
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Dimensionality Reduction for Intrusion Detection Systems in Multi-data Streams—A Review and Proposal of Unsupervised Feature Selection Scheme
Naif Almusallam, Zahir Tari, Péter Bertök, et al.
Emergence, complexity and computation (2016), pp. 467-487
Closed Access | Times Cited: 21
Naif Almusallam, Zahir Tari, Péter Bertök, et al.
Emergence, complexity and computation (2016), pp. 467-487
Closed Access | Times Cited: 21
Showing 21 citing articles:
Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges
Muhammad Usama, Junaid Qadir, Aunn Raza, et al.
IEEE Access (2019) Vol. 7, pp. 65579-65615
Open Access | Times Cited: 360
Muhammad Usama, Junaid Qadir, Aunn Raza, et al.
IEEE Access (2019) Vol. 7, pp. 65579-65615
Open Access | Times Cited: 360
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, et al.
IEEE Transactions on Information Forensics and Security (2017) Vol. 13, Iss. 3, pp. 621-636
Open Access | Times Cited: 203
Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, et al.
IEEE Transactions on Information Forensics and Security (2017) Vol. 13, Iss. 3, pp. 621-636
Open Access | Times Cited: 203
A survey of outlier detection in high dimensional data streams
Imen Souiden, Mohamed Nazih Omri, Zaki Brahmi
Computer Science Review (2022) Vol. 44, pp. 100463-100463
Closed Access | Times Cited: 50
Imen Souiden, Mohamed Nazih Omri, Zaki Brahmi
Computer Science Review (2022) Vol. 44, pp. 100463-100463
Closed Access | Times Cited: 50
Unsupervised Anomaly Detection Using Variational Auto-Encoder based Feature Extraction
Rong Yao, Chongdang Liu, Linxuan Zhang, et al.
(2019), pp. 1-7
Closed Access | Times Cited: 67
Rong Yao, Chongdang Liu, Linxuan Zhang, et al.
(2019), pp. 1-7
Closed Access | Times Cited: 67
EnClass: Ensemble-Based Classification Model for Network Anomaly Detection in Massive Datasets
Sahil Garg, Amritpal Singh, Shalini Batra, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2017)
Closed Access | Times Cited: 28
Sahil Garg, Amritpal Singh, Shalini Batra, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2017)
Closed Access | Times Cited: 28
A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer
Qian-yi Dai, Bin Zhang, Shu-qin Dong
Security and Communication Networks (2022) Vol. 2022, pp. 1-18
Open Access | Times Cited: 14
Qian-yi Dai, Bin Zhang, Shu-qin Dong
Security and Communication Networks (2022) Vol. 2022, pp. 1-18
Open Access | Times Cited: 14
Cyber Attacks Detection based on Deep Learning for Cloud-Dew Computing in Automotive IoT Applications
Mohamed Mounir Moussa, Lubna Alazzawi
(2020), pp. 55-61
Closed Access | Times Cited: 21
Mohamed Mounir Moussa, Lubna Alazzawi
(2020), pp. 55-61
Closed Access | Times Cited: 21
Research on real-time outlier detection over big data streams
Liangchen Chen, Gao Shu, Xiufeng Cao
International Journal of Computers and Applications (2017) Vol. 42, Iss. 1, pp. 93-101
Closed Access | Times Cited: 20
Liangchen Chen, Gao Shu, Xiufeng Cao
International Journal of Computers and Applications (2017) Vol. 42, Iss. 1, pp. 93-101
Closed Access | Times Cited: 20
An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks
Shahriar Mohammadi, Fatemeh Amiri
International Journal of Computational Intelligence and Applications (2019) Vol. 18, Iss. 01
Closed Access | Times Cited: 13
Shahriar Mohammadi, Fatemeh Amiri
International Journal of Computational Intelligence and Applications (2019) Vol. 18, Iss. 01
Closed Access | Times Cited: 13
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection
Jiamu Li, Ji Zhang, Mohamed Jaward Bah, et al.
Algorithms (2022) Vol. 15, Iss. 11, pp. 429-429
Open Access | Times Cited: 7
Jiamu Li, Ji Zhang, Mohamed Jaward Bah, et al.
Algorithms (2022) Vol. 15, Iss. 11, pp. 429-429
Open Access | Times Cited: 7
Spectral ranking and unsupervised feature selection for point, collective, and contextual anomaly detection
Haofan Zhang, Ke Nian, Thomas F. Coleman, et al.
