
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment
Sehrish Batool, Farrukh Zeeshan Khan, Syed Qaiser Ali Shah, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 23
Sehrish Batool, Farrukh Zeeshan Khan, Syed Qaiser Ali Shah, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 23
Showing 23 citing articles:
Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates
Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, et al.
Applied Sciences (2022) Vol. 12, Iss. 12, pp. 6127-6127
Open Access | Times Cited: 28
Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, et al.
Applied Sciences (2022) Vol. 12, Iss. 12, pp. 6127-6127
Open Access | Times Cited: 28
Enabling Sustainable Transportation Through IoT and AIoT Innovations
Alaba Ayotunde Fadele, Oluwadare Adegbemile, Usman Sani, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 273-291
Closed Access | Times Cited: 6
Alaba Ayotunde Fadele, Oluwadare Adegbemile, Usman Sani, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 273-291
Closed Access | Times Cited: 6
E-commerce Payment System Empowered by Blockchain for Enhanced Security
R. Sujatha, Nellore Vamseswar, Vinod Salunkhe, et al.
Lecture notes in electrical engineering (2025), pp. 241-255
Closed Access
R. Sujatha, Nellore Vamseswar, Vinod Salunkhe, et al.
Lecture notes in electrical engineering (2025), pp. 241-255
Closed Access
ENTROPY BASED EARLIER DETECTION AND MITIGATION OF DDOS ATTACK USING STOCHASTIC METHOD IN SDN_IOT
I. Varalakshmi, M. Thenmozhi
Measurement Sensors (2025), pp. 101873-101873
Open Access
I. Varalakshmi, M. Thenmozhi
Measurement Sensors (2025), pp. 101873-101873
Open Access
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
Ankit Jain, Hariom Shukla, Diksha Goel
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 13129-13164
Closed Access | Times Cited: 4
Ankit Jain, Hariom Shukla, Diksha Goel
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 13129-13164
Closed Access | Times Cited: 4
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN
Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297548-e0297548
Open Access | Times Cited: 3
Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297548-e0297548
Open Access | Times Cited: 3
A systematic literature review of attribute based encryption in health services
Raza Imam, Kaushal Kumar, Syed Mehran Raza, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 9, pp. 6743-6774
Open Access | Times Cited: 14
Raza Imam, Kaushal Kumar, Syed Mehran Raza, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 9, pp. 6743-6774
Open Access | Times Cited: 14
DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges
Jasmeen Kaur Chahal, Abhinav Bhandari, Sunny Behal
Computer Science Review (2024) Vol. 53, pp. 100644-100644
Closed Access | Times Cited: 2
Jasmeen Kaur Chahal, Abhinav Bhandari, Sunny Behal
Computer Science Review (2024) Vol. 53, pp. 100644-100644
Closed Access | Times Cited: 2
Performance analysis of ODL and RYU controllers’ against DDoS attack in software defined networks
Neelam Gupta, Sarvesh Tanwar, Sumit Badotra
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10899-10919
Closed Access | Times Cited: 1
Neelam Gupta, Sarvesh Tanwar, Sumit Badotra
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10899-10919
Closed Access | Times Cited: 1
Geospatial assessment of a severe flood event in the Nilwala River basin, Sri Lanka
Charuni I. Madhushani, Randika K. Makumbura, Vindhya Basnayake, et al.
Sustainable Water Resources Management (2024) Vol. 10, Iss. 4
Closed Access | Times Cited: 1
Charuni I. Madhushani, Randika K. Makumbura, Vindhya Basnayake, et al.
