
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Developing a multi-level intrusion detection system using hybrid-DBN
Ahmet Ali Süzen
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 2, pp. 1913-1923
Closed Access | Times Cited: 48
Ahmet Ali Süzen
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 2, pp. 1913-1923
Closed Access | Times Cited: 48
Showing 1-25 of 48 citing articles:
Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model
Mhamad Bakro, Rakesh Ranjan Kumar, M. N. Husain, et al.
IEEE Access (2024) Vol. 12, pp. 8846-8874
Open Access | Times Cited: 15
Mhamad Bakro, Rakesh Ranjan Kumar, M. N. Husain, et al.
IEEE Access (2024) Vol. 12, pp. 8846-8874
Open Access | Times Cited: 15
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 40
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 40
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction
Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1619-1648
Closed Access | Times Cited: 8
Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1619-1648
Closed Access | Times Cited: 8
Network intrusion detection based on IE-DBN model
Huaping Jia, Jun Liu, Min Zhang, et al.
Computer Communications (2021) Vol. 178, pp. 131-140
Closed Access | Times Cited: 40
Huaping Jia, Jun Liu, Min Zhang, et al.
Computer Communications (2021) Vol. 178, pp. 131-140
Closed Access | Times Cited: 40
Intrusion Detection using hybridized Meta-heuristic techniques with Weighted XGBoost Classifier
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 16
Detection of IoT Attacks Using Hybrid RNN‐DBN Model
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access
D. Pavithra, R. Bharathraj, P. Poovizhi, et al.
(2025), pp. 209-225
Closed Access
A Review of Artificial Intelligence to Enhance the Security of Big Data Systems: State-of-Art, Methodologies, Applications, and Challenges
Duan Dai, Sahar Boroomand
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 2, pp. 1291-1309
Closed Access | Times Cited: 33
Duan Dai, Sahar Boroomand
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 2, pp. 1291-1309
Closed Access | Times Cited: 33
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
Ravinder Kumar, Amita Malik, Virender Ranga
Knowledge-Based Systems (2022) Vol. 256, pp. 109762-109762
Closed Access | Times Cited: 25
A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13
Ijaz Ahmad, Zhong Wan, Ashfaq Ahmad
Internet of Things (2023) Vol. 23, pp. 100825-100825
Closed Access | Times Cited: 13
Adaptive Particle Grey Wolf Optimizer with Deep Learning-based Sentiment Analysis on Online Product Reviews
Durai Elangovan, Varatharaj Subedha
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 3, pp. 10989-10993
Open Access | Times Cited: 13
Durai Elangovan, Varatharaj Subedha
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 3, pp. 10989-10993
Open Access | Times Cited: 13
DFE: efficient IoT network intrusion detection using deep feature extraction
Amir Basati, Mohammad Mehdi Faghih
Neural Computing and Applications (2022) Vol. 34, Iss. 18, pp. 15175-15195
Closed Access | Times Cited: 19
Amir Basati, Mohammad Mehdi Faghih
Neural Computing and Applications (2022) Vol. 34, Iss. 18, pp. 15175-15195
Closed Access | Times Cited: 19
Hybrid optimization enabled deep learning technique for multi-level intrusion detection
Emil Selvan G.S.R., Maria Azees, CH. Rayala Vinodkumar, et al.
Advances in Engineering Software (2022) Vol. 173, pp. 103197-103197
Closed Access | Times Cited: 19
Emil Selvan G.S.R., Maria Azees, CH. Rayala Vinodkumar, et al.
Advances in Engineering Software (2022) Vol. 173, pp. 103197-103197
Closed Access | Times Cited: 19
Estimation performance of the novel hybrid estimator based on machine learning and extended Kalman filter proposed for speed-sensorless direct torque control of brushless direct current motor
Remzi İnan, Bekir Aksoy, Osamah Khaled Musleh SALMAN
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107083-107083
Closed Access | Times Cited: 9
Remzi İnan, Bekir Aksoy, Osamah Khaled Musleh SALMAN
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107083-107083
Closed Access | Times Cited: 9
Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
International Journal of Emerging Science and Engineering (2022) Vol. 10, Iss. 7, pp. 1-16
Open Access | Times Cited: 15
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
International Journal of Emerging Science and Engineering (2022) Vol. 10, Iss. 7, pp. 1-16
Open Access | Times Cited: 15
Multi-step attack detection in industrial networks using a hybrid deep learning architecture
Muhammad Hassan Jamal, Muazzam A. Khan, Safi Ullah, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 8, pp. 13824-13848
Open Access | Times Cited: 8
Muhammad Hassan Jamal, Muazzam A. Khan, Safi Ullah, et al.
Mathematical Biosciences & Engineering (2023) Vol. 20, Iss. 8, pp. 13824-13848
Open Access | Times Cited: 8
DBN-protected material Enhanced intrusion prevention sensor system defends against cyber attacks in the IoT devices
P. Ajay, B. Nagaraj, R. Arun Kumar, et al.
Measurement Sensors (2024) Vol. 34, pp. 101263-101263
Open Access | Times Cited: 2
P. Ajay, B. Nagaraj, R. Arun Kumar, et al.
Measurement Sensors (2024) Vol. 34, pp. 101263-101263
Open Access | Times Cited: 2
MuDeLA: multi-level deep learning approach for intrusion detection systems
Wathiq Laftah Al-Yaseen, Ali Kadhum Idrees
International Journal of Computers and Applications (2023) Vol. 45, Iss. 12, pp. 755-763
Closed Access | Times Cited: 6
Wathiq Laftah Al-Yaseen, Ali Kadhum Idrees
International Journal of Computers and Applications (2023) Vol. 45, Iss. 12, pp. 755-763
Closed Access | Times Cited: 6
Effective Intrusion Detection in Highly Imbalanced IoT Networks With Lightweight S2CGAN-IDS
C.P. Wang, Du Xu, Zonghang Li, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15140-15151
Open Access | Times Cited: 6
C.P. Wang, Du Xu, Zonghang Li, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15140-15151
Open Access | Times Cited: 6
Intrusion detection with deep learning on internet of things heterogeneous network
Sharipuddin Sharipuddin, Benni Purnama, Kurniabudi Kurniabudi, et al.
IAES International Journal of Artificial Intelligence (2021) Vol. 10, Iss. 3, pp. 735-735
Open Access | Times Cited: 15
Sharipuddin Sharipuddin, Benni Purnama, Kurniabudi Kurniabudi, et al.
IAES International Journal of Artificial Intelligence (2021) Vol. 10, Iss. 3, pp. 735-735
Open Access | Times Cited: 15
A deep learning-based approach for defect detection in powder bed fusion additive manufacturing using transfer learning
Burhan Duman, Koray Özsoy
Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi (2021) Vol. 37, Iss. 1, pp. 361-376
Open Access | Times Cited: 14
Burhan Duman, Koray Özsoy
Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi (2021) Vol. 37, Iss. 1, pp. 361-376
Open Access | Times Cited: 14
Optimal network intrusion detection assignment in multi-level IoT systems
Thi-Nga Dao, Duc Van Le, Xuan Nam Tran
Computer Networks (2023) Vol. 232, pp. 109846-109846
Closed Access | Times Cited: 5
Thi-Nga Dao, Duc Van Le, Xuan Nam Tran
Computer Networks (2023) Vol. 232, pp. 109846-109846
Closed Access | Times Cited: 5
Experimental and DBN-Based neural network extraction of radiation attenuation coefficient of dry mixture shotcrete produced using different additives
Melda Alkan Çakıroğlu, Ali Nadi Kaplan, Ahmet Ali Süzen
Radiation Physics and Chemistry (2021) Vol. 188, pp. 109636-109636
Closed Access | Times Cited: 13
Melda Alkan Çakıroğlu, Ali Nadi Kaplan, Ahmet Ali Süzen
Radiation Physics and Chemistry (2021) Vol. 188, pp. 109636-109636
Closed Access | Times Cited: 13
An improved autoencoder-based approach for anomaly detection in industrial control systems
Muhammad Muzamil Aslam, Ali Tufail, Liyanage C. De Silva, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1
Muhammad Muzamil Aslam, Ali Tufail, Liyanage C. De Silva, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1
A New Industrial Intrusion Detection Method Based on CNN-BiLSTM
Jun Wang, Changfu Si, Zhen Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4297-4318
Open Access | Times Cited: 1
Jun Wang, Changfu Si, Zhen Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 3, pp. 4297-4318
Open Access | Times Cited: 1
Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 1
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, et al.
Frontiers in Computer Science (2024) Vol. 6
Closed Access | Times Cited: 1