
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network
Wei Peng, Yufeng Li, Zhen Zhang, et al.
IEEE Access (2019) Vol. 7, pp. 87593-87605
Open Access | Times Cited: 125
Wei Peng, Yufeng Li, Zhen Zhang, et al.
IEEE Access (2019) Vol. 7, pp. 87593-87605
Open Access | Times Cited: 125
Showing 26-50 of 125 citing articles:
A framework for detection of cyber attacks by the classification of intrusion detection datasets
Durgesh Srivastava, Rajeshwar Singh, Chinmay Chakraborty, et al.
Microprocessors and Microsystems (2023) Vol. 105, pp. 104964-104964
Closed Access | Times Cited: 31
Durgesh Srivastava, Rajeshwar Singh, Chinmay Chakraborty, et al.
Microprocessors and Microsystems (2023) Vol. 105, pp. 104964-104964
Closed Access | Times Cited: 31
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
(2023), pp. 355-367
Closed Access | Times Cited: 28
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
(2023), pp. 355-367
Closed Access | Times Cited: 28
Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Federated learning for network attack detection using attention-based graph neural networks
Jian Wu, Qiu Guangqiu, Chunming Wu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 10
Jian Wu, Qiu Guangqiu, Chunming Wu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 10
A Novel Wireless Network Intrusion Detection Method Based on Adaptive Synthetic Sampling and an Improved Convolutional Neural Network
Zhiquan Hu, Liejun Wang, Qi Lei, et al.
IEEE Access (2020) Vol. 8, pp. 195741-195751
Open Access | Times Cited: 68
Zhiquan Hu, Liejun Wang, Qi Lei, et al.
IEEE Access (2020) Vol. 8, pp. 195741-195751
Open Access | Times Cited: 68
A Survey of Intrusion Detection Using Deep Learning in Internet of Things
Baraa I. Farhan, Ammar D. Jasim
Iraqi Journal for Computer Science and Mathematics (2021), pp. 83-93
Open Access | Times Cited: 53
Baraa I. Farhan, Ammar D. Jasim
Iraqi Journal for Computer Science and Mathematics (2021), pp. 83-93
Open Access | Times Cited: 53
A novel adaptive network intrusion detection system for internet of things
Parthiban Aravamudhan, T. Kanimozhi
PLoS ONE (2023) Vol. 18, Iss. 4, pp. e0283725-e0283725
Open Access | Times Cited: 19
Parthiban Aravamudhan, T. Kanimozhi
PLoS ONE (2023) Vol. 18, Iss. 4, pp. e0283725-e0283725
Open Access | Times Cited: 19
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks
Subhan Ullah, Zahid Hasan Mahmood, Nabeel Ali, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 115-115
Open Access | Times Cited: 18
Subhan Ullah, Zahid Hasan Mahmood, Nabeel Ali, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 115-115
Open Access | Times Cited: 18
Recognition of E-Commerce through Big Data Classification and Data Mining Techniques Involving Artificial Intelligence
Vishwanadham Mandala, R. Rajavarman, C Jamunadevi, et al.
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2023), pp. 720-727
Closed Access | Times Cited: 17
Vishwanadham Mandala, R. Rajavarman, C Jamunadevi, et al.
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2023), pp. 720-727
Closed Access | Times Cited: 17
Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 5
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 5
Hybrid Convolutional Neural Network for Robust Attack Detection in Wireless Sensor Networks
S. Prasad, Rifat Hussain, Adam Amril Jaharadak, et al.
Internet Technology Letters (2025)
Closed Access
S. Prasad, Rifat Hussain, Adam Amril Jaharadak, et al.
Internet Technology Letters (2025)
Closed Access
Developing a multi-level intrusion detection system using hybrid-DBN
Ahmet Ali Süzen
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 2, pp. 1913-1923
Closed Access | Times Cited: 48
Ahmet Ali Süzen
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 2, pp. 1913-1923
Closed Access | Times Cited: 48
Investigating the Efficiency of Deep Learning Models in Bioinspired Object Detection
Sunday Adeola Ajagbe, Olukayode Oki, Matthew Abiola Oladipupo, et al.
