
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Encrypted Malware Traffic Detection via Graph-based Network Analysis
Zhuoqun Fu, Mingxuan Liu, Yue Qin, et al.
(2022), pp. 495-509
Open Access | Times Cited: 25
Zhuoqun Fu, Mingxuan Liu, Yue Qin, et al.
(2022), pp. 495-509
Open Access | Times Cited: 25
Showing 25 citing articles:
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review
Il Hwan Ji, Ju Hyeon Lee, Min Ji Kang, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 898-898
Open Access | Times Cited: 13
Il Hwan Ji, Ju Hyeon Lee, Min Ji Kang, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 898-898
Open Access | Times Cited: 13
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing, Qilei Yin, Xinhao Deng, et al.
(2024)
Open Access | Times Cited: 7
Yuqi Qing, Qilei Yin, Xinhao Deng, et al.
(2024)
Open Access | Times Cited: 7
ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning
Xueying Han, Susu Cui, Jian Qin, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 1680-1689
Closed Access | Times Cited: 6
Xueying Han, Susu Cui, Jian Qin, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 1680-1689
Closed Access | Times Cited: 6
Frequency Domain Feature Based Robust Malicious Traffic Detection
Chuanpu Fu, Qi Li, Meng Shen, et al.
IEEE/ACM Transactions on Networking (2022) Vol. 31, Iss. 1, pp. 452-467
Closed Access | Times Cited: 23
Chuanpu Fu, Qi Li, Meng Shen, et al.
IEEE/ACM Transactions on Networking (2022) Vol. 31, Iss. 1, pp. 452-467
Closed Access | Times Cited: 23
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 14
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 14
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning
Jianjin Zhao, Qi Li, Yueping Hong, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 2460-2476
Closed Access | Times Cited: 4
Jianjin Zhao, Qi Li, Yueping Hong, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 2460-2476
Closed Access | Times Cited: 4
Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis
Yukai Liu, Jizhe Jia, Jinhe Wu, et al.
Lecture notes in computer science (2025), pp. 98-110
Closed Access
Yukai Liu, Jizhe Jia, Jinhe Wu, et al.
Lecture notes in computer science (2025), pp. 98-110
Closed Access
ECNet: Robust Malicious Network Traffic Detection with Multi-view Feature and Confidence Mechanism
Xueying Han, Song Liu, Junrong Liu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6871-6885
Closed Access | Times Cited: 3
Xueying Han, Song Liu, Junrong Liu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6871-6885
Closed Access | Times Cited: 3
ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic
Yijing Zhang, Hui Xue, Jianjun Lin, et al.
(2023), pp. 1-10
Closed Access | Times Cited: 2
Yijing Zhang, Hui Xue, Jianjun Lin, et al.
(2023), pp. 1-10
Closed Access | Times Cited: 2
K-XMSS and K-SPHINCS+: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms
Minjoo Sim, Siwoo Eum, Gyeongju Song, et al.
Sensors (2023) Vol. 23, Iss. 17, pp. 7558-7558
Open Access | Times Cited: 2
Minjoo Sim, Siwoo Eum, Gyeongju Song, et al.
Sensors (2023) Vol. 23, Iss. 17, pp. 7558-7558
Open Access | Times Cited: 2
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features
Guo Qing, Wenchuan Yang, Baojiang Cui
Lecture notes on data engineering and communications technologies (2024), pp. 75-86
Closed Access
Guo Qing, Wenchuan Yang, Baojiang Cui
Lecture notes on data engineering and communications technologies (2024), pp. 75-86
Closed Access
EM-BERT: A Language Model Based Method to Detect Encrypted Malicious Network Traffic
Yu Wen Liang, Pengchao Li, Qiunan Lai, et al.
Lecture notes in electrical engineering (2024), pp. 580-589
Closed Access
Yu Wen Liang, Pengchao Li, Qiunan Lai, et al.
