OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
IEEE Access (2021) Vol. 9, pp. 90603-90615
Open Access | Times Cited: 43

Showing 26-50 of 43 citing articles:

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, et al.
Future Internet (2023) Vol. 15, Iss. 8, pp. 280-280
Open Access | Times Cited: 2

Intrusion Detection System for Internet of Medical Things
Priyesh Kulshrestha, T. V. Vijay Kumar, Manju Khari
Lecture notes in networks and systems (2023), pp. 293-303
Closed Access | Times Cited: 2

Antenna Optimization using Machine Learning Algorithms and their Applications: A Review
Anil Pandey, M. P. Singh
Journal of Engineering Science and Technology Review (2024) Vol. 17, Iss. 2, pp. 128-144
Open Access

Digital Twin-Assisted anomaly detection for industrial scenarios
Cristina Alcaraz, Javier López
International Journal of Critical Infrastructure Protection (2024), pp. 100721-100721
Closed Access

A Strategy for Predicting the Performance of Supervised and Unsupervised Tabular Data Classifiers
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
Data Science and Engineering (2024)
Open Access

NIDS-CBAD: detecting adversarial attacks in network intrusion detection systems using domain constraints
Vivek Kumar, Kamal Kumar, Maheep Singh
International Journal of Machine Learning and Cybernetics (2024)
Closed Access

SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture
Chao Zha, Zhiyu Wang, Yifei Fan, et al.
Computers & Security (2024) Vol. 146, pp. 104056-104056
Closed Access

Enhancing trustworthiness in ML-based network intrusion detection with uncertainty quantification
Jacopo Talpini, Fábio Sartori, Marco Savi
Journal of Reliable Intelligent Environments (2024)
Open Access

Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments
Charles F. Gonçalves, Daniel Sadoc Menasché, Alberto Avritzer, et al.
IEEE Access (2023) Vol. 11, pp. 70716-70740
Open Access | Times Cited: 1

Zero-day attacks: review of the methods used based on intrusion detection and prevention systems
Arianna Armijos, Erick Cuenca
(2023), pp. 1-6
Closed Access | Times Cited: 1

Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods
S. Revathy, S. Sathya Priya
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 4s, pp. 156-160
Open Access | Times Cited: 1

A Survey of Computational Intelligence Techniques Used for Cyber-Attack Detection
S. Deepa Rajan, R. Karthika
Smart innovation, systems and technologies (2022), pp. 515-527
Closed Access | Times Cited: 2

Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring
Tommaso Zoppi, Andrea Ceccarelli
IEEE Access (2021) Vol. 9, pp. 150579-150591
Open Access | Times Cited: 1

Efficient & Sustainable Intrusion Detection System Using Machine Learning & Deep Learning for IoT
Muhammad Sarim Amir, Gufran Bhatti, Misbah Anwer, et al.
(2023), pp. 1-6
Closed Access

Intrusion detection without attack knowledge: generating out-of-distribution tabular data
Andrea Ceccarelli, Tommaso Zoppi
(2023), pp. 125-136
Closed Access

CESSO-HCRNN: A Hybrid CRNN With Chaotic Enriched SSO-based Improved Information Gain to Detect Zero-Day Attacks
Dharani Kanta Roy, Ripon Patgiri
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 11
Open Access

Zero-Day Attack Detection Analysis in Streaming Data Using Supervised Learning Techniques
B. Ida Seraphim, E. Poovammal
Smart innovation, systems and technologies (2022), pp. 517-530
Closed Access

Zero-Day Attack Detection using Ensemble Technique
Fawaz Wangde, Shivam Mulay, Rahul Adhao, et al.
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2021)
Open Access

Previous Page - Page 2

Scroll to top