
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
Zulfiqar Ali Khan, Akbar Siami Namin
Electronics (2022) Vol. 11, Iss. 23, pp. 3892-3892
Open Access | Times Cited: 12
Zulfiqar Ali Khan, Akbar Siami Namin
Electronics (2022) Vol. 11, Iss. 23, pp. 3892-3892
Open Access | Times Cited: 12
Showing 12 citing articles:
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques
Metehan Gelgi, Yueting Guan, Sanjay Arunachala, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3571-3571
Open Access | Times Cited: 7
Metehan Gelgi, Yueting Guan, Sanjay Arunachala, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3571-3571
Open Access | Times Cited: 7
A New Secure Model for Cloud Environments Using RBFNN and AdaBoost
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
An Efficient DDoS Attack Detection using Attention based Hybrid Model in Blockchain based SDN-IoT
Priyanka Pawar, Deepak Kumar, A. Bhuvanesh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
Priyanka Pawar, Deepak Kumar, A. Bhuvanesh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
Dynamic Analysis for Detection of Self-Destructive Smart Contracts
Zulfiqar Ali Khan, Akbar Siami Namin
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023)
Closed Access | Times Cited: 4
Zulfiqar Ali Khan, Akbar Siami Namin
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023)
Closed Access | Times Cited: 4
A Survey of Vulnerability Detection Techniques by Smart Contract Tools
Zulfiqar Ali Khan, Akbar Siami Namin
IEEE Access (2024) Vol. 12, pp. 70870-70910
Open Access | Times Cited: 1
Zulfiqar Ali Khan, Akbar Siami Namin
IEEE Access (2024) Vol. 12, pp. 70870-70910
Open Access | Times Cited: 1
A Machine Learning Approach for DDoS Attack Detection in CIC-DDoS2019 Dataset Using Multiple Linear Regression Algorithm
Lakshmeeswari Gondi, Swathi Sambangi, P. Kundana Priya, et al.
Springer proceedings in mathematics & statistics (2024), pp. 393-403
Closed Access | Times Cited: 1
Lakshmeeswari Gondi, Swathi Sambangi, P. Kundana Priya, et al.
Springer proceedings in mathematics & statistics (2024), pp. 393-403
Closed Access | Times Cited: 1
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator
Islam Obaidat, Bennett Kahn, Fatemeh Tavakoli, et al.
(2023), pp. 470-479
Closed Access | Times Cited: 3
Islam Obaidat, Bennett Kahn, Fatemeh Tavakoli, et al.
(2023), pp. 470-479
Closed Access | Times Cited: 3
A Communication-Efficient, Privacy-Preserving Federated Learning Algorithm Based on Two-Stage Gradient Pruning and Differentiated Differential Privacy
Yong Li, Wei Du, Liquan Han, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 3
Yong Li, Wei Du, Liquan Han, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 3
ProCAPTCHA: A profile-based CAPTCHA for personal password authentication
Nilobon Nanglae, Pattarasinee Bhattarakosol
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0311197-e0311197
Open Access
Nilobon Nanglae, Pattarasinee Bhattarakosol
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0311197-e0311197
Open Access
A Blockchain-Based Security Framework for East-West Interface of SDN
Hamad Alrashede, Fathy Eassa, Abdullah Ali, et al.
Electronics (2024) Vol. 13, Iss. 19, pp. 3799-3799
Open Access
Hamad Alrashede, Fathy Eassa, Abdullah Ali, et al.
Electronics (2024) Vol. 13, Iss. 19, pp. 3799-3799
Open Access
Evolutionary Equilibrium of Mining Pools Under DDoS Attack in Blockchain System
Xiao Liu, Zhao Huang, Quan Wang
2022 International Conference on Networking and Network Applications (NaNA) (2023), pp. 78-83
Closed Access | Times Cited: 1
Xiao Liu, Zhao Huang, Quan Wang
2022 International Conference on Networking and Network Applications (NaNA) (2023), pp. 78-83
Closed Access | Times Cited: 1
A Detection and Response Architecture for Stealthy Attacks on Cyber-Physical Systems
Tawfeeq Shawly
JOIV International Journal on Informatics Visualization (2023) Vol. 7, Iss. 3, pp. 801-807
Open Access
Tawfeeq Shawly
JOIV International Journal on Informatics Visualization (2023) Vol. 7, Iss. 3, pp. 801-807
Open Access