
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adoption and realization of deep learning in network traffic anomaly detection device design
Guanglu Wei, Zhonghua Wang
Soft Computing (2020) Vol. 25, Iss. 2, pp. 1147-1158
Closed Access | Times Cited: 28
Guanglu Wei, Zhonghua Wang
Soft Computing (2020) Vol. 25, Iss. 2, pp. 1147-1158
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning
Shaokang Cai, Dezhi Han, Xinming Yin, et al.
Connection Science (2022) Vol. 34, Iss. 1, pp. 551-577
Open Access | Times Cited: 30
Shaokang Cai, Dezhi Han, Xinming Yin, et al.
Connection Science (2022) Vol. 34, Iss. 1, pp. 551-577
Open Access | Times Cited: 30
Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network
Jun Wang, Hanlei Jin, Junxiao Chen, et al.
Information Sciences (2022) Vol. 617, pp. 133-149
Closed Access | Times Cited: 30
Jun Wang, Hanlei Jin, Junxiao Chen, et al.
Information Sciences (2022) Vol. 617, pp. 133-149
Closed Access | Times Cited: 30
Traffic Anomaly Detection in Wireless Sensor Networks Based on Principal Component Analysis and Deep Convolution Neural Network
Chengpeng Yao, Yu Yang, Kun Yin, et al.
IEEE Access (2022) Vol. 10, pp. 103136-103149
Open Access | Times Cited: 28
Chengpeng Yao, Yu Yang, Kun Yin, et al.
IEEE Access (2022) Vol. 10, pp. 103136-103149
Open Access | Times Cited: 28
Prediction for the Inventory Management Chaotic Complexity System Based on the Deep Neural Network Algorithm
Tengfei Lei, Rita Yi Man Li, Nuttapong Jotikastira, et al.
Complexity (2023) Vol. 2023, pp. 1-11
Open Access | Times Cited: 12
Tengfei Lei, Rita Yi Man Li, Nuttapong Jotikastira, et al.
Complexity (2023) Vol. 2023, pp. 1-11
Open Access | Times Cited: 12
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism
Saihua Cai, Han Xu, Mingjie Liu, et al.
Computers & Security (2023) Vol. 136, pp. 103580-103580
Closed Access | Times Cited: 12
Saihua Cai, Han Xu, Mingjie Liu, et al.
Computers & Security (2023) Vol. 136, pp. 103580-103580
Closed Access | Times Cited: 12
Intrusion Detection System Based on Multi-Level Feature Extraction and Inductive Network
Junyi Mao, Xiaoyu Yang, Bo Hu, et al.
Electronics (2025) Vol. 14, Iss. 1, pp. 189-189
Open Access
Junyi Mao, Xiaoyu Yang, Bo Hu, et al.
Electronics (2025) Vol. 14, Iss. 1, pp. 189-189
Open Access
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features
Li Ming, Dezhi Han, Xinming Yin, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 21
Li Ming, Dezhi Han, Xinming Yin, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 21
Machine Learning Techniques for Anomaly Detection in Network Traffic
Richa Singh, Nidhi Srivastava, Ashwani Kumar
2021 Sixth International Conference on Image Information Processing (ICIIP) (2021)
Closed Access | Times Cited: 19
Richa Singh, Nidhi Srivastava, Ashwani Kumar
2021 Sixth International Conference on Image Information Processing (ICIIP) (2021)
Closed Access | Times Cited: 19
A novel network traffic combination prediction model
Zhongda Tian, Pengfei Song
International Journal of Communication Systems (2022) Vol. 35, Iss. 7
Closed Access | Times Cited: 11
Zhongda Tian, Pengfei Song
International Journal of Communication Systems (2022) Vol. 35, Iss. 7
Closed Access | Times Cited: 11
An improved X-means and isolation forest based methodology for network traffic anomaly detection
Yifan Feng, Weihong Cai, Haoyu Yue, et al.
PLoS ONE (2022) Vol. 17, Iss. 1, pp. e0263423-e0263423
Open Access | Times Cited: 10
Yifan Feng, Weihong Cai, Haoyu Yue, et al.
