OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine Learning Algorithms for Network Intrusion Detection
Jie Li, Yanpeng Qu, Fei Chao, et al.
Intelligent systems reference library (2018), pp. 151-179
Closed Access | Times Cited: 49

Showing 1-25 of 49 citing articles:

Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Zeeshan Ahmad, Adnan Shahid Khan, Cheah Wai Shiang, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 32, Iss. 1
Open Access | Times Cited: 775

Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 527-555
Open Access | Times Cited: 87

Anomaly Detection Using Deep Neural Network for IoT Architecture
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93

A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network
Adnan Shahid Khan, Zeeshan Ahmad, Johari Abdullah, et al.
IEEE Access (2021) Vol. 9, pp. 87079-87093
Open Access | Times Cited: 67

Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments
Syed S. H. Rizvi, Mark Scanlon, Jimmy McGibney, et al.
(2023), pp. 355-367
Closed Access | Times Cited: 28

Internet of Drones Intrusion Detection Using Deep Learning
Rabie Α. Ramadan, Abdel-Hamid M. Emara, Mohammed Al-Sarem, et al.
Electronics (2021) Vol. 10, Iss. 21, pp. 2633-2633
Open Access | Times Cited: 52

Intrusion Detection Systems Based on Machine Learning Algorithms
Sandy Victor Amanoul, Adnan Mohsin Abdulazeez, Diyar Qader Zeebare, et al.
(2021), pp. 282-287
Closed Access | Times Cited: 32

Robust genetic machine learning ensemble model for intrusion detection in network traffic
M. A. Akhtar, Syed Muhammad Owais Qadri, Maria Andleeb Siddiqui, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 10

Integrated Approach for Network Intrusion Detection
C. V. Suresh Babu, G. Suruthi, C. Indhumathi, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 19-39
Closed Access | Times Cited: 3

Curvature-based feature selection with application in classifying electronic health records
Zheming Zuo, Jie Li, Han Xu, et al.
Technological Forecasting and Social Change (2021) Vol. 173, pp. 121127-121127
Open Access | Times Cited: 20

Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms
Rachidi Zhour, Khalid Chougdali, Abdellatif Kobbane
(2023), pp. 1-5
Closed Access | Times Cited: 8

Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem
Chutipon Pimsarn, Tossapon Boongoen, Natthakan Iam-On, et al.
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4863-4880
Open Access | Times Cited: 11

Towards Big data Governance in Cybersecurity
Longzhi Yang, Jie Li, Noe Elisa, et al.
Data-Enabled Discovery and Applications (2019) Vol. 3, Iss. 1
Open Access | Times Cited: 17

An Intrusion Detection System Using the XGBoost Algorithm for SDVN
Adi El‐Dalahmeh, Jie Li, Ghaith El-Dalahmeh, et al.
Advances in intelligent systems and computing (2024), pp. 390-402
Closed Access | Times Cited: 1

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis
Adi El‐Dalahmeh, Moawiah El‐Dalahmeh, Mohammad A. Razzaque, et al.
Security and Privacy (2024) Vol. 7, Iss. 6
Open Access | Times Cited: 1

AI in Cybersecurity
Leslie F. Sikos
Intelligent systems reference library (2018)
Closed Access | Times Cited: 14

Network Intrusion Detection Systems Design: A Machine Learning Approach
Manuel Gonçalves da Silva Neto, Danielo G. Gomes
(2019), pp. 932-945
Open Access | Times Cited: 11

A multi-subpopulation bacterial foraging optimisation algorithm with deletion and immigration strategies for unmanned surface vehicle path planning
Yang Long, Yixin Su, Binghua Shi, et al.
Intelligent Service Robotics (2021) Vol. 14, Iss. 2, pp. 303-312
Closed Access | Times Cited: 10

A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks
Hela Mliki, Abir Hadj Kaceam, Lamia Chaari Fourati
ICST Transactions on Security and Safety (2021) Vol. 8, Iss. 29, pp. 171246-171246
Open Access | Times Cited: 10

Continuous lightweight authentication according group priority and key agreement for Internet of Things
Reza Sarabi Miyanaji, Sam Jabbehdari, Nasser Modiri
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 7
Closed Access | Times Cited: 6

S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6

Exploration of Machine Learning Algorithms for Development of Intelligent Intrusion Detection Systems
Adnan Jannat, Umar Hayat, Touseef Sadiq
(2023), pp. 1-6
Closed Access | Times Cited: 2

Fuzzy optimized V-detector algorithm on Apache Spark for class imbalance issue of intrusion detection in big data
Ahlam Kourid, Salim Chıkhı, Diego Reforgiato Recupero
Neural Computing and Applications (2023) Vol. 35, Iss. 27, pp. 19821-19845
Closed Access | Times Cited: 2

Application of Machine Learning Approaches in Intrusion Detection System
Zena Abdulmunim Aziz, Adnan Mohsin Abdulazeez
Journal of Soft Computing and Data Mining (2021) Vol. 2, Iss. 2
Open Access | Times Cited: 6

Page 1 - Next Page

Scroll to top