
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network
Xiaowei Wang, Shoulin Yin, Hang Li, et al.
International Journal of Wireless Information Networks (2020) Vol. 27, Iss. 4, pp. 503-517
Closed Access | Times Cited: 51
Xiaowei Wang, Shoulin Yin, Hang Li, et al.
International Journal of Wireless Information Networks (2020) Vol. 27, Iss. 4, pp. 503-517
Closed Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 91
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 91
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Sang-Woong Lee, Haval Mohammed Sidqi, Mokhtar Mohammadi, et al.
Journal of Network and Computer Applications (2021) Vol. 187, pp. 103111-103111
Closed Access | Times Cited: 93
Sang-Woong Lee, Haval Mohammed Sidqi, Mokhtar Mohammadi, et al.
Journal of Network and Computer Applications (2021) Vol. 187, pp. 103111-103111
Closed Access | Times Cited: 93
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine
Haifeng Lin, Qilin Xue, Jiayin Feng, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 1, pp. 111-124
Open Access | Times Cited: 50
Haifeng Lin, Qilin Xue, Jiayin Feng, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 1, pp. 111-124
Open Access | Times Cited: 50
Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 31
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 31
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks
Karthik Raj Kumar Yesodha, M. Krishnamurthy, M. Selvi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1237-1262
Closed Access | Times Cited: 7
Karthik Raj Kumar Yesodha, M. Krishnamurthy, M. Selvi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1237-1262
Closed Access | Times Cited: 7
Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework
Jitendra Kumar Samriya, Rajeev Tiwari, Xiaochun Cheng, et al.
Sustainable Computing Informatics and Systems (2022) Vol. 35, pp. 100746-100746
Closed Access | Times Cited: 31
Jitendra Kumar Samriya, Rajeev Tiwari, Xiaochun Cheng, et al.
Sustainable Computing Informatics and Systems (2022) Vol. 35, pp. 100746-100746
Closed Access | Times Cited: 31
Enhancing wireless sensor network security and efficiency with CNN-FL and NGO optimization
M. Shanmathi, Abhilash Sonker, Zair Hussain, et al.
Measurement Sensors (2024) Vol. 32, pp. 101057-101057
Open Access | Times Cited: 6
M. Shanmathi, Abhilash Sonker, Zair Hussain, et al.
Measurement Sensors (2024) Vol. 32, pp. 101057-101057
Open Access | Times Cited: 6
DeepDetect: An innovative hybrid deep learning framework for anomaly detection in IoT networks
Zeenat Zulfiqar, Saif Ur Rehman Malik, Syed Atif Moqurrab, et al.
Journal of Computational Science (2024) Vol. 83, pp. 102426-102426
Open Access | Times Cited: 5
Zeenat Zulfiqar, Saif Ur Rehman Malik, Syed Atif Moqurrab, et al.
Journal of Computational Science (2024) Vol. 83, pp. 102426-102426
Open Access | Times Cited: 5
Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey
Jacek Krupski, Waldemar Graniszewski, Marcin Iwanowski
Electronics (2021) Vol. 10, Iss. 16, pp. 2042-2042
Open Access | Times Cited: 34
Jacek Krupski, Waldemar Graniszewski, Marcin Iwanowski
Electronics (2021) Vol. 10, Iss. 16, pp. 2042-2042
Open Access | Times Cited: 34
A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks
Naveed Muhammad, Fahim Arif, Syed Muhammad Usman, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 23
Naveed Muhammad, Fahim Arif, Syed Muhammad Usman, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 23
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model
Tianyue Zhang, Wei Chen, Yu-Xiao Liu, et al.
Computers & Security (2023) Vol. 128, pp. 103144-103144
Closed Access | Times Cited: 14
Tianyue Zhang, Wei Chen, Yu-Xiao Liu, et al.
Computers & Security (2023) Vol. 128, pp. 103144-103144
Closed Access | Times Cited: 14
A Hierarchical Intrusion Detection Model Combining Multiple Deep Learning Models With Attention Mechanism
Hongsheng Xu, Libo Sun, Ganglong Fan, et al.
IEEE Access (2023) Vol. 11, pp. 66212-66226
Open Access | Times Cited: 14
Hongsheng Xu, Libo Sun, Ganglong Fan, et al.
