
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Hybrid Evolutionary Approach for Identification of Zero-Day Attacks on Wired/Wireless Network System
Alok Kumar Shukla
Wireless Personal Communications (2020) Vol. 123, Iss. 1, pp. 1-29
Closed Access | Times Cited: 15
Alok Kumar Shukla
Wireless Personal Communications (2020) Vol. 123, Iss. 1, pp. 1-29
Closed Access | Times Cited: 15
Showing 15 citing articles:
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57
Survey on Wireless Network Security
Rashid Nazir, Asif Ali Laghari, Kamlesh Kumar, et al.
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 3, pp. 1591-1610
Closed Access | Times Cited: 46
Rashid Nazir, Asif Ali Laghari, Kamlesh Kumar, et al.
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 3, pp. 1591-1610
Closed Access | Times Cited: 46
A deep and systematic review of the intrusion detection systems in the fog environment
Yi Lizhi, Mei Yin, Mehdi Darbandi
Transactions on Emerging Telecommunications Technologies (2022) Vol. 34, Iss. 1
Closed Access | Times Cited: 19
Yi Lizhi, Mei Yin, Mehdi Darbandi
Transactions on Emerging Telecommunications Technologies (2022) Vol. 34, Iss. 1
Closed Access | Times Cited: 19
RETRACTED ARTICLE: IoT-based intrusion detection system for healthcare using RNNBiLSTM deep learning strategy with custom features
D. V. Jeyanthi, B. Indrani
Soft Computing (2023) Vol. 27, Iss. 16, pp. 11915-11930
Closed Access | Times Cited: 10
D. V. Jeyanthi, B. Indrani
Soft Computing (2023) Vol. 27, Iss. 16, pp. 11915-11930
Closed Access | Times Cited: 10
Tomato plant leaf disease detection using generative adversarial network and deep convolutional neural network
Rashmi Deshpande, Hemant Patidar
The Imaging Science Journal (2022) Vol. 70, Iss. 1, pp. 1-9
Closed Access | Times Cited: 13
Rashmi Deshpande, Hemant Patidar
The Imaging Science Journal (2022) Vol. 70, Iss. 1, pp. 1-9
Closed Access | Times Cited: 13
Zero Day Attack Detection and Simulation through Deep Learning Techniques
Aalap Arun, Anjaly S. Nair, A. G. Sreedevi
(2024), pp. 852-857
Closed Access | Times Cited: 1
Aalap Arun, Anjaly S. Nair, A. G. Sreedevi
(2024), pp. 852-857
Closed Access | Times Cited: 1
Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks
H. Azath, Mayank Mani, G. K. D. Prasanna Venkatesan, et al.
Wireless Personal Communications (2022) Vol. 123, Iss. 3, pp. 2227-2243
Closed Access | Times Cited: 6
H. Azath, Mayank Mani, G. K. D. Prasanna Venkatesan, et al.
Wireless Personal Communications (2022) Vol. 123, Iss. 3, pp. 2227-2243
Closed Access | Times Cited: 6
IoT Based Intrusion Detection System for Healthcare Using RNNBiLSTM Deep Learning Strategy with Custom Features
D. V. Jeyanthi, B. Indrani
Research Square (Research Square) (2022)
Open Access | Times Cited: 5
D. V. Jeyanthi, B. Indrani
Research Square (Research Square) (2022)
Open Access | Times Cited: 5
An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method
Roseline Oluwaseun Ogundokun, Sanjay Misra, Amos Orenyi Bajeh, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 255-271
Closed Access | Times Cited: 4
Roseline Oluwaseun Ogundokun, Sanjay Misra, Amos Orenyi Bajeh, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 255-271
Closed Access | Times Cited: 4
Detecting anonymous attacks in wireless communication medium using adaptive grasshopper optimization algorithm
Shubhra Dwivedi
Cognitive Systems Research (2021) Vol. 69, pp. 1-21
Closed Access | Times Cited: 5
Shubhra Dwivedi
Cognitive Systems Research (2021) Vol. 69, pp. 1-21
Closed Access | Times Cited: 5
FedAvg-P: Performance-Based Hierarchical Federated Learning-Based Anomaly Detection System Aggregation Strategy for Advanced Metering Infrastructure
Hend Alshede, Kamal Jambi, Laila Nassef, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5492-5492
Open Access
Hend Alshede, Kamal Jambi, Laila Nassef, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5492-5492
Open Access
Exploring the Effectiveness of Selection of Feature Techniques for Incursion Detection in Cyber-Physical Systems
Ram Ji, Devanand Padha, Yashwant Singh
Advances in intelligent systems and computing (2024), pp. 65-81
Closed Access
Ram Ji, Devanand Padha, Yashwant Singh
Advances in intelligent systems and computing (2024), pp. 65-81
Closed Access
Detecting impersonation episode using teaching learning‐based optimization and support vector machine techniques
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1
Cybercrimes and defense approaches in vehicular networks
Anuraj Singh, Priyanka Chawla, Rajalakshmi Krishnamurthi, et al.
Elsevier eBooks (2022), pp. 37-63
Closed Access
Anuraj Singh, Priyanka Chawla, Rajalakshmi Krishnamurthi, et al.
Elsevier eBooks (2022), pp. 37-63
Closed Access
Multi Core DNN based IDS for Botnet Attacks using KPCA Reduction Techniques
B. Sharmila, Rohini Nagapadma
Research Square (Research Square) (2021)
Open Access
B. Sharmila, Rohini Nagapadma
Research Square (Research Square) (2021)
Open Access