
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Hybrid-DNN for DDoS Detection and Classification in Software-Defined IIoT Networks
Ahmad Zainudin, Love Allen Chijioke Ahakonye, Rubina Akter, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8491-8504
Closed Access | Times Cited: 70
Ahmad Zainudin, Love Allen Chijioke Ahakonye, Rubina Akter, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8491-8504
Closed Access | Times Cited: 70
Showing 1-25 of 70 citing articles:
Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks
Ashfaq Ahmad Najar, S. Manohar Naik
Computers & Security (2024) Vol. 139, pp. 103716-103716
Closed Access | Times Cited: 27
Ashfaq Ahmad Najar, S. Manohar Naik
Computers & Security (2024) Vol. 139, pp. 103716-103716
Closed Access | Times Cited: 27
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access | Times Cited: 2
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access | Times Cited: 2
RBF-SVM kernel-based model for detecting DDoS attacks in SDN integrated vehicular network
Goodness Oluchi Anyanwu, Cosmas Ifeanyi Nwakanma, Jae Min Lee, et al.
Ad Hoc Networks (2022) Vol. 140, pp. 103026-103026
Closed Access | Times Cited: 42
Goodness Oluchi Anyanwu, Cosmas Ifeanyi Nwakanma, Jae Min Lee, et al.
Ad Hoc Networks (2022) Vol. 140, pp. 103026-103026
Closed Access | Times Cited: 42
DDoS attack detection and mitigation using deep neural network in SDN environment
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 35
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 35
Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model
Ahmed Ahmim, Faiz Maazouzi, Marwa Ahmim, et al.
IEEE Access (2023) Vol. 11, pp. 119862-119875
Open Access | Times Cited: 32
Ahmed Ahmim, Faiz Maazouzi, Marwa Ahmim, et al.
IEEE Access (2023) Vol. 11, pp. 119862-119875
Open Access | Times Cited: 32
Federated Learning Inspired Low-Complexity Intrusion Detection and Classification Technique for SDN-Based Industrial CPS
Ahmad Zainudin, Rubina Akter, Dong‐Seong Kim, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 2442-2459
Closed Access | Times Cited: 28
Ahmad Zainudin, Rubina Akter, Dong‐Seong Kim, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 2442-2459
Closed Access | Times Cited: 28
DDoS attacks in Industrial IoT: A survey
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 22
Shubhankar Chaudhary, Pramod Kumar Mishra
Computer Networks (2023) Vol. 236, pp. 110015-110015
Closed Access | Times Cited: 22
Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks
Yawar Abbas Abid, Jinsong Wu, Guangquan Xu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 14, pp. 24715-24725
Closed Access | Times Cited: 9
Yawar Abbas Abid, Jinsong Wu, Guangquan Xu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 14, pp. 24715-24725
Closed Access | Times Cited: 9
Securing Mobile Edge Computing Using Hybrid Deep Learning Method
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, et al.
Computers (2024) Vol. 13, Iss. 1, pp. 25-25
Open Access | Times Cited: 8
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, et al.
Computers (2024) Vol. 13, Iss. 1, pp. 25-25
Open Access | Times Cited: 8
An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN Environments
Lei Chen, Zhihao Wang, Ru Huo, et al.
Algorithms (2023) Vol. 16, Iss. 4, pp. 197-197
Open Access | Times Cited: 20
Lei Chen, Zhihao Wang, Ru Huo, et al.
