OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey
Mouhammd Alkasassbeh, Sherenaz W. Al-Haj Baddar
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 10021-10064
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection
Samuel Oladiipo Olabanji, Yewande Alice Marquis, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 57-74
Open Access | Times Cited: 45

A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection
Aeryn Dunmore, Julian Jang‐Jaccard, Fariza Sabrina, et al.
IEEE Access (2023) Vol. 11, pp. 76071-76094
Open Access | Times Cited: 42

Cyber-physical systems security: A systematic review
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 17

Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno
Applied Sciences (2024) Vol. 14, Iss. 10, pp. 4109-4109
Open Access | Times Cited: 9

Effects of Feature Selection and Normalization on Network Intrusion Detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
(2024)
Open Access | Times Cited: 8

Effects of feature selection and normalization on network intrusion detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
Data Science and Management (2024)
Open Access | Times Cited: 7

Design of an Intrusion Detection Model for IoT-Enabled Smart Home
Deepti Rani, Nasib Singh Gill, Preeti Gulia, et al.
IEEE Access (2023), pp. 1-1
Open Access | Times Cited: 18

Dual-hybrid intrusion detection system to detect False Data Injection in smart grids
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access

Adversarial Attacks on Deep Learning-based Network Intrusion Detection Systems: A Taxonomy and Review
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2025)
Closed Access

Analyzing the Effect of Feature Selection Algorithms on ML Classifiers
Aya Ahmed, Minar El-Aasser, Milad Ghantous
Lecture notes in networks and systems (2025), pp. 424-438
Closed Access

Robust Botnet Detection Approach for Known and Unknown Attacks in IoT Networks Using Stacked Multi-classifier and Adaptive Thresholding
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 3

Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 3

Securing Emerging IoT Environments with Super Learner Ensembles
Abdelraouf Ishtaiwi, Ali Maqousi, Amjad Aldweesh
(2024), pp. 1-7
Closed Access | Times Cited: 2

Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
El Mehdi Kandoussi, Adam Houmairi, Iman El Mir, et al.
Cluster Computing (2024)
Closed Access | Times Cited: 1

Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1

Machine Learning Techniques for Accurately Detecting the DNS Tunneling
Mouhammd Alkasassbeh, Mohammad Almseidin
Lecture notes in networks and systems (2023), pp. 352-364
Closed Access | Times Cited: 2

Adversarial Attacks on Deep Learning-Based Network Intrusion Detection Systems: A Taxonomy and Review
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2024)
Closed Access

Machine Learning in Network Intrusion Detection: A Cross-Dataset Generalization Study
Marco Cantone, Claudio Marrocco, Alessandro Bria
IEEE Access (2024) Vol. 12, pp. 144489-144508
Open Access

A Machine Learning Model to Predict Cyberattacks in Connected and Autonomous Vehicles
Manoj K. Jha, Rishav Jaiswal
Journal of Computational and Cognitive Engineering (2024) Vol. 3, Iss. 3, pp. 307-315
Open Access

Hybrid Intrusion Detection System Based on Data Resampling and Deep Learning
Huan Chen, Gui-Rong You, Yeou-Ren Shiue
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access

Quality of Service of Signature Based Intrusion Detection System
Durdana Pervez, Zakira Inayat, Awais Ahmad
(2024)
Closed Access

CloudFusion: Multi-Source Intrusion Detection in Cloud Environments
Yang Xu, Kun Zhang, Xia Jun, et al.
(2024), pp. 2656-2661
Closed Access

INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS
Fal Sadikin, Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (2023) Vol. 8, Iss. 1, pp. 39-48
Open Access

ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
Fal Sadikin, Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (2023) Vol. 8, Iss. 1, pp. 7-16
Open Access

Page 1 - Next Page

Scroll to top