IEEE Access (2023) Vol. 11, pp. 66212-66226
Open Access | Times Cited: 14
Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network
Shalini Subramani, M. Selvi
Neural Computing and Applications (2023) Vol. 35, Iss. 20, pp. 15201-15220
Closed Access | Times Cited: 12
Shalini Subramani, M. Selvi
Neural Computing and Applications (2023) Vol. 35, Iss. 20, pp. 15201-15220
Closed Access | Times Cited: 12
Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
HDL-IDS: Integrating feature selection methods with hybrid deep learning for improved intrusion detection systems
Marwa Mohammad Obaid, Muna Hadi Saleh
AIP conference proceedings (2025) Vol. 3264, pp. 040026-040026
Closed Access
Marwa Mohammad Obaid, Muna Hadi Saleh
AIP conference proceedings (2025) Vol. 3264, pp. 040026-040026
Closed Access
A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection
Shoulin Yin, Hang Li, Asif Ali Laghari, et al.
ICST Transactions on Scalable Information Systems (2021) Vol. 8, Iss. 33, pp. 171247-171247
Open Access | Times Cited: 28
Shoulin Yin, Hang Li, Asif Ali Laghari, et al.
ICST Transactions on Scalable Information Systems (2021) Vol. 8, Iss. 33, pp. 171247-171247
Open Access | Times Cited: 28
Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network
C. U. Om Kumar, Suguna Marappan, R. M. Bhavadharini, et al.
Wireless Personal Communications (2022) Vol. 129, Iss. 2, pp. 783-812
Closed Access | Times Cited: 19
C. U. Om Kumar, Suguna Marappan, R. M. Bhavadharini, et al.
Wireless Personal Communications (2022) Vol. 129, Iss. 2, pp. 783-812
Closed Access | Times Cited: 19
An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN
Zhihua Liu, Shengquan Liu, Zhang Jian
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 411-433
Open Access | Times Cited: 3
Zhihua Liu, Shengquan Liu, Zhang Jian
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 411-433
Open Access | Times Cited: 3
Multi-step attack detection in industrial networks using a hybrid deep learning architecture
Muhammad Hassan Jamal, Muazzam A. Khan, Safi Ullah, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 8, pp. 13824-13848
Open Access | Times Cited: 8
Muhammad Hassan Jamal, Muazzam A. Khan, Safi Ullah, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 8, pp. 13824-13848
Open Access | Times Cited: 8
TFD-IIS-CRMCB: Telecom Fraud Detection for Incomplete Information Systems Based on Correlated Relation and Maximal Consistent Block
Ran Li, Hongchang Chen, Shuxin Liu, et al.
Entropy (2023) Vol. 25, Iss. 1, pp. 112-112
Open Access | Times Cited: 7
Ran Li, Hongchang Chen, Shuxin Liu, et al.
Entropy (2023) Vol. 25, Iss. 1, pp. 112-112
Open Access | Times Cited: 7
E-commerce consumer privacy protection and immersive business experience simulation based on intrusion detection algorithms
Sumei Zhuang
Entertainment Computing (2024) Vol. 51, pp. 100747-100747
Closed Access | Times Cited: 2
Sumei Zhuang
Entertainment Computing (2024) Vol. 51, pp. 100747-100747
Closed Access | Times Cited: 2
<span>Novel Approach to Intrusion Detection: Introducing GAN-MSCNN-BILSTM with LIME Predictions</span> <br>
Asmaa Benchama
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 1
Asmaa Benchama
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 1
PdGAT-ID: An intrusion detection method for industrial control systems based on periodic extraction and spatiotemporal graph attention
Dongping Zhang, Mengting Wang, Yuzhen Bu, et al.
Computers & Security (2024) Vol. 149, pp. 104210-104210
Closed Access | Times Cited: 1
Dongping Zhang, Mengting Wang, Yuzhen Bu, et al.
Computers & Security (2024) Vol. 149, pp. 104210-104210
Closed Access | Times Cited: 1
A novel optimization-driven deep learning framework for the detection of DDoS attacks
Raj Kumar Batchu, Thulasi Bikku, Srinivasarao Thota, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Raj Kumar Batchu, Thulasi Bikku, Srinivasarao Thota, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Deep Learning based IDS for Secured Routing in Wireless Sensor Networks using Fuzzy Genetic Approach
Shalini Subramani, M. Selvi
Research Square (Research Square) (2022)
Open Access | Times Cited: 7
Shalini Subramani, M. Selvi
Research Square (Research Square) (2022)
Open Access | Times Cited: 7