OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A new method to classify malicious domain name using neutrosophic sets in DGA botnet detection
Nguyen Van Can, Doan Ngoc Tu, Tong Anh Tuan, et al.
Journal of Intelligent & Fuzzy Systems (2020) Vol. 38, Iss. 4, pp. 4223-4236
Closed Access | Times Cited: 19

Showing 19 citing articles:

On Detecting and Classifying DGA Botnets and their Families
Tong Anh Tuan, Hoang Viet Long, David Taniar
Computers & Security (2021) Vol. 113, pp. 102549-102549
Open Access | Times Cited: 42

Detecting APT Attacks Based on Network Traffic Using Machine Learning
Cho Do Xuan
Journal of Web Engineering (2021)
Open Access | Times Cited: 29

A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic
Cho Do Xuan, Duc Duong, Hoang Xuan Dau
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 6, pp. 11311-11329
Closed Access | Times Cited: 25

GLDS method for multiple attribute group decision making under 2-Tuple linguistic neutrosophic environment
Jianping Fan, Feng Yan, Meiqin Wu
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 6, pp. 11523-11538
Closed Access | Times Cited: 17

UTL_DGA22 - a dataset for DGA botnet detection and classification
Tong Anh Tuan, Viet Anh Nguyen, Trần Thị Lượng, et al.
Computer Networks (2022) Vol. 221, pp. 109508-109508
Closed Access | Times Cited: 8

Intrusion detection algorithm based on image enhanced convolutional neural network
Qian Wang, Wenfang Zhao, Jiadong Ren
Journal of Intelligent & Fuzzy Systems (2021) Vol. 41, Iss. 1, pp. 2183-2194
Closed Access | Times Cited: 9

Particle swarm optimization for the shortest path problem
Lehua Yang, Dongmei Li, Ruipu Tan
Journal of Intelligent & Fuzzy Systems (2021) Vol. 41, Iss. 1, pp. 1353-1373
Closed Access | Times Cited: 6

A semantic element representation model for malicious domain name detection
Luhui Yang, Guangjie Liu, Jinwei Wang, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103148-103148
Closed Access | Times Cited: 4

Towards DGA Domain Name Detection via Multi-feature Coordinated Representation and Random Forest
Haiyan Xu, Xin Wang, Yuanyuan Qiu, et al.
(2023), pp. 510-518
Closed Access | Times Cited: 2

A Malicious Domain Name Detection Method Based on Variational Autoencoder
Donglin Ma, Xichuan Wu
(2024) Vol. 36, pp. 1206-1210
Closed Access

C2-DNSWatch: Endpoint Framework for Detecting Command and Control (C2) Connection of Advanced Persistent Threats (APTs)
Raja Zeeshan Haider, Baber Aslam, Haider Abbas, et al.
(2024) Vol. 74, pp. 64-69
Closed Access

Neutrosophic ratio-type exponential estimators for estimation of population mean
Zaigham Tahir, Hina Khan, Faten S. Alamri, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 3, pp. 4559-4583
Closed Access | Times Cited: 1

New expected impact functions and algorithms for modeling games under soft sets
İrfan Deli̇, Hoàng Việt Long, Lê Hoàng Sơn, et al.
Journal of Intelligent & Fuzzy Systems (2020) Vol. 39, Iss. 3, pp. 4463-4472
Closed Access | Times Cited: 3

A neutrosophic folding and retraction on a single-valued neutrosophic graph
M. Abu-Saleem
Journal of Intelligent & Fuzzy Systems (2021) Vol. 40, Iss. 3, pp. 5207-5213
Closed Access | Times Cited: 3

Malicious Domain Name Detection Based on Doc2vec and Hybrid Network
Donglin Ma, Shuhuan Zhang, Fanqi Kong, et al.
IOP Conference Series Earth and Environmental Science (2021) Vol. 693, Iss. 1, pp. 012089-012089
Open Access | Times Cited: 3

Botnet Detection via Machine Learning Techniques
Haofan Wang
2022 International Conference on Big Data, Information and Computer Network (BDICN) (2022), pp. 831-836
Closed Access | Times Cited: 2

Image Retrieval Using Intensity Gradients and Texture Chromatic Pattern
I. Jeena Jacob, P. Betty, P. Ebby Darney, et al.
International Journal of Data Warehousing and Mining (2021) Vol. 17, Iss. 1, pp. 57-73
Closed Access | Times Cited: 2

Interval neutrosophic stochastic dynamical systems driven by Brownian motion
Nguyen Thi Kim Son, Nguyen Phuong Dong, Hoàng Việt Long, et al.
Applied Soft Computing (2022) Vol. 129, pp. 109609-109609
Closed Access | Times Cited: 1

Assessment of Machine Learning Models in Detecting DGA Botnet in Characteristics by TF-IDF
Tong Anh Tuan, Viet Anh Nguyen, Hoang Viet Long
(2021), pp. 1-5
Closed Access | Times Cited: 1

Page 1

Scroll to top