
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning
Ahmed M. Abdel‐Khalek, Maggie Mashaly
The Journal of Supercomputing (2023) Vol. 79, Iss. 10, pp. 10611-10644
Open Access | Times Cited: 49
Ahmed M. Abdel‐Khalek, Maggie Mashaly
The Journal of Supercomputing (2023) Vol. 79, Iss. 10, pp. 10611-10644
Open Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
XIDINTFL-VAE: XGBoost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 8
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 8
Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6
Sandeepkumar Racherla, Prathyusha Sripathi, Nuruzzaman Faruqui, et al.
IEEE Access (2024) Vol. 12, pp. 63584-63597
Open Access | Times Cited: 6
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Intrusion Detection Based on Adaptive Sample Distribution Dual-Experience Replay Reinforcement Learning
Haonan Tan, Le Wang, Dong Zhu, et al.
Mathematics (2024) Vol. 12, Iss. 7, pp. 948-948
Open Access | Times Cited: 5
Haonan Tan, Le Wang, Dong Zhu, et al.
Mathematics (2024) Vol. 12, Iss. 7, pp. 948-948
Open Access | Times Cited: 5
Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices
Mohammed Jouhari, Mohsen Guizani
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 1558-1563
Open Access | Times Cited: 5
Mohammed Jouhari, Mohsen Guizani
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 1558-1563
Open Access | Times Cited: 5
Fuzzy-Rule Based Optimized Hybrid Deep Learning Model for Network Intrusion Detection in SDN Enabled IoT Network
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access
Hybrid network intrusion detection system based on sliding window and information entropy in imbalanced dataset
Jingrong Mo, Jie Ke, Huiyi Zhou, et al.
Applied Intelligence (2025) Vol. 55, Iss. 6
Closed Access
Jingrong Mo, Jie Ke, Huiyi Zhou, et al.
Applied Intelligence (2025) Vol. 55, Iss. 6
Closed Access
Resampling approaches to handle class imbalance: a review from a data perspective
Miguel Martins Carvalho, Armando J. Pinho, Susana Brás
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access
Miguel Martins Carvalho, Armando J. Pinho, Susana Brás
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 4
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 4
Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
Ramya Chinnasamy, Malliga Subramanian, V E Sathishkumar, et al.
ICT Express (2025)
Open Access
Eeg Driven Seizure Classification Framework Leveraging Variational Mode Decomposition Technique and Entropy Features Based Bayesian Optimized SVM
C P Kandasamy, Vinodh Kumar E, E Balaji
(2025)
Closed Access
C P Kandasamy, Vinodh Kumar E, E Balaji
(2025)
Closed Access
Robust Intrusion Detection System Using an Improved Hybrid Deep Learning Model for Binary and Multi-Class Classification in IoT Networks
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Optimal intrusion detection for imbalanced data using Bagging method with deep neural network optimized by flower pollination algorithm
Hussein Ridha Sayegh, Dong Wang, Bahaa Hussein Taher, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2745-e2745
Open Access
Hussein Ridha Sayegh, Dong Wang, Bahaa Hussein Taher, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2745-e2745
Open Access
Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access
Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Antonio Maci, Alessandro Santorsola, Antonio Coscia, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 118-118
Open Access | Times Cited: 12
Antonio Maci, Alessandro Santorsola, Antonio Coscia, et al.
Computers (2023) Vol. 12, Iss. 6, pp. 118-118
Open Access | Times Cited: 12
A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3
Chia‐Hung Wang, Qing Ye, J. Cai, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 5893-5910
Closed Access | Times Cited: 3
Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems
Giuseppe Aceto, Fabio Giampaolo, Ciro Guida, et al.
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103926-103926
Open Access | Times Cited: 3
Giuseppe Aceto, Fabio Giampaolo, Ciro Guida, et al.
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103926-103926
Open Access | Times Cited: 3
Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data
Sikha Bagui, Dustin Mink, Subhash C. Bagui, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 204-204
Open Access | Times Cited: 8
Sikha Bagui, Dustin Mink, Subhash C. Bagui, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 204-204
Open Access | Times Cited: 8
Machine Learning Classification for Intrusion Detection Systems Using the NSL-KDD Dataset
Chotima Thana-Aksaneekorn, Somkiat Kosolsombat, Taweewat Luangwiriya
(2024), pp. 1-6
Closed Access | Times Cited: 2
Chotima Thana-Aksaneekorn, Somkiat Kosolsombat, Taweewat Luangwiriya
(2024), pp. 1-6
Closed Access | Times Cited: 2
A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 2
Samia Allaoua Chelloug
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4845-4861
Open Access | Times Cited: 2
Anomaly detection in network traffic with ELSC learning algorithm
Muhammad Muntazir Khan, Muhammad Zubair Rehman, Abdullah Khan, et al.
Electronics Letters (2024) Vol. 60, Iss. 14
Open Access | Times Cited: 2
Muhammad Muntazir Khan, Muhammad Zubair Rehman, Abdullah Khan, et al.
Electronics Letters (2024) Vol. 60, Iss. 14
Open Access | Times Cited: 2
Network intrusion detection based on machine learning strategies: performance comparisons on imbalanced wired, wireless, and software-defined networking (SDN) network traffics
Hilal Hacılar, ZAFER AYDIN, Vehbi Çağrı Güngör
TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES (2024) Vol. 32, Iss. 4, pp. 623-640
Open Access | Times Cited: 2
Hilal Hacılar, ZAFER AYDIN, Vehbi Çağrı Güngör
TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES (2024) Vol. 32, Iss. 4, pp. 623-640
Open Access | Times Cited: 2
CADS-ML/DL: efficient cloud-based multi-attack detection system
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1989-2013
Closed Access | Times Cited: 4
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1989-2013
Closed Access | Times Cited: 4
Approach of establishing a high-resolution shading occupant behavior model in the office building
Gaoxiang Chen, Jun Lu, Jian Yao, et al.
Journal of Building Engineering (2024) Vol. 87, pp. 108950-108950
Open Access | Times Cited: 1
Gaoxiang Chen, Jun Lu, Jian Yao, et al.
Journal of Building Engineering (2024) Vol. 87, pp. 108950-108950
Open Access | Times Cited: 1
Investigation of Oversampling in IoT-IDS
Shwe Sin Myat Than, Akari Myint Soe, Aung Htein Maw
(2024), pp. 1-6
Closed Access | Times Cited: 1
Shwe Sin Myat Than, Akari Myint Soe, Aung Htein Maw
(2024), pp. 1-6
Closed Access | Times Cited: 1