
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network traffic anomaly detection method based on chaotic neural network
Shaojun Sheng, Xin Wang
Alexandria Engineering Journal (2023) Vol. 77, pp. 567-579
Open Access | Times Cited: 9
Shaojun Sheng, Xin Wang
Alexandria Engineering Journal (2023) Vol. 77, pp. 567-579
Open Access | Times Cited: 9
Showing 9 citing articles:
Physical Layer Security for 6G: Towards Achieving Intelligent Native Security at Layer-1
Israt Ara, Brian Kelley
IEEE Access (2024) Vol. 12, pp. 82800-