 258-266
Closed Access
Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches
Jiahao Wu, Heng Pan, Penglai Cui, et al.
Lecture notes in computer science (2024), pp. 187-207
Closed Access
Jiahao Wu, Heng Pan, Penglai Cui, et al.
Lecture notes in computer science (2024), pp. 187-207
Closed Access
Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches
Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 4535-4553
Closed Access
Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 4535-4553
Closed Access
On Building Secure Wide-Area Networks over Public Internet Service Providers
Marc Wyss, Roland Meier, Llorenç Romá, et al.
(2024), pp. 7-27
Closed Access
Marc Wyss, Roland Meier, Llorenç Romá, et al.
(2024), pp. 7-27
Closed Access
Federated In-Network Machine Learning for Privacy-Preserving IoT Traffic Analysis
Mingyuan Zang, Changgang Zheng, Tomasz Koziak, et al.
ACM Transactions on Internet Technology (2024)
Closed Access
Mingyuan Zang, Changgang Zheng, Tomasz Koziak, et al.
ACM Transactions on Internet Technology (2024)
Closed Access
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions
Lumin Shi, Jun Li, Devkishen Sisodia, et al.
Security and Privacy in Communication Networks (2024), pp. 25-44
Closed Access
Lumin Shi, Jun Li, Devkishen Sisodia, et al.
Security and Privacy in Communication Networks (2024), pp. 25-44
Closed Access
Incremental Specialization of Network Programs
Fabian Ruffy, Zhanghan Wang, Gianni Antichi, et al.
(2024), pp. 264-272
Closed Access
Fabian Ruffy, Zhanghan Wang, Gianni Antichi, et al.
(2024), pp. 264-272
Closed Access
Internet Architecture Evolution: Found in Translation
Guilherme Ribeiro, Luis Pedrosa, Salvatore Signorello, et al.
(2024), pp. 300-307
Closed Access
Guilherme Ribeiro, Luis Pedrosa, Salvatore Signorello, et al.
(2024), pp. 300-307
Closed Access
DNS Congestion Control in Adversarial Settings
Huayi Duan, Jihye Kim, Marc Wyss, et al.
(2024), pp. 726-747
Open Access
Huayi Duan, Jihye Kim, Marc Wyss, et al.
(2024), pp. 726-747
Open Access
F3: Fast and Flexible Network Telemetry with an FPGA coprocessor
Weiqi Feng, Jiaqi Gao, Xiaoqi Chen, et al.
Proceedings of the ACM on Networking (2024) Vol. 2, Iss. CoNEXT4, pp. 1-22
Closed Access
Weiqi Feng, Jiaqi Gao, Xiaoqi Chen, et al.
Proceedings of the ACM on Networking (2024) Vol. 2, Iss. CoNEXT4, pp. 1-22
Closed Access
Collaborative DDoS defense for SDN-based AIoT with autoencoder-enhanced federated learning
Jie Ma, Wei Su
Information Fusion (2024), pp. 102820-102820
Closed Access
Jie Ma, Wei Su
Information Fusion (2024), pp. 102820-102820
Closed Access
NeuroLPM - Scaling Longest Prefix Match Hardware with Neural Networks
Alon Rashelbach, Igor de Paula, Mark Silberstein
(2023), pp. 886-899
Open Access | Times Cited: 1
Alon Rashelbach, Igor de Paula, Mark Silberstein
(2023), pp. 886-899
Open Access | Times Cited: 1
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks
Simon Scherrer, Jo Vliegen, Arish Sateesan, et al.
(2023), pp. 162-172
Open Access | Times Cited: 1
Simon Scherrer, Jo Vliegen, Arish Sateesan, et al.
(2023), pp. 162-172
Open Access | Times Cited: 1