
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection
Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkaravarthy
Cluster Computing (2022) Vol. 25, Iss. 5, pp. 3129-3144
Closed Access | Times Cited: 20
Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkaravarthy
Cluster Computing (2022) Vol. 25, Iss. 5, pp. 3129-3144
Closed Access | Times Cited: 20
Showing 20 citing articles:
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103760-103760
Open Access | Times Cited: 45
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103760-103760
Open Access | Times Cited: 45
Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model
Mhamad Bakro, Rakesh Ranjan Kumar, M. N. Husain, et al.
IEEE Access (2024) Vol. 12, pp. 8846-8874
Open Access | Times Cited: 15
Mhamad Bakro, Rakesh Ranjan Kumar, M. N. Husain, et al.
IEEE Access (2024) Vol. 12, pp. 8846-8874
Open Access | Times Cited: 15
An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique
M. Mayuranathan, S.K. Saravanan, B. Muthusenthil, et al.
Advances in Engineering Software (2022) Vol. 173, pp. 103236-103236
Closed Access | Times Cited: 45
M. Mayuranathan, S.K. Saravanan, B. Muthusenthil, et al.
Advances in Engineering Software (2022) Vol. 173, pp. 103236-103236
Closed Access | Times Cited: 45
An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 31
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 31
Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey
Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5340-5340
Open Access | Times Cited: 23
Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5340-5340
Open Access | Times Cited: 23
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
arXiv (Cornell University) (2023)
Open Access | Times Cited: 14
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
arXiv (Cornell University) (2023)
Open Access | Times Cited: 14
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
V. T. Prabhakaran, Ashokkumar Kulandasamy
Journal of Reliable Intelligent Environments (2023) Vol. 9, Iss. 3, pp. 333-347
Closed Access | Times Cited: 8
V. T. Prabhakaran, Ashokkumar Kulandasamy
Journal of Reliable Intelligent Environments (2023) Vol. 9, Iss. 3, pp. 333-347
Closed Access | Times Cited: 8
Intrusion Detection System Using the G-ABC with Deep Neural Network in Cloud Environment
Nishika Gulia, Kamna Solanki, Sandeep Dalal, et al.
Scientific Programming (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 8
Nishika Gulia, Kamna Solanki, Sandeep Dalal, et al.
Scientific Programming (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 8
Computer vision based distributed denial of service attack detection for resource-limited devices
Hayelom Gebrye, Yong Wang, Fagen Li
Computers & Electrical Engineering (2024) Vol. 120, pp. 109716-109716
Closed Access | Times Cited: 2
Hayelom Gebrye, Yong Wang, Fagen Li
Computers & Electrical Engineering (2024) Vol. 120, pp. 109716-109716
Closed Access | Times Cited: 2
A Hybrid Machine Learning‐Based Data‐Centric Cybersecurity Detection in the 5G ‐Enabled IoT
Lingcheng Zeng, Yunzhu An, Heng Zhou, et al.
Security and Privacy (2024)
Open Access | Times Cited: 1
Lingcheng Zeng, Yunzhu An, Heng Zhou, et al.
Security and Privacy (2024)
Open Access | Times Cited: 1
Review Paper on Cloud Intrusion Detection System
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 159-163
Open Access | Times Cited: 1
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 159-163
Open Access | Times Cited: 1
CNN-LSTM-based IDS on Precision Farming for IIoT data
Prince Rajak, Jaykumar Lachure, Rajesh Doriya
(2022), pp. 99-103
Closed Access | Times Cited: 6
Prince Rajak, Jaykumar Lachure, Rajesh Doriya
(2022), pp. 99-103
Closed Access | Times Cited: 6
Enhancing Security in Cloud Computing and Protocols Using Harris Hawks Optimizer with Deep Learning for Intrusion Detection
R.K. Tiwari, S. Murugappan
(2023), pp. 170-175
Closed Access | Times Cited: 2
R.K. Tiwari, S. Murugappan
(2023), pp. 170-175
Closed Access | Times Cited: 2
Intrusion detection system in cloud computing by utilizing VTR-HLSTM based on deep learning
Valavan Woothukadu Thirumaran, Nalini Joseph, G. Umarani Srikanth
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1829-1829
Open Access
Valavan Woothukadu Thirumaran, Nalini Joseph, G. Umarani Srikanth
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1829-1829
Open Access
Cloud Intrusion Detection System
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 150-155
Open Access
Prof. R. G. Waghmare, Kaustubh M. Karale, Omkar A. Raut
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 150-155
Open Access
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Transfer Learning Based Bi-GRU for Intrusion Detection System in Cloud Computing
Gavini Sreelatha
Communications in computer and information science (2024), pp. 1-15
Closed Access
Gavini Sreelatha
Communications in computer and information science (2024), pp. 1-15
Closed Access
Ensuring Privacy and Security of EHR With Secure Collaborative Transfer Learning (SCTL)
D. Dhinakaran, S. Edwin Raja, A. Ramathilagam, et al.
Advances in healthcare information systems and administration book series (2024), pp. 213-242
Closed Access
D. Dhinakaran, S. Edwin Raja, A. Ramathilagam, et al.
Advances in healthcare information systems and administration book series (2024), pp. 213-242
Closed Access
Detecting Unbalanced Network Traffic Intrusions With Deep Learning
S. Pavithra, K. Venkata Vikas
IEEE Access (2024) Vol. 12, pp. 74096-74107
Open Access
S. Pavithra, K. Venkata Vikas
IEEE Access (2024) Vol. 12, pp. 74096-74107
Open Access
A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems
M. Nafees Muneera, G. Anbu Selvi, V. Vaissnave, et al.
International Journal of Computer Network and Information Security (2023) Vol. 15, Iss. 6, pp. 40-51
Open Access | Times Cited: 1
M. Nafees Muneera, G. Anbu Selvi, V. Vaissnave, et al.
International Journal of Computer Network and Information Security (2023) Vol. 15, Iss. 6, pp. 40-51
Open Access | Times Cited: 1