
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel methodology for malicious traffic detection in smart devices using BI-LSTM–CNN-dependent deep learning methodology
T. Anitha, S. Aanjankumar, S. Poonkuntran, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 27, pp. 20319-20338
Closed Access | Times Cited: 17
T. Anitha, S. Aanjankumar, S. Poonkuntran, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 27, pp. 20319-20338
Closed Access | Times Cited: 17
Showing 17 citing articles:
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Maiada M. Mahmoud, Yasser Omar, Ayman Abdel-Hamid
Future Internet (2025) Vol. 17, Iss. 1, pp. 25-25
Open Access | Times Cited: 2
Maiada M. Mahmoud, Yasser Omar, Ayman Abdel-Hamid
Future Internet (2025) Vol. 17, Iss. 1, pp. 25-25
Open Access | Times Cited: 2
Integrating contextual intelligence with mixture of experts for signature and anomaly-based intrusion detection in CPS security
Kashif Rahim, Zia Ul Islam Nasir, Nassar Ikram, et al.
Neural Computing and Applications (2025)
Closed Access | Times Cited: 1
Kashif Rahim, Zia Ul Islam Nasir, Nassar Ikram, et al.
Neural Computing and Applications (2025)
Closed Access | Times Cited: 1
HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access
Ziqian Chen, Wei Xia, Zhen Li, et al.
Computers & Security (2025), pp. 104360-104360
Closed Access
Detection of Anomalies in Data Streams Using the LSTM-CNN Model
Agnieszka Duraj, Piotr S. Szczepaniak, Artur Sadok
Sensors (2025) Vol. 25, Iss. 5, pp. 1610-1610
Open Access
Agnieszka Duraj, Piotr S. Szczepaniak, Artur Sadok
Sensors (2025) Vol. 25, Iss. 5, pp. 1610-1610
Open Access
ASCDNet: development of adaptive serial cascaded deep network and improved heuristic algorithm for smart transportation planning and traffic flow prediction
B. Kannadasan, K. Yogeswari
Journal of Ambient Intelligence and Humanized Computing (2025)
Closed Access
B. Kannadasan, K. Yogeswari
Journal of Ambient Intelligence and Humanized Computing (2025)
Closed Access
Survey on identification and prediction of security threats using various deep learning models on software testing
Suman Suman, Raees Ahmad Khan
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Suman Suman, Raees Ahmad Khan
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Prediction of android ransomware with deep learning model using hybrid cryptography
K R Kalphana, S. Aanjankumar, Michrandi N Surya, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
K R Kalphana, S. Aanjankumar, Michrandi N Surya, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Hybrid Detection Technique for IP Packet Header Modifications Associated with Store-and-Forward Operations
Asmaa Munshi
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10229-10229
Open Access | Times Cited: 2
Asmaa Munshi
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10229-10229
Open Access | Times Cited: 2
Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network
Tingting Su, Jia Wang, Hu Wei, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4433-4448
Open Access
Tingting Su, Jia Wang, Hu Wei, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4433-4448
Open Access
Abnormal traffic detection for Internet of Things based on an improved Residual Network
Weizhe Wang
Physical Communication (2024) Vol. 66, pp. 102406-102406
Closed Access
Weizhe Wang
Physical Communication (2024) Vol. 66, pp. 102406-102406
Closed Access
Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access
A Transformer Based Malicious Traffic Detection Method in Android Mobile Networks
Yuhao Sun, Hao Peng, Yingjun Chen, et al.
Lecture notes in computer science (2024), pp. 370-385
Closed Access
Yuhao Sun, Hao Peng, Yingjun Chen, et al.
Lecture notes in computer science (2024), pp. 370-385
Closed Access
MMH-Net: A novel multi-modal hybrid learning network for accurate mass estimation of acoustic levitated objects
Yingwei Wang, Liangxu Jiang, Ziyi Chen, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108965-108965
Closed Access
Yingwei Wang, Liangxu Jiang, Ziyi Chen, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108965-108965
Closed Access
An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices
Ao Yu, Jun Tao, Dikai Zou, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 34, pp. 1-8
Closed Access
Ao Yu, Jun Tao, Dikai Zou, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 34, pp. 1-8
Closed Access
Digital twin technology fundamentals
Chakkrapong Chaiburi, Bancha Yingngam
Elsevier eBooks (2024), pp. 1-35
Closed Access
Chakkrapong Chaiburi, Bancha Yingngam
Elsevier eBooks (2024), pp. 1-35
Closed Access
Research on highway traffic flow prediction based on a hybrid model of ARIMA–GWO–LSTM
Changxi Ma, Kyeongmo Gu, Yongpeng Zhao, et al.
Neural Computing and Applications (2024)
Closed Access
Changxi Ma, Kyeongmo Gu, Yongpeng Zhao, et al.
Neural Computing and Applications (2024)
Closed Access
Vehicular Network Security Through Optimized Deep Learning Model with Feature Selection Techniques
Fida Muhammad Khan, Taj Rahman, Asim Zeb, et al.
(2024) Vol. 1, Iss. 2, pp. 136-153
Closed Access
Fida Muhammad Khan, Taj Rahman, Asim Zeb, et al.
(2024) Vol. 1, Iss. 2, pp. 136-153
Closed Access
Bangla Handwriting Resource Generation and Recognition Using Deep Learning Algorithms
Md. Tariqul Islam, Md. Abu Saim, Akhsya Ghuha Opey, et al.
(2023), pp. 01-05
Closed Access
Md. Tariqul Islam, Md. Abu Saim, Akhsya Ghuha Opey, et al.
(2023), pp. 01-05
Closed Access