
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm
Mahrukh Ramzan, Muhammad Shoaib, Ayesha Altaf, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8642-8642
Open Access | Times Cited: 12
Mahrukh Ramzan, Muhammad Shoaib, Ayesha Altaf, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8642-8642
Open Access | Times Cited: 12
Showing 12 citing articles:
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP
Sajid Mehmood, Rashid Amin, Jamal Mustafa, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0312425-e0312425
Open Access | Times Cited: 1
Sajid Mehmood, Rashid Amin, Jamal Mustafa, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0312425-e0312425
Open Access | Times Cited: 1
Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing
Fray L. Becerra-Suarez, Ismael Fernández-Roman, Manuel G. Forero
Mathematics (2024) Vol. 12, Iss. 9, pp. 1294-1294
Open Access | Times Cited: 8
Fray L. Becerra-Suarez, Ismael Fernández-Roman, Manuel G. Forero
Mathematics (2024) Vol. 12, Iss. 9, pp. 1294-1294
Open Access | Times Cited: 8
Effective Intrusion Detection System Using Deep Learning for DDoS Attacks
Jahangir Shaikh, Yasir Awais Butt, Hira Fatima Naqvi
Deleted Journal (2024) Vol. 4, Iss. 1
Open Access | Times Cited: 6
Jahangir Shaikh, Yasir Awais Butt, Hira Fatima Naqvi
Deleted Journal (2024) Vol. 4, Iss. 1
Open Access | Times Cited: 6
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 5
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal
The Journal of Supercomputing (2024) Vol. 80, Iss. 19, pp. 26942-26984
Open Access | Times Cited: 5
Enhanced Hybrid Approach for Multi-Class DDoS Attack Detection and Classification in Software-Defined Networks Using Remote Sensing and Data Analytics
S. Pradeesh, M. Jeyakarthic, A. Thirumalairaj
Remote Sensing in Earth Systems Sciences (2025)
Closed Access
S. Pradeesh, M. Jeyakarthic, A. Thirumalairaj
Remote Sensing in Earth Systems Sciences (2025)
Closed Access
Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments
Fiza Ashfaq, Muhammad Wasim, Mumtaz Ali Shah, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1905-1905
Open Access
Fiza Ashfaq, Muhammad Wasim, Mumtaz Ali Shah, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1905-1905
Open Access
Identificación de ataques de denegación de servicio distribuido (DDoS) mediante la integración de algoritmos de aprendizaje automático y arquitecturas de redes neuronales artificiales.
Víctor Alfonso Guzmán Brand, Laura Esperanza Gélvez García
Revista de Ingeniería Matemáticas y Ciencias de la Información (2025) Vol. 12, Iss. 23
Open Access
Víctor Alfonso Guzmán Brand, Laura Esperanza Gélvez García
Revista de Ingeniería Matemáticas y Ciencias de la Información (2025) Vol. 12, Iss. 23
Open Access
A Novel Data Preprocessing Model for Lightweight Sensory IoT Intrusion Detection
Shahbaz Ahmad Khanday, Hoor Fatima, Nitin Rakesh
International Journal of Mathematical Engineering and Management Sciences (2024) Vol. 9, Iss. 1, pp. 188-204
Open Access | Times Cited: 2
Shahbaz Ahmad Khanday, Hoor Fatima, Nitin Rakesh
International Journal of Mathematical Engineering and Management Sciences (2024) Vol. 9, Iss. 1, pp. 188-204
Open Access | Times Cited: 2
Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network
K. M. Mohamed Hashim Aslam, Faiza Iqbal, Ayesha Altaf, et al.
IEEE Access (2024) Vol. 12, pp. 15651-15661
Open Access
K. M. Mohamed Hashim Aslam, Faiza Iqbal, Ayesha Altaf, et al.
IEEE Access (2024) Vol. 12, pp. 15651-15661
Open Access
Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach
Ramakrishna Subbareddy, Tamil selvan
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access
Ramakrishna Subbareddy, Tamil selvan
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access
Improved Whale Optimization Algorithm and Optimized Long Short-Term Memory for DDoS Cyber Security Threat
Sanjaikanth E Vadakkethil, Kiran Polimetla, Srikanth Velpula, et al.
(2024), pp. 01-05
Closed Access
Sanjaikanth E Vadakkethil, Kiran Polimetla, Srikanth Velpula, et al.
(2024), pp. 01-05
Closed Access
Detecting DDoS Attacks using Machine Learning: Survey
Sarah Zghair Arrak, Rana Jumma Surayh Al- Janabi
Journal of Al-Qadisiyah for Computer Science and Mathematics (2024) Vol. 16, Iss. 2
Open Access
Sarah Zghair Arrak, Rana Jumma Surayh Al- Janabi
Journal of Al-Qadisiyah for Computer Science and Mathematics (2024) Vol. 16, Iss. 2
Open Access