
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Attack and intrusion detection in cloud computing using an ensemble learning approach
Parul Singh, Virender Ranga
International Journal of Information Technology (2021) Vol. 13, Iss. 2, pp. 565-571
Closed Access | Times Cited: 58
Parul Singh, Virender Ranga
International Journal of Information Technology (2021) Vol. 13, Iss. 2, pp. 565-571
Closed Access | Times Cited: 58
Showing 1-25 of 58 citing articles:
Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 30
Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9588-9588
Open Access | Times Cited: 30
Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
T. Aswini Devi, Arpit Jain
(2024)
Closed Access | Times Cited: 13
T. Aswini Devi, Arpit Jain
(2024)
Closed Access | Times Cited: 13
A supervised machine learning-based solution for efficient network intrusion detection using ensemble learning based on hyperparameter optimization
Arindam Sarkar, Hanjabam Saratchandra Sharma, Moirangthem Marjit Singh
International Journal of Information Technology (2022) Vol. 15, Iss. 1, pp. 423-434
Closed Access | Times Cited: 28
Arindam Sarkar, Hanjabam Saratchandra Sharma, Moirangthem Marjit Singh
International Journal of Information Technology (2022) Vol. 15, Iss. 1, pp. 423-434
Closed Access | Times Cited: 28
Geotechnical characterisation of coal spoil piles using high-resolution optical and multispectral data: A machine learning approach
Sureka Thiruchittampalam, Bikram Pratap Banerjee, Nancy F. Glenn, et al.
Engineering Geology (2024) Vol. 329, pp. 107406-107406
Open Access | Times Cited: 5
Sureka Thiruchittampalam, Bikram Pratap Banerjee, Nancy F. Glenn, et al.
Engineering Geology (2024) Vol. 329, pp. 107406-107406
Open Access | Times Cited: 5
Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber‐Physical Systems
Ram Ji, Arvind Selwal, Narinder Verma, et al.
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
Ram Ji, Arvind Selwal, Narinder Verma, et al.
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Machine Learning and Deep Learning based Intrusion Detection in Cloud Environment: A Review
A. Vinolia, N. Kanya, V.N. Rajavarman
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 952-960
Closed Access | Times Cited: 15
A. Vinolia, N. Kanya, V.N. Rajavarman
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 952-960
Closed Access | Times Cited: 15
MFBFST: Building a stable ensemble learning model using multivariate filter-based feature selection technique for detection of suspicious URL
Sanjukta Mohanty, Arup Abhinna Acharya
Procedia Computer Science (2023) Vol. 218, pp. 1668-1681
Open Access | Times Cited: 9
Sanjukta Mohanty, Arup Abhinna Acharya
Procedia Computer Science (2023) Vol. 218, pp. 1668-1681
Open Access | Times Cited: 9
Detection of DDoS Vulnerability in Cloud Computing Using the Perplexed Bayes Classifier
Narendra Mishra, R. K. Singh, Sunil Kumar Yadav
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 15
Narendra Mishra, R. K. Singh, Sunil Kumar Yadav
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 15
Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization algorithm
G. Senthilkumar, K. Tamilarasi, J. K. Periasamy
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1383-1400
Closed Access | Times Cited: 8
G. Senthilkumar, K. Tamilarasi, J. K. Periasamy
Wireless Networks (2023) Vol. 30, Iss. 3, pp. 1383-1400
Closed Access | Times Cited: 8
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA
K. Devi, B. Muthusenthil
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 9
Closed Access | Times Cited: 12
K. Devi, B. Muthusenthil
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 9
Closed Access | Times Cited: 12
An optimal feature subset selection technique to improve accounting information security for intrusion detection systems
Ameer Saheb Shaker, A.P.Dr. Wasan Qasim al-Khafaji, Makki Qasim Kuaiber, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Ameer Saheb Shaker, A.P.Dr. Wasan Qasim al-Khafaji, Makki Qasim Kuaiber, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Jaya-Mutated Leader Algorithm Based Deep Feed Forward Neural Network for Intrusion Detection Using Cloud Computing
Kirti Mahajan, Saeed Alhasen, Deepti Chaudhari, et al.
Cybernetics & Systems (2023), pp. 1-25
Closed Access | Times Cited: 5
Kirti Mahajan, Saeed Alhasen, Deepti Chaudhari, et al.