PLoS ONE (2022) Vol. 17, Iss. 1, pp. e0263423-e0263423
Open Access | Times Cited: 10
Anomaly Detection in Log Files Based on Machine Learning Techniques
Sándor R. Répás Salam Allawi Hussein
Deleted Journal (2024) Vol. 20, Iss. 3s, pp. 1299-1311
Open Access | Times Cited: 1
Sándor R. Répás Salam Allawi Hussein
Deleted Journal (2024) Vol. 20, Iss. 3s, pp. 1299-1311
Open Access | Times Cited: 1
Internet Abnormal Traffic Detection Based on WOA-BiLSTM-Attention
Mei Lin
(2024) Vol. 42, pp. 799-804
Closed Access | Times Cited: 1
Mei Lin
(2024) Vol. 42, pp. 799-804
Closed Access | Times Cited: 1
A multi-information fusion anomaly detection model based on convolutional neural networks and AutoEncoder
Zhongnan Zhao, Hongwei Guo, Yue Wang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Zhongnan Zhao, Hongwei Guo, Yue Wang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
DDoS-FOCUS: A Distributed DoS Attacks Mitigation using Deep Learning Approach for a Secure IoT Network
Mohammed Al-Khafajiy, Ghaith Al-Tameemi, Thar Baker
(2023), pp. 393-399
Open Access | Times Cited: 3
Mohammed Al-Khafajiy, Ghaith Al-Tameemi, Thar Baker
(2023), pp. 393-399
Open Access | Times Cited: 3
Network Traffic Anomaly Detection Based on Generative Adversarial Network and Transformer
Zhurong Wang, Jing Zhou, Xinhong Hei
Lecture notes on data engineering and communications technologies (2023), pp. 228-235
Closed Access | Times Cited: 2
Zhurong Wang, Jing Zhou, Xinhong Hei
Lecture notes on data engineering and communications technologies (2023), pp. 228-235
Closed Access | Times Cited: 2
Wireless capsule endoscopy multiclass classification using three-dimensional deep convolutional neural network model
Mehrdokht Bordbar, Mohammad Sadegh Helfroush, Habibollah Danyali, et al.
BioMedical Engineering OnLine (2023) Vol. 22, Iss. 1
Open Access | Times Cited: 2
Mehrdokht Bordbar, Mohammad Sadegh Helfroush, Habibollah Danyali, et al.
BioMedical Engineering OnLine (2023) Vol. 22, Iss. 1
Open Access | Times Cited: 2
The Development of a New System for Generating Training Data of AI-Based Anomaly Detection
Thi My Truong, Won Seok Choi, Jeong Jang Hyeon, et al.
(2024)
Closed Access
Thi My Truong, Won Seok Choi, Jeong Jang Hyeon, et al.
(2024)
Closed Access
Principal Component Analysis and Deep Learning-Based Traffic Anomaly Detection in WSN
Vandana Shakya, Jaytrilok Choudhary, Dhirendra Pratap Singh
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024), pp. 1-6
Closed Access
Vandana Shakya, Jaytrilok Choudhary, Dhirendra Pratap Singh
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024), pp. 1-6
Closed Access
Evaluating the Performance and Challenges of Machine Learning Models in Network Anomaly Detection
Sakshi Bakhare, Sudhir W. Mohod
International Journal of Scientific Research in Science Engineering and Technology (2024) Vol. 11, Iss. 3, pp. 42-52
Open Access
Sakshi Bakhare, Sudhir W. Mohod
International Journal of Scientific Research in Science Engineering and Technology (2024) Vol. 11, Iss. 3, pp. 42-52
Open Access
CNN-LSTM Based Machine Learning Model to Identify Firewall Decision
Xiaoxuan Ma
(2024), pp. 951-954
Closed Access
Xiaoxuan Ma
(2024), pp. 951-954
Closed Access
Research on Multi-Layer Defense against DDoS Attacks in Intelligent Distribution Networks
Kai Xu, Zemin Li, Nan Liang, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3583-3583
Open Access
Kai Xu, Zemin Li, Nan Liang, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3583-3583
Open Access
Machine Learning-Based Intelligent Scoring of College English Teaching in the Field of Natural Language Processing
Wei Wang
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 2
Wei Wang
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 2
An Adaptive abnormal flow detection method for new energy stations based on HHT algorithm
Yin Liang, Xiaoqian Chen
Journal of Physics Conference Series (2021) Vol. 1827, Iss. 1, pp. 012206-012206
Open Access | Times Cited: 1
Yin Liang, Xiaoqian Chen
Journal of Physics Conference Series (2021) Vol. 1827, Iss. 1, pp. 012206-012206
Open Access | Times Cited: 1
An Image Sentence Generation Based on Deep Neural Network Using RCNN-LSTM Model
S. Sai Satyanarayana Reddy, Ashwani Kumar, M. Jyaram
2021 Sixth International Conference on Image Information Processing (ICIIP) (2021) Vol. 14, pp. 364-368
Closed Access | Times Cited: 1
S. Sai Satyanarayana Reddy, Ashwani Kumar, M. Jyaram
2021 Sixth International Conference on Image Information Processing (ICIIP) (2021) Vol. 14, pp. 364-368
Closed Access | Times Cited: 1
Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation
Yitu Wang, Takayuki Nakachi
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2023) Vol. E107.A, Iss. 1, pp. 125-133
Open Access
Yitu Wang, Takayuki Nakachi
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2023) Vol. E107.A, Iss. 1, pp. 125-133
Open Access