
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey
Mouhammd Alkasassbeh, Sherenaz W. Al-Haj Baddar
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 10021-10064
Closed Access | Times Cited: 27
Mouhammd Alkasassbeh, Sherenaz W. Al-Haj Baddar
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 10021-10064
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection
Samuel Oladiipo Olabanji, Yewande Alice Marquis, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 57-74
Open Access | Times Cited: 45
Samuel Oladiipo Olabanji, Yewande Alice Marquis, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 57-74
Open Access | Times Cited: 45
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection
Aeryn Dunmore, Julian Jang‐Jaccard, Fariza Sabrina, et al.
IEEE Access (2023) Vol. 11, pp. 76071-76094
Open Access | Times Cited: 42
Aeryn Dunmore, Julian Jang‐Jaccard, Fariza Sabrina, et al.
IEEE Access (2023) Vol. 11, pp. 76071-76094
Open Access | Times Cited: 42
Cyber-physical systems security: A systematic review
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 17
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 17
Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno
Applied Sciences (2024) Vol. 14, Iss. 10, pp. 4109-4109
Open Access | Times Cited: 9
Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno
Applied Sciences (2024) Vol. 14, Iss. 10, pp. 4109-4109
Open Access | Times Cited: 9
Effects of Feature Selection and Normalization on Network Intrusion Detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
(2024)
Open Access | Times Cited: 8
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
(2024)
Open Access | Times Cited: 8
Effects of feature selection and normalization on network intrusion detection
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
Data Science and Management (2024)
Open Access | Times Cited: 7
Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, et al.
Data Science and Management (2024)
Open Access | Times Cited: 7
Design of an Intrusion Detection Model for IoT-Enabled Smart Home
Deepti Rani, Nasib Singh Gill, Preeti Gulia, et al.
IEEE Access (2023), pp. 1-1
Open Access | Times Cited: 18
Deepti Rani, Nasib Singh Gill, Preeti Gulia, et al.
IEEE Access (2023), pp. 1-1
Open Access | Times Cited: 18
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access
Adversarial Attacks on Deep Learning-based Network Intrusion Detection Systems: A Taxonomy and Review
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2025)
Closed Access
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2025)
Closed Access
Analyzing the Effect of Feature Selection Algorithms on ML Classifiers
Aya Ahmed, Minar El-Aasser, Milad Ghantous
Lecture notes in networks and systems (2025), pp. 424-438
Closed Access
Aya Ahmed, Minar El-Aasser, Milad Ghantous
Lecture notes in networks and systems (2025), pp. 424-438
Closed Access
Robust Botnet Detection Approach for Known and Unknown Attacks in IoT Networks Using Stacked Multi-classifier and Adaptive Thresholding
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 3
Deepa Krishnan, Pravin Shrinath
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 12561-12577
Closed Access | Times Cited: 3
Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 3
Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109143-109143
Open Access | Times Cited: 3
Securing Emerging IoT Environments with Super Learner Ensembles
Abdelraouf Ishtaiwi, Ali Maqousi, Amjad Aldweesh
(2024), pp. 1-7
Closed Access | Times Cited: 2
Abdelraouf Ishtaiwi, Ali Maqousi, Amjad Aldweesh
(2024), pp. 1-7
Closed Access | Times Cited: 2
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
El Mehdi Kandoussi, Adam Houmairi, Iman El Mir, et al.
Cluster Computing (2024)
Closed Access | Times Cited: 1
El Mehdi Kandoussi, Adam Houmairi, Iman El Mir, et al.
Cluster Computing (2024)
Closed Access | Times Cited: 1
Enhanced Intrusion Detection Based Hybrid Meta-heuristic Feature Selection
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1
Ali Hussein Ali, Boudour Ammar, Maha Charfeddine, et al.
Communications in computer and information science (2024), pp. 3-15
Closed Access | Times Cited: 1
Machine Learning Techniques for Accurately Detecting the DNS Tunneling
Mouhammd Alkasassbeh, Mohammad Almseidin
Lecture notes in networks and systems (2023), pp. 352-364
Closed Access | Times Cited: 2
Mouhammd Alkasassbeh, Mohammad Almseidin
Lecture notes in networks and systems (2023), pp. 352-364
Closed Access | Times Cited: 2
Adversarial Attacks on Deep Learning-Based Network Intrusion Detection Systems: A Taxonomy and Review
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2024)
Closed Access
Md Mehedi Hasan, Rafiqul Islam, Quazi Mamun, et al.
(2024)
Closed Access
Machine Learning in Network Intrusion Detection: A Cross-Dataset Generalization Study
Marco Cantone, Claudio Marrocco, Alessandro Bria
IEEE Access (2024) Vol. 12, pp. 144489-144508
Open Access
Marco Cantone, Claudio Marrocco, Alessandro Bria
IEEE Access (2024) Vol. 12, pp. 144489-144508
Open Access
A Machine Learning Model to Predict Cyberattacks in Connected and Autonomous Vehicles
Manoj K. Jha, Rishav Jaiswal
Journal of Computational and Cognitive Engineering (2024) Vol. 3, Iss. 3, pp. 307-315
Open Access
Manoj K. Jha, Rishav Jaiswal
Journal of Computational and Cognitive Engineering (2024) Vol. 3, Iss. 3, pp. 307-315
Open Access
Hybrid Intrusion Detection System Based on Data Resampling and Deep Learning
Huan Chen, Gui-Rong You, Yeou-Ren Shiue
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access
Huan Chen, Gui-Rong You, Yeou-Ren Shiue
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access
Quality of Service of Signature Based Intrusion Detection System
Durdana Pervez, Zakira Inayat, Awais Ahmad
(2024)
Closed Access
Durdana Pervez, Zakira Inayat, Awais Ahmad
(2024)
Closed Access
CloudFusion: Multi-Source Intrusion Detection in Cloud Environments
Yang Xu, Kun Zhang, Xia Jun, et al.
(2024), pp. 2656-2661
Closed Access
Yang Xu, Kun Zhang, Xia Jun, et al.
(2024), pp. 2656-2661
Closed Access
Review of Intrusion Detection Systems Taxonomy, Techniques, Methods and Future Research Directions
Matúš Mikuláš, Ivan Kotuliak
(2024), pp. 1-8
Closed Access
Matúš Mikuláš, Ivan Kotuliak
(2024), pp. 1-8
Closed Access
INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS
Fal Sadikin, Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (2023) Vol. 8, Iss. 1, pp. 39-48
Open Access
Fal Sadikin, Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (2023) Vol. 8, Iss. 1, pp. 39-48
Open Access
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
Fal Sadikin, Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (2023) Vol. 8, Iss. 1, pp. 7-16
Open Access
Fal Sadikin, Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (2023) Vol. 8, Iss. 1, pp. 7-16
Open Access