
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 22
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2139-2158
Open Access | Times Cited: 22
Showing 22 citing articles:
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1
Toward reliable diabetes prediction: Innovations in data engineering and machine learning applications
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
Digital Health (2024) Vol. 10
Open Access | Times Cited: 9
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
Digital Health (2024) Vol. 10
Open Access | Times Cited: 9
Deep learning-based human activity recognition using CNN, ConvLSTM, and LRCN
Md Ashraf Uddin, Md. Alamin Talukder, Muhammad Sajib Uzzaman, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 259-268
Open Access | Times Cited: 5
Md Ashraf Uddin, Md. Alamin Talukder, Muhammad Sajib Uzzaman, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 259-268
Open Access | Times Cited: 5
A hybrid cardiovascular arrhythmia disease detection using ConvNeXt-X models on electrocardiogram signals
Md. Alamin Talukder, Majdi Khalid, Mohsin Kazi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 5
Md. Alamin Talukder, Majdi Khalid, Mohsin Kazi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 5
Rapid authentication of Cuscutae Semen with imbalanced sample categories using a handheld near infrared spectrometer
Xinying Peng, Xiangyang Yu, Jinfeng Lin, et al.
Journal of Near Infrared Spectroscopy (2025)
Closed Access
Xinying Peng, Xiangyang Yu, Jinfeng Lin, et al.
Journal of Near Infrared Spectroscopy (2025)
Closed Access
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction
Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Research on Network Intrusion Detection Model Based on Hybrid Sampling and Deep Learning
Doudou Guo, Yufei Xie
Sensors (2025) Vol. 25, Iss. 5, pp. 1578-1578
Open Access
Doudou Guo, Yufei Xie
Sensors (2025) Vol. 25, Iss. 5, pp. 1578-1578
Open Access
Evaluating the Effectiveness of Machine Learning Algorithms for Network Intrusion Detection
Sri Vasavi Chandu, Rajesh Reddy Anumula, P. M. S. S. Chandu, et al.
Communications in computer and information science (2025), pp. 325-344
Closed Access
Sri Vasavi Chandu, Rajesh Reddy Anumula, P. M. S. S. Chandu, et al.
Communications in computer and information science (2025), pp. 325-344
Closed Access
A Novel Time‐to‐Response Based Attack Mitigation Technique for Internet of Things‐Integrated Wireless Sensor Networks
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
An interpretable dimensional reduction technique with an explainable model for detecting attacks in Internet of Medical Things devices
Swati Lipsa, Ranjan Kumar Dash, Nikola Ivković
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Swati Lipsa, Ranjan Kumar Dash, Nikola Ivković
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Enhancing malware detection with feature selection and scaling techniques using machine learning models
Rakibul Hasan, Barna Biswas, Md Samiun, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Rakibul Hasan, Barna Biswas, Md Samiun, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Wahida Ferdose Urmi, Mohammed Nasir Uddin, Md Ashraf Uddin, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 316-331
Open Access | Times Cited: 4
Wahida Ferdose Urmi, Mohammed Nasir Uddin, Md Ashraf Uddin, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 316-331
Open Access | Times Cited: 4
An integrated multistage ensemble machine learning model for fraudulent transaction detection
Md. Alamin Talukder, Majdi Khalid, Md Ashraf Uddin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Md. Alamin Talukder, Majdi Khalid, Md Ashraf Uddin
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 4
Data-driven strategies for digital native market segmentation using clustering
Md Ashraf Uddin, Md. Alamin Talukder, Md. Redwan Ahmed, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 178-191
Open Access | Times Cited: 3
Md Ashraf Uddin, Md. Alamin Talukder, Md. Redwan Ahmed, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 178-191
Open Access | Times Cited: 3
A dual-tier adaptive one-class classification IDS for emerging cyberthreats
Md Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, et al.
Computer Communications (2024) Vol. 229, pp. 108006-108006
Open Access | Times Cited: 3
Md Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, et al.
Computer Communications (2024) Vol. 229, pp. 108006-108006
Open Access | Times Cited: 3
usfAD based effective unknown attack detection focused IDS framework
Md Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Md Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Enhancing agricultural wireless sensor network security through integrated machine learning approaches
Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
A Reliable Multipath Intercluster Routing Protocol Based on Link Stability
Juan Xu, Wentao Xue, Ruofan Wang, et al.
Wireless Personal Communications (2024)
Closed Access
Juan Xu, Wentao Xue, Ruofan Wang, et al.
Wireless Personal Communications (2024)
Closed Access
Feature Selection using Improved Nomadic People Optimizer in Intrusion Detection
Zinah Sattar Jabbar Aboud, Rami Tawil, Mustafa S. Kadhm
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 18213-18221
Open Access
Zinah Sattar Jabbar Aboud, Rami Tawil, Mustafa S. Kadhm
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 18213-18221
Open Access
Industrial network intrusion detection in open-set scenarios
Wei Yu, Zhixiang Chen, Hui Wang, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Wei Yu, Zhixiang Chen, Hui Wang, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Previsão de Desfechos Clínicos em Pacientes com Tuberculose Usando Redes Neurais Perceptron Multicamadas: Análise Interativa de Dados e Visualizações
Ronilson W. S. Pereira, Marcos César da Rocha Seruffo, Karla Figueiredo
(2024), pp. 29-38
Closed Access
Ronilson W. S. Pereira, Marcos César da Rocha Seruffo, Karla Figueiredo
(2024), pp. 29-38
Closed Access
Towards Reliable Diabetes Prediction: Innovations in Data Engineering and Machine Learning Applications
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
bioRxiv (Cold Spring Harbor Laboratory) (2024)
Closed Access
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
bioRxiv (Cold Spring Harbor Laboratory) (2024)
Closed Access
ElNnGA: An Artificial Intelligence Empowered Scheme for Unknown Attack Recognition and Defense Strategy Recommendation
Jiale Quan, Han Yu, Liumei Zhang, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2024), pp. 411-417
Closed Access
Jiale Quan, Han Yu, Liumei Zhang, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2024), pp. 411-417
Closed Access