OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis
Shengwei Lei, Chunhe Xia, Zhong Li, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 4, pp. 3257-3274
Closed Access | Times Cited: 33

Showing 26-50 of 33 citing articles:

Deep Learning-Based Intrusion Detection Model for Network Security
Sagar Dhanraj Pande, Govinda Rajulu Lanke, Mukesh Soni, et al.
Lecture notes in networks and systems (2023), pp. 377-386
Closed Access | Times Cited: 1

Generating Network Intrusion Image through IGTD Algorithm for CNN Classification
Muhammad Nur Aman Ahmad Nazarri, Mohammad Hafiz Mohd Yusof, Akram A. Almohammedi
(2023) Vol. 9, pp. 172-177
Closed Access | Times Cited: 1

Dynamic deep stateful firewall packet analysis model
Eunice Kailanya, Mary Mwadulo, Amos Omamo
African Journal of Science Technology and Social Sciences (2022) Vol. 1, Iss. 2, pp. 116-123
Open Access | Times Cited: 1

Intrusion Detection for Marine Meteorological Sensor Network
Xin Su, Guifu Zhang, Minxue Zhang, et al.
(2022), pp. 190-196
Closed Access | Times Cited: 1

LCHI: Low-Order Correlation and High-Order Interaction Integrated Model Oriented to Network Intrusion Detection
Shengwei Lei, Chunhe Xia, Tianbo Wang
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 1

Detection of Attacks on Industrial Internet of Things Using Fewer Features
Hong-Yu Chuang, Ruey‐Maw Chen
(2023), pp. 1-4
Closed Access

STAD: A Traffic Anomaly Detection Technology Based on Siamese Neural Network
Zinuo Yin, Hailong Ma, Tao Hu
(2023), pp. 18-23
Closed Access

Previous Page - Page 2

Scroll to top