
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
Computers & Security (2022) Vol. 124, pp. 102997-102997
Closed Access | Times Cited: 8
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
Computers & Security (2022) Vol. 124, pp. 102997-102997
Closed Access | Times Cited: 8
Showing 8 citing articles:
Design of Realtime Web Application Firewall on Deep Learning-Based to Improve Web Application Security
Raharjo Muttaqin, Dodi Sudiana
Jurnal Penelitian Pendidikan IPA (2025) Vol. 10, Iss. 12, pp. 11121-11129
Open Access
Raharjo Muttaqin, Dodi Sudiana
Jurnal Penelitian Pendidikan IPA (2025) Vol. 10, Iss. 12, pp. 11121-11129
Open Access
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
(2024), pp. 82-89
Closed Access | Times Cited: 1
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
(2024), pp. 82-89
Closed Access | Times Cited: 1
Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation
Pilar Schummer, Alberto del Río, Javier Serrano, et al.
AI (2024) Vol. 5, Iss. 4, pp. 2967-2983
Open Access | Times Cited: 1
Pilar Schummer, Alberto del Río, Javier Serrano, et al.
AI (2024) Vol. 5, Iss. 4, pp. 2967-2983
Open Access | Times Cited: 1
Time-Specific Integrity Service in MQTT Protocol
Haotian Yan, Haibo Hu, Qingqing Ye
(2024), pp. 113-125
Closed Access
Haotian Yan, Haibo Hu, Qingqing Ye
(2024), pp. 113-125
Closed Access
A novel hybrid neural network approach incorporating convolution and LSTM with a self-attention mechanism for web attack detection
Kaiyu Luo, Yindong Chen
Applied Intelligence (2024) Vol. 55, Iss. 2
Closed Access
Kaiyu Luo, Yindong Chen
Applied Intelligence (2024) Vol. 55, Iss. 2
Closed Access
Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
(2024), pp. 217-218
Closed Access
Jesús E. Dı́az-Verdejo, Rafael Estepa, Antonio Estepa, et al.
(2024), pp. 217-218
Closed Access
Enhancing cybersecurity threat detection and mitigation through IP applied in linux
Ghossoon Alsadoon
AIP conference proceedings (2024) Vol. 3207, pp. 060001-060001
Closed Access
Ghossoon Alsadoon
AIP conference proceedings (2024) Vol. 3207, pp. 060001-060001
Closed Access
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments
Agustín Lara, Juan Antonio Ternero Muñiz, Rafael Estepa, et al.
(2023) Vol. 3, pp. 65-70
Closed Access
Agustín Lara, Juan Antonio Ternero Muñiz, Rafael Estepa, et al.
(2023) Vol. 3, pp. 65-70
Closed Access