
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
S. Balasubramaniam, C. Vijesh Joe, T. A. Sivakumar, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-16
Open Access | Times Cited: 55
S. Balasubramaniam, C. Vijesh Joe, T. A. Sivakumar, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-16
Open Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection
Mahdieh Maazalahi, Soodeh Hosseini
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Mahdieh Maazalahi, Soodeh Hosseini
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1
Exploring Methods of Mitigation against DDoS Attack in an IoT Network
Piyush M. Prajapati, Priyesh P. Gandhi, Sheshang Degadwala
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access | Times Cited: 12
Piyush M. Prajapati, Priyesh P. Gandhi, Sheshang Degadwala
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access | Times Cited: 12
Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity
Md. Alamgir Hossain, Md Saiful Islam
Measurement Sensors (2024) Vol. 32, pp. 101037-101037
Open Access | Times Cited: 9
Md. Alamgir Hossain, Md Saiful Islam
Measurement Sensors (2024) Vol. 32, pp. 101037-101037
Open Access | Times Cited: 9
K-means and meta-heuristic algorithms for intrusion detection systems
Mahdieh Maazalahi, Soodeh Hosseini
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10377-10419
Closed Access | Times Cited: 7
Mahdieh Maazalahi, Soodeh Hosseini
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10377-10419
Closed Access | Times Cited: 7
ReliefF based feature selection and Gradient Squirrel search Algorithm enabled Deep Maxout Network for detection of heart disease
S. Balasubramaniam, C. Vijesh Joe, Chinnadurai Manthiramoorthy, et al.
Biomedical Signal Processing and Control (2023) Vol. 87, pp. 105446-105446
Closed Access | Times Cited: 20
S. Balasubramaniam, C. Vijesh Joe, Chinnadurai Manthiramoorthy, et al.
Biomedical Signal Processing and Control (2023) Vol. 87, pp. 105446-105446
Closed Access | Times Cited: 20
A novel methodology for malicious traffic detection in smart devices using BI-LSTM–CNN-dependent deep learning methodology
T. Anitha, S. Aanjankumar, S. Poonkuntran, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 27, pp. 20319-20338
Closed Access | Times Cited: 17
T. Anitha, S. Aanjankumar, S. Poonkuntran, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 27, pp. 20319-20338
Closed Access | Times Cited: 17
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing
Mohamed Ouhssini, Karim Afdel, Elhafed Agherrabi, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101938-101938
Open Access | Times Cited: 5
Mohamed Ouhssini, Karim Afdel, Elhafed Agherrabi, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101938-101938
Open Access | Times Cited: 5
Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
A Method for Lightweight DDoS Attack Detection Based on LightGBM
Jinyang Song, Chao Han, Qiao Kang, et al.
Smart innovation, systems and technologies (2025), pp. 88-101
Closed Access
Jinyang Song, Chao Han, Qiao Kang, et al.
Smart innovation, systems and technologies (2025), pp. 88-101
Closed Access
Information Theory-Based DDoS Attack Detection in Cloud Computing
Mohammad Abdelkareem Alarqan, Bahari Belaton, Ammar Almomani, et al.
International Journal of Cloud Applications and Computing (2025) Vol. 15, Iss. 1, pp. 1-38
Open Access
Mohammad Abdelkareem Alarqan, Bahari Belaton, Ammar Almomani, et al.
International Journal of Cloud Applications and Computing (2025) Vol. 15, Iss. 1, pp. 1-38
Open Access
Harnessing feature pruning with optimal deep learning-based distributed denial of service cyberattack detection on IoT environment
Rania Aboalela, Khalid Allehaibi, Naif Alsaadi, et al.
Alexandria Engineering Journal (2025) Vol. 120, pp. 584-597
Closed Access
Rania Aboalela, Khalid Allehaibi, Naif Alsaadi, et al.
Alexandria Engineering Journal (2025) Vol. 120, pp. 584-597
Closed Access
Exponential and Logarithmic Regression Models to Improve Cloud Performance Using Reinforcement Learning
Prathamesh Vijay Lahande, Parag Ravikant Kaveri, Shirish Joshi
Lecture notes in electrical engineering (2025), pp. 501-509
Closed Access
Prathamesh Vijay Lahande, Parag Ravikant Kaveri, Shirish Joshi
Lecture notes in electrical engineering (2025), pp. 501-509
Closed Access
Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access
Chin‐Shiuh Shieh, Thanh Lâm Nguyễn, Thanh-Tuan Nguyen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2025) Vol. 82, Iss. 3, pp. 4881-4912
Open Access
An IoT Integrated Smart Prediction of Wild Animal Intrusion in Residential Areas Using Hybrid Deep Learning with Computer Vision
Senthil G. A, R. Prabha, N Aishwarya, et al.
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 4
Senthil G. A, R. Prabha, N Aishwarya, et al.
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 4
Deep Learning-Based Traffic Accident Prediction: An Investigative Study for Enhanced Road Safety
M Girija, V Divya
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 4
M Girija, V Divya
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 4
An Intrusion System for Internet of Things Security Breaches Using Machine Learning Techniques
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Artificial Intelligence and Applications (2024) Vol. 2, Iss. 3, pp. 188-194
Open Access | Times Cited: 4
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Artificial Intelligence and Applications (2024) Vol. 2, Iss. 3, pp. 188-194
Open Access | Times Cited: 4
The application of gated recurrent unit algorithm with fused attention mechanism in UWB indoor localization
Yalin Tian, Zengzeng Lian, María Amparo Núñez Andrés, et al.
Measurement (2024) Vol. 234, pp. 114835-114835
Open Access | Times Cited: 4
Yalin Tian, Zengzeng Lian, María Amparo Núñez Andrés, et al.
Measurement (2024) Vol. 234, pp. 114835-114835
Open Access | Times Cited: 4
Hybrid deep learning models for road surface condition monitoring
Abdelkader Hadj-Attou, Yacine Kabir, Farid Ykhlef
Measurement (2023) Vol. 220, pp. 113267-113267
Closed Access | Times Cited: 11
Abdelkader Hadj-Attou, Yacine Kabir, Farid Ykhlef
Measurement (2023) Vol. 220, pp. 113267-113267
Closed Access | Times Cited: 11
A new deep learning method for classification of power quality disturbances using DWT-MRA in utility smart grid
Dazi Li, Irfan Ali Channa, Xun Chen, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109290-109290
Closed Access | Times Cited: 3
Dazi Li, Irfan Ali Channa, Xun Chen, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109290-109290
Closed Access | Times Cited: 3
Examining Healthcare Services Utilizing Cloud Technology in Intelligent Urban Environments
Abhinav Kumar, Anindya Bag, Akshay Anand, et al.
Advances in healthcare information systems and administration book series (2024), pp. 77-98
Closed Access | Times Cited: 2
Abhinav Kumar, Anindya Bag, Akshay Anand, et al.
Advances in healthcare information systems and administration book series (2024), pp. 77-98
Closed Access | Times Cited: 2
Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security
M Rekha, Shoba Rani P
ICST Transactions on Scalable Information Systems (2024)
Open Access | Times Cited: 1
M Rekha, Shoba Rani P
ICST Transactions on Scalable Information Systems (2024)
Open Access | Times Cited: 1
An Innovative approach to Improve the Quality of Pharmaceuticals approach using Cloud Computing
N. Vijayaraj, D. Rajalakshmi, P.S. Immaculate, et al.
EAI Endorsed Transactions on Pervasive Health and Technology (2024) Vol. 10
Open Access | Times Cited: 1
N. Vijayaraj, D. Rajalakshmi, P.S. Immaculate, et al.
EAI Endorsed Transactions on Pervasive Health and Technology (2024) Vol. 10
Open Access | Times Cited: 1
Spatiotemporal crowds features extraction of infrared images using neural network
Anas M. Al-Oraiqat, Oleksandr Drieiev, Hanna Drieieva, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 4, pp. 2543-2556
Closed Access | Times Cited: 1
Anas M. Al-Oraiqat, Oleksandr Drieiev, Hanna Drieieva, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 4, pp. 2543-2556
Closed Access | Times Cited: 1