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2022), pp. 1-6
Closed Access | Times Cited: 27
Sunday Adeola Ajagbe, Olukayode Oki, Matthew Abiola Oladipupo, et al.
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2022), pp. 1-6
Closed Access | Times Cited: 27
Network traffic analysis over clustering-based collective anomaly detection
Chonghua Wang, Hao Zhou, Zhiqiang Hao, et al.
Computer Networks (2022) Vol. 205, pp. 108760-108760
Closed Access | Times Cited: 26
Chonghua Wang, Hao Zhou, Zhiqiang Hao, et al.
Computer Networks (2022) Vol. 205, pp. 108760-108760
Closed Access | Times Cited: 26
Network intrusion detection system: A survey on artificial intelligence‐based techniques
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
A Comprehensive Review on Cyber-Attack Detection and Control of Microgrid Systems
Hamidreza Shafei, Li Li, Ricardo P. Aguilera
Power systems (2023), pp. 1-45
Closed Access | Times Cited: 11
Hamidreza Shafei, Li Li, Ricardo P. Aguilera
Power systems (2023), pp. 1-45
Closed Access | Times Cited: 11
Enhancing network intrusion detection classifiers using supervised adversarial training
Chuanlong Yin, Yuefei Zhu, Shengli Liu, et al.
The Journal of Supercomputing (2019) Vol. 76, Iss. 9, pp. 6690-6719
Closed Access | Times Cited: 32
Chuanlong Yin, Yuefei Zhu, Shengli Liu, et al.
The Journal of Supercomputing (2019) Vol. 76, Iss. 9, pp. 6690-6719
Closed Access | Times Cited: 32
Intrusion Detection System using MLP and Chaotic Neural Networks
Pooja Shettar, Amit V Kachavimath, Mohammed Moin Mulla, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2021)
Closed Access | Times Cited: 23
Pooja Shettar, Amit V Kachavimath, Mohammed Moin Mulla, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2021)
Closed Access | Times Cited: 23
Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects
Iqbal H. Sarker
(2022)
Open Access | Times Cited: 17
Iqbal H. Sarker
(2022)
Open Access | Times Cited: 17
WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services
C. Edwin Singh, S. Maria Celestin Vigila
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 2, pp. 1737-1751
Open Access | Times Cited: 14
C. Edwin Singh, S. Maria Celestin Vigila
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 2, pp. 1737-1751
Open Access | Times Cited: 14
Fuzzy based intrusion detection system in MANET
C. Edwin Singh, S. Maria Celestin Vigila
Measurement Sensors (2022) Vol. 26, pp. 100578-100578
Open Access | Times Cited: 14
C. Edwin Singh, S. Maria Celestin Vigila
Measurement Sensors (2022) Vol. 26, pp. 100578-100578
Open Access | Times Cited: 14
Belief-DDoS: stepping up DDoS attack detection model using DBN algorithm
Putra Wanda, Marselina Endah Hiswati
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 271-278
Closed Access | Times Cited: 8
Putra Wanda, Marselina Endah Hiswati
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 271-278
Closed Access | Times Cited: 8
A Deep Learning Based Fault Diagnosis Method With Hyperparameter Optimization by Using Parallel Computing
Chaozhong Guo, Lin Li, Yuanyuan Hu, et al.
IEEE Access (2020) Vol. 8, pp. 131248-131256
Open Access | Times Cited: 23
Chaozhong Guo, Lin Li, Yuanyuan Hu, et al.
IEEE Access (2020) Vol. 8, pp. 131248-131256
Open Access | Times Cited: 23
Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud
V. T. Prabhakaran, Ashokkumar Kulandasamy
Computational Intelligence (2020) Vol. 37, Iss. 1, pp. 344-370
Closed Access | Times Cited: 23
V. T. Prabhakaran, Ashokkumar Kulandasamy
Computational Intelligence (2020) Vol. 37, Iss. 1, pp. 344-370
Closed Access | Times Cited: 23