
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Dilara Gumusbas, Tulay Yldrm, Angelo Genovese, et al.
IEEE Systems Journal (2020) Vol. 15, Iss. 2, pp. 1717-1731
Open Access | Times Cited: 132
Dilara Gumusbas, Tulay Yldrm, Angelo Genovese, et al.
IEEE Systems Journal (2020) Vol. 15, Iss. 2, pp. 1717-1731
Open Access | Times Cited: 132
Showing 26-50 of 132 citing articles:
Memory-Efficient Deep Learning for Botnet Attack Detection in IoT Networks
Segun I. Popoola, Bamidele Adebisi, Ruth Ande, et al.
Electronics (2021) Vol. 10, Iss. 9, pp. 1104-1104
Open Access | Times Cited: 37
Segun I. Popoola, Bamidele Adebisi, Ruth Ande, et al.
Electronics (2021) Vol. 10, Iss. 9, pp. 1104-1104
Open Access | Times Cited: 37
Intrusion detection in wireless sensor network using enhanced empirical based component analysis
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 27
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 27
Network intrusion detection system: A survey on artificial intelligence‐based techniques
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
A new intrusion detection system based on SVM–GWO algorithms for Internet of Things
Hamed Ghasemi, Shahram Babaie
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2173-2185
Closed Access | Times Cited: 5
Hamed Ghasemi, Shahram Babaie
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2173-2185
Closed Access | Times Cited: 5
Intrusion detection system: a deep neural network-based concatenated approach
Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 13918-13948
Closed Access | Times Cited: 5
Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 13918-13948
Closed Access | Times Cited: 5
A Semi-Supervised Soft Prototype-based Autonomous Fuzzy Ensemble System for Network Intrusion Detection
Xiaowei Gu, Gareth Howells, Haiyue Yuan
Applied Soft Computing (2025), pp. 112719-112719
Open Access
Xiaowei Gu, Gareth Howells, Haiyue Yuan
Applied Soft Computing (2025), pp. 112719-112719
Open Access
Explainable artificial intelligence models in intrusion detection systems
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access
Samed Al, Şeref Sağıroğlu
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110145-110145
Closed Access
A Deep Learning Framework Based on Convolutional Neural Network for Automatic Detection of Cyberattacks in IoT Use Cases
Sivananda Hanumanthu, G. Anil Kumar, Amjan Shaik, et al.
(2025), pp. 379-389
Closed Access
Sivananda Hanumanthu, G. Anil Kumar, Amjan Shaik, et al.
(2025), pp. 379-389
Closed Access
Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Mir Aman Sheheryar, Sparsh Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
A Context Aware Approach for Fake News Detection
Francesco Colace, Sabrina Galano, Brij B. Gupta, et al.
Advances in intelligent systems and computing (2025), pp. 299-309
Closed Access
Francesco Colace, Sabrina Galano, Brij B. Gupta, et al.
Advances in intelligent systems and computing (2025), pp. 299-309
Closed Access
Network security based combined CNN-RNN models for IoT intrusion detection system
Rahma Jablaoui, Noureddine Liouane
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Rahma Jablaoui, Noureddine Liouane
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Computational Intelligence Approach for an Intrusion Detection System
Isha Sood, Varsha Sharma
Communications in computer and information science (2025), pp. 239-253
Closed Access
Isha Sood, Varsha Sharma
Communications in computer and information science (2025), pp. 239-253
Closed Access
Multi-objective evolving long–short term memory networks with attention for network intrusion detection
Wenhong Wei, Yi Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2023) Vol. 139, pp. 110216-110216
Closed Access | Times Cited: 11
Wenhong Wei, Yi Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2023) Vol. 139, pp. 110216-110216
Closed Access | Times Cited: 11
A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers
Khawlah Harahsheh, Chung‐Hao Chen
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 11
Khawlah Harahsheh, Chung‐Hao Chen
Informatica (2023) Vol. 47, Iss. 6
Open Access | Times Cited: 11
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications
KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, et al.
2022 IEEE 6th Conference on Information and Communication Technology (CICT) (2023), pp. 1-6
Open Access | Times Cited: 11
KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, et al.
