
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models
Umar Islam, Ali Muhammad, Rafiq Mansoor, et al.
Sustainability (2022) Vol. 14, Iss. 14, pp. 8374-8374
Open Access | Times Cited: 91
Umar Islam, Ali Muhammad, Rafiq Mansoor, et al.
Sustainability (2022) Vol. 14, Iss. 14, pp. 8374-8374
Open Access | Times Cited: 91
Showing 1-25 of 91 citing articles:
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 114
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 114
Sustainable Digital Marketing Under Big Data: An AI Random Forest Model Approach
Keyan Jin, Ziqi Zhong, Elena Yifei Zhao
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 3566-3579
Open Access | Times Cited: 25
Keyan Jin, Ziqi Zhong, Elena Yifei Zhao
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 3566-3579
Open Access | Times Cited: 25
An Effective Classification of DDoS Attacks in a Distributed Network by Adopting Hierarchical Machine Learning and Hyperparameters Optimization Techniques
Sandeep Dasari, Rajesh Kaluri
IEEE Access (2024) Vol. 12, pp. 10834-10845
Open Access | Times Cited: 18
Sandeep Dasari, Rajesh Kaluri
IEEE Access (2024) Vol. 12, pp. 10834-10845
Open Access | Times Cited: 18
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14
A Novel Decentralized Blockchain Architecture for the Preservation of Privacy and Data Security against Cyberattacks in Healthcare
Ajitesh Kumar, Akhilesh Kumar Singh, Ijaz Ahmad, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5921-5921
Open Access | Times Cited: 54
Ajitesh Kumar, Akhilesh Kumar Singh, Ijaz Ahmad, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5921-5921
Open Access | Times Cited: 54
DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare
Bulletin of Electrical Engineering and Informatics (2022) Vol. 12, Iss. 2, pp. 930-939
Open Access | Times Cited: 49
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare
Bulletin of Electrical Engineering and Informatics (2022) Vol. 12, Iss. 2, pp. 930-939
Open Access | Times Cited: 49
DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions
Amal A. Alahmadi, Malak Aljabri, Fahd Alhaidari, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3103-3103
Open Access | Times Cited: 29
Amal A. Alahmadi, Malak Aljabri, Fahd Alhaidari, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3103-3103
Open Access | Times Cited: 29
Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks
Rihab Jmal, Walid Ghabri, Ramzi Guesmi, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4953-4953
Open Access | Times Cited: 28
Rihab Jmal, Walid Ghabri, Ramzi Guesmi, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4953-4953
Open Access | Times Cited: 28
Ishaani Priyadarshini, Pinaki Mohanty, Ahmed Alkhayyat, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 11
Closed Access | Times Cited: 25
A Deep Learning Methodology for Predicting Cybersecurity Attacks on the Internet of Things
Omar Azib Alkhudaydi, Moez Krichen, Ans D. Alghamdi
Information (2023) Vol. 14, Iss. 10, pp. 550-550
Open Access | Times Cited: 22
Omar Azib Alkhudaydi, Moez Krichen, Ans D. Alghamdi
Information (2023) Vol. 14, Iss. 10, pp. 550-550
Open Access | Times Cited: 22
Evaluation and Analysis: Internet of Things using Machine Learning Algorithms for Detection of DDoS Attacks
Anshika Sharma, Himanshi Babbar
(2023)
Closed Access | Times Cited: 21
Anshika Sharma, Himanshi Babbar
(2023)
Closed Access | Times Cited: 21
Smart Android Based Home Automation System Using Internet of Things (IoT)
Muhammad Abbas Khan, Ijaz Ahmad, Anis Nurashikin Nordin, et al.
Sustainability (2022) Vol. 14, Iss. 17, pp. 10717-10717
Open Access | Times Cited: 36
Muhammad Abbas Khan, Ijaz Ahmad, Anis Nurashikin Nordin, et al.
Sustainability (2022) Vol. 14, Iss. 17, pp. 10717-10717
Open Access | Times Cited: 36
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
Abdulbasit A. Darem, Asma A. Alhashmi, Tareq M. Alkhaldi, et al.
