OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intrusion detection system using soft labeling and stacking ensemble
Hadi Nazari Abdoli, Amir Jalaly Bidgoly, Somayyeh Fallah
International Journal of Information Technology (2022) Vol. 14, Iss. 7, pp. 3711-3718
Closed Access | Times Cited: 7

Showing 7 citing articles:

Deep-efficient-guard: securing wireless ad hoc networks via graph neural network
Sehba Masood, Aasim Zafar
International Journal of Information Technology (2024) Vol. 16, Iss. 7, pp. 4111-4126
Closed Access | Times Cited: 10

An optimized differential private stochastic gradient descent (DP-SGD) approach to combat membership inference attacks in neural networks
Emad Elabd, Waleed Ead, Shalu
International Journal of Information Technology (2025)
Closed Access

Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access

An intrusion detection system using ranked feature bagging
M. Azhagiri, A. Rajesh, S. Karthik, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1213-1219
Closed Access | Times Cited: 9

Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm
G Florance, R J Anandhi
International Journal of Information Technology (2024) Vol. 16, Iss. 7, pp. 4701-4712
Closed Access | Times Cited: 3

Enhancing Network Security through a Multi-layered Honeypot Architecture with Integrated Network Monitoring Tools
Tejas Shivaprasad, A S Moulya, N. Guruprasad
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 473-477
Closed Access | Times Cited: 1

A robust method for malware analysis using stacking classifiers and dendrogram visualization
N. Naveen Kumar, S. Balamurugan, R. Maruthamuthu, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1

A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks
Thiago José Lucas, Inaê Soares de Figueiredo, Carlos Alexandre Carvalho Tojeiro, et al.
IEEE Access (2023) Vol. 11, pp. 122638-122676
Open Access | Times Cited: 4

Page 1

Scroll to top