
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An intrusion detection system using ranked feature bagging
M. Azhagiri, A. Rajesh, S. Karthik, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1213-1219
Closed Access | Times Cited: 9
M. Azhagiri, A. Rajesh, S. Karthik, et al.
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1213-1219
Closed Access | Times Cited: 9
Showing 9 citing articles:
DMFCNN-HBO: deep maxout fusion convolutional neural network model enabled with honey badger optimization for DDoS attack detection
Dhananjay S. Rakshe, Sweta Jha, Pawan Bhaladhare
International Journal of Information Technology (2025)
Closed Access | Times Cited: 1
Dhananjay S. Rakshe, Sweta Jha, Pawan Bhaladhare
International Journal of Information Technology (2025)
Closed Access | Times Cited: 1
Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber‐Physical Systems
Ram Ji, Arvind Selwal, Narinder Verma, et al.
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
Ram Ji, Arvind Selwal, Narinder Verma, et al.
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access
Spreading cybersecurity awareness via gamification: zero-day game
Fadi Abu-Amara, Reem Al Hosani, Hamda Al Tamimi, et al.
International Journal of Information Technology (2024) Vol. 16, Iss. 5, pp. 2945-2953
Closed Access | Times Cited: 4
Fadi Abu-Amara, Reem Al Hosani, Hamda Al Tamimi, et al.
International Journal of Information Technology (2024) Vol. 16, Iss. 5, pp. 2945-2953
Closed Access | Times Cited: 4
An optimal feature subset selection technique to improve accounting information security for intrusion detection systems
Ameer Saheb Shaker, A.P.Dr. Wasan Qasim al-Khafaji, Makki Qasim Kuaiber, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Ameer Saheb Shaker, A.P.Dr. Wasan Qasim al-Khafaji, Makki Qasim Kuaiber, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1
Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 853-908
Open Access | Times Cited: 1
A GPS-based Face Attendance Register System using Android Applications stored in the Cloud
N. Murali, R. Rajesh, S. Sridharan, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 17-22
Closed Access | Times Cited: 1
N. Murali, R. Rajesh, S. Sridharan, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 17-22
Closed Access | Times Cited: 1
Enhancing Network Security through a Multi-layered Honeypot Architecture with Integrated Network Monitoring Tools
Tejas Shivaprasad, A S Moulya, N. Guruprasad
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 473-477
Closed Access | Times Cited: 1
Tejas Shivaprasad, A S Moulya, N. Guruprasad
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 473-477
Closed Access | Times Cited: 1
PPFCM-SMOTE: a novel balancing system for anomaly detection in IoT edge using probabilistic possibilistic fuzzy clustering and SMOTE
J. Manokaran, G. Vairavel, J. Vijaya
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
J. Manokaran, G. Vairavel, J. Vijaya
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
A lightweight approach for intrusion detection in WSNs based on DCGAN
Manu Devi, P. Nandal, Harkesh Sehrawat
International Journal of Information Technology (2024)
Closed Access
Manu Devi, P. Nandal, Harkesh Sehrawat
International Journal of Information Technology (2024)
Closed Access