
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9937-9937
Open Access | Times Cited: 17
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9937-9937
Open Access | Times Cited: 17
Showing 17 citing articles:
Exploring Methods of Mitigation against DDoS Attack in an IoT Network
Piyush M. Prajapati, Priyesh P. Gandhi, Sheshang Degadwala
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access | Times Cited: 12
Piyush M. Prajapati, Priyesh P. Gandhi, Sheshang Degadwala
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access | Times Cited: 12
Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing
Fray L. Becerra-Suarez, Ismael Fernández-Roman, Manuel G. Forero
Mathematics (2024) Vol. 12, Iss. 9, pp. 1294-1294
Open Access | Times Cited: 7
Fray L. Becerra-Suarez, Ismael Fernández-Roman, Manuel G. Forero
Mathematics (2024) Vol. 12, Iss. 9, pp. 1294-1294
Open Access | Times Cited: 7
Distributed Denial of Service Attack Detection in IoT Utilizing Attention Mechanism Based Long Short-Term Memory
G S Nijaguna, Ghazi Mohamad Ramadan, S. Prabu, et al.
Lecture notes in electrical engineering (2025), pp. 207-216
Closed Access
G S Nijaguna, Ghazi Mohamad Ramadan, S. Prabu, et al.
Lecture notes in electrical engineering (2025), pp. 207-216
Closed Access
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
Ankit Sharma, Kriti Bhushan
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13809-13834
Closed Access | Times Cited: 3
Ankit Sharma, Kriti Bhushan
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13809-13834
Closed Access | Times Cited: 3
Enhancing Security Mechanisms for IoT-Fog Networks
Salah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz, et al.
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 152-159
Open Access | Times Cited: 2
Salah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz, et al.
Journal of Robotics and Control (JRC) (2024) Vol. 5, Iss. 1, pp. 152-159
Open Access | Times Cited: 2
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks
Amandeep Verma, Rahul Saha, Gulshan Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 48301-48320
Open Access | Times Cited: 2
Amandeep Verma, Rahul Saha, Gulshan Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 48301-48320
Open Access | Times Cited: 2
5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks
Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 2
Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access | Times Cited: 2
Res2Net-ERNN: deep learning based cyberattack classification in software defined network
Mamatha Maddu, Yamarthi Narasimha Rao
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12821-12839
Closed Access | Times Cited: 1
Mamatha Maddu, Yamarthi Narasimha Rao
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12821-12839
Closed Access | Times Cited: 1
WSN intrusion detection method using improved spatiotemporal ResNet and GAN
Jing Yang
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Jing Yang
Open Computer Science (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
A Survey on Intrusion Detection System in IoT Networks
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 1
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim
Cyber Security and Applications (2024) Vol. 3, pp. 100082-100082
Open Access | Times Cited: 1
NIDR: Network Interference Detection and Rectification
Rose Mary K A, Celestine Joy, Denin Devis, et al.
(2024), pp. 1-4
Closed Access
Rose Mary K A, Celestine Joy, Denin Devis, et al.
(2024), pp. 1-4
Closed Access
DDoS Attacks Detection in IoT Networks using Naive Bayes and Random Forest
Animesh Srivastava, Shweta Tiwari, Bhupender Singh Rawat, et al.
(2024), pp. 1609-1612
Closed Access
Animesh Srivastava, Shweta Tiwari, Bhupender Singh Rawat, et al.
(2024), pp. 1609-1612
Closed Access
A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access
Distributed Denial of Services (DDoS) & IoT Botnet Malware Identification Using Machine Learning & Deep Learning Models
Indrajeet Kumar, Manvi Bohra, Noor Mohd, et al.
(2024), pp. 1-6
Closed Access
Indrajeet Kumar, Manvi Bohra, Noor Mohd, et al.
(2024), pp. 1-6
Closed Access
Machine Learning-Based Framework for Cybersecurity of Robotic System
Narinder Verma, Neerendra Kumar, Harish Salotra
Lecture notes in electrical engineering (2024), pp. 257-269
Closed Access
Narinder Verma, Neerendra Kumar, Harish Salotra
Lecture notes in electrical engineering (2024), pp. 257-269
Closed Access
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
HOANG Thi Phuong
Vinh University Journal of Science (2024) Vol. 53, Iss. 4A, pp. 69-78
Closed Access
HOANG Thi Phuong
Vinh University Journal of Science (2024) Vol. 53, Iss. 4A, pp. 69-78
Closed Access
The performance of Logistic Regression, Decision Tree, KNN, Naive Bayes and SVM for identifying Automotive Cybersecurity Attack and Prevention: An Experimental Study
Sonali Mishra
Deleted Journal (2024) Vol. 20, Iss. 2s, pp. 687-699
Open Access
Sonali Mishra
Deleted Journal (2024) Vol. 20, Iss. 2s, pp. 687-699
Open Access