OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Aggregate-based congestion control for pulse-wave DDoS defense
Albert Gran Alcoz, Martin Strohmeier, Vincent Lenders, et al.
(2022)
Open Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

A comprehensive survey on DDoS defense systems: New trends and challenges
Qing Li, He Huang, Ruoyu Li, et al.
Computer Networks (2023) Vol. 233, pp. 109895-109895
Closed Access | Times Cited: 20

Offloading Machine Learning to Programmable Data Planes: A Systematic Survey
Ricardo Parizotto, Bruno Loureiro Coelho, Diego Cardoso Nunes, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 1, pp. 1-34
Closed Access | Times Cited: 18

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection
Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
IEEE Access (2024) Vol. 12, pp. 89363-89383
Open Access | Times Cited: 6

Planter: Rapid Prototyping of In-Network Machine Learning Inference
Changgang Zheng, Mingyuan Zang, Xinpeng Hong, et al.
ACM SIGCOMM Computer Communication Review (2024) Vol. 54, Iss. 1, pp. 2-21
Open Access | Times Cited: 5

ML-NIC: accelerating machine learning inference using smart network interface cards
Raghav Kapoor, David C. Anastasiu, Sean Choi
Frontiers in Computer Science (2025) Vol. 6
Open Access

Toward Continuous Threat Defense: in-Network Traffic Analysis for IoT Gateways
Mingyuan Zang, Changgang Zheng, Lars Dittmann, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 9244-9257
Closed Access | Times Cited: 9

A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid
Guo Wei, Zhi Zhang, Liyuan Chang, et al.
Drones (2024) Vol. 8, Iss. 9, pp. 437-437
Open Access | Times Cited: 3

SatShield: In-Network Mitigation of Link Flooding Attacks for LEO Constellation Networks
Wei Jiang, Hao Jiang, Yulai Xie, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 16, pp. 27340-27355
Closed Access

An End-to-end Online DDoS Mitigation Scheme for Network Forwarding Devices
Geng Zhang, Meng Wu, Lin Zhang, et al.
(2024), pp. 1-5
Closed Access

SAROS: A Self-Adaptive Routing Oblivious Sampling Method for Network-wide Heavy Hitter Detection
Enhan Li, W. Wu, Zhaohua Wang, et al.
(2024), pp. 142-148
Closed Access

EXCLF: A LDoS attack detection & mitigation model based on programmable data plane
Dan Tang, Hongbo Cao, Jiliang Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110666-110666
Closed Access

EdgeShield: Enabling Collaborative DDoS Mitigation at the Edge
Xiaoyu Xia, Feifei Chen, Qiang He, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14502-14513
Closed Access

AdaFlow: Efficient In-Network Traffic Classification using Programmable Switches
Sankalp Mittal, Harshith Kotha, M. Anand Krishna, et al.
(2024), pp. 258-266
Closed Access

Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches
Jiahao Wu, Heng Pan, Penglai Cui, et al.
Lecture notes in computer science (2024), pp. 187-207
Closed Access

Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches
Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 4535-4553
Closed Access

On Building Secure Wide-Area Networks over Public Internet Service Providers
Marc Wyss, Roland Meier, Llorenç Romá, et al.
(2024), pp. 7-27
Closed Access

Federated In-Network Machine Learning for Privacy-Preserving IoT Traffic Analysis
Mingyuan Zang, Changgang Zheng, Tomasz Koziak, et al.
ACM Transactions on Internet Technology (2024)
Closed Access

DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions
Lumin Shi, Jun Li, Devkishen Sisodia, et al.
Security and Privacy in Communication Networks (2024), pp. 25-44
Closed Access

Incremental Specialization of Network Programs
Fabian Ruffy, Zhanghan Wang, Gianni Antichi, et al.
(2024), pp. 264-272
Closed Access

Internet Architecture Evolution: Found in Translation
Guilherme Ribeiro, Luis Pedrosa, Salvatore Signorello, et al.
(2024), pp. 300-307
Closed Access

DNS Congestion Control in Adversarial Settings
Huayi Duan, Jihye Kim, Marc Wyss, et al.
(2024), pp. 726-747
Open Access

F3: Fast and Flexible Network Telemetry with an FPGA coprocessor
Weiqi Feng, Jiaqi Gao, Xiaoqi Chen, et al.
Proceedings of the ACM on Networking (2024) Vol. 2, Iss. CoNEXT4, pp. 1-22
Closed Access

Collaborative DDoS defense for SDN-based AIoT with autoencoder-enhanced federated learning
Jie Ma, Wei Su
Information Fusion (2024), pp. 102820-102820
Closed Access

NeuroLPM - Scaling Longest Prefix Match Hardware with Neural Networks
Alon Rashelbach, Igor de Paula, Mark Silberstein
(2023), pp. 886-899
Open Access | Times Cited: 1

ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks
Simon Scherrer, Jo Vliegen, Arish Sateesan, et al.
(2023), pp. 162-172
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top