OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103760-103760
Open Access | Times Cited: 45

Showing 26-50 of 45 citing articles:

A hybrid feature selection and aggregation strategy-based stacking ensemble technique for network intrusion detection
Yongqing Huang, Guoqing Chen, Jin Gou, et al.
Applied Intelligence (2024) Vol. 55, Iss. 1
Closed Access | Times Cited: 1

Deep Learning for Diverse Data Types Steganalysis: A Review
Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 4

Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats
Lu Ju, Arindam Bhar, Arindam Sarkar, et al.
Internet of Things (2024), pp. 101377-101377
Closed Access | Times Cited: 1

Deep learning techniques for hand vein biometrics: A comprehensive review
Mustapha Hemis, Hamza Kheddar, Sami Bourouis, et al.
Information Fusion (2024), pp. 102716-102716
Closed Access | Times Cited: 1

A Novel Long Short-Term Memory Seq2Seq Model with Chaos-Based Optimization and Attention Mechanism for Enhanced Dam Deformation Prediction
Lei Wang, Jiajun Wang, Dawei Tong, et al.
Buildings (2024) Vol. 14, Iss. 11, pp. 3675-3675
Open Access | Times Cited: 1

A comprehensive survey on intrusion detection algorithms
Yang Li, Zhengming Li, Mengyao Li
Computers & Electrical Engineering (2024) Vol. 121, pp. 109863-109863
Closed Access | Times Cited: 1

On and off the manifold: Generation and Detection of adversarial attacks in IIoT networks
Mohammad Al-Fawa’reh, Jumana Abu-Khalaf, Naeem Khalid Janjua, et al.
Journal of Network and Computer Applications (2024), pp. 104102-104102
Closed Access | Times Cited: 1

The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network
Qiang Fu, Jun Wang, Changfu Si, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 329-349
Open Access

Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources
Saloua Hendaoui, Fatma Hendaoui
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 679-684
Closed Access

Process-aware security monitoring in industrial control systems: A systematic review and future directions
Muaan Ur Rehman, Hayretdin Bahşi
International Journal of Critical Infrastructure Protection (2024) Vol. 47, pp. 100719-100719
Closed Access

A Direct Collaborative Network Intrusion Detection System for IoT Networks Integration
Carlos Pedroso, Agnaldo Batista, Samuel Brisio, et al.
(2024), pp. 309-322
Closed Access

Cross-attention mechanism-based spectrum sensing in generalized Gaussian noise
Haolei Xi, Wei Guo, Yanqing Yang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Heuristic machine learning approaches for identifying phishing threats across web and email platforms
Ramprasath Jayaprakash, Krishnaraj Natarajan, Alfred Daniel, et al.
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access

Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey
Richard Holdbrook, Olusola T. Odeyomi, Sun Yi, et al.
Electronics (2024) Vol. 13, Iss. 22, pp. 4440-4440
Open Access

Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection
Seethalakshmi Perumal, P. Sujatha, S. Krishnaa, et al.
Journal of Network and Computer Applications (2024), pp. 104083-104083
Closed Access

Autonomous Cybersecurity: Evolving Challenges, Emerging Opportunities, and Future Research Trajectories
Ali Dehghantanha, Abbas Yazdinejad, Reza M. Parizi
(2023), pp. 1-10
Closed Access | Times Cited: 1

Deep Learning-Enabled Heterogeneous Transfer Learning for Improved Network Attack Detection in Internal Networks
Gang Wang, Dong Liu, Chunrui Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12033-12033
Open Access

On and Off the Manifold: Generation and Detection of Adversarial Attacks in Iiot Networks
Mohammad Al-Fawa’reh, Jumana Abu-Khalaf, Naeem Khalid Janjua, et al.
(2023)
Closed Access

Previous Page - Page 2

Scroll to top