Algorithms (2023) Vol. 16, Iss. 4, pp. 197-197
Open Access | Times Cited: 20
DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy
Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi
Engineering Reports (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 19
Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi
Engineering Reports (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 19
Blockchain-Inspired Collaborative Cyber-Attacks Detection for Securing Metaverse
Ahmad Zainudin, Made Adi Paramartha Putra, Revin Naufal Alief, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18221-18236
Closed Access | Times Cited: 7
Ahmad Zainudin, Made Adi Paramartha Putra, Revin Naufal Alief, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18221-18236
Closed Access | Times Cited: 7
Drift Adaptive Online DDoS Attack Detection Framework for IoT System
Yonas Kibret Beshah, Surafel Lemma Abebe, Henock Mulugeta Melaku
Electronics (2024) Vol. 13, Iss. 6, pp. 1004-1004
Open Access | Times Cited: 7
Yonas Kibret Beshah, Surafel Lemma Abebe, Henock Mulugeta Melaku
Electronics (2024) Vol. 13, Iss. 6, pp. 1004-1004
Open Access | Times Cited: 7
Flow optimization strategies in data center networks: A survey
Yong Liu, Tianyi Yu, Qian Meng, et al.
Journal of Network and Computer Applications (2024) Vol. 226, pp. 103883-103883
Closed Access | Times Cited: 6
Yong Liu, Tianyi Yu, Qian Meng, et al.
Journal of Network and Computer Applications (2024) Vol. 226, pp. 103883-103883
Closed Access | Times Cited: 6
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 6
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 6
An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 14
Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 9
Closed Access | Times Cited: 14
An explainable nature-inspired cyber attack detection system in Software-Defined IoT applications
Chandan Kumar, Md. Sarfaraj Alam Ansari
Expert Systems with Applications (2024) Vol. 250, pp. 123853-123853
Closed Access | Times Cited: 5
Chandan Kumar, Md. Sarfaraj Alam Ansari
Expert Systems with Applications (2024) Vol. 250, pp. 123853-123853
Closed Access | Times Cited: 5
Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks
Makhduma F. Saiyedand, Irfan Al‐Anbagi
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 596-616
Open Access | Times Cited: 5
Makhduma F. Saiyedand, Irfan Al‐Anbagi
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 596-616
Open Access | Times Cited: 5
Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based On Stochastic Games and Double Deep Q-Networks
Shoujian Yu, X. H. Wang, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29132-29145
Closed Access | Times Cited: 5
Shoujian Yu, X. H. Wang, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29132-29145
Closed Access | Times Cited: 5
HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
D. Adhimuga Sivasakthi, A. Sathiyaraj, Ramkumar Devendiran
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5005-5019
Closed Access | Times Cited: 4
D. Adhimuga Sivasakthi, A. Sathiyaraj, Ramkumar Devendiran
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5005-5019
Closed Access | Times Cited: 4
Software Classification and Detection of Communication Signals Using Artificial Neural Networks
Ali Arkan AL Ezz, Nada Sharis, Firas M Al Salb
Deleted Journal (2025) Vol. 2, Iss. 3, pp. 1-12
Closed Access
Ali Arkan AL Ezz, Nada Sharis, Firas M Al Salb
Deleted Journal (2025) Vol. 2, Iss. 3, pp. 1-12
Closed Access
Intelligent Network Element: A Programmable Switch Based on Machine Learning to Defend Against DDoS Attacks
Jingfu Yan, Huachun Zhou, Weilin Wang
Information Systems Frontiers (2025)
Open Access
Jingfu Yan, Huachun Zhou, Weilin Wang
Information Systems Frontiers (2025)
Open Access
Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access
Optimized DDoS Detection in Software‐Defined IIoT Using a Hybrid Deep Neural Network Model
Enlai Chen, Na Zhang, Xiaomei Tu, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 3
Closed Access
Enlai Chen, Na Zhang, Xiaomei Tu, et al.
Internet Technology Letters (2025) Vol. 8, Iss. 3
Closed Access
A DDoS Attack Detection Method Based on IQR and DFFCNN in SDN
Meng Yue, He Yan, Ruize Han, et al.
Journal of Network and Computer Applications (2025), pp. 104203-104203
Closed Access
Meng Yue, He Yan, Ruize Han, et al.
Journal of Network and Computer Applications (2025), pp. 104203-104203
Closed Access