OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Efficient Hybrid Evolutionary Approach for Identification of Zero-Day Attacks on Wired/Wireless Network System
Alok Kumar Shukla
Wireless Personal Communications (2020) Vol. 123, Iss. 1, pp. 1-29
Closed Access | Times Cited: 15

Showing 15 citing articles:

Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Cluster Computing (2021) Vol. 24, Iss. 3, pp. 1881-1900
Closed Access | Times Cited: 57

Survey on Wireless Network Security
Rashid Nazir, Asif Ali Laghari, Kamlesh Kumar, et al.
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 3, pp. 1591-1610
Closed Access | Times Cited: 46

A deep and systematic review of the intrusion detection systems in the fog environment
Yi Lizhi, Mei Yin, Mehdi Darbandi
Transactions on Emerging Telecommunications Technologies (2022) Vol. 34, Iss. 1
Closed Access | Times Cited: 19

RETRACTED ARTICLE: IoT-based intrusion detection system for healthcare using RNNBiLSTM deep learning strategy with custom features
D. V. Jeyanthi, B. Indrani
Soft Computing (2023) Vol. 27, Iss. 16, pp. 11915-11930
Closed Access | Times Cited: 10

Tomato plant leaf disease detection using generative adversarial network and deep convolutional neural network
Rashmi Deshpande, Hemant Patidar
The Imaging Science Journal (2022) Vol. 70, Iss. 1, pp. 1-9
Closed Access | Times Cited: 13

Zero Day Attack Detection and Simulation through Deep Learning Techniques
Aalap Arun, Anjaly S. Nair, A. G. Sreedevi
(2024), pp. 852-857
Closed Access | Times Cited: 1

Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks
H. Azath, Mayank Mani, G. K. D. Prasanna Venkatesan, et al.
Wireless Personal Communications (2022) Vol. 123, Iss. 3, pp. 2227-2243
Closed Access | Times Cited: 6

IoT Based Intrusion Detection System for Healthcare Using RNNBiLSTM Deep Learning Strategy with Custom Features
D. V. Jeyanthi, B. Indrani
Research Square (Research Square) (2022)
Open Access | Times Cited: 5

An Integrated IDS Using ICA-Based Feature Selection and SVM Classification Method
Roseline Oluwaseun Ogundokun, Sanjay Misra, Amos Orenyi Bajeh, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 255-271
Closed Access | Times Cited: 4

Detecting anonymous attacks in wireless communication medium using adaptive grasshopper optimization algorithm
Shubhra Dwivedi
Cognitive Systems Research (2021) Vol. 69, pp. 1-21
Closed Access | Times Cited: 5

Exploring the Effectiveness of Selection of Feature Techniques for Incursion Detection in Cyber-Physical Systems
Ram Ji, Devanand Padha, Yashwant Singh
Advances in intelligent systems and computing (2024), pp. 65-81
Closed Access

Detecting impersonation episode using teaching learning‐based optimization and support vector machine techniques
Alok Kumar Shukla
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 1

Cybercrimes and defense approaches in vehicular networks
Anuraj Singh, Priyanka Chawla, Rajalakshmi Krishnamurthi, et al.
Elsevier eBooks (2022), pp. 37-63
Closed Access

Multi Core DN​N based IDS for Botnet Attacks using KPCA Reduction Techniques
B. Sharmila, Rohini Nagapadma
Research Square (Research Square) (2021)
Open Access

Page 1

Scroll to top