
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN
Dan Tang, Siyuan Wang, Boru Liu, et al.
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 5, pp. 3373-3384
Closed Access | Times Cited: 28
Dan Tang, Siyuan Wang, Boru Liu, et al.
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 5, pp. 3373-3384
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN
Boru Liu, Dan Tang, Jingwen Chen, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124356-124356
Closed Access | Times Cited: 6
Boru Liu, Dan Tang, Jingwen Chen, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124356-124356
Closed Access | Times Cited: 6
A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection
Xiaochun Yin, Fang Wei, Zengguang Liu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
Xiaochun Yin, Fang Wei, Zengguang Liu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
FastTSS: Accelerating tuple space search for fast packet classification in virtual SDN switches
Bing Xiong, Jing Wu, Guanglong Hu, et al.
Journal of Network and Computer Applications (2025), pp. 104112-104112
Closed Access
Bing Xiong, Jing Wu, Guanglong Hu, et al.
Journal of Network and Computer Applications (2025), pp. 104112-104112
Closed Access
Exploring LDoS Attack Detection in SDNs using Machine Learning Techniques
Ali Mohammed Salih
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19568-19574
Open Access
Ali Mohammed Salih
Engineering Technology & Applied Science Research (2025) Vol. 15, Iss. 1, pp. 19568-19574
Open Access
LR-STGCN: Detecting and mitigating low-rate DDoS attacks in SDN based on spatial–temporal graph neural network
Jin Wang, Liping Wang
Computers & Security (2025), pp. 104460-104460
Closed Access
Jin Wang, Liping Wang
Computers & Security (2025), pp. 104460-104460
Closed Access
FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN
Dan Tang, Zhiqing Zheng, Keqin Li, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 3, pp. 2524-2536
Closed Access | Times Cited: 9
Dan Tang, Zhiqing Zheng, Keqin Li, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 3, pp. 2524-2536
Closed Access | Times Cited: 9
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN
Dan Tang, Chenjun Gao, Wei Liang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 4, pp. 5073-5084
Closed Access | Times Cited: 8
Dan Tang, Chenjun Gao, Wei Liang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 4, pp. 5073-5084
Closed Access | Times Cited: 8
A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities
Suruchi Karnani, Neha Agrawal, Rohit Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 35253-35306
Closed Access | Times Cited: 7
Suruchi Karnani, Neha Agrawal, Rohit Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 35253-35306
Closed Access | Times Cited: 7
FTODefender: An efficient flow table overflow attacks defending system in SDN
Dan Tang, Zhiqing Zheng, Chao Yin, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121460-121460
Closed Access | Times Cited: 5
Dan Tang, Zhiqing Zheng, Chao Yin, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121460-121460
Closed Access | Times Cited: 5
A Method for Detecting LDoS Attacks in SDWSN Based on Compressed Hilbert–Huang Transform and Convolutional Neural Networks
Yazhi Liu, Ding Sun, Rundong Zhang, et al.
Sensors (2023) Vol. 23, Iss. 10, pp. 4745-4745
Open Access | Times Cited: 4
Yazhi Liu, Ding Sun, Rundong Zhang, et al.
Sensors (2023) Vol. 23, Iss. 10, pp. 4745-4745
Open Access | Times Cited: 4
Cross-layer detection and defence mechanism against DDoS and DRDoS attacks in software-defined networks using P4 switches
David Chunhu Li, Hsuan-Hao Tu, Li‐Der Chou
Computers & Electrical Engineering (2024) Vol. 118, pp. 109307-109307
Closed Access | Times Cited: 1
David Chunhu Li, Hsuan-Hao Tu, Li‐Der Chou
Computers & Electrical Engineering (2024) Vol. 118, pp. 109307-109307
Closed Access | Times Cited: 1
SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks
Yan Feng, Zhihai Yang, Qindong Sun, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 2953-2953
Open Access | Times Cited: 1
Yan Feng, Zhihai Yang, Qindong Sun, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 2953-2953
Open Access | Times Cited: 1
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions
Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
Computer Science Review (2024) Vol. 55, pp. 100692-100692
Closed Access | Times Cited: 1
Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
Computer Science Review (2024) Vol. 55, pp. 100692-100692
Closed Access | Times Cited: 1
HawkEye: An end-host method to detect the low-rate denial-of-service attack of cross-traffic over bottleneck links
Fei Lei, Xianliang Jiang, Guang Jin, et al.
Computer Networks (2024), pp. 110951-110951
Closed Access | Times Cited: 1
Fei Lei, Xianliang Jiang, Guang Jin, et al.
Computer Networks (2024), pp. 110951-110951
Closed Access | Times Cited: 1
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics
Dan Tang, Siyuan Wang, Siqi Zhang, et al.
IEEE Transactions on Cognitive Communications and Networking (2023) Vol. 9, Iss. 6, pp. 1721-1733
Closed Access | Times Cited: 2
Dan Tang, Siyuan Wang, Siqi Zhang, et al.
IEEE Transactions on Cognitive Communications and Networking (2023) Vol. 9, Iss. 6, pp. 1721-1733
Closed Access | Times Cited: 2
Security Investigation for Software Defined Network Controller
Hamza Mutaher
Lecture notes in networks and systems (2024), pp. 647-662
Closed Access
Hamza Mutaher
Lecture notes in networks and systems (2024), pp. 647-662
Closed Access
Parallel path selection mechanism for DDoS attack detection
Man Li, Huachun Zhou, Shuangxing Deng
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103938-103938
Closed Access
Man Li, Huachun Zhou, Shuangxing Deng
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103938-103938
Closed Access
IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
Yanhua Liu, Yuting Han, Hui Chen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 1851-1866
Open Access
Yanhua Liu, Yuting Han, Hui Chen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 1851-1866
Open Access
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane
Dan Tang, Hongbo Cao, Jiliang Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110666-110666
Closed Access
Dan Tang, Hongbo Cao, Jiliang Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110666-110666
Closed Access
Image Transformation for IoT-based Anomaly Detection
Imran Bamus, Feyza Yıldırım Okay
(2024), pp. 1-4
Closed Access
Imran Bamus, Feyza Yıldırım Okay
(2024), pp. 1-4
Closed Access
An LDoS attack detection method based on FSWT time–frequency distribution
Xiaocai Wang, Dan Tang, Feng Ye, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 125006-125006
Closed Access
Xiaocai Wang, Dan Tang, Feng Ye, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 125006-125006
Closed Access
FAPM: A Fake Amplification Phenomenon Monitor to Filter DRDoS Attacks With P4 Data Plane
Dan Tang, Xiaocai Wang, Keqin Li, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 6, pp. 6703-6715
Closed Access
Dan Tang, Xiaocai Wang, Keqin Li, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 6, pp. 6703-6715
Closed Access
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models
Nguyen Tan Cam, Tran Duc Viet
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
Nguyen Tan Cam, Tran Duc Viet
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks
Dan Tang, Rui Dai, Yudong Yan, et al.
ACM Computing Surveys (2024)
Open Access
Dan Tang, Rui Dai, Yudong Yan, et al.
ACM Computing Surveys (2024)
Open Access
Elastically accelerating lookup on virtual SDN flow tables for software-defined cloud gateways
Bing Xiong, Jing Wu, Qiaorong Huang, et al.
Computer Networks (2023) Vol. 238, pp. 110092-110092
Closed Access
Bing Xiong, Jing Wu, Qiaorong Huang, et al.
Computer Networks (2023) Vol. 238, pp. 110092-110092
Closed Access