OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework
Mohammad Al Razib, Danish Javeed, Muhammad Taimoor Khan, et al.
IEEE Access (2022) Vol. 10, pp. 53015-53026
Open Access | Times Cited: 83

Showing 1-25 of 83 citing articles:

Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models
Umar Islam, Ali Muhammad, Rafiq Mansoor, et al.
Sustainability (2022) Vol. 14, Iss. 14, pp. 8374-8374
Open Access | Times Cited: 95

FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
IEEE Access (2023) Vol. 11, pp. 28934-28954
Open Access | Times Cited: 50

XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Maiada M. Mahmoud, Yasser Omar, Ayman Abdel-Hamid
Future Internet (2025) Vol. 17, Iss. 1, pp. 25-25
Open Access | Times Cited: 2

Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm
Bambang Susilo, Abdul Muis, Riri Fitri Sari
Sensors (2025) Vol. 25, Iss. 2, pp. 580-580
Open Access | Times Cited: 2

A Novel Decentralized Blockchain Architecture for the Preservation of Privacy and Data Security against Cyberattacks in Healthcare
Ajitesh Kumar, Akhilesh Kumar Singh, Ijaz Ahmad, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5921-5921
Open Access | Times Cited: 54

An Intelligent Intrusion Detection System for Smart Consumer Electronics Network
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 69, Iss. 4, pp. 906-913
Open Access | Times Cited: 38

A Deep-Ensemble-Learning-Based Approach for Skin Cancer Diagnosis
Khurram Shehzad, Zhenhua Tan, Shifa Shoukat, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1342-1342
Open Access | Times Cited: 32

A new DDoS attack detection model based on improved stacked autoencoder and gated recurrent unit for software defined network
Haizhen Wang, Jia Na, Yang He, et al.
The Computer Journal (2025)
Closed Access | Times Cited: 1

Smart Android Based Home Automation System Using Internet of Things (IoT)
Muhammad Abbas Khan, Ijaz Ahmad, Anis Nurashikin Nordin, et al.
Sustainability (2022) Vol. 14, Iss. 17, pp. 10717-10717
Open Access | Times Cited: 36

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art
Fatimah Aldauiji, Omar Batarfi, Manal Bayousef
IEEE Access (2022) Vol. 10, pp. 61695-61706
Open Access | Times Cited: 32

An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN Environments
Lei Chen, Zhihao Wang, Ru Huo, et al.
Algorithms (2023) Vol. 16, Iss. 4, pp. 197-197
Open Access | Times Cited: 20

Multi-class intrusion detection system in SDN based on hybrid BiLSTM model
Meng Cui, Jue Chen, Xihe Qiu, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9937-9956
Closed Access | Times Cited: 6

An AI-Driven Hybrid Framework for Intrusion Detection in IoT-Enabled E-Health
Fazal Wahab, Yuhai Zhao, Danish Javeed, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 25

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 9986-10043
Closed Access | Times Cited: 15

Physical Assessment of an SDN-Based Security Framework for DDoS Attack Mitigation: Introducing the SDN-SlowRate-DDoS Dataset
Noe M. Yungaicela-Naula, Cesar Vargas‐Rosales, Jesús Arturo Pérez-Díaz, et al.
IEEE Access (2023) Vol. 11, pp. 46820-46831
Open Access | Times Cited: 13

An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment
P. Malini, K R Kavitha
Computers & Security (2024) Vol. 141, pp. 103818-103818
Closed Access | Times Cited: 5

Hybrid Chaotic Zebra Optimization Algorithm and Long Short-Term Memory for Cyber Threats Detection
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
IEEE Access (2024) Vol. 12, pp. 93235-93260
Open Access | Times Cited: 5

Novel Hybrid Deep Learning based Cyber Security Threat Detection Model with Optimization Algorithm
S. Markkandeyan, A. Dennis Ananth, M. Rajakumaran, et al.
Cyber Security and Applications (2024), pp. 100075-100075
Open Access | Times Cited: 5

Network intrusion detection and mitigation in SDN using deep learning models
Mamatha Maddu, Yamarthi Narasimha Rao
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 849-862
Closed Access | Times Cited: 12

MBL-DSDN: a novel load balancing algorithm in distributed software-defined networks based on micro-clustering and B-LSTM methods
Marjan Mahmoudi, Behrang Barekatain, Zahra Beheshti, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20421-20487
Closed Access | Times Cited: 4

One-Class Classification-Based Position Falsification Detection System in C-ITS Communication Network
Ilhwan Ji, Chintae Choi, Cheolho Lee, et al.
Lecture notes in computer science (2025), pp. 203-216
Closed Access

A New Secure Model for Cloud Environments Using RBFNN and AdaBoost
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access

Med-DDoS-SDN: A Kafka Streams-Based Distributed Approach for Protecting Healthcare SDN Environments Against DDoS Attacks
Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
Smart innovation, systems and technologies (2025), pp. 49-60
Closed Access

Generalizability Assessment of Learning‐Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity
Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access

Page 1 - Next Page

Scroll to top