OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates
Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, et al.
Applied Sciences (2022) Vol. 12, Iss. 12, pp. 6127-6127
Open Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking
Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, et al.
Sensors (2023) Vol. 23, Iss. 9, pp. 4441-4441
Open Access | Times Cited: 31

Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis
Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 775-775
Open Access | Times Cited: 25

On the (in)Security of the Control Plane of SDN Architecture: A Survey
Zaheed Ahmed Bhuiyan, Salekul Islam, Md. Motaharul Islam, et al.
IEEE Access (2023) Vol. 11, pp. 91550-91582
Open Access | Times Cited: 22

Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks
Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan
Sensors (2023) Vol. 23, Iss. 12, pp. 5644-5644
Open Access | Times Cited: 19

Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation
Lotfi Mhamdi, Mohd Mat Isa
Journal of Network and Computer Applications (2024) Vol. 225, pp. 103868-103868
Open Access | Times Cited: 7

ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN
Boru Liu, Dan Tang, Jingwen Chen, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124356-124356
Closed Access | Times Cited: 6

Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, et al.
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12441-12441
Open Access | Times Cited: 25

Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller
A. Mansoor, Mohammed Anbar, Abdullah Ahmed Bahashwan, et al.
Systems (2023) Vol. 11, Iss. 6, pp. 296-296
Open Access | Times Cited: 13

ENTROPY BASED EARLIER DETECTION AND MITIGATION OF DDOS ATTACK USING STOCHASTIC METHOD IN SDN_IOT
I. Varalakshmi, M. Thenmozhi
Measurement Sensors (2025), pp. 101873-101873
Open Access

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, et al.
IEEE Access (2023) Vol. 11, pp. 43019-43040
Open Access | Times Cited: 12

SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
Vaishali Shirsath, Madhav Chandane, Chhagan Lal, et al.
Computer Networks (2024) Vol. 244, pp. 110327-110327
Closed Access | Times Cited: 4

HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN
Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297548-e0297548
Open Access | Times Cited: 3

Multi-domain collaborative two-level DDoS detection via hybrid deep learning
Huifen Feng, Weiting Zhang, Ying Liu, et al.
Computer Networks (2024) Vol. 242, pp. 110251-110251
Closed Access | Times Cited: 2

A Review of Power System False Data Attack Detection Technology Based on Big Data
Zhengwei Chang, Jie Wu, Huihui Liang, et al.
Information (2024) Vol. 15, Iss. 8, pp. 439-439
Open Access | Times Cited: 2

Renyi entropy-driven network traffic anomaly detection with dynamic threshold
Haoran Yu, Wenchuan Yang, Baojiang Cui, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 2

DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps
Aishatu Abdullahi Wabi, Ismaila Idris, Olayemi Mikail Olaniyi, et al.
Computers & Security (2023) Vol. 139, pp. 103652-103652
Closed Access | Times Cited: 6

A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic
Qiwen Tian, Sumiko Miyata
IoT (2023) Vol. 4, Iss. 2, pp. 95-111
Open Access | Times Cited: 5

A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)
Dalia Shihab Ahmed, Abbas Abdulazeez Abdulhameed, Methaq Talib Gaata
Deleted Journal (2024) Vol. 4, Iss. 3, pp. 86-135
Open Access | Times Cited: 1

Performance analysis of entropy variation-based detection of DDoS attacks in IoT
Nimisha Pandey, Pramod Kumar Mishra
Internet of Things (2023) Vol. 23, pp. 100812-100812
Closed Access | Times Cited: 3

A Thorough Investigation of Various Goals and Responses for Mobile Software-Defined Networks
Somesh Kumar Sahu, J. Chandra, Kiran Hemanthraj Muloor, et al.
Advances in wireless technologies and telecommunication book series (2023), pp. 307-328
Closed Access | Times Cited: 3

A Comprehensive Detection and Mitigation Mechanism to Protect SD-IoV Systems Against Controller-Targeted DDoS Attacks
Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, et al.
Research Square (Research Square) (2024)
Open Access

A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks
Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, et al.
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14295-14313
Closed Access

A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning
Dhruv Kalambe, Divyansh Sharma, Pushkar Kadam, et al.
Journal of Network and Computer Applications (2024) Vol. 235, pp. 104081-104081
Closed Access

DDoS Attacks Analysis with Cyber Data Forensics using Weighted Logistic Regression and Random Forest
Jyoti Tolanur, Shilpa Chaudhari
(2023), pp. 1-6
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top