Cybernetics & Systems (2023), pp. 1-25
Closed Access | Times Cited: 5
Detection of non-periodic low-rate denial of service attacks in software defined networks using machine learning
Danial Yousef, Boushra Maala, Maria Skvortsova, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 4, pp. 2161-2175
Closed Access | Times Cited: 5
Danial Yousef, Boushra Maala, Maria Skvortsova, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 4, pp. 2161-2175
Closed Access | Times Cited: 5
A Comprehensive Survey on Ensemble Machine Learning Approaches for Detection of Intrusion in IoT Networks
J. Jasmine Shirley, M. Geetha Priya
(2023) Vol. 4, pp. 1-10
Closed Access | Times Cited: 4
J. Jasmine Shirley, M. Geetha Priya
(2023) Vol. 4, pp. 1-10
Closed Access | Times Cited: 4
Service centric attribute based block level two step encryption scheme for improved cloud security
Shahnawaz Ahmad, Shabana Mehfuz, Javed Beg
AIP conference proceedings (2024) Vol. 3082, pp. 150003-150003
Open Access | Times Cited: 1
Shahnawaz Ahmad, Shabana Mehfuz, Javed Beg
AIP conference proceedings (2024) Vol. 3082, pp. 150003-150003
Open Access | Times Cited: 1
Hybrid one‐dimensional residual autoencoder and ensemble of gradient boosting for cloud IDS
Nupa Ram Chauhan, Rakesh Dwivedi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 14
Closed Access | Times Cited: 1
Nupa Ram Chauhan, Rakesh Dwivedi
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 14
Closed Access | Times Cited: 1
Enhancing cloud security: A study on ensemble learning‐based intrusion detection systems
Maha Al‐Sharif, Anas Bushnag
IET Communications (2024) Vol. 18, Iss. 16, pp. 950-965
Open Access | Times Cited: 1
Maha Al‐Sharif, Anas Bushnag
IET Communications (2024) Vol. 18, Iss. 16, pp. 950-965
Open Access | Times Cited: 1
Intrusion detection based on concept drift detection and online incremental learning
Farah Jemili, Khaled Jouini, Ouajdi Korbaa
International Journal of Pervasive Computing and Communications (2024)
Closed Access | Times Cited: 1
Farah Jemili, Khaled Jouini, Ouajdi Korbaa
International Journal of Pervasive Computing and Communications (2024)
Closed Access | Times Cited: 1
DaE2: Unmasking Malicious URLs by Leveraging Diverse and Efficient Ensemble Machine Learning for Online Security
Abiodun Esther Omolara, Moatsum Alawida
Computers & Security (2024), pp. 104170-104170
Closed Access | Times Cited: 1
Abiodun Esther Omolara, Moatsum Alawida
Computers & Security (2024), pp. 104170-104170
Closed Access | Times Cited: 1
Intrusion detection system using soft labeling and stacking ensemble
Hadi Nazari Abdoli, Amir Jalaly Bidgoly, Somayyeh Fallah
International Journal of Information Technology (2022) Vol. 14, Iss. 7, pp. 3711-3718
Closed Access | Times Cited: 7
Hadi Nazari Abdoli, Amir Jalaly Bidgoly, Somayyeh Fallah
International Journal of Information Technology (2022) Vol. 14, Iss. 7, pp. 3711-3718
Closed Access | Times Cited: 7
Light Weight Gradient Ensemble Model for detecting network attack at the edge of the IoT network
D. Santhadevi, B. Janet
International Journal of Information Technology (2022) Vol. 15, Iss. 1, pp. 29-38
Closed Access | Times Cited: 7
D. Santhadevi, B. Janet
International Journal of Information Technology (2022) Vol. 15, Iss. 1, pp. 29-38
Closed Access | Times Cited: 7
Enhanced capsule generative adversarial network with Blockchain fostered Intrusion Detection System for Enhancing Cyber security in Cloud
R. Ravi Kanth, T. Prem Jacob
(2023), pp. 1-6
Closed Access | Times Cited: 4
R. Ravi Kanth, T. Prem Jacob
(2023), pp. 1-6
Closed Access | Times Cited: 4
A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks
Thiago José Lucas, Inaê Soares de Figueiredo, Carlos Alexandre Carvalho Tojeiro, et al.
IEEE Access (2023) Vol. 11, pp. 122638-122676
Open Access | Times Cited: 4
Thiago José Lucas, Inaê Soares de Figueiredo, Carlos Alexandre Carvalho Tojeiro, et al.
IEEE Access (2023) Vol. 11, pp. 122638-122676
Open Access | Times Cited: 4