
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Abnormal traffic detection system in SDN based on deep learning hybrid models
Kun Wang, Yu Fu, Xueyuan Duan, et al.
Computer Communications (2024) Vol. 216, pp. 183-194
Open Access | Times Cited: 13
Kun Wang, Yu Fu, Xueyuan Duan, et al.
Computer Communications (2024) Vol. 216, pp. 183-194
Open Access | Times Cited: 13
Showing 13 citing articles:
Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access | Times Cited: 1
Ahmed Bensaoud, Jugal Kalita
Ad Hoc Networks (2025) Vol. 170, pp. 103770-103770
Open Access | Times Cited: 1
Empowering Cybersecurity Using Enhanced Rat Swarm Optimization With Deep Stack-Based Ensemble Learning Approach
P. Manickam, M. Girija, Ashit Kumar Dutta, et al.
IEEE Access (2024) Vol. 12, pp. 62492-62501
Open Access | Times Cited: 5
P. Manickam, M. Girija, Ashit Kumar Dutta, et al.
IEEE Access (2024) Vol. 12, pp. 62492-62501
Open Access | Times Cited: 5
An effective IDS using CondenseNet and CoAtNet based approach for SDN-IoT environment
Dimmiti Srinivasa Rao, Ajith Jubilson Emerson
Computers & Electrical Engineering (2025) Vol. 123, pp. 110305-110305
Closed Access
Dimmiti Srinivasa Rao, Ajith Jubilson Emerson
Computers & Electrical Engineering (2025) Vol. 123, pp. 110305-110305
Closed Access
A DDoS Attack Detection Method Based on IQR and DFFCNN in SDN
Meng Yue, He Yan, Ruize Han, et al.
Journal of Network and Computer Applications (2025), pp. 104203-104203
Closed Access
Meng Yue, He Yan, Ruize Han, et al.
Journal of Network and Computer Applications (2025), pp. 104203-104203
Closed Access
Efficient implementation of a wavelet neural network model for short-term traffic flow prediction: Sensitivity analysis
Sonia Mrad, Rafaa Mraïhi, Aparna Murthy
International Journal of Transportation Science and Technology (2024)
Open Access | Times Cited: 2
Sonia Mrad, Rafaa Mraïhi, Aparna Murthy
International Journal of Transportation Science and Technology (2024)
Open Access | Times Cited: 2
Res2Net-ERNN: deep learning based cyberattack classification in software defined network
Mamatha Maddu, Yamarthi Narasimha Rao
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12821-12839
Closed Access | Times Cited: 1
Mamatha Maddu, Yamarthi Narasimha Rao
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 12821-12839
Closed Access | Times Cited: 1
Towards deep learning multi-classification of DDoS attacks in software-defined networks
Ameur Salem Zaidoun, Zied Lachiri
(2024), pp. 1-4
Closed Access | Times Cited: 1
Ameur Salem Zaidoun, Zied Lachiri
(2024), pp. 1-4
Closed Access | Times Cited: 1
Deep Learning Models Comparison in binary context for DDoS Attack Detection in Software-Defined Network
Ameur Salem Zaidoun, Zied Lachiri
(2024), pp. 105-109
Closed Access | Times Cited: 1
Ameur Salem Zaidoun, Zied Lachiri
(2024), pp. 105-109
Closed Access | Times Cited: 1
Design and Analysis of Image Forgery Detection System Using Deep Learning
Indu Sharma, Anuj Kumar, Manika Manwal
(2024), pp. 1519-1524
Closed Access
Indu Sharma, Anuj Kumar, Manika Manwal
(2024), pp. 1519-1524
Closed Access
Abnormal Traffic Detection System Based on Feature Fusion and Sparse Transformer
Xinjian Zhao, Weiwei Miao, Guoquan Yuan, et al.
Mathematics (2024) Vol. 12, Iss. 11, pp. 1643-1643
Open Access
Xinjian Zhao, Weiwei Miao, Guoquan Yuan, et al.
Mathematics (2024) Vol. 12, Iss. 11, pp. 1643-1643
Open Access
Federated Learning-Based Security Attack Detection for Multi-Controller Software-Defined Networks
Abrar Omar Alkhamisi, Iyad Katib, Seyed M. Buhari
Algorithms (2024) Vol. 17, Iss. 7, pp. 290-290
Open Access
Abrar Omar Alkhamisi, Iyad Katib, Seyed M. Buhari
Algorithms (2024) Vol. 17, Iss. 7, pp. 290-290
Open Access
Evaluating Feature Selection Techniques with Deep Learning Approach in Cancer Diagnosis
Nirmal Saraswat, Prashant Kumar, Jyoti Joshi, et al.
(2024), pp. 930-935
Closed Access
Nirmal Saraswat, Prashant Kumar, Jyoti Joshi, et al.
(2024), pp. 930-935
Closed Access
Fuzzy Embedding to Detect Intrusion in Software-Defined Networks
Quang-Vinh Dang
Lecture notes in networks and systems (2024), pp. 707-713
Closed Access
Quang-Vinh Dang
Lecture notes in networks and systems (2024), pp. 707-713
Closed Access
Enhancing Malicious Traffic Detection in IoT-Enabled SDN Using Convolutional Neural Network
Safae Khalis, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 941-954
Closed Access
Safae Khalis, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 941-954
Closed Access