OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intrusion Detection System Using PCA with Random Forest Approach
Subhash Waskle, Lokesh Parashar, Upendra Singh
2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (2020), pp. 803-808
Closed Access | Times Cited: 96

Showing 26-50 of 96 citing articles:

Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles
Wanting Gou, Haodi Zhang, Ronghui Zhang
Sensors (2023) Vol. 23, Iss. 21, pp. 8788-8788
Open Access | Times Cited: 10

Research on Dung Beetle Optimization Based Stacked Sparse Autoencoder for Network Situation Element Extraction
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3

Hybrid Deep Learning Network Intrusion Detection System Based on Convolutional Neural Network and Bidirectional Long Short-Term Memory
Anindra Ageng Jihado, Abba Suganda Girsang
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 2, pp. 219-232
Open Access | Times Cited: 3

A Two-Level Ensemble Learning Framework for Enhancing Network Intrusion Detection Systems
Osvaldo Arreche, Ismail Bibers, Mustafa Abdallah
IEEE Access (2024) Vol. 12, pp. 83830-83857
Closed Access | Times Cited: 3

Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model
M. M. El-Gayar, Faheed A. F. Alrslani, Shaker El–Sappagh
Information (2024) Vol. 15, Iss. 10, pp. 583-583
Open Access | Times Cited: 3

Intrusion Detection System Based on Machine Learning Algorithms: A Review
Sandy Victor Amanoul, Adnan Mohsin Abdulazeez
(2022)
Closed Access | Times Cited: 14

Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML
Shahad Alahmed, Qutaiba Alasad, Maytham M. Hammood, et al.
Computers (2022) Vol. 11, Iss. 7, pp. 115-115
Open Access | Times Cited: 13

IoBT Intrusion Detection System using Machine Learning
Basmh Alkanjr, Thamer Alshammari
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2023), pp. 0886-0892
Closed Access | Times Cited: 7

Hybrid Deep Learning framework-based intrusion detection system for the Internet of Things
G. Kirubavathi, Aparna R Nair
(2024), pp. 1-6
Closed Access | Times Cited: 2

Network Intrusion Detection Based on an Efficient Neural Architecture Search
Renjian Lyu, Mingshu He, Yu Zhang, et al.
Symmetry (2021) Vol. 13, Iss. 8, pp. 1453-1453
Open Access | Times Cited: 17

Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier
Rekha Gangula, Murali Mohan, Ranjeeth Kumar
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 21
Closed Access | Times Cited: 11

Intrusion Detection in IoT-Based Healthcare Using ML and DL Approaches: A Case Study
Priya Das, Sohail Saif
Advanced technologies and societal change (2023), pp. 271-294
Closed Access | Times Cited: 6

Review on intrusion detection system for IoT/IIoT -brief study
Komal Bansal, Anita Singhrova
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 23083-23108
Closed Access | Times Cited: 6

Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection
Charity Yaa Mansa Baidoo, Winfred Yaokumah, Ebenezer Owusu
International Journal of Information Technologies and Systems Approach (2023) Vol. 16, Iss. 1, pp. 1-19
Open Access | Times Cited: 5

A Survey on Intrusion Detection System using Machine Learning Techniques
B H Aishwarya, Bhavana S Akki, H M Harshitha, et al.
International Journal for Research in Applied Science and Engineering Technology (2023) Vol. 11, Iss. 5, pp. 473-477
Open Access | Times Cited: 4

LKD-STNN: A Lightweight Malicious Traffic Detection Method for Internet of Things Based on Knowledge Distillation
Shizhou Zhu, Xiaolong Xu, Juan Zhao, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6438-6453
Closed Access | Times Cited: 4

Secure intrusion detection system for IOT sensor data using LR-ECC and FY-SFL-DLNN algorithm
Majjaru Chandrababu, K Senthilkumar
Journal of Control and Decision (2024), pp. 1-14
Closed Access | Times Cited: 1

Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks
Shahad Alahmed, Qutaiba Alasad, J.S. Yuan, et al.
Algorithms (2024) Vol. 17, Iss. 4, pp. 155-155
Open Access | Times Cited: 1

A federated learning approach to network intrusion detection using residual networks in industrial IoT networks
Nisha Chaurasia, Munna Ram, Priyanka Verma, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 13, pp. 18325-18346
Open Access | Times Cited: 1

Intrusion Detection System Based on an Intelligent Multi-Layer Model Using Machine Learning
Ouafae Elaeraj, Cherkaoui Leghris
Journal of Artificial Intelligence and Technology (2024)
Open Access | Times Cited: 1

Leveraging machine learning for enhanced cybersecurity: an intrusion detection system
Wurood Mahdi sahib, Zainab Ali Abd Alhuseen, Iman Dakhil Idan Saeedi, et al.
Service Oriented Computing and Applications (2024)
Closed Access | Times Cited: 1

A Comparative Study for SDN Security Based on Machine Learning
Khattab M. Ali Alheeti, Abdulkareem Alzahrani, Maha Alamri, et al.
International Journal of Interactive Mobile Technologies (iJIM) (2023) Vol. 17, Iss. 11, pp. 131-140
Open Access | Times Cited: 3

A Review on Cybersecurity based on Machine Learning and Deep Learning Algorithms
Alan Fuad Jahwar, Siddeeq Y. Ameen
Journal of Soft Computing and Data Mining (2021) Vol. 2, Iss. 2
Open Access | Times Cited: 8

FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection
Luming Yang, Shaojing Fu, Xuyun Zhang, et al.
World Wide Web (2022) Vol. 25, Iss. 5, pp. 2139-2161
Closed Access | Times Cited: 5

Field asymmetric ion mobility spectrometry for pre-symptomatic rot detection in stored Ranger Russet and Russet Burbank potatoes
Gajanan S. Kothawade, Abhilash K. Chandel, Lav R. Khot, et al.
Postharvest Biology and Technology (2021) Vol. 181, pp. 111679-111679
Open Access | Times Cited: 6

Scroll to top