IEEE Access (2023) Vol. 11, pp. 125138-125158
Open Access | Times Cited: 17
Abdulbasit A. Darem, Asma A. Alhashmi, Tareq M. Alkhaldi, et al.
IEEE Access (2023) Vol. 11, pp. 125138-125158
Open Access | Times Cited: 17
Advanced machine learning approach for DoS attack resilience in internet of vehicles security
Nadeem Ahmed, Fayaz Hassan, Khursheed Aurangzeb, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e28844-e28844
Open Access | Times Cited: 5
Nadeem Ahmed, Fayaz Hassan, Khursheed Aurangzeb, et al.
Heliyon (2024) Vol. 10, Iss. 8, pp. e28844-e28844
Open Access | Times Cited: 5
Deep Learning-Driven Defense Strategies for Mitigating DDoS Attacks in Cloud Computing Environments
Doaa Mohsin Abd Ali Afraji, Jaime Lloret, Lourdes Peñalver
Cyber Security and Applications (2025), pp. 100085-100085
Open Access
Doaa Mohsin Abd Ali Afraji, Jaime Lloret, Lourdes Peñalver
Cyber Security and Applications (2025), pp. 100085-100085
Open Access
Denial of Service Attack Classification Using Machine Learning with Multi-Features
Furqan Rustam, Muhammad Faheem Mushtaq, Ameer Hamza, et al.
Electronics (2022) Vol. 11, Iss. 22, pp. 3817-3817
Open Access | Times Cited: 26
Furqan Rustam, Muhammad Faheem Mushtaq, Ameer Hamza, et al.
Electronics (2022) Vol. 11, Iss. 22, pp. 3817-3817
Open Access | Times Cited: 26
Anomaly Detection of Distributed Denial of Service (DDoS) in IoT Network Using Machine Learning
Baydaa Hashim Mohammed, Hasimi Sallehudin, Nurhizam Safie Mohd Satar, et al.
Studies in systems, decision and control (2025), pp. 41-64
Closed Access
Baydaa Hashim Mohammed, Hasimi Sallehudin, Nurhizam Safie Mohd Satar, et al.
Studies in systems, decision and control (2025), pp. 41-64
Closed Access
Distributed Denial of Service Attack Detection in IoT Utilizing Attention Mechanism Based Long Short-Term Memory
G S Nijaguna, Ghazi Mohamad Ramadan, S. Prabu, et al.
Lecture notes in electrical engineering (2025), pp. 207-216
Closed Access
G S Nijaguna, Ghazi Mohamad Ramadan, S. Prabu, et al.
Lecture notes in electrical engineering (2025), pp. 207-216
Closed Access
Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Cross-Selling Car Loans to Remittance Recipients in Uzbekistan: A Machine Learning Approach Using SMOTE-ENN
Masuda Isaeva
(2025), pp. 136-141
Closed Access
Masuda Isaeva
(2025), pp. 136-141
Closed Access
Development and Validation of Embedded Device for Electrocardiogram Arrhythmia Empowered with Transfer Learning
Rizwana Naz Asif, Sagheer Abbas, Muhammad Adnan Khan, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 20
Rizwana Naz Asif, Sagheer Abbas, Muhammad Adnan Khan, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 20
The Management of IoT-Based Organizational and Industrial Digitalization Using Machine Learning Methods
Aoqi Xu, Mehdi Darbandi, Danial Javaheri, et al.
Sustainability (2023) Vol. 15, Iss. 7, pp. 5932-5932
Open Access | Times Cited: 11
Aoqi Xu, Mehdi Darbandi, Danial Javaheri, et al.
Sustainability (2023) Vol. 15, Iss. 7, pp. 5932-5932
Open Access | Times Cited: 11
Joint IoT/ML Platforms for Smart Societies and Environments: A Review on Multimodal Information-Based Learning for Safety and Security
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications
Umar Islam, Abdullah A. Al‐Atawi, Hathal Salamah Alwageed, et al.
IEEE Access (2023) Vol. 11, pp. 74641-74656
Open Access | Times Cited: 11
Umar Islam, Abdullah A. Al‐Atawi, Hathal Salamah Alwageed, et al.
IEEE Access (2023) Vol. 11, pp. 74641-74656
Open Access | Times Cited: 11