OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 4, pp. 51-51
Open Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14

Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity
Md. Alamgir Hossain, Md Saiful Islam
Measurement Sensors (2024) Vol. 32, pp. 101037-101037
Open Access | Times Cited: 9

Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions
Rawan Bukhowah, Ahmed Aljughaiman, M. M. Hafizur Rahman
Electronics (2024) Vol. 13, Iss. 6, pp. 1031-1031
Open Access | Times Cited: 8

A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
Surendra Kumar, Mridula Dwivedi, Mohit Kumar, et al.
Computer Science Review (2024) Vol. 53, pp. 100661-100661
Closed Access | Times Cited: 8

Cyber-attack detection for lateral control system of cloud-based intelligent connected vehicle based on BiLSTM-Attention network
Cao He, Xing Xu, Haobin Jiang, et al.
Measurement (2025), pp. 116740-116740
Closed Access

An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, et al.
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access

Securing the Internet of Things: A Comprehensive Examination of Machine and Deep Learning Approaches Against Denial of Service Attacks
Deepak Singh, R. Uma Mageswari
Broadband Communications, Networks and Systems (2025), pp. 176-188
Closed Access

A Method for Lightweight DDoS Attack Detection Based on LightGBM
Jinyang Song, Chao Han, Qiao Kang, et al.
Smart innovation, systems and technologies (2025), pp. 88-101
Closed Access

A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks
Mehdi Rouissat, Mohammed Belkheir, Ibrahim S. Alsukayti, et al.
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10366-10366
Open Access | Times Cited: 11

Improving the controllability robustness of complex temporal networks against intelligent attacks
Qian Zhang, Peyman Arebi
Journal of Complex Networks (2024) Vol. 12, Iss. 4
Closed Access | Times Cited: 3

DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment
Goda Srinivasa Rao, Priyadarsan Patra, V. A. Narayana, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100526-100526
Open Access | Times Cited: 2

From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding
Akbar Khanan, Yasir Abdelgadir Mohamed, Abdul Hakim H. M. Mohamed, et al.
IEEE Access (2024) Vol. 12, pp. 59289-59317
Open Access | Times Cited: 1

An entropy and machine learning based approach for DDoS attacks detection in software defined networks
Amany I. Hassan, Eman Abd El Reheem, Shawkat K. Guirguis
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

Detecting DDoS Attacks Through Decision Tree Analysis: An EDA Approach with the CIC DDoS 2019 Dataset
Ahmad Turmudi Zy, Amali, Anggi Muhammad Rifa’i, et al.
(2024), pp. 202-207
Closed Access | Times Cited: 1

Isolation Forest Anomaly Detection in Vital Sign Monitoring for Healthcare
Kanchan Yadav, Upendra Singh Aswal, V. Saravanan, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3

Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution
Evangelos D. Spyrou, Ioannis G. Tsoulos, Chrysostomos Stylios
Future Internet (2023) Vol. 15, Iss. 12, pp. 401-401
Open Access | Times Cited: 2

Privacy and security issues in smart grids: A survey
Ogweno Jeremiah Okeyo
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 182-202
Open Access | Times Cited: 2

Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach
Federica Uccello, Marek Pawlicki, Salvatore D’Antonio, et al.
Communications in computer and information science (2024), pp. 236-246
Closed Access

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions
Winnie Owoko
World Journal of Advanced Engineering Technology and Sciences (2024) Vol. 11, Iss. 2, pp. 454-475
Open Access

Snort Versus Suricata in Intrusion Detection
Dhuha Sabri Ghazi, Hamood Shehab Hamid, Mhammed Joudah Zaiter, et al.
Iraqi Journal of Information & Communications Technology (2024) Vol. 7, Iss. 2, pp. 73-88
Open Access

DDoS and Botnet Attacks: A Survey of Detection and Prevention Techniques
S. Pranav, S. Sathya Priya, B. Hariharan
(2024), pp. 1-7
Closed Access

Defending Against App-Layer DDoS: Advanced Machine Learning Security
Salim Salmi, Lahcen Oughdir, Anas El Affar
(2024) Vol. 12, pp. 1-6
Closed Access

A Novel LightGBM-Bayesian Approach for DDoS Detection in SDN Environments
R. Vaishali, S. Manohar Naik
2022 Moratuwa Engineering Research Conference (MERCon) (2024), pp. 7-12
Closed Access

A novel recovery controllability method on temporal networks via temporal lost link prediction
Y. Qin, Ke Yan
Journal of Complex Networks (2024) Vol. 12, Iss. 6
Closed Access

Page 1 - Next Page

Scroll to top