OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine Learning Algorithms for Network Intrusion Detection
Jie Li, Yanpeng Qu, Fei Chao, et al.
Intelligent systems reference library (2018), pp. 151-179
Closed Access | Times Cited: 49

Showing 26-50 of 49 citing articles:

Intrusion Detection System(IDS) Analysis Using ML
Rupak Dutta, B.K Nirupama, Niranjanamurthy
2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (2022), pp. 1-4
Closed Access | Times Cited: 4

Hyper Parameter Optimized NIDS via Machine Learning in IoT Ecosystem
Paritosh Kumar Yadav, Sudhakar Pandey, Deepika Agrawal, et al.
(2023), pp. 499-504
Closed Access | Times Cited: 2

A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection
Ola Surakhi, Antonio M. Mora, Mohammed Jamoos, et al.
2021 22nd International Arab Conference on Information Technology (ACIT) (2021), pp. 1-13
Closed Access | Times Cited: 5

Impact of Hybrid Sampling on ML-based Network Intrusion Detection Systems
Atmaja Mali, Ayush Gala, Kalyani Waghmare
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access

Machine Learning-Based Network Intrusion Detection System for IoT Environment
Paritosh Kumar Yadav, Sudhakar Pandey, Deepika Agrawal, et al.
Lecture notes in networks and systems (2024), pp. 101-120
Closed Access

Fuzzy Rule Interpolation with A General Representation of Fuzzy Sets
Yanpeng Qu, Jiaxin Wu, Zhanwen Wu, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2024), pp. 1-8
Closed Access

Detection of DoS Attacks in Cloud Computing: A Machine Learning Approach
Gabriele Capasso, Antonio Esposito
Lecture notes on data engineering and communications technologies (2024), pp. 275-284
Closed Access

Anomaly Detection Method for Smart Distribution Grids Using Autoencoders
Jing Zhang, Xueqi Jin, Ye Liang, et al.
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 398-402
Closed Access

EARLY: A Tool for Real-Time Security Attack Detection
Tanwir Ahmad, Dragoş Truşcan, Jüri Vain
(2023), pp. 225-251
Closed Access | Times Cited: 1

Classification of Adversarial Attacks Using Ensemble Clustering Approach
Pongsakorn Tatongjai, Tossapon Boongoen, Natthakan Iam-On, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2479-2498
Open Access | Times Cited: 2

An Ensemble Classification Approach with Selective Under and Over Sampling of Imbalance Intrusion Detection Dataset
Priyanka Tripathi, Rajni Ranjan Singh Makwana
International Journal of Security and Its Applications (2019) Vol. 13, Iss. 4, pp. 41-50
Open Access | Times Cited: 1

A Novel Feature Reduction Methodology Using Siamese and Deep Forest Classification for Intrusion Detection
V. Gokula Krishnan, K. Sreerama Murthy, Viswanathasarma Ch, et al.
Lecture notes in networks and systems (2022), pp. 327-341
Closed Access | Times Cited: 1

Zum Stand der Dinge
Armin Lunkeit, Wolf Zimmer
Springer eBooks (2021), pp. 15-77
Closed Access | Times Cited: 1

Performance analysis and feature selection for network-based intrusion detection with deep learning

TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES (2021)
Open Access | Times Cited: 1

Cyber Attack Detection Using Bellman Optimality Equation in Reinforcement Learning
Monali Shetty, Sharvari Tamane
Advances in computer science research (2023), pp. 188-200
Open Access

How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Lecture notes in computer science (2023), pp. 283-297
Closed Access

Deep Learning-Enabled Heterogeneous Transfer Learning for Improved Network Attack Detection in Internal Networks
Gang Wang, Dong Liu, Chunrui Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12033-12033
Open Access

Presentation of a New Method for Intrusion Detection by using Deep Learning in Network
Hui Ma
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access

Network Intrusion Classification on the UNSW-NB15 Dataset Using XGBoost Feature Selection Technique
Uday Chandra Akuthota, Lava Bhargava
2021 IEEE International Symposium on Smart Electronic Systems (iSES) (2023), pp. 169-174
Closed Access

Design of Network Intrusion Detection Systems with under-sampled datasets
Bruno Riccelli dos Santos Silva, Manuel Silva Neto, Paulo César Cortez, et al.
2021 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON) (2019), pp. 1-6
Closed Access

Performance analysis and feature selection for network-based intrusion detectionwith deep learning
SERHAT CANER, NESLİ ERDOĞMUŞ, YUSUF MURAT ERTEN
TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES (2022) Vol. 30, Iss. 3, pp. 629-643
Open Access

Curvature-based Feature Selection with Application in Classifying Electronic Health Records
Zheming Zuo, Jie Li, Han Xu, et al.
arXiv (Cornell University) (2021)
Closed Access

Previous Page - Page 2

Scroll to top