
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
IEEE Access (2021) Vol. 9, pp. 90603-90615
Open Access | Times Cited: 43
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
IEEE Access (2021) Vol. 9, pp. 90603-90615
Open Access | Times Cited: 43
Showing 26-50 of 43 citing articles:
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, et al.
Future Internet (2023) Vol. 15, Iss. 8, pp. 280-280
Open Access | Times Cited: 2
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, et al.
Future Internet (2023) Vol. 15, Iss. 8, pp. 280-280
Open Access | Times Cited: 2
Intrusion Detection System for Internet of Medical Things
Priyesh Kulshrestha, T. V. Vijay Kumar, Manju Khari
Lecture notes in networks and systems (2023), pp. 293-303
Closed Access | Times Cited: 2
Priyesh Kulshrestha, T. V. Vijay Kumar, Manju Khari
Lecture notes in networks and systems (2023), pp. 293-303
Closed Access | Times Cited: 2
Antenna Optimization using Machine Learning Algorithms and their Applications: A Review
Anil Pandey, M. P. Singh
Journal of Engineering Science and Technology Review (2024) Vol. 17, Iss. 2, pp. 128-144
Open Access
Anil Pandey, M. P. Singh
Journal of Engineering Science and Technology Review (2024) Vol. 17, Iss. 2, pp. 128-144
Open Access
Digital Twin-Assisted anomaly detection for industrial scenarios
Cristina Alcaraz, Javier López
International Journal of Critical Infrastructure Protection (2024), pp. 100721-100721
Closed Access
Cristina Alcaraz, Javier López
International Journal of Critical Infrastructure Protection (2024), pp. 100721-100721
Closed Access
A Strategy for Predicting the Performance of Supervised and Unsupervised Tabular Data Classifiers
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
Data Science and Engineering (2024)
Open Access
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
Data Science and Engineering (2024)
Open Access
NIDS-CBAD: detecting adversarial attacks in network intrusion detection systems using domain constraints
Vivek Kumar, Kamal Kumar, Maheep Singh
International Journal of Machine Learning and Cybernetics (2024)
Closed Access
Vivek Kumar, Kamal Kumar, Maheep Singh
International Journal of Machine Learning and Cybernetics (2024)
Closed Access
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture
Chao Zha, Zhiyu Wang, Yifei Fan, et al.
Computers & Security (2024) Vol. 146, pp. 104056-104056
Closed Access
Chao Zha, Zhiyu Wang, Yifei Fan, et al.
Computers & Security (2024) Vol. 146, pp. 104056-104056
Closed Access
Enhancing trustworthiness in ML-based network intrusion detection with uncertainty quantification
Jacopo Talpini, Fábio Sartori, Marco Savi
Journal of Reliable Intelligent Environments (2024)
Open Access
Jacopo Talpini, Fábio Sartori, Marco Savi
Journal of Reliable Intelligent Environments (2024)
Open Access
Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments
Charles F. Gonçalves, Daniel Sadoc Menasché, Alberto Avritzer, et al.
IEEE Access (2023) Vol. 11, pp. 70716-70740
Open Access | Times Cited: 1
Charles F. Gonçalves, Daniel Sadoc Menasché, Alberto Avritzer, et al.
IEEE Access (2023) Vol. 11, pp. 70716-70740
Open Access | Times Cited: 1
Zero-day attacks: review of the methods used based on intrusion detection and prevention systems
Arianna Armijos, Erick Cuenca
(2023), pp. 1-6
Closed Access | Times Cited: 1
Arianna Armijos, Erick Cuenca
(2023), pp. 1-6
Closed Access | Times Cited: 1
Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods
S. Revathy, S. Sathya Priya
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 4s, pp. 156-160
Open Access | Times Cited: 1
S. Revathy, S. Sathya Priya
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 4s, pp. 156-160
Open Access | Times Cited: 1
A Survey of Computational Intelligence Techniques Used for Cyber-Attack Detection
S. Deepa Rajan, R. Karthika
Smart innovation, systems and technologies (2022), pp. 515-527
Closed Access | Times Cited: 2
S. Deepa Rajan, R. Karthika
Smart innovation, systems and technologies (2022), pp. 515-527
Closed Access | Times Cited: 2
Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring
Tommaso Zoppi, Andrea Ceccarelli
IEEE Access (2021) Vol. 9, pp. 150579-150591
Open Access | Times Cited: 1
Tommaso Zoppi, Andrea Ceccarelli
IEEE Access (2021) Vol. 9, pp. 150579-150591
Open Access | Times Cited: 1
Efficient & Sustainable Intrusion Detection System Using Machine Learning & Deep Learning for IoT
Muhammad Sarim Amir, Gufran Bhatti, Misbah Anwer, et al.
(2023), pp. 1-6
Closed Access
Muhammad Sarim Amir, Gufran Bhatti, Misbah Anwer, et al.
(2023), pp. 1-6
Closed Access
Intrusion detection without attack knowledge: generating out-of-distribution tabular data
Andrea Ceccarelli, Tommaso Zoppi
(2023), pp. 125-136
Closed Access
Andrea Ceccarelli, Tommaso Zoppi
(2023), pp. 125-136
Closed Access
CESSO-HCRNN: A Hybrid CRNN With Chaotic Enriched SSO-based Improved Information Gain to Detect Zero-Day Attacks
Dharani Kanta Roy, Ripon Patgiri
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 11
Open Access
Dharani Kanta Roy, Ripon Patgiri
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 11
Open Access
Zero-Day Attack Detection Analysis in Streaming Data Using Supervised Learning Techniques
B. Ida Seraphim, E. Poovammal
Smart innovation, systems and technologies (2022), pp. 517-530
Closed Access
B. Ida Seraphim, E. Poovammal
Smart innovation, systems and technologies (2022), pp. 517-530
Closed Access
Zero-Day Attack Detection using Ensemble Technique
Fawaz Wangde, Shivam Mulay, Rahul Adhao, et al.
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2021)
Open Access
Fawaz Wangde, Shivam Mulay, Rahul Adhao, et al.
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2021)
Open Access