
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Novel Machine Learning Approach for DDoS Cloud Detection: Bayesian-Based CNN and Data Fusion Enhancements
Ibtihal AlSaleh, Aida Al‐Samawi, Liyth Nissirat
Sensors (2024) Vol. 24, Iss. 5, pp. 1418-1418
Open Access | Times Cited: 7
Ibtihal AlSaleh, Aida Al‐Samawi, Liyth Nissirat
Sensors (2024) Vol. 24, Iss. 5, pp. 1418-1418
Open Access | Times Cited: 7
Showing 7 citing articles:
Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques— Recent Research Advancements
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5
Amira Mahamat Abdallah, Aysha Saif Rashed Obaid Alkaabi, Ghaya Bark Nasser Douman Alameri, et al.
IEEE Access (2024) Vol. 12, pp. 56749-56773
Open Access | Times Cited: 5
Evidence Detection in Cloud Forensics: Classifying Cyber-Attacks in IaaS Environments using machine learning
Suhaila Abuowaida, Hamza Abu Owida, Sulieman Ibraheem Shelash Al-Hawary, et al.
Data & Metadata (2025) Vol. 4, pp. 699-699
Closed Access
Suhaila Abuowaida, Hamza Abu Owida, Sulieman Ibraheem Shelash Al-Hawary, et al.
Data & Metadata (2025) Vol. 4, pp. 699-699
Closed Access
Improved Whale Optimization Algorithm and Optimized Long Short-Term Memory for DDoS Cyber Security Threat
Sanjaikanth E Vadakkethil, Kiran Polimetla, Srikanth Velpula, et al.
(2024), pp. 01-05
Closed Access
Sanjaikanth E Vadakkethil, Kiran Polimetla, Srikanth Velpula, et al.
(2024), pp. 01-05
Closed Access
Collaborative Defense Method Against DDoS Attacks on SDN-Architected Cloud Servers
Yiying Zhang, Yao Xu, Longzhe Han, et al.
Lecture notes in computer science (2024), pp. 362-370
Closed Access
Yiying Zhang, Yao Xu, Longzhe Han, et al.
Lecture notes in computer science (2024), pp. 362-370
Closed Access
Detection and Mitigation of DDoS Attacks : A Review of Robust and Scalable Solutions
Sheshang Degadwala, Verma Jyoti Sukhdev Sushila
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 5, pp. 12-23
Open Access
Sheshang Degadwala, Verma Jyoti Sukhdev Sushila
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 5, pp. 12-23
Open Access
Enhancing Cloud Security in DDoS: A Holistic Approach Leveraging Machine Learning Techniques
Manju C Nair, B. Ankayarkanni
(2024) Vol. 23, pp. 1217-1222
Closed Access
Manju C Nair, B. Ankayarkanni
(2024) Vol. 23, pp. 1217-1222
Closed Access
Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-Optimized LightGBM Algorithm
Daoqi Han, Honghui Li, Xueliang Fu
Sensors (2024) Vol. 24, Iss. 19, pp. 6179-6179
Open Access
Daoqi Han, Honghui Li, Xueliang Fu
Sensors (2024) Vol. 24, Iss. 19, pp. 6179-6179
Open Access