Sustainable Water Resources Management (2024) Vol. 10, Iss. 4
Closed Access | Times Cited: 1
Classification of DDoS attack traffic on SDN network environment using deep learning
Urikhimbam Boby Clinton, Nazrul Hoque, Khumukcham Robindro Singh
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 1
Urikhimbam Boby Clinton, Nazrul Hoque, Khumukcham Robindro Singh
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 1
Detection and Mitigation of Malicious DDoS Floods in Software Defined Networks
Furqan Ahmad, Ubaid Ur Rehman, Maham Saleem
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
Furqan Ahmad, Ubaid Ur Rehman, Maham Saleem
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
ZF-DDOS: An Enhanced Statistical-Based DDoS Detection Approach using Integrated Z-Score and Fast-Entropy Measures
Mahmoud Hassan, Khaked Metwally, Mohamed A. Elshafey
(2024) Vol. 13, pp. 145-152
Closed Access
Mahmoud Hassan, Khaked Metwally, Mohamed A. Elshafey
(2024) Vol. 13, pp. 145-152
Closed Access
Efficiency Assessment of Software-Defined Networking for Real-Time Network Systems
Neelam Gupta, Sarvesh Tanwar, Sumit Badotra
Journal of Computer Science (2024) Vol. 20, Iss. 6, pp. 682-689
Open Access
Neelam Gupta, Sarvesh Tanwar, Sumit Badotra
Journal of Computer Science (2024) Vol. 20, Iss. 6, pp. 682-689
Open Access
Random Forest Stratified K-Fold Cross Validation on SYN DoS Attack SD-IoV
Muhammad Arif Hakimi Zamrai, Kamaludin Mohd Yusof, Muhammad Afizi Azizan
(2024), pp. 7-12
Closed Access
Muhammad Arif Hakimi Zamrai, Kamaludin Mohd Yusof, Muhammad Afizi Azizan
(2024), pp. 7-12
Closed Access
Implementation of Rule‐Based DDoS Solution in Software‐Defined Network
Kim Gyoung Tae, Anchit Bijalwan, Hamza Mutaher
(2024), pp. 79-106
Closed Access
Kim Gyoung Tae, Anchit Bijalwan, Hamza Mutaher
(2024), pp. 79-106
Closed Access
Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation
Hikofumi Suzuki, A. IWASA, Takumi Uchiyama, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2023), pp. 558-567
Closed Access
Hikofumi Suzuki, A. IWASA, Takumi Uchiyama, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2023), pp. 558-567
Closed Access
Reducing CPU Utilization & Improving Failover Time in Dual Controller SDN (Software Defined Network) Environment
R. Sivakumar S. Annie Christila
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 1010-1018
Open Access
R. Sivakumar S. Annie Christila
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 1010-1018
Open Access
Detection and Mitigation of Malicious DDoS Floods in Software Defined Networks
Furqan Ahmad
Research Square (Research Square) (2023)
Open Access
Furqan Ahmad
Research Square (Research Square) (2023)
Open Access
Detection and Mitigation of Malicious DDoS Floods in Software Defined Networks
Furqan Ahmad, Maham Saleem, Ubaid Ur Rehman, et al.
Journal of Electrical Electronics Engineering (2023) Vol. 2, Iss. 2
Open Access
Furqan Ahmad, Maham Saleem, Ubaid Ur Rehman, et al.
Journal of Electrical Electronics Engineering (2023) Vol. 2, Iss. 2
Open Access
Retracted: Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment
Security and Communication Networks
Security and Communication Networks (2023) Vol. 2023, pp. 1-1
Open Access
Security and Communication Networks
Security and Communication Networks (2023) Vol. 2023, pp. 1-1
Open Access
A Survey on Distributed Denial of Service Attack - Detection Mechanisms and Mitigation Mechanisms in the Cloud Environment
Chris Harry Kandikattu, Sam Sangeeth Panguluri, Sandeep Kumar, et al.
2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (2023), pp. 635-641
Closed Access
Chris Harry Kandikattu, Sam Sangeeth Panguluri, Sandeep Kumar, et al.
2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (2023), pp. 635-641
Closed Access
Network Flow-Based Dataset Generator Based on OpenFlow SDN
Muhammad Fajar Sidiq, Akbari Indra Basuki, Arief Indriarto Haris, et al.
(2023), pp. 285-290
Closed Access
Muhammad Fajar Sidiq, Akbari Indra Basuki, Arief Indriarto Haris, et al.
(2023), pp. 285-290
Closed Access