
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
Novel Class Probability Features for Optimizing Network Attack Detection With Machine Learning
Ali Raza, Kashif Munir, Mubarak Almutairi, et al.
IEEE Access (2023) Vol. 11, pp. 98685-98694
Open Access | Times Cited: 26
Ali Raza, Kashif Munir, Mubarak Almutairi, et al.
IEEE Access (2023) Vol. 11, pp. 98685-98694
Open Access | Times Cited: 26
Fuzzy-Rule Based Optimized Hybrid Deep Learning Model for Network Intrusion Detection in SDN Enabled IoT Network
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access
Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
A Tutorial on Cross-layer Optimization Wireless Network System Using TOPSIS Method
Ramya Sharma, M Ramachandran, Vimala Saravanan, et al.
Journal on Electronic and Automation Engineering (2024) Vol. 2, Iss. 3, pp. 10-21
Open Access | Times Cited: 3
Ramya Sharma, M Ramachandran, Vimala Saravanan, et al.
Journal on Electronic and Automation Engineering (2024) Vol. 2, Iss. 3, pp. 10-21
Open Access | Times Cited: 3
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3
A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2
Advancing Iot Security: A Novel Intrusion Detection System for Evolving Threats In Industry 4.0 Using Optimized Convolutional Sparse Ficks Law Graph Point Trans-Net
P. A. Mathina, K. Valarmathi
Computers & Security (2024), pp. 104169-104169
Closed Access | Times Cited: 2
P. A. Mathina, K. Valarmathi
Computers & Security (2024), pp. 104169-104169
Closed Access | Times Cited: 2
Evaluation of Three Common Green Building Materials Using ELECTRE Method
(2024) Vol. 1, Iss. 1, pp. 30-40
Open Access | Times Cited: 2
(2024) Vol. 1, Iss. 1, pp. 30-40
Open Access | Times Cited: 2
AI-Powered Marketing Revolutionizing Customer Engagement Through Innovative Strategies
S. Vasundhara, K. Venkatesh, V. Manimegalai, et al.
Advances in business information systems and analytics book series (2024), pp. 21-46
Closed Access | Times Cited: 2
S. Vasundhara, K. Venkatesh, V. Manimegalai, et al.
Advances in business information systems and analytics book series (2024), pp. 21-46
Closed Access | Times Cited: 2
Exploring Lightweight Deep Learning Techniques for Intrusion Detection Systems in IoT Networks: A Survey
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1
Intrusion Detection System in Explainable Artificial Intelligence by Using Different Algorithms
D. Satyanarayana, E. Saikiran
(2024), pp. 1-4
Closed Access | Times Cited: 1
D. Satyanarayana, E. Saikiran
(2024), pp. 1-4
Closed Access | Times Cited: 1
Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
M Anoop, L. William Mary, Allan J Wilson, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
M Anoop, L. William Mary, Allan J Wilson, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Tuning Element Distribution, Structure and Properties Using the SPSS Method
Ramya Sharma, Manjula Selvam, M Ramachandran, et al.
REST Journal on Emerging trends in Modelling and Manufacturing (2024) Vol. 9, Iss. 3, pp. 11-22
Open Access
Ramya Sharma, Manjula Selvam, M Ramachandran, et al.
REST Journal on Emerging trends in Modelling and Manufacturing (2024) Vol. 9, Iss. 3, pp. 11-22
Open Access
Evaluating Drinking Water Quality in Salem District Using the DEMATEL Method
Sathiyaraj Chinnasamy, Vimala Saravanan, M Ramachandran, et al.
REST Journal on Emerging trends in Modelling and Manufacturing (2024) Vol. 9, Iss. 3, pp. 32-42
Open Access
Sathiyaraj Chinnasamy, Vimala Saravanan, M Ramachandran, et al.
REST Journal on Emerging trends in Modelling and Manufacturing (2024) Vol. 9, Iss. 3, pp. 32-42
Open Access
Design optimization of Solar Power Inverter using the GRA Method
Ramya Sharma, M Ramachandran, Vimala Saravanan, et al.
(2024) Vol. 2, Iss. 3, pp. 23-35
Open Access
Ramya Sharma, M Ramachandran, Vimala Saravanan, et al.
(2024) Vol. 2, Iss. 3, pp. 23-35
Open Access
Internet of Things (IoT) Technologies With Intrusion Detection Systems in Deep Learning
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access
A Bibliometric and Trend Analysis on Fuzzy Risk Assessment
Selçuk Çebi, Cengiz Kahraman, Başar Öztayşi, et al.
Lecture notes in networks and systems (2024), pp. 639-648
Closed Access
Selçuk Çebi, Cengiz Kahraman, Başar Öztayşi, et al.
Lecture notes in networks and systems (2024), pp. 639-648
Closed Access
Analysis of Big Data Network Security Defense Mechanism Application of Artificial Intelligence
Haitao He, Lin Luo, Qiong Zhao
International Journal of Intelligent Information Technologies (2024) Vol. 20, Iss. 1, pp. 1-18
Open Access
Haitao He, Lin Luo, Qiong Zhao
International Journal of Intelligent Information Technologies (2024) Vol. 20, Iss. 1, pp. 1-18
Open Access
Leveraging AI for Network Threat Detection—A Conceptual Overview
Muhammad Ali Paracha, Syed Usman Jamil, Khurram Shahzad, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4611-4611
Open Access
Muhammad Ali Paracha, Syed Usman Jamil, Khurram Shahzad, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4611-4611
Open Access
Traffic Analysis-Based Cybersecurity Intrusion Detection Through Automated Guided Attention Federated Graph Neural Network
Smarajit Ghosh
Applied Soft Computing (2024), pp. 112603-112603
Closed Access
Smarajit Ghosh
Applied Soft Computing (2024), pp. 112603-112603
Closed Access
A Novel Hybrid Approach for Threat Detection in Cyber Security using AI algorithm
Abhishek Kumar Gupta, Neetu Dixit, Sujeet Kumar, et al.
(2024), pp. 1-6
Closed Access
Abhishek Kumar Gupta, Neetu Dixit, Sujeet Kumar, et al.
(2024), pp. 1-6
Closed Access
Future Technology Development Using VIKOR Method
Computer Science Engineering and Technology (2024) Vol. 1, Iss. 1, pp. 28-35
Open Access
Computer Science Engineering and Technology (2024) Vol. 1, Iss. 1, pp. 28-35
Open Access
Evaluation of a WSM system for a smart system in agricultural systems
(2024) Vol. 1, Iss. 2, pp. 17-25
Open Access
(2024) Vol. 1, Iss. 2, pp. 17-25
Open Access
Breast Cancer Metastasis: Markers and MCDM Models
Computer Science Engineering and Technology (2024) Vol. 1, Iss. 2, pp. 34-41
Open Access
Computer Science Engineering and Technology (2024) Vol. 1, Iss. 2, pp. 34-41
Open Access
Evaluation of Ultraviolet Radiation using the MOORA Method
2 (2024) Vol. 1, Iss. 2, pp. 26-34
Open Access
2 (2024) Vol. 1, Iss. 2, pp. 26-34
Open Access