
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system
Safa Mohamed, Ridha Ejbali
International Journal of Information Security (2022) Vol. 22, Iss. 1, pp. 235-247
Closed Access | Times Cited: 41
Safa Mohamed, Ridha Ejbali
International Journal of Information Security (2022) Vol. 22, Iss. 1, pp. 235-247
Closed Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 11
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 11
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 9
DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment
Nidhi Joraviya, Bhavesh N. Gohil, Udai Pratap Rao
The Journal of Supercomputing (2024) Vol. 80, Iss. 9, pp. 12218-12246
Closed Access | Times Cited: 7
Nidhi Joraviya, Bhavesh N. Gohil, Udai Pratap Rao
The Journal of Supercomputing (2024) Vol. 80, Iss. 9, pp. 12218-12246
Closed Access | Times Cited: 7
Intrusion Detection Based on Adaptive Sample Distribution Dual-Experience Replay Reinforcement Learning
Haonan Tan, Le Wang, Dong Zhu, et al.
Mathematics (2024) Vol. 12, Iss. 7, pp. 948-948
Open Access | Times Cited: 5
Haonan Tan, Le Wang, Dong Zhu, et al.
Mathematics (2024) Vol. 12, Iss. 7, pp. 948-948
Open Access | Times Cited: 5
CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 5
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4319-4347
Open Access | Times Cited: 5
Reinforcement Learning-Empowered Graph Convolutional Network Framework for Data Integrity Attack Detection in Cyber-Physical Systems
Edeh Vincent, Mehdi Korki, Mehdi Seyedmahmoudian, et al.
CSEE Journal of Power and Energy Systems (2024)
Open Access | Times Cited: 5
Edeh Vincent, Mehdi Korki, Mehdi Seyedmahmoudian, et al.
CSEE Journal of Power and Energy Systems (2024)
Open Access | Times Cited: 5
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access
Dual replay memory reinforcement learning framework for minority attack detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access
Navigating cybersecurity training: A comprehensive review
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access
Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2025) Vol. 123, pp. 110097-110097
Closed Access
Intelligent terminal SMC for non-linear chemotherapy using Markovian-based deep on-policy learning
Zahra Rasooli, Juliang Yin, Mostafa Taheri
Expert Systems with Applications (2025), pp. 126988-126988
Closed Access
Zahra Rasooli, Juliang Yin, Mostafa Taheri
Expert Systems with Applications (2025), pp. 126988-126988
Closed Access
An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling
Qinglei Yao, Xiaoqiang Zhao
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
Qinglei Yao, Xiaoqiang Zhao
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access
SE-DWNet: An Advanced ResNet-Based Model for Intrusion Detection with Symmetric Data Distribution
Kunsan Zhang, Rongqin Zheng, Chaopeng Li, et al.
Symmetry (2025) Vol. 17, Iss. 4, pp. 526-526
Open Access
Kunsan Zhang, Rongqin Zheng, Chaopeng Li, et al.
Symmetry (2025) Vol. 17, Iss. 4, pp. 526-526
Open Access
A DRL Strategy for Optimal Resource Allocation Along With 3D Trajectory Dynamics in UAV-MEC Network
Tayyaba Khurshid, Waqas Ahmed, Muhammad Rehan, et al.
IEEE Access (2023) Vol. 11, pp. 54664-54678
Open Access | Times Cited: 10
Tayyaba Khurshid, Waqas Ahmed, Muhammad Rehan, et al.
IEEE Access (2023) Vol. 11, pp. 54664-54678
Open Access | Times Cited: 10
Cost based Random Forest Classifier for Intrusion Detection System in Internet of Things
K. Pramilarani, P. Vasanthi Kumari
Applied Soft Computing (2023) Vol. 151, pp. 111125-111125
Closed Access | Times Cited: 10
K. Pramilarani, P. Vasanthi Kumari
Applied Soft Computing (2023) Vol. 151, pp. 111125-111125
Closed Access | Times Cited: 10
A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3
A micro Reinforcement Learning architecture for Intrusion Detection Systems
Boshra Darabi, Mozafar Bag‐Mohammadi, Mojtaba Karami
Pattern Recognition Letters (2024) Vol. 185, pp. 81-86
Closed Access | Times Cited: 3
Boshra Darabi, Mozafar Bag‐Mohammadi, Mojtaba Karami
Pattern Recognition Letters (2024) Vol. 185, pp. 81-86
Closed Access | Times Cited: 3
Performance Metrics of an Intrusion Detection System Through Window-Based Deep Learning Models
Fatima Isiaka
Journal of Data Science and Intelligent Systems (2023) Vol. 2, Iss. 3, pp. 174-180
Open Access | Times Cited: 8
Fatima Isiaka
Journal of Data Science and Intelligent Systems (2023) Vol. 2, Iss. 3, pp. 174-180
Open Access | Times Cited: 8
Network intrusion classification for IoT networks using an extreme learning machine
Uday Chandra Akuthota, Lava Bhargava
Engineering Research Express (2024) Vol. 6, Iss. 2, pp. 025217-025217
Closed Access | Times Cited: 2
Uday Chandra Akuthota, Lava Bhargava
Engineering Research Express (2024) Vol. 6, Iss. 2, pp. 025217-025217
Closed Access | Times Cited: 2
Adversarial robustness of deep reinforcement learning-based intrusion detection
Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 6, pp. 3625-3651
Closed Access | Times Cited: 2
Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 6, pp. 3625-3651
Closed Access | Times Cited: 2
Intrusion Detection System in Explainable Artificial Intelligence by Using Different Algorithms
D. Satyanarayana, E. Saikiran
(2024), pp. 1-4
Closed Access | Times Cited: 1
D. Satyanarayana, E. Saikiran
(2024), pp. 1-4
Closed Access | Times Cited: 1
Network Intrusion Detection with Feature Elimination and Selection Using Deep Learning
Aryam Mann, Vamsi Kiran Mekathoti, B. Nithya, et al.
(2024) Vol. 4, pp. 1-6
Closed Access | Times Cited: 1
Aryam Mann, Vamsi Kiran Mekathoti, B. Nithya, et al.
(2024) Vol. 4, pp. 1-6
Closed Access | Times Cited: 1
Enhancing Intrusion Detection Systems with Reinforcement Learning: A Comprehensive Survey of RL-based Approaches and Techniques
Faten Louati, Farah Barika Ktata, Ikram Amous
SN Computer Science (2024) Vol. 5, Iss. 6
Closed Access | Times Cited: 1
Faten Louati, Farah Barika Ktata, Ikram Amous
SN Computer Science (2024) Vol. 5, Iss. 6
Closed Access | Times Cited: 1
AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection
Xinchen Zhang, Running Zhao, Zhihan Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 581-590
Open Access | Times Cited: 1
Xinchen Zhang, Running Zhao, Zhihan Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 581-590
Open Access | Times Cited: 1
An Adaptive Intrusion Detection System for WSN using Reinforcement Learning and Deep Classification
Saqib Hussain, Jingsha He, Nafei Zhu, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 1
Saqib Hussain, Jingsha He, Nafei Zhu, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 1