
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD
Mona Esmaeili, Seyedamiryousef Hosseini Goki, Behnam Hajipour Khire Masjidi, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 41
Mona Esmaeili, Seyedamiryousef Hosseini Goki, Behnam Hajipour Khire Masjidi, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 23
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 23
A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 27
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 27
A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks
Joseph Bamidele Awotunde, Femi Emmanuel Ayo, Ranjit Panigrahi, et al.
International Journal of Computational Intelligence Systems (2023) Vol. 16, Iss. 1
Open Access | Times Cited: 23
Joseph Bamidele Awotunde, Femi Emmanuel Ayo, Ranjit Panigrahi, et al.
International Journal of Computational Intelligence Systems (2023) Vol. 16, Iss. 1
Open Access | Times Cited: 23
An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection
Zhiwei Ye, Jun Luo, Zhou Wen, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 124-136
Closed Access | Times Cited: 23
Zhiwei Ye, Jun Luo, Zhou Wen, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 124-136
Closed Access | Times Cited: 23
Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
T. Aswini Devi, Arpit Jain
(2024)
Closed Access | Times Cited: 13
T. Aswini Devi, Arpit Jain
(2024)
Closed Access | Times Cited: 13
A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9937-9937
Open Access | Times Cited: 17
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9937-9937
Open Access | Times Cited: 17
Prediction of Composite Mechanical Properties: Integration of Deep Neural Network Methods and Finite Element Analysis
Kimia Gholami, Faraz Ege, Ramin Barzegar
Journal of Composites Science (2023) Vol. 7, Iss. 2, pp. 54-54
Open Access | Times Cited: 15
Kimia Gholami, Faraz Ege, Ramin Barzegar
Journal of Composites Science (2023) Vol. 7, Iss. 2, pp. 54-54
Open Access | Times Cited: 15
A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Coarse and fine feature selection for Network Intrusion Detection Systems (IDS ) in IoT networks
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 5
Deep Ensemble-based Efficient Framework for Network Attack Detection
Furqan Rustam, Ali Raza, Imran Ashraf, et al.
(2023)
Closed Access | Times Cited: 11
Furqan Rustam, Ali Raza, Imran Ashraf, et al.
(2023)
Closed Access | Times Cited: 11
An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications
Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1903-1912
Closed Access | Times Cited: 10
Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1903-1912
Closed Access | Times Cited: 10
A Transductive Learning-Based Early Warning System for Housing and Stock Markets With Off-Policy Optimization
M.J. Ramezankhani, Albert Boghosian
IEEE Access (2024) Vol. 12, pp. 141762-141784
Open Access | Times Cited: 2
M.J. Ramezankhani, Albert Boghosian
IEEE Access (2024) Vol. 12, pp. 141762-141784
Open Access | Times Cited: 2
A Novel Method for 3D Lung Tumor Reconstruction Using Generative Models
Hamidreza Najafi, Kimia Savoji, Marzieh Mirzaeibonehkhater, et al.
Diagnostics (2024) Vol. 14, Iss. 22, pp. 2604-2604
Open Access | Times Cited: 2
Hamidreza Najafi, Kimia Savoji, Marzieh Mirzaeibonehkhater, et al.
Diagnostics (2024) Vol. 14, Iss. 22, pp. 2604-2604
Open Access | Times Cited: 2
A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Mohammed A. Al Ghamdi
IEEE Access (2023) Vol. 11, pp. 96615-96625
Open Access | Times Cited: 7
Development of an Intelligent Classifier Model for Denial of Service Attack Detection
Álvaro Michelena, José Aveleira‐Mata, Esteban Jove, et al.
International Journal of Interactive Multimedia and Artificial Intelligence (2023) Vol. 8, Iss. 3, pp. 33-33
Open Access | Times Cited: 7
Álvaro Michelena, José Aveleira‐Mata, Esteban Jove, et al.
International Journal of Interactive Multimedia and Artificial Intelligence (2023) Vol. 8, Iss. 3, pp. 33-33
Open Access | Times Cited: 7
Hiperparemetreleri Ayarlanmış Makine Öğrenmesi Yöntemleri Kullanılarak Ağdaki Saldırıların Tespiti
Erol DOĞAN, Halit Bakır
International Conference on Pioneer and Innovative Studies (2023) Vol. 1, pp. 274-286
Open Access | Times Cited: 6
Erol DOĞAN, Halit Bakır
International Conference on Pioneer and Innovative Studies (2023) Vol. 1, pp. 274-286
Open Access | Times Cited: 6
LUFlow: Attack Detection in the Internet of Things Using Machine Learning Approaches
Anshika Sharma, Himanshi Babbar
(2023), pp. 1-5
Closed Access | Times Cited: 6
Anshika Sharma, Himanshi Babbar
(2023), pp. 1-5
Closed Access | Times Cited: 6
SeismoNet: A proximal policy optimization-based earthquake early warning system using dilated convolution layers and online data augmentation
Shaya Banar, Reza Mohammadi
Expert Systems with Applications (2024) Vol. 253, pp. 124337-124337
Closed Access | Times Cited: 1
Shaya Banar, Reza Mohammadi
Expert Systems with Applications (2024) Vol. 253, pp. 124337-124337
Closed Access | Times Cited: 1
A Network Intrusion Detection Method Based on Bagging Ensemble
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 1
Zichen Zhang, Shanshan Kong, T. D. Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 7, pp. 850-850
Open Access | Times Cited: 1
Impact of Artificial Intelligence in Nursing for Geriatric Clinical Care for Chronic Diseases: A Systematic Literature Review
Mahdieh Poodineh Moghadam, Zabih Allah Moghadam, Mohammad Reza Chalak Qazani, et al.
IEEE Access (2024) Vol. 12, pp. 122557-122587
Open Access | Times Cited: 1
Mahdieh Poodineh Moghadam, Zabih Allah Moghadam, Mohammad Reza Chalak Qazani, et al.
IEEE Access (2024) Vol. 12, pp. 122557-122587
Open Access | Times Cited: 1
Melanoma detection: integrating dilated convolutional methods with mutual learning-based artificial bee colony and reinforcement learning
Fengyu Hu, Jiayuan Zhang
Multiscale and Multidisciplinary Modeling Experiments and Design (2024) Vol. 8, Iss. 1
Closed Access | Times Cited: 1
Fengyu Hu, Jiayuan Zhang
Multiscale and Multidisciplinary Modeling Experiments and Design (2024) Vol. 8, Iss. 1
Closed Access | Times Cited: 1
IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System
Urooj Akram, Wareesa Sharif, Mobeen Shahroz, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6379-6379
Open Access | Times Cited: 4
Urooj Akram, Wareesa Sharif, Mobeen Shahroz, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6379-6379
Open Access | Times Cited: 4
Localization and Detection of Sinkhole Attacks in Wireless Sensor Networks Based on Denial of Service (DoS) Attacks
Manoranjitham R Mona R
Deleted Journal (2024) Vol. 20, Iss. 3s, pp. 195-204
Open Access | Times Cited: 1
Manoranjitham R Mona R
Deleted Journal (2024) Vol. 20, Iss. 3s, pp. 195-204
Open Access | Times Cited: 1
Detecting Botnet Attacks in IoT Healthcare Systems through IoT Technology
Anshika Sharma, Himanshi Babbar
(2023)
Closed Access | Times Cited: 3
Anshika Sharma, Himanshi Babbar
(2023)
Closed Access | Times Cited: 3
Detection of Attacks in Smart Healthcare deploying Machine Learning Algorithms*
Anshika Sharma, Himanshi Babbar, Amit Kumar Vats
(2023) Vol. 107, pp. 1-6
Closed Access | Times Cited: 2
Anshika Sharma, Himanshi Babbar, Amit Kumar Vats
(2023) Vol. 107, pp. 1-6
Closed Access | Times Cited: 2