
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An intrusion detection system using optimized deep neural network architecture
Mangayarkarasi Ramaiah, Vanmathi Chandrasekaran, Vinayakumar Ravi, et al.
Transactions on Emerging Telecommunications Technologies (2021) Vol. 32, Iss. 4
Closed Access | Times Cited: 55
Mangayarkarasi Ramaiah, Vanmathi Chandrasekaran, Vinayakumar Ravi, et al.
Transactions on Emerging Telecommunications Technologies (2021) Vol. 32, Iss. 4
Closed Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities
Adla Padma, Mangayarkarasi Ramaiah
IEEE Access (2024) Vol. 12, pp. 21985-22002
Open Access | Times Cited: 22
Adla Padma, Mangayarkarasi Ramaiah
IEEE Access (2024) Vol. 12, pp. 21985-22002
Open Access | Times Cited: 22
SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks
Segun I. Popoola, Bamidele Adebisi, Ruth Ande, et al.
Sensors (2021) Vol. 21, Iss. 9, pp. 2985-2985
Open Access | Times Cited: 90
Segun I. Popoola, Bamidele Adebisi, Ruth Ande, et al.
Sensors (2021) Vol. 21, Iss. 9, pp. 2985-2985
Open Access | Times Cited: 90
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Deep residual convolutional neural Network: An efficient technique for intrusion detection system
Gunupudi Sai Chaitanya Kumar, R. Kiran Kumar, Kuricheti Parish Venkata Kumar, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 121912-121912
Closed Access | Times Cited: 33
Gunupudi Sai Chaitanya Kumar, R. Kiran Kumar, Kuricheti Parish Venkata Kumar, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 121912-121912
Closed Access | Times Cited: 33
An edge based hybrid intrusion detection framework for mobile edge computing
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Complex & Intelligent Systems (2021) Vol. 8, Iss. 5, pp. 3719-3746
Open Access | Times Cited: 47
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Complex & Intelligent Systems (2021) Vol. 8, Iss. 5, pp. 3719-3746
Open Access | Times Cited: 47
Intrusion detection in wireless sensor network using enhanced empirical based component analysis
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 26
Zhiqiang Liu, Ghulam Mohi-Ud-Din, Jiangbin Zheng, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 181-193
Closed Access | Times Cited: 26
A novel metaheuristics with deep learning enabled intrusion detection system for secured smart environment
Areej Malibari, Saud S. Alotaibi, Reem Alshahrani, et al.
Sustainable Energy Technologies and Assessments (2022) Vol. 52, pp. 102312-102312
Closed Access | Times Cited: 26
Areej Malibari, Saud S. Alotaibi, Reem Alshahrani, et al.
Sustainable Energy Technologies and Assessments (2022) Vol. 52, pp. 102312-102312
Closed Access | Times Cited: 26
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Human Computer Interaction System for Teacher-Student Interaction Model Using Machine Learning
Aili Zhang
International Journal of Human-Computer Interaction (2022), pp. 1-12
Closed Access | Times Cited: 21
Aili Zhang
International Journal of Human-Computer Interaction (2022), pp. 1-12
Closed Access | Times Cited: 21
A Hybrid Spider Monkey and Hierarchical Particle Swarm Optimization Approach for Intrusion Detection on Internet of Things
E. Sandhya, K. Annapurani
Sensors (2022) Vol. 22, Iss. 21, pp. 8566-8566
Open Access | Times Cited: 19
E. Sandhya, K. Annapurani
Sensors (2022) Vol. 22, Iss. 21, pp. 8566-8566
Open Access | Times Cited: 19
RANet: Network intrusion detection with group-gating convolutional neural network
Xiaoqing Zhang, Fei Yang, Yue Hu, et al.
Journal of Network and Computer Applications (2021) Vol. 198, pp. 103266-103266
Closed Access | Times Cited: 26
Xiaoqing Zhang, Fei Yang, Yue Hu, et al.
Journal of Network and Computer Applications (2021) Vol. 198, pp. 103266-103266
Closed Access | Times Cited: 26
Effective intrusion detection system for IoT using optimized capsule auto encoder model
C. U. Om Kumar, Jeyakumar Durairaj, Ahamed Ali S, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 13
Closed Access | Times Cited: 16
C. U. Om Kumar, Jeyakumar Durairaj, Ahamed Ali S, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 13
Closed Access | Times Cited: 16
Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 1457-1490
Open Access | Times Cited: 3
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 1457-1490
Open Access | Times Cited: 3
Intrusion Detection System Using the G-ABC with Deep Neural Network in Cloud Environment
Nishika Gulia, Kamna Solanki, Sandeep Dalal, et al.
Scientific Programming (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 8
Nishika Gulia, Kamna Solanki, Sandeep Dalal, et al.
Scientific Programming (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 8
An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy inference
Zohre Majidian, Shiva TaghipourEivazi, Bahman Arasteh, et al.
Computers & Electrical Engineering (2023) Vol. 106, pp. 108600-108600
Closed Access | Times Cited: 7
Zohre Majidian, Shiva TaghipourEivazi, Bahman Arasteh, et al.
Computers & Electrical Engineering (2023) Vol. 106, pp. 108600-108600
Closed Access | Times Cited: 7
Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment
Fatma S. Alrayes, Mashael M. Asiri, Mashael Maashi, et al.
Sustainability (2023) Vol. 15, Iss. 8, pp. 6902-6902
Open Access | Times Cited: 7
Fatma S. Alrayes, Mashael M. Asiri, Mashael Maashi, et al.
Sustainability (2023) Vol. 15, Iss. 8, pp. 6902-6902
Open Access | Times Cited: 7
Enhancing Cyberattack Detection Using Dimensionality Reduction With Hybrid Deep Learning on Internet of Things Environment
Salahaldeen Duraibi, Abdullah Mujawib Alashjaee
IEEE Access (2024) Vol. 12, pp. 84752-84762
Open Access | Times Cited: 2
Salahaldeen Duraibi, Abdullah Mujawib Alashjaee
IEEE Access (2024) Vol. 12, pp. 84752-84762
Open Access | Times Cited: 2
A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks
Mangayarkarasi Ramaiah, Adla Padma, Ravula Vishnukumar, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2
Mangayarkarasi Ramaiah, Adla Padma, Ravula Vishnukumar, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2
Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems
Engy El-Shafeiy, Walaa M. Elsayed, Haitham Elwahsh, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 5933-5933
Open Access | Times Cited: 2
Engy El-Shafeiy, Walaa M. Elsayed, Haitham Elwahsh, et al.
Sensors (2024) Vol. 24, Iss. 18, pp. 5933-5933
Open Access | Times Cited: 2
Securing constrained IoT systems: A lightweight machine learning approach for anomaly detection and prevention
Zainab Alwaisi, Tanesh Kumar, Erkki Harjula, et al.
Internet of Things (2024), pp. 101398-101398
Open Access | Times Cited: 2
Zainab Alwaisi, Tanesh Kumar, Erkki Harjula, et al.
Internet of Things (2024), pp. 101398-101398
Open Access | Times Cited: 2
Deep learning techniques to detect cybersecurity attacks: a systematic mapping study
Damiano Torre, Frantzy Mesadieu, Anitha Chennamaneni
Empirical Software Engineering (2023) Vol. 28, Iss. 3
Closed Access | Times Cited: 6
Damiano Torre, Frantzy Mesadieu, Anitha Chennamaneni
Empirical Software Engineering (2023) Vol. 28, Iss. 3
Closed Access | Times Cited: 6
Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system
Lenin Narengbam, Shouvik Dey
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 23
Closed Access | Times Cited: 6
Lenin Narengbam, Shouvik Dey
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 23
Closed Access | Times Cited: 6