
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques
Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, et al.
Computers & Electrical Engineering (2022) Vol. 98, pp. 107716-107716
Closed Access | Times Cited: 128
Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, et al.
Computers & Electrical Engineering (2022) Vol. 98, pp. 107716-107716
Closed Access | Times Cited: 128
Showing 1-25 of 128 citing articles:
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 123
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 123
Blockchain for Modern Applications: A Survey
Moez Krichen, Meryem Ammi, Alaeddine Mihoub, et al.
Sensors (2022) Vol. 22, Iss. 14, pp. 5274-5274
Open Access | Times Cited: 121
Moez Krichen, Meryem Ammi, Alaeddine Mihoub, et al.
Sensors (2022) Vol. 22, Iss. 14, pp. 5274-5274
Open Access | Times Cited: 121
Are Formal Methods Applicable To Machine Learning And Artificial Intelligence?
Moez Krichen, Alaeddine Mihoub, Mohammed Y. Alzahrani, et al.
(2022), pp. 48-53
Closed Access | Times Cited: 74
Moez Krichen, Alaeddine Mihoub, Mohammed Y. Alzahrani, et al.
(2022), pp. 48-53
Closed Access | Times Cited: 74
A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 57
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 57
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 47
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 47
Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 32
A Salem, Safaa M. Azzam, O. E. Emam, et al.
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 32
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 19
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 19
Olive Disease Classification Based on Vision Transformer and CNN Models
Hamoud Alshammari, Karim Gasmi, Ibtihel Ben Ltaifa, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 58
Hamoud Alshammari, Karim Gasmi, Ibtihel Ben Ltaifa, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 58
Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
Moez Krichen, Wilfried Yves Hamilton Adoni, Alaeddine Mihoub, et al.
(2022), pp. 184-189
Closed Access | Times Cited: 57
Moez Krichen, Wilfried Yves Hamilton Adoni, Alaeddine Mihoub, et al.
(2022), pp. 184-189
Closed Access | Times Cited: 57
An Efficient Hybrid Deep Learning Model for Denial of Service Detection in Cyber Physical Systems
Ankita Sharma, Shalli Rani, Syed Bilal Hussain Shah, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 10, Iss. 5, pp. 2419-2428
Closed Access | Times Cited: 38
Ankita Sharma, Shalli Rani, Syed Bilal Hussain Shah, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 10, Iss. 5, pp. 2419-2428
Closed Access | Times Cited: 38
DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions
Amal A. Alahmadi, Malak Aljabri, Fahd Alhaidari, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3103-3103
Open Access | Times Cited: 34
Amal A. Alahmadi, Malak Aljabri, Fahd Alhaidari, et al.
Electronics (2023) Vol. 12, Iss. 14, pp. 3103-3103
Open Access | Times Cited: 34
DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 4, pp. 51-51
Open Access | Times Cited: 32
Kazeem B. Adedeji, Adnan M. Abu‐Mahfouz, Anish Kurien
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 4, pp. 51-51
Open Access | Times Cited: 32
A Novel Multi Algorithm Approach to Identify Network Anomalies in the IoT Using Fog Computing and a Model to Distinguish between IoT and Non-IoT Devices
Rami J. Alzahrani, Ahmed Alzahrani
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 2, pp. 19-19
Open Access | Times Cited: 23
Rami J. Alzahrani, Ahmed Alzahrani
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 2, pp. 19-19
Open Access | Times Cited: 23
Energy Analysis-Based Cyber Attack Detection by IoT with Artificial Intelligence in a Sustainable Smart City
D. Prabakar, M. Sundarrajan, R. Manikandan, et al.
Sustainability (2023) Vol. 15, Iss. 7, pp. 6031-6031
Open Access | Times Cited: 23
D. Prabakar, M. Sundarrajan, R. Manikandan, et al.
Sustainability (2023) Vol. 15, Iss. 7, pp. 6031-6031
Open Access | Times Cited: 23
DDoS attack detection using MLP and Random Forest Algorithms
Ashfaq Ahmad Najar, S. Manohar Naik
International Journal of Information Technology (2022) Vol. 14, Iss. 5, pp. 2317-2327
Closed Access | Times Cited: 33
Ashfaq Ahmad Najar, S. Manohar Naik
International Journal of Information Technology (2022) Vol. 14, Iss. 5, pp. 2317-2327
Closed Access | Times Cited: 33
Traffic Anomaly Detection in Wireless Sensor Networks Based on Principal Component Analysis and Deep Convolution Neural Network
Chengpeng Yao, Yu Yang, Kun Yin, et al.
IEEE Access (2022) Vol. 10, pp. 103136-103149
Open Access | Times Cited: 30
Chengpeng Yao, Yu Yang, Kun Yin, et al.
IEEE Access (2022) Vol. 10, pp. 103136-103149
Open Access | Times Cited: 30
Evaluation and Analysis: Internet of Things using Machine Learning Algorithms for Detection of DDoS Attacks
Anshika Sharma, Himanshi Babbar
(2023)
Closed Access | Times Cited: 21
Anshika Sharma, Himanshi Babbar
(2023)
Closed Access | Times Cited: 21
A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9937-9937
Open Access | Times Cited: 21
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9937-9937
Open Access | Times Cited: 21
DDoS attack detection in smart grid network using reconstructive machine learning models
Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair
PeerJ Computer Science (2024) Vol. 10, pp. e1784-e1784
Open Access | Times Cited: 6
Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair
PeerJ Computer Science (2024) Vol. 10, pp. e1784-e1784
Open Access | Times Cited: 6
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning
Sharjeel Riaz, Shahzad Latif, Syed Muhammad Usman, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 24
Sharjeel Riaz, Shahzad Latif, Syed Muhammad Usman, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9305-9305
Open Access | Times Cited: 24
A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario
Anselme Herman Eyeleko, Tao Feng
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21917-21941
Open Access | Times Cited: 14
Anselme Herman Eyeleko, Tao Feng
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21917-21941
Open Access | Times Cited: 14
Enhancing DDoS Attack Detection Using Snake Optimizer With Ensemble Learning on Internet of Things Environment
Mohammed Aljebreen, Hanan Abdullah Mengash, Munya A. Arasi, et al.
IEEE Access (2023) Vol. 11, pp. 104745-104753
Open Access | Times Cited: 14
Mohammed Aljebreen, Hanan Abdullah Mengash, Munya A. Arasi, et al.
IEEE Access (2023) Vol. 11, pp. 104745-104753
Open Access | Times Cited: 14
Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things
Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103766-103766
Open Access | Times Cited: 13
Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103766-103766
Open Access | Times Cited: 13
Olive Leaf Disease Detection via Wavelet Transform and Feature Fusion of Pre-Trained Deep Learning Models
Mahmood A. Mahmood, Khalaf Alsalem
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3431-3448
Open Access | Times Cited: 5
Mahmood A. Mahmood, Khalaf Alsalem
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3431-3448
Open Access | Times Cited: 5
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12
F. Castaño, Eduardo Fidalgo, Rocío Aláiz-Rodríguez, et al.
IEEE Access (2023) Vol. 11, pp. 40779-40789
Open Access | Times Cited: 12