OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Attack and intrusion detection in cloud computing using an ensemble learning approach
Parul Singh, Virender Ranga
International Journal of Information Technology (2021) Vol. 13, Iss. 2, pp. 565-571
Closed Access | Times Cited: 58

Showing 26-50 of 58 citing articles:

A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Methods
G. Padmavathi, D. Shanmugapriya, S. Asha
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2022), pp. 354-358
Closed Access | Times Cited: 6

DDoS Attack Detection on Cloud Computing Services using Algorithms of Machine Learning: Survey
Chilla Sathvika, Vuyyuru Satwika, Yarrapothu Sruthi, et al.
2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (2023), pp. 1094-1100
Closed Access | Times Cited: 3

Correlation Matrix as a Smart Filter for Malware Classification Using Ensemble of Novel Feature Selection Algorithms
Faruk Cürebal, Ferhat Demirkıran, Aykut Çayır, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 3

Convolutional neural network for intrusion detection using blockchain technology
A.Kh. Al-Jabri, Farah Jemili, Ouajdi Korbaa
International Journal of Computers and Applications (2023) Vol. 46, Iss. 2, pp. 67-77
Closed Access | Times Cited: 3

A SYSTEMATIC LITERATURE REVIEW ON SECURITY ISSUES IN CLOUD COMPUTING USING EDGE COMPUTING AND BLOCKCHAIN: THREAT, MITIGATION, AND FUTURE TRENDS
Muzammil Ahmad Khan, Shariq Mahmood Khan, Siva Kumar Subramaniam
Malaysian Journal of Computer Science (2023) Vol. 36, Iss. 4, pp. 347-367
Open Access | Times Cited: 3

DDoS Attack using SYN Flooding: A Case Study
Sambhavi Kukreti, Sumit Kumar Modgil, Neha Gehlot, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2022), pp. 323-329
Closed Access | Times Cited: 4

Using Ensemble Techniques Based on Machine and Deep Learning for Solving Intrusion Detection Problems: A Survey
Hadeel Qasem Gheni, Wathiq Laftah Al-Yaseen
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 2

Digital Investigation of Network Traffic Using Machine Learning
Saswati Chatterjee, Suneeta Satpathy, Arpita Nibedita
ICST Transactions on Scalable Information Systems (2023)
Open Access | Times Cited: 2

Intrusion detection system in cloud computing by utilizing VTR-HLSTM based on deep learning
Valavan Woothukadu Thirumaran, Nalini Joseph, G. Umarani Srikanth
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1829-1829
Open Access

A Systematic Approach to Detect Insider Attacks and Exploitation in Cyber Physical System
Atul B. Vitekar, Vijaya R. Pawar
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 883-888
Closed Access

An advancement in AdaSyn for imbalanced learning: An application to fraud detection in digital transactions
Chandana Gouri Tekkali, Karthika Natarajan
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 5-6, pp. 11381-11396
Closed Access

OntoIDF: a smart knowledge-based framework for intrusion detection in autonomous cloud computing environment
Banpreet Kaur, Sunil Gupta
International Journal of Information Technology (2024)
Closed Access

Hypervisor Based Intrusion Detection Using Enhanced Radial Basis Neural Network on Cloud Environment
Naga Seshu Kumar Anumukonda, Rajesh Kumar Yadav, N. S. Raghava
(2024), pp. 1-6
Closed Access

Empowering Smart City IoT Network Intrusion Detection with Advanced Ensemble Learning-based Feature Selection
R. Tino Merlin, R. Ravi
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 2, pp. 367-374
Open Access

FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environments
Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, N. S. Raghava
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 20
Closed Access

MEMFO-KELM: A Deep Learning Approach for Real-Time Intrusion Detection in Cloud Environments
M. Ramanan
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7763-7775
Closed Access

An Efficient Intrusion Detection System in Cloud Network Based on Deep Learning and Improved Marine Predators-Particle Swarm Optimization
Badari Narayan, V. Murthy, Siddappa Madappa
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 6, pp. 60-71
Open Access | Times Cited: 1

An Effective Dual Level Flow Optimized AlexNet-BiGRU Model for Intrusion Detection in Cloud Computing
Rajesh Bingu, S. Jothilakshmi
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 7s, pp. 153-165
Open Access | Times Cited: 1

Intrusion Detection System using Ensemble Learning Approaches: A Systematic Literature Review
Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2022) Vol. 18, Iss. 13, pp. 160-175
Open Access | Times Cited: 2

Intrusion Detection System using Long Short Term Memory Classification, Artificial Raindrop Algorithm and Harmony Search Algorithm
Meghana G Raj, Santosh Kumar Pani
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 12
Open Access | Times Cited: 1

A Sorting-AB Approach for an Enhanced IDS in Cloud Environment
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2023), pp. 120-125
Closed Access

A Study on Swarm-Based Approaches for Intrusion Detection System in Cloud Environment
Nishika, Kamna Solanki, Sandeep Dalal
Lecture notes in networks and systems (2023), pp. 603-614
Closed Access

Intrusion Detection based on Concept Drift Detection & Online Incremental Learning
Farah Jemili, Khaled Jouini, Ouajdi Korbaa
Research Square (Research Square) (2023)
Open Access

Scroll to top