
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks
Chin‐Shiuh Shieh, Thanh-Tuan Nguyen, Wan-Wei Lin, et al.
Electronics (2022) Vol. 11, Iss. 13, pp. 1977-1977
Open Access | Times Cited: 15
Chin‐Shiuh Shieh, Thanh-Tuan Nguyen, Wan-Wei Lin, et al.
Electronics (2022) Vol. 11, Iss. 13, pp. 1977-1977
Open Access | Times Cited: 15
Showing 15 citing articles:
Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions
Jean-Paul A. Yaacoub, Hassan Noura, Ola Salman
Internet of Things and Cyber-Physical Systems (2023) Vol. 3, pp. 155-179
Open Access | Times Cited: 27
Jean-Paul A. Yaacoub, Hassan Noura, Ola Salman
Internet of Things and Cyber-Physical Systems (2023) Vol. 3, pp. 155-179
Open Access | Times Cited: 27
A comprehensive survey on DDoS defense systems: New trends and challenges
Qing Li, He Huang, Ruoyu Li, et al.
Computer Networks (2023) Vol. 233, pp. 109895-109895
Closed Access | Times Cited: 20
Qing Li, He Huang, Ruoyu Li, et al.
Computer Networks (2023) Vol. 233, pp. 109895-109895
Closed Access | Times Cited: 20
An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN Environments
Lei Chen, Zhihao Wang, Ru Huo, et al.
Algorithms (2023) Vol. 16, Iss. 4, pp. 197-197
Open Access | Times Cited: 19
Lei Chen, Zhihao Wang, Ru Huo, et al.
Algorithms (2023) Vol. 16, Iss. 4, pp. 197-197
Open Access | Times Cited: 19
Open-Set Recognition in Unknown DDoS Attacks Detection With Reciprocal Points Learning
Chin‐Shiuh Shieh, Fu-An Ho, Mong-Fong Horng, et al.
IEEE Access (2024) Vol. 12, pp. 56461-56476
Open Access | Times Cited: 2
Chin‐Shiuh Shieh, Fu-An Ho, Mong-Fong Horng, et al.
IEEE Access (2024) Vol. 12, pp. 56461-56476
Open Access | Times Cited: 2
Federated learning challenges and risks in modern digital healthcare systems
Kassim Kalinaki, Owais Ahmed Malik, Umar Yahya, et al.
Elsevier eBooks (2024), pp. 283-300
Closed Access | Times Cited: 1
Kassim Kalinaki, Owais Ahmed Malik, Umar Yahya, et al.
Elsevier eBooks (2024), pp. 283-300
Closed Access | Times Cited: 1
A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model
G. Sankara Rao, P. Krishna Subbarao
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 244-253
Open Access | Times Cited: 4
G. Sankara Rao, P. Krishna Subbarao
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 9, pp. 244-253
Open Access | Times Cited: 4
One-Parameter Statistical Methods to Recognize DDoS Attacks
Roman Hajtmanek, Martin Kontšek, Juraj Smieško, et al.
Symmetry (2022) Vol. 14, Iss. 11, pp. 2388-2388
Open Access | Times Cited: 5
Roman Hajtmanek, Martin Kontšek, Juraj Smieško, et al.
Symmetry (2022) Vol. 14, Iss. 11, pp. 2388-2388
Open Access | Times Cited: 5
Exploring a novel framework for DoS/DDoS attack detection and simulation in contemporary networks
Sankara Rao Gottapu, Subbarao P. Krishna
i-manager’s Journal on Software Engineering (2024) Vol. 18, Iss. 3, pp. 43-43
Closed Access
Sankara Rao Gottapu, Subbarao P. Krishna
i-manager’s Journal on Software Engineering (2024) Vol. 18, Iss. 3, pp. 43-43
Closed Access
Comparação do Impacto de Ataques Adversariais Contra Modelo de Classificação baseado em ML
Mateus Pelloso, Michele Nogueira
(2024), pp. 168-181
Closed Access
Mateus Pelloso, Michele Nogueira
(2024), pp. 168-181
Closed Access
Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks
Lamia Alhazmi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access | Times Cited: 1
Lamia Alhazmi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access | Times Cited: 1
Analyze textual data: deep neural network for adversarial inversion attack in wireless networks
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Machine Recognition of DDoS Attacks Using Statistical Parameters
Juraj Smieško, Pavel Segeč, Martin Kontšek
Mathematics (2023) Vol. 12, Iss. 1, pp. 142-142
Open Access | Times Cited: 1
Juraj Smieško, Pavel Segeč, Martin Kontšek
Mathematics (2023) Vol. 12, Iss. 1, pp. 142-142
Open Access | Times Cited: 1
A Hybrid Model for The Detection Of APA-DDoS Attacks Using Random Forest with Recurrent Neural Network
P. S. Ezekiel, O Taylor
IJARCCE (2023) Vol. 12, Iss. 11
Open Access
P. S. Ezekiel, O Taylor
IJARCCE (2023) Vol. 12, Iss. 11
Open Access