
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87
Showing 26-50 of 87 citing articles:
Hybrid Deep Learning Network Intrusion Detection System Based on Convolutional Neural Network and Bidirectional Long Short-Term Memory
Anindra Ageng Jihado, Abba Suganda Girsang
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 2, pp. 219-232
Open Access | Times Cited: 3
Anindra Ageng Jihado, Abba Suganda Girsang
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 2, pp. 219-232
Open Access | Times Cited: 3
Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 3
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 3
A TabPFN-based intrusion detection system for the industrial internet of things
Sergio Ruiz-Villafranca, José Roldán-Gómez, Juan Manuel Castelo Gómez, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20080-20117
Open Access | Times Cited: 3
Sergio Ruiz-Villafranca, José Roldán-Gómez, Juan Manuel Castelo Gómez, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20080-20117
Open Access | Times Cited: 3
Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection
Salma Abdelhamid, Islam Hegazy, Mostafa Aref, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 116-116
Open Access | Times Cited: 3
Salma Abdelhamid, Islam Hegazy, Mostafa Aref, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 116-116
Open Access | Times Cited: 3
Hybrid Quantum Computing and Decision Tree-Based Data Mining for Improved Data Security
K. Sudharson, N.S. Usha, G. Babu, et al.
2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA (2023), pp. 1-6
Closed Access | Times Cited: 9
K. Sudharson, N.S. Usha, G. Babu, et al.
2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA (2023), pp. 1-6
Closed Access | Times Cited: 9
Network Intrusion Detection using Deep Convolution Neural Network
Vanlalruata Hnamte, Jamal Hussain
(2023)
Closed Access | Times Cited: 8
Vanlalruata Hnamte, Jamal Hussain
(2023)
Closed Access | Times Cited: 8
Network Intrusion Detection CNN Model for Realistic Network Attacks Based on Network Traffic Classification
Alla Abd El-Rady, Heba Osama, Rowayda Sadik, et al.
(2023), pp. 167-178
Closed Access | Times Cited: 7
Alla Abd El-Rady, Heba Osama, Rowayda Sadik, et al.
(2023), pp. 167-178
Closed Access | Times Cited: 7
GDLC: A new Graph Deep Learning framework based on centrality measures for intrusion detection in IoT networks
Mortada Termos, Zakariya Ghalmane, Mohamed-El-Amine Brahmia, et al.
Internet of Things (2024) Vol. 26, pp. 101214-101214
Closed Access | Times Cited: 2
Mortada Termos, Zakariya Ghalmane, Mohamed-El-Amine Brahmia, et al.
Internet of Things (2024) Vol. 26, pp. 101214-101214
Closed Access | Times Cited: 2
SwinSight: a hierarchical vision transformer using shifted windows to leverage aerial image classification
Praveen Kumar Pradhan, Alloy Das, Amish Kumar, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
Praveen Kumar Pradhan, Alloy Das, Amish Kumar, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
Hand Symbol Recognition Using Canny Edge Algorithm And Convolutional Neural Network
Harshit Mittal, Neeraj Garg
(2024), pp. 1-5
Closed Access | Times Cited: 1
Harshit Mittal, Neeraj Garg
(2024), pp. 1-5
Closed Access | Times Cited: 1
Fire Incendie Detection A compartive study of Convolutional Neural Networks (CNN) and Support Vector Machines (SVM).
Yasmine Guerbai, Asma Saibi
(2024), pp. 1-6
Closed Access | Times Cited: 1
Yasmine Guerbai, Asma Saibi
(2024), pp. 1-6
Closed Access | Times Cited: 1
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning
Mohammed Salah Abood, Hua Wang, Bal S. Virdee, et al.
IET Communications (2024) Vol. 18, Iss. 13, pp. 759-777
Open Access | Times Cited: 1
Mohammed Salah Abood, Hua Wang, Bal S. Virdee, et al.
IET Communications (2024) Vol. 18, Iss. 13, pp. 759-777
Open Access | Times Cited: 1
SeNet-I: An Approach for Detecting Network Intrusions Through Serialized Network Traffic Images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
(2023)
Closed Access | Times Cited: 4
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
(2023)
Closed Access | Times Cited: 4
Intrusion Detection in IoT Network Using Few-Shot Class Incremental Learning
Mostafa Hosseini, Wei Shi
Lecture notes in networks and systems (2024), pp. 617-636
Closed Access | Times Cited: 1
Mostafa Hosseini, Wei Shi
Lecture notes in networks and systems (2024), pp. 617-636
Closed Access | Times Cited: 1
Securing IoT networks in cloud computing environments: a real-time IDS
Soham Biswas, Md. Sarfaraj Alam Ansari
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 14489-14519
Closed Access | Times Cited: 1
Soham Biswas, Md. Sarfaraj Alam Ansari
The Journal of Supercomputing (2024) Vol. 80, Iss. 10, pp. 14489-14519
Closed Access | Times Cited: 1
An AI-Driven Based Cybersecurity System for Network Intrusion Detection System in Hybrid with EPO and CNNet-LAM
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1
Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury, et al.
MethodsX (2024) Vol. 12, pp. 102747-102747
Open Access | Times Cited: 1
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury, et al.
MethodsX (2024) Vol. 12, pp. 102747-102747
Open Access | Times Cited: 1
Intrusion Detection System to Secure a Network using ACNN Model and Machine Learning
Ruchika Dungarani, Satish Narayan Gujjar
International Journal of Innovative Science and Modern Engineering (2024) Vol. 12, Iss. 6, pp. 1-5
Closed Access | Times Cited: 1
Ruchika Dungarani, Satish Narayan Gujjar
International Journal of Innovative Science and Modern Engineering (2024) Vol. 12, Iss. 6, pp. 1-5
Closed Access | Times Cited: 1
A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network
Khoa Dinh Nguyen Dang, Peppino Fazio, Miroslav Vozňák
Future Internet (2024) Vol. 16, Iss. 8, pp. 264-264
Open Access | Times Cited: 1
Khoa Dinh Nguyen Dang, Peppino Fazio, Miroslav Vozňák
Future Internet (2024) Vol. 16, Iss. 8, pp. 264-264
Open Access | Times Cited: 1
A study on characterizing energy, latency and security for Intrusion Detection Systems on heterogeneous embedded platforms
Camélia Slimani, Louis Morge-Rollet, Laurent Lemarchand, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107473-107473
Closed Access | Times Cited: 1
Camélia Slimani, Louis Morge-Rollet, Laurent Lemarchand, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107473-107473
Closed Access | Times Cited: 1
Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism
Dinh‐Minh Vu, Thi Ha La, Gia Bach Nguyen, et al.
IET Communications (2024) Vol. 18, Iss. 17, pp. 1107-1125
Open Access | Times Cited: 1
Dinh‐Minh Vu, Thi Ha La, Gia Bach Nguyen, et al.
IET Communications (2024) Vol. 18, Iss. 17, pp. 1107-1125
Open Access | Times Cited: 1
Optimization of Intrusion Detection with Deep Learning: A Study Based on the KDD Cup 99 Database
Agalit Mohamed Amine, Youness Idrissi Khamlichi
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1029-1038
Open Access | Times Cited: 1
Agalit Mohamed Amine, Youness Idrissi Khamlichi
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1029-1038
Open Access | Times Cited: 1
Spatio-Temporal Advanced Persistent Threat Detection and Correlation for Cyber-Physical Power Systems using Enhanced GC-LSTM
Alfan Presekal, Alexandru Ştefanov, Ioannis Semertzis, et al.
IEEE Transactions on Smart Grid (2024) Vol. 16, Iss. 2, pp. 1654-1666
Closed Access | Times Cited: 1
Alfan Presekal, Alexandru Ştefanov, Ioannis Semertzis, et al.
IEEE Transactions on Smart Grid (2024) Vol. 16, Iss. 2, pp. 1654-1666
Closed Access | Times Cited: 1
Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction
Lizzy Oluwatoyin Ofusori, Tebogo Bokaba, Siyabonga Mhlongo
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1
Lizzy Oluwatoyin Ofusori, Tebogo Bokaba, Siyabonga Mhlongo
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1