Lecture notes in electrical engineering (2024), pp. 580-589
Closed Access
Encrypted Malicious Traffic Detection Based on Albert and Deep Learning
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
(2024)
Closed Access
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
(2024)
Closed Access
COMEX: Deeply Observing Application Behavior on Real Android Devices
Zeya Umayya, D. S. Malik, Arpit Nandi, et al.
(2024), pp. 100-109
Closed Access
Zeya Umayya, D. S. Malik, Arpit Nandi, et al.
(2024), pp. 100-109
Closed Access
Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware
Diogo Barradas, Carlos Novo, Bernardo Portela, et al.
(2024), pp. 181-196
Closed Access
Diogo Barradas, Carlos Novo, Bernardo Portela, et al.
(2024), pp. 181-196
Closed Access
Challenges and Advances in Analyzing TLS 1.3-Encrypted Traffic: A Comprehensive Survey
Jiuxing Zhou, Wei Fu, Wei Hu, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4000-4000
Open Access
Jiuxing Zhou, Wei Fu, Wei Hu, et al.
Electronics (2024) Vol. 13, Iss. 20, pp. 4000-4000
Open Access
MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification
Zuwei Fan, Shunliang Zhang
Security and Privacy in Communication Networks (2024), pp. 60-79
Closed Access
Zuwei Fan, Shunliang Zhang
Security and Privacy in Communication Networks (2024), pp. 60-79
Closed Access
TrafCL: Robust Encrypted Malicious Traffic Detection via Contrastive Learning
Xiaodu Yang, Sijie Ruan, Jinyu Li, et al.
(2024), pp. 2910-2919
Closed Access
Xiaodu Yang, Sijie Ruan, Jinyu Li, et al.
(2024), pp. 2910-2919
Closed Access
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
Chuqi Zhang, Jun Zeng, Yiming Zhang, et al.
(2024), pp. 3898-3912
Open Access
Chuqi Zhang, Jun Zeng, Yiming Zhang, et al.
(2024), pp. 3898-3912
Open Access
AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic
Junhao Liu, Guolin Shao, Hong Rao, et al.
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10366-10366
Open Access
Junhao Liu, Guolin Shao, Hong Rao, et al.
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10366-10366
Open Access
Cyber Attack Detection with Encrypted Network Connection Analysis
Serkan Gönen, Gökçe KARACAYILMAZ, Harun Artuner, et al.
Lecture notes in mechanical engineering (2023), pp. 622-629
Closed Access | Times Cited: 1
Serkan Gönen, Gökçe KARACAYILMAZ, Harun Artuner, et al.
Lecture notes in mechanical engineering (2023), pp. 622-629
Closed Access | Times Cited: 1
Ensemble Learning for Encrypted Malware Detection and Classification
Sileshi Nibret Zeleke, Solomon Zemene, Mario A. Bochicchio
(2023), pp. 132-137
Closed Access | Times Cited: 1
Sileshi Nibret Zeleke, Solomon Zemene, Mario A. Bochicchio
(2023), pp. 132-137
Closed Access | Times Cited: 1
MF-Net: Encrypted Malicious Traffic Detection Based on Multi-flow Temporal Features
Guangchun Yue, Yanlong Zhai, Meng Shen, et al.
Communications in computer and information science (2023), pp. 58-71
Closed Access | Times Cited: 1
Guangchun Yue, Yanlong Zhai, Meng Shen, et al.
Communications in computer and information science (2023), pp. 58-71
Closed Access | Times Cited: 1
SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT
Subir Halder, Amrita Ghosal, Thomas Newe, et al.
(2023), pp. 1-9
Closed Access
Subir Halder, Amrita Ghosal, Thomas Newe, et al.
(2023), pp. 1-9
Closed Access
A Machine Learning-Based Framework for Detecting Malicious HTTPS Traffic
Tung Bui, Duc Tran, Nguyễn Linh Giang, et al.
(2023), pp. 769-776
Closed Access
Tung Bui, Duc Tran, Nguyễn Linh Giang, et al.
(2023), pp. 769-776
Closed Access