OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35

Showing 1-25 of 35 citing articles:

Novel Class Probability Features for Optimizing Network Attack Detection With Machine Learning
Ali Raza, Kashif Munir, Mubarak Almutairi, et al.
IEEE Access (2023) Vol. 11, pp. 98685-98694
Open Access | Times Cited: 26

Fuzzy-Rule Based Optimized Hybrid Deep Learning Model for Network Intrusion Detection in SDN Enabled IoT Network
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access

Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4

A Tutorial on Cross-layer Optimization Wireless Network System Using TOPSIS Method
Ramya Sharma, M Ramachandran, Vimala Saravanan, et al.
Journal on Electronic and Automation Engineering (2024) Vol. 2, Iss. 3, pp. 10-21
Open Access | Times Cited: 3

Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3

A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2

AI-Powered Marketing Revolutionizing Customer Engagement Through Innovative Strategies
S. Vasundhara, K. Venkatesh, V. Manimegalai, et al.
Advances in business information systems and analytics book series (2024), pp. 21-46
Closed Access | Times Cited: 2

Exploring Lightweight Deep Learning Techniques for Intrusion Detection Systems in IoT Networks: A Survey
Hind Ali abdul Hassan
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 1944-1958
Open Access | Times Cited: 1

Intrusion Detection System in Explainable Artificial Intelligence by Using Different Algorithms
D. Satyanarayana, E. Saikiran
(2024), pp. 1-4
Closed Access | Times Cited: 1

Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
M Anoop, L. William Mary, Allan J Wilson, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Tuning Element Distribution, Structure and Properties Using the SPSS Method
Ramya Sharma, Manjula Selvam, M Ramachandran, et al.
REST Journal on Emerging trends in Modelling and Manufacturing (2024) Vol. 9, Iss. 3, pp. 11-22
Open Access

Evaluating Drinking Water Quality in Salem District Using the DEMATEL Method
Sathiyaraj Chinnasamy, Vimala Saravanan, M Ramachandran, et al.
REST Journal on Emerging trends in Modelling and Manufacturing (2024) Vol. 9, Iss. 3, pp. 32-42
Open Access

Design optimization of Solar Power Inverter using the GRA Method
Ramya Sharma, M Ramachandran, Vimala Saravanan, et al.
(2024) Vol. 2, Iss. 3, pp. 23-35
Open Access

Internet of Things (IoT) Technologies With Intrusion Detection Systems in Deep Learning
Nancy Jasmine Goldena, R. Rashia SubaShree
Advances in information security, privacy, and ethics book series (2024), pp. 143-165
Closed Access

A Bibliometric and Trend Analysis on Fuzzy Risk Assessment
Selçuk Çebi, Cengiz Kahraman, Başar Öztayşi, et al.
Lecture notes in networks and systems (2024), pp. 639-648
Closed Access

Analysis of Big Data Network Security Defense Mechanism Application of Artificial Intelligence
Haitao He, Lin Luo, Qiong Zhao
International Journal of Intelligent Information Technologies (2024) Vol. 20, Iss. 1, pp. 1-18
Open Access

Leveraging AI for Network Threat Detection—A Conceptual Overview
Muhammad Ali Paracha, Syed Usman Jamil, Khurram Shahzad, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4611-4611
Open Access

A Novel Hybrid Approach for Threat Detection in Cyber Security using AI algorithm
Abhishek Kumar Gupta, Neetu Dixit, Sujeet Kumar, et al.
(2024), pp. 1-6
Closed Access

Future Technology Development Using VIKOR Method

Computer Science Engineering and Technology (2024) Vol. 1, Iss. 1, pp. 28-35
Open Access

Breast Cancer Metastasis: Markers and MCDM Models

Computer Science Engineering and Technology (2024) Vol. 1, Iss. 2, pp. 34-41
Open Access

Page 1 - Next Page

Scroll to top