2022 IEEE 6th Conference on Information and Communication Technology (CICT) (2023), pp. 1-6
Open Access | Times Cited: 11
Deep learning technique for plant disease detection
Temitope Samson Adekunle, Morolake Oladayo Lawrence, Oluwaseyi Omotayo Alabı, et al.
Computer Science and Information Technologies (2024) Vol. 5, Iss. 1, pp. 49-56
Open Access | Times Cited: 4
Temitope Samson Adekunle, Morolake Oladayo Lawrence, Oluwaseyi Omotayo Alabı, et al.
Computer Science and Information Technologies (2024) Vol. 5, Iss. 1, pp. 49-56
Open Access | Times Cited: 4
Robust DDoS attack detection with adaptive transfer learning
Mulualem Bitew Anley, Angelo Genovese, Davide Agostinello, et al.
Computers & Security (2024) Vol. 144, pp. 103962-103962
Open Access | Times Cited: 4
Mulualem Bitew Anley, Angelo Genovese, Davide Agostinello, et al.
Computers & Security (2024) Vol. 144, pp. 103962-103962
Open Access | Times Cited: 4
An Optimized Gradient Boost Decision Tree Using Enhanced African Buffalo Optimization Method for Cyber Security Intrusion Detection
Shailendra Mishra
Applied Sciences (2022) Vol. 12, Iss. 24, pp. 12591-12591
Open Access | Times Cited: 16
Shailendra Mishra
Applied Sciences (2022) Vol. 12, Iss. 24, pp. 12591-12591
Open Access | Times Cited: 16
An Integrated Framework for Enhancing Security and Privacy in IoT-Based Business Intelligence Applications
Randhir Kumar, Prabhat Kumar, Alireza Jolfaei, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2023), pp. 01-06
Closed Access | Times Cited: 9
Randhir Kumar, Prabhat Kumar, Alireza Jolfaei, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2023), pp. 01-06
Closed Access | Times Cited: 9
Leveraging of Gradient Boosting Algorithm in Misuse Intrusion Detection using KDD Cup 99 Dataset
Sulaiman Muhammed Sulaiman, Adnan Mohsin Abdulazeez
Indonesian Journal of Computer Science (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 3
Sulaiman Muhammed Sulaiman, Adnan Mohsin Abdulazeez
Indonesian Journal of Computer Science (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 3
The Use of AI to Analyze Social Media Attacks for Predictive Analytics
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Journal of Computing Theories and Applications (2024) Vol. 1, Iss. 4, pp. 386-395
Open Access | Times Cited: 3
Temitope Samson Adekunle, Oluwaseyi Omotayo Alabı, Morolake Oladayo Lawrence, et al.
Journal of Computing Theories and Applications (2024) Vol. 1, Iss. 4, pp. 386-395
Open Access | Times Cited: 3
Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3
Samar AboulEla, Nourhan M. Ibrahim, Sarama Shehmir, et al.
AI (2024) Vol. 5, Iss. 2, pp. 704-732
Open Access | Times Cited: 3
An Efficient CNN + Sparse Transformer-Based Intrusion Detection Method for IoT
Yiying Zhang, Yifan Fan, Zhenkun Guo, et al.
Lecture notes in computer science (2024), pp. 482-493
Closed Access | Times Cited: 3
Yiying Zhang, Yifan Fan, Zhenkun Guo, et al.
Lecture notes in computer science (2024), pp. 482-493
Closed Access | Times Cited: 3
Current Status and Challenges and Future Trends of Deep Learning-Based Intrusion Detection Models
Yuqiang Wu, Bailin Zou, Yifei Cao
Journal of Imaging (2024) Vol. 10, Iss. 10, pp. 254-254
Open Access | Times Cited: 3
Yuqiang Wu, Bailin Zou, Yifei Cao
Journal of Imaging (2024) Vol. 10, Iss. 10, pp. 254-254
Open Access | Times Cited: 3
A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed) Denial of Service Attacks
S. Malliga, P. S. Nandhini, S. V. Kogilavani
Information Technology And Control (2022) Vol. 51, Iss. 1, pp. 180-215
Open Access | Times Cited: 14
S. Malliga, P. S. Nandhini, S. V. Kogilavani
Information Technology And Control (2022) Vol. 51, Iss. 1, pp. 180-215
Open Access | Times Cited: 14