International Journal of Data Science and Analytics (2018) Vol. 9, Iss. 1, pp. 57-75
Closed Access | Times Cited: 11
Haofan Zhang, Ke Nian, Thomas F. Coleman, et al.
International Journal of Data Science and Analytics (2018) Vol. 9, Iss. 1, pp. 57-75
Closed Access | Times Cited: 11
A dynamic feature selection and intelligent model serving for hybrid batch-stream processing
Boshra Pishgoo, Ahmad Akbari, Bijan Raahemi
Knowledge-Based Systems (2022) Vol. 256, pp. 109749-109749
Closed Access | Times Cited: 6
Boshra Pishgoo, Ahmad Akbari, Bijan Raahemi
Knowledge-Based Systems (2022) Vol. 256, pp. 109749-109749
Closed Access | Times Cited: 6
Detecting Outliers in Non-IID Data: A Systematic Literature Review
Shafaq Siddiqi, Faiza Qureshi, Stefanie Lindstaedt, et al.
IEEE Access (2023) Vol. 11, pp. 70333-70352
Open Access | Times Cited: 3
Shafaq Siddiqi, Faiza Qureshi, Stefanie Lindstaedt, et al.
IEEE Access (2023) Vol. 11, pp. 70333-70352
Open Access | Times Cited: 3
Deep Feature Learning
Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja
SpringerBriefs on cyber security systems and networks (2018), pp. 47-68
Closed Access | Times Cited: 7
Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja
SpringerBriefs on cyber security systems and networks (2018), pp. 47-68
Closed Access | Times Cited: 7
Paper Review On Data Mining, components, And Big Data
Sufyan Sabah Al-Rifai, Ali Muwafaq Shaban, Muhmmad Shihab Muayad Shihab, et al.
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2020)
Closed Access | Times Cited: 6
Sufyan Sabah Al-Rifai, Ali Muwafaq Shaban, Muhmmad Shihab Muayad Shihab, et al.
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2020)
Closed Access | Times Cited: 6
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network
Kwangjo Kim
IEICE Transactions on Information and Systems (2020) Vol. E103.D, Iss. 7, pp. 1433-1447
Open Access | Times Cited: 4
Kwangjo Kim
IEICE Transactions on Information and Systems (2020) Vol. E103.D, Iss. 7, pp. 1433-1447
Open Access | Times Cited: 4
A Metaheuristic-Based Subspace Search Approach for Outlier Detection in High-Dimensional Data Streams
Imen Souiden, Zaki Brahmi, Mohamed Nazih Omri
Advances in Science, Technology & Innovation/Advances in science, technology & innovation (2024), pp. 29-41
Closed Access
Imen Souiden, Zaki Brahmi, Mohamed Nazih Omri
Advances in Science, Technology & Innovation/Advances in science, technology & innovation (2024), pp. 29-41
Closed Access
Hybrid intelligent intrusion detection system for multiple Wi‐Fi attacks in wireless networks using stacked restricted Boltzmann machine and deep belief networks
M. Nivaashini, Suganya Elavarasan, Sountharrajan Sehar
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 23
Closed Access | Times Cited: 1
M. Nivaashini, Suganya Elavarasan, Sountharrajan Sehar
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 23
Closed Access | Times Cited: 1
Future Outlier Detection Algorithm for Smarter Industry Application Using ML and AI
Kunal Dhibar, Prasenjit Maji
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 152-166
Closed Access | Times Cited: 1
Kunal Dhibar, Prasenjit Maji
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 152-166
Closed Access | Times Cited: 1
Dimensionality reduction of the attributes using fuzzy optimized independent component analysis for a Big Data Intrusion Detection System
R. Aswanandini, Ch. Deepa
Scientific and technical journal of information technologies mechanics and optics (2022) Vol. 22, Iss. 1, pp. 93-100
Open Access | Times Cited: 2
R. Aswanandini, Ch. Deepa
Scientific and technical journal of information technologies mechanics and optics (2022) Vol. 22, Iss. 1, pp. 93-100
Open Access | Times Cited: 2
Classical Machine Learning and Its Applications to IDS
Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja
SpringerBriefs on cyber security systems and networks (2018), pp. 13-26
Closed Access | Times Cited: 2
Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja
SpringerBriefs on cyber security systems and networks (2018), pp. 13-26
Closed Access | Times Cited: 2