
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Sneha Padhiar, Ritesh Patel
Smart innovation, systems and technologies (2023), pp. 265-270
Closed Access | Times Cited: 22
Sneha Padhiar, Ritesh Patel
Smart innovation, systems and technologies (2023), pp. 265-270
Closed Access | Times Cited: 22
Showing 22 citing articles:
When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors
Charles Smutz, Angelos Stavrou
(2016)
Open Access | Times Cited: 91
Charles Smutz, Angelos Stavrou
(2016)
Open Access | Times Cited: 91
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis
Chuanpu Fu, Qi Li, Meng Shen, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 3431-3446
Open Access | Times Cited: 90
Chuanpu Fu, Qi Li, Meng Shen, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 3431-3446
Open Access | Times Cited: 90
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives
Abhishek Divekar, Meet Parekh, Vaibhav Savla, et al.
(2018), pp. 1-8
Open Access | Times Cited: 60
Abhishek Divekar, Meet Parekh, Vaibhav Savla, et al.
(2018), pp. 1-8
Open Access | Times Cited: 60
Aggregate-based congestion control for pulse-wave DDoS defense
Albert Gran Alcoz, Martin Strohmeier, Vincent Lenders, et al.
(2022)
Open Access | Times Cited: 33
Albert Gran Alcoz, Martin Strohmeier, Vincent Lenders, et al.
(2022)
Open Access | Times Cited: 33
Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts
Aaron Schlenker, Haifeng Xu, Mina Guirguis, et al.
(2017), pp. 381-387
Open Access | Times Cited: 47
Aaron Schlenker, Haifeng Xu, Mina Guirguis, et al.
(2017), pp. 381-387
Open Access | Times Cited: 47
Review of semi-supervised method for Intrusion Detection System
Sofy Fitriani, Satria Mandala, Muhammad Ary Murti
(2016), pp. 36-41
Closed Access | Times Cited: 27
Sofy Fitriani, Satria Mandala, Muhammad Ary Murti
(2016), pp. 36-41
Closed Access | Times Cited: 27
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process
Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 17, Iss. 4, pp. 2451-2479
Open Access | Times Cited: 25
Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 17, Iss. 4, pp. 2451-2479
Open Access | Times Cited: 25
On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
Abhishek Verma, Virender Ranga
(2019)
Open Access | Times Cited: 24
Abhishek Verma, Virender Ranga
(2019)
Open Access | Times Cited: 24
New Directions in Automated Traffic Analysis
Jordan Holland, Paul Schmitt, Nick Feamster, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 3366-3383
Open Access | Times Cited: 14
Jordan Holland, Paul Schmitt, Nick Feamster, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 3366-3383
Open Access | Times Cited: 14
Malicious URL Detection using Deep Learning
R. Vinayakumar, S. Sriram, Soman KP, et al.
(2020)
Open Access | Times Cited: 5
R. Vinayakumar, S. Sriram, Soman KP, et al.
(2020)
Open Access | Times Cited: 5
An Analysis of Graph Properties for Detecting Sybil Nodes in Social Networks
Korkiat Kaewking, Sirapat Boonkrong
Journal of ICT Research and Applications (2018) Vol. 12, Iss. 2, pp. 185-185
Open Access | Times Cited: 2
Korkiat Kaewking, Sirapat Boonkrong
Journal of ICT Research and Applications (2018) Vol. 12, Iss. 2, pp. 185-185
Open Access | Times Cited: 2
Frequency analysis and online learning in malware detection
Ngoc Anh Huynh
(2019)
Open Access | Times Cited: 2
Ngoc Anh Huynh
(2019)
Open Access | Times Cited: 2
Detection and Evaluation of Data Exfiltration
Riccardo Bortolameotti
(2019)
Open Access | Times Cited: 2
Riccardo Bortolameotti
(2019)
Open Access | Times Cited: 2
Antidefacement
Christian Urcuqui, Melisa García Peña, José Luis Osorio Quintero, et al.
Sistemas y Telemática (2016) Vol. 14, Iss. 39, pp. 9-27
Open Access | Times Cited: 1
Christian Urcuqui, Melisa García Peña, José Luis Osorio Quintero, et al.
Sistemas y Telemática (2016) Vol. 14, Iss. 39, pp. 9-27
Open Access | Times Cited: 1
On an attempt to explore challenges for Artificial Intelligence and Machine Learning in Indian Military and Defence Sector and Studying the Possible Inter-relationship amongst them using ISM Methodology
Mukesh Bansal, U. Dinesh, Remica Aggarwal, et al.
International Journal of Computer Applications (2019) Vol. 177, Iss. 28, pp. 5-10
Open Access | Times Cited: 1
Mukesh Bansal, U. Dinesh, Remica Aggarwal, et al.
International Journal of Computer Applications (2019) Vol. 177, Iss. 28, pp. 5-10
Open Access | Times Cited: 1
An Assessment of Intrusion Detection using Machine Learning on Traffic Statistical Data
Qianru Zhou, Rongzhen Li, Lei Xu, et al.
(2021)
Open Access | Times Cited: 1
Qianru Zhou, Rongzhen Li, Lei Xu, et al.
(2021)
Open Access | Times Cited: 1
Uma Revisão Sobre as Publicações de Sistemas de Detecção de Intrusão
Felipe Cesar Costa Alves, Ed Wilson Tavares Ferreira, Valtemir Emerêncio do Nascimento, et al.
Revista de Informática Teórica e Aplicada (2016) Vol. 23, Iss. 2, pp. 67-67
Open Access
Felipe Cesar Costa Alves, Ed Wilson Tavares Ferreira, Valtemir Emerêncio do Nascimento, et al.
Revista de Informática Teórica e Aplicada (2016) Vol. 23, Iss. 2, pp. 67-67
Open Access
Aprendizagem de Máquina para Segurança em Redes de Computadores: Métodos e Aplicações
Márcia Henke, Clayton Santos, Eduardo Nunan, et al.
(2011), pp. 53-103
Open Access
Márcia Henke, Clayton Santos, Eduardo Nunan, et al.
(2011), pp. 53-103
Open Access
Security Considerations for Edge Computing
John M. Acken, Naresh Kumar Sehgal
(2019), pp. 187-194
Open Access
John M. Acken, Naresh Kumar Sehgal
(2019), pp. 187-194
Open Access
A Neuro-Fuzzy based Inconsistency Location Display to Represent Efficient Recognition in Social Networks
Sahena Rameez, D. Manju
International Journal of Research in Advent Technology (2019) Vol. 7, Iss. 5, pp. 159-165
Open Access
Sahena Rameez, D. Manju
International Journal of Research in Advent Technology (2019) Vol. 7, Iss. 5, pp. 159-165
Open Access
Novel Cryptographic Primitives and Protocols for Censorship Resistance
Kevin P. Dyer
(2000)
Open Access
Kevin P. Dyer
(2000)
Open Access
An Assessment of Intrusion Detection using Machine Learning on Traffic Statistical Data
Qianru Zhou, Rongzhen Li, Lei Xu, et al.
(2021)
Open Access
Qianru Zhou, Rongzhen Li, Lei Xu, et al.
(2021)
Open Access