
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Low-rate DDoS attack Detection using Deep Learning for SDN-enabled IoT Networks
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Amgad Muneer, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 11
Open Access | Times Cited: 25
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Amgad Muneer, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 11
Open Access | Times Cited: 25
Showing 25 citing articles:
Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Babangida Isyaku, et al.
IEEE Access (2024) Vol. 12, pp. 51630-51649
Open Access | Times Cited: 12
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Babangida Isyaku, et al.
IEEE Access (2024) Vol. 12, pp. 51630-51649
Open Access | Times Cited: 12
A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection
Mohammed S. Alshehri, Oumaima Saidani, Fatma S. Alrayes, et al.
IEEE Access (2024) Vol. 12, pp. 45762-45772
Open Access | Times Cited: 9
Mohammed S. Alshehri, Oumaima Saidani, Fatma S. Alrayes, et al.
IEEE Access (2024) Vol. 12, pp. 45762-45772
Open Access | Times Cited: 9
DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 21
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 21
MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
IEEE Access (2023) Vol. 11, pp. 114590-114601
Open Access | Times Cited: 13
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
IEEE Access (2023) Vol. 11, pp. 114590-114601
Open Access | Times Cited: 13
Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks
Makhduma F. Saiyedand, Irfan Al‐Anbagi
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 596-616
Open Access | Times Cited: 5
Makhduma F. Saiyedand, Irfan Al‐Anbagi
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 596-616
Open Access | Times Cited: 5
Comparison and Investigation of AI-Based Approaches for Cyberattack Detection in Cyber-Physical Systems
Mujaheed Abdullahi, Hitham Alhussian, Norshakirah Aziz, et al.
IEEE Access (2024) Vol. 12, pp. 31988-32004
Open Access | Times Cited: 4
Mujaheed Abdullahi, Hitham Alhussian, Norshakirah Aziz, et al.
IEEE Access (2024) Vol. 12, pp. 31988-32004
Open Access | Times Cited: 4
An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 4
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 4
Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit
Md. Mobin Akhtar, Sultan Alasmari, S. K. Wasim Haidar, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Md. Mobin Akhtar, Sultan Alasmari, S. K. Wasim Haidar, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Modified Equilibrium Optimization Algorithm With Deep Learning-Based DDoS Attack Classification in 5G Networks
Mohammed Aljebreen, Fatma S. Alrayes, Mohammed Maray, et al.
IEEE Access (2023) Vol. 11, pp. 108561-108570
Closed Access | Times Cited: 8
Mohammed Aljebreen, Fatma S. Alrayes, Mohammed Maray, et al.
IEEE Access (2023) Vol. 11, pp. 108561-108570
Closed Access | Times Cited: 8
Performance Comparison of Machine Learning Classifiers for DDOS Detection and Mitigation on Software Defined Networks
Babangida Isyaku, Kamalrulnizam Abu Bakar, Muhammad Salisu Ali, et al.
(2023), pp. 69-74
Closed Access | Times Cited: 6
Babangida Isyaku, Kamalrulnizam Abu Bakar, Muhammad Salisu Ali, et al.
(2023), pp. 69-74
Closed Access | Times Cited: 6
Survey on Low-Rate DDoS Attacks, Detection and Defense
Dušan Drinić, Zoran Čiča
(2024), pp. 1-6
Closed Access | Times Cited: 1
Dušan Drinić, Zoran Čiča
(2024), pp. 1-6
Closed Access | Times Cited: 1
Classification of DDoS attack traffic on SDN network environment using deep learning
Urikhimbam Boby Clinton, Nazrul Hoque, Khumukcham Robindro Singh
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 1
Urikhimbam Boby Clinton, Nazrul Hoque, Khumukcham Robindro Singh
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 1
A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT )
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1
Real-Time Detection of Low-Rate DDoS Attacks in SDN-Based Networks Using Online Machine Learning Model
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mujaheed Abdullahi, et al.
(2023), pp. 95-101
Open Access | Times Cited: 4
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mujaheed Abdullahi, et al.
(2023), pp. 95-101
Open Access | Times Cited: 4
Online Machine Learning Approach to Detect and Mitigate Low-Rate DDoS Attacks in SDN-Based Networks
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mohamed Alashhab, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2023), pp. 152-157
Closed Access | Times Cited: 3
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mohamed Alashhab, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2023), pp. 152-157
Closed Access | Times Cited: 3
A Raise of Security Concern in IoT Devices: Measuring IoT Security Through Penetration Testing Framework
Abdul Ghafar Jaafar, Saiful Adli Ismail, Abdul Habir, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 5
Open Access
Abdul Ghafar Jaafar, Saiful Adli Ismail, Abdul Habir, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 5
Open Access
Hybrid IDS architecture for IoT security enhancing threat detection with CPBNN and CNN models
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 120
Open Access
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 120
Open Access
Artificial intelligence in the smart construction industry: A review of the existing state, challenges, and future threats
Aawag Mohsen Alawag, M. S. Liew, Wesam Salah Alaloul, et al.
AIP conference proceedings (2024) Vol. 3041, pp. 060004-060004
Closed Access
Aawag Mohsen Alawag, M. S. Liew, Wesam Salah Alaloul, et al.
AIP conference proceedings (2024) Vol. 3041, pp. 060004-060004
Closed Access
Detection of LR-DDoS Attack Based on Hybrid Neural Networks CNN-LSTM and CNN-Autoencoder
Dušan Drinić, Marija Novičić, Goran Kvaščev
(2024), pp. 1-4
Closed Access
Dušan Drinić, Marija Novičić, Goran Kvaščev
(2024), pp. 1-4
Closed Access
A Multi-Task Learning Model for IoT Anomaly Traffic Identification
S. Sree Vivek, Urikhimbam Boby Clinton, Nazrul Hoque
Lecture notes in electrical engineering (2024), pp. 299-311
Closed Access
S. Sree Vivek, Urikhimbam Boby Clinton, Nazrul Hoque
Lecture notes in electrical engineering (2024), pp. 299-311
Closed Access
Simulation-Based Evaluation of Advanced Threat Detection and Response in Financial Industry Networks Using Zero Trust and Blockchain Technology
Clement Daah, Amna Qureshi, Irfan Awan, et al.
Simulation Modelling Practice and Theory (2024), pp. 103027-103027
Open Access
Clement Daah, Amna Qureshi, Irfan Awan, et al.
Simulation Modelling Practice and Theory (2024), pp. 103027-103027
Open Access
Security and QoS (Quality of Service) Related Current Challenges in IoT
Shital Pawar, Meghana Lokhande, Sandip Thite, et al.
International Journal of Electronics and Communication Engineering (2023) Vol. 10, Iss. 4, pp. 9-20
Open Access | Times Cited: 1
Shital Pawar, Meghana Lokhande, Sandip Thite, et al.
International Journal of Electronics and Communication Engineering (2023) Vol. 10, Iss. 4, pp. 9-20
Open Access | Times Cited: 1
Real-time Detection of Low-Rate DDoS Attacks in SDN-based Networks using Online Machine Learning Model
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mujaheed Abdullahi, et al.
Authorea (Authorea) (2023)
Open Access
Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mujaheed Abdullahi, et al.
Authorea (Authorea) (2023)
Open Access
Privacy and Security Control Approach for DDoS Attacks in Cyber Physical Systems using Deep Learning
Amar Pal Yadav, Nitin Mishra
(2023), pp. 1-7
Closed Access
Amar Pal Yadav, Nitin Mishra
(2023), pp. 1-7
Closed Access