OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Explainable AI-Based DDOS Attack Identification Method for IoT Networks
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, et al.
Computers (2023) Vol. 12, Iss. 2, pp. 32-32
Open Access | Times Cited: 37

Showing 1-25 of 37 citing articles:

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
Mamoona Humayun, Noshina Tariq, Majed Alfayad, et al.
IEEE Access (2024) Vol. 12, pp. 25469-25490
Open Access | Times Cited: 17

Exploring Methods of Mitigation against DDoS Attack in an IoT Network
Piyush M. Prajapati, Priyesh P. Gandhi, Sheshang Degadwala
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access | Times Cited: 12

An efficient artificial intelligence approach for early detection of cross-site scripting attacks
Faizan Younas, Ali Raza, Nisrean Thalji, et al.
Decision Analytics Journal (2024) Vol. 11, pp. 100466-100466
Open Access | Times Cited: 11

A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1975-2002
Open Access | Times Cited: 8

Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas
Computers & Security (2025), pp. 104318-104318
Open Access | Times Cited: 1

An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 14

A systematic evaluation of white-box explainable AI methods for anomaly detection in IoT systems
Anna Namrita Gummadi, Osvaldo Arreche, Mustafa Abdallah
Internet of Things (2025) Vol. 30, pp. 101505-101505
Closed Access

Explainable artificial intelligence models in intrusion detection systems
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access

Enhanced Hybrid Approach for Multi-Class DDoS Attack Detection and Classification in Software-Defined Networks Using Remote Sensing and Data Analytics
S. Pradeesh, M. Jeyakarthic, A. Thirumalairaj
Remote Sensing in Earth Systems Sciences (2025)
Closed Access

ENTROPY BASED EARLIER DETECTION AND MITIGATION OF DDOS ATTACK USING STOCHASTIC METHOD IN SDN_IOT
I. Varalakshmi, M. Thenmozhi
Measurement Sensors (2025), pp. 101873-101873
Open Access

A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things
Anil Kumar Prajapati, Emmanuel S. Pilli, Ramesh Babu Battula, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110071-110071
Closed Access

Artificial Intelligence Applications in Healthcare Security
Salvatore D’Antonio, Federica Uccello
(2025), pp. 143-156
Closed Access

Exploring Artificial Intelligence’s Potential in Developing Advanced Distributed Denial of Service Defense Strategies
Ahmad Alhindi
Lecture notes in networks and systems (2025), pp. 251-264
Closed Access

DDoS Attack Detection Using Explainable AI in Machine Learning
Soumyasree Jena, Ashish Ranjan, Vibhav Prakash Singh
Communications in computer and information science (2025), pp. 3-16
Closed Access

Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization
Vasavi Chithanuru, Mangayarkarasi Ramaiah
PeerJ Computer Science (2025) Vol. 11, pp. e2630-e2630
Open Access

A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
Ankit Sharma, Kriti Bhushan
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13809-13834
Closed Access | Times Cited: 3

Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Vajratiya Vajrobol, Geetika Jain Saxena, Sanjeev Singh, et al.
Alexandria Engineering Journal (2024) Vol. 112, pp. 63-73
Closed Access | Times Cited: 3

DDoS Attack Classification Leveraging Data Balancing and Hyperparameter Tuning Approach Using Ensemble Machine Learning with XAI
Zakaria Masud Jiyad, Abdullah Al Maruf, Md. Mahmudul Haque, et al.
(2024)
Closed Access | Times Cited: 2

Recent Applications of Explainable AI (XAI): A Systematic Literature Review
Mirka Saarela, Vili Podgorelec
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8884-8884
Open Access | Times Cited: 2

Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection
Uyen Do, Laura Lahesoo, Rodrigo Matos Carnier, et al.
(2024), pp. 669-674
Closed Access | Times Cited: 1

Lightweight Deep Learning Method based on Group Convolution: Detecting DDoS Attacks in IoT Environments
Shuanglong Yan, Hongmu Han, Xinhua Dong, et al.
(2024), pp. 181-189
Closed Access | Times Cited: 1

The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks
Andy Reed, Laurence S. Dooley, Soraya Kouadri Mostéfaoui
Sensors (2024) Vol. 24, Iss. 17, pp. 5581-5581
Open Access | Times Cited: 1

Cyber-XAI-Block: an end-to-end cyber threat detection & fl-based risk assessment framework for iot enabled smart organization using xai and blockchain technologies
Omar Abboosh Hussein Gwassi, Osman N. Uçan, Enrique A. Navarro
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets
Muhammad Luqman, Muhammad Zeeshan, Qaiser Riaz, et al.
Journal of the Franklin Institute (2024), pp. 107440-107440
Closed Access | Times Cited: 1

IoT Security Detection Method Based on Multifeature and Multineural Network Fusion
Zihao Zhu, Leilei Zhang, Jian Hua Liu, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top