
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
(2023), pp. 355-367
Closed Access | Times Cited: 28
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
(2023), pp. 355-367
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing
Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, et al.
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 66
Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, et al.
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 66
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Salman Muneer, Umer Farooq, Atifa Athar, et al.
Journal of Engineering (2024) Vol. 2024, pp. 1-16
Open Access | Times Cited: 22
Salman Muneer, Umer Farooq, Atifa Athar, et al.
Journal of Engineering (2024) Vol. 2024, pp. 1-16
Open Access | Times Cited: 22
Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
IEEE Access (2022) Vol. 10, pp. 110362-110384
Open Access | Times Cited: 36
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
IEEE Access (2022) Vol. 10, pp. 110362-110384
Open Access | Times Cited: 36
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2559-2581
Open Access | Times Cited: 5
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2559-2581
Open Access | Times Cited: 5
Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection
Khadija M. Abuali, Liyth Nissirat, Aida Al‐Samawi
Sensors (2023) Vol. 23, Iss. 21, pp. 8959-8959
Open Access | Times Cited: 13
Khadija M. Abuali, Liyth Nissirat, Aida Al‐Samawi
Sensors (2023) Vol. 23, Iss. 21, pp. 8959-8959
Open Access | Times Cited: 13
Network intrusion detection system by learning jointly from tabular and text‐based features
Berkant Düzgün, Aykut Çayır, Uğur Ünal, et al.
Expert Systems (2023) Vol. 41, Iss. 4
Open Access | Times Cited: 6
Berkant Düzgün, Aykut Çayır, Uğur Ünal, et al.
Expert Systems (2023) Vol. 41, Iss. 4
Open Access | Times Cited: 6
Efficient optimization algorithms for various machine learning tasks, including classification, regression, and clustering
Hengki Tamando Sihotang, Marc K. Albert, Fristi Riandari, et al.
Idea Future Research (2023) Vol. 1, Iss. 1, pp. 14-24
Open Access | Times Cited: 5
Hengki Tamando Sihotang, Marc K. Albert, Fristi Riandari, et al.
Idea Future Research (2023) Vol. 1, Iss. 1, pp. 14-24
Open Access | Times Cited: 5
Cybersecurity Warning System Using Diluted Convolutional Neural Network Framework for IOT Attack Prevention
International journal of intelligent engineering and systems (2023) Vol. 17, Iss. 1, pp. 794-801
Open Access | Times Cited: 5
International journal of intelligent engineering and systems (2023) Vol. 17, Iss. 1, pp. 794-801
Open Access | Times Cited: 5
Intrusion Detection Schemes Based on Synthetic Minority Oversampling Technique and Machine Learning Models
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1
Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1
Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack
Sonam Bhardwaj, Mayank Dave
Computers & Security (2023) Vol. 135, pp. 103521-103521
Closed Access | Times Cited: 4
Sonam Bhardwaj, Mayank Dave
Computers & Security (2023) Vol. 135, pp. 103521-103521
Closed Access | Times Cited: 4
Computer Network Security Protection System Based on Genetic Algorithm
Qin Shen, Cuijin Lao
(2023), pp. 1-8
Closed Access | Times Cited: 3
Qin Shen, Cuijin Lao
(2023), pp. 1-8
Closed Access | Times Cited: 3
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic
Yea-Sul Kim, Ye-Eun Kim, Hwankuk Kim
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 1125-1147
Open Access | Times Cited: 2
Yea-Sul Kim, Ye-Eun Kim, Hwankuk Kim
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 1125-1147
Open Access | Times Cited: 2
An Innovative Intrusion Detection System for High-Density Communication Networks Using Artificial Intelligence
G. Sirisha, K. Vimal Kumar Stephen, R Suganya, et al.
(2023), pp. 78-78
Open Access | Times Cited: 2
G. Sirisha, K. Vimal Kumar Stephen, R Suganya, et al.
(2023), pp. 78-78
Open Access | Times Cited: 2
MC-MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection
Nazanin Moarref, Mehmet Tahir Sandıkkaya
Security and Communication Networks (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 2
Nazanin Moarref, Mehmet Tahir Sandıkkaya
Security and Communication Networks (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 2
Enhancing Multiclass Network Intrusion Detection Systems Using Continuous Wavelet Transform on Network Traffic
Abdulaziz A. Alsulami, Badraddin Alturki
Data & Metadata (2024) Vol. 4, pp. 474-474
Closed Access
Abdulaziz A. Alsulami, Badraddin Alturki
Data & Metadata (2024) Vol. 4, pp. 474-474
Closed Access
A Hybrid Deep Learning Approach for Accurate Network Intrusion Detection Using Traffic Flow Analysis in IoMT Domain
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Lecture notes in networks and systems (2024), pp. 369-385
Closed Access
Md. Afroz, Emmanuel Nyakwende, Birendra Goswami
Lecture notes in networks and systems (2024), pp. 369-385
Closed Access
Enhancing intrusion detection with imbalanced data classification and feature selection in machine learning algorithms
S. V. Sugin, M. Kanchana, Mr Sugin
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access
S. V. Sugin, M. Kanchana, Mr Sugin
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access
Advancements in Machine Learning Techniques for Intrusion Detection Systems: An Overview of Perspectives and Datasets
Journal of Logistics Informatics and Service Science (2024) Vol. 11, Iss. 3
Open Access
Journal of Logistics Informatics and Service Science (2024) Vol. 11, Iss. 3
Open Access
A configurable anonymisation approach for network flow data: Balancing utility and privacy
Liam Daly Manocchio, Siamak Layeghy, David Gwynne, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109465-109465
Open Access
Liam Daly Manocchio, Siamak Layeghy, David Gwynne, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109465-109465
Open Access
IoT Cyber Attacks Detection - Survey
Alaa Abdul Al Muhsen Hussain Al Zubaidi
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access
Alaa Abdul Al Muhsen Hussain Al Zubaidi
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-6
Closed Access
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems
S.Ya. Hilgurt, Anatolii Davydenko, Т. В. Матьовка, et al.
Journal of Cyber Security and Mobility (2023)
Open Access | Times Cited: 1
S.Ya. Hilgurt, Anatolii Davydenko, Т. В. Матьовка, et al.
Journal of Cyber Security and Mobility (2023)
Open Access | Times Cited: 1
An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2023), pp. 0275-0282
Closed Access | Times Cited: 1
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (2023), pp. 0275-0282
Closed Access | Times Cited: 1
Exploring the Synergy of GAN and CNN Models for Robust Intrusion Detection in Cyber Security
Tarang Pardeshi, Daxa Vekariya, Ankita Gandhi
(2023), pp. 1470-1475
Closed Access | Times Cited: 1
Tarang Pardeshi, Daxa Vekariya, Ankita Gandhi
(2023), pp. 1470-1475
Closed Access | Times Cited: 1
Unleashing the Power of Machine and Deep Learning for Advanced Network Intrusion Detection: An Analysis and Exploration
Seema Rani, Sanjeev Kumar
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2023), pp. 1-9
Closed Access
Seema Rani, Sanjeev Kumar
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2023), pp. 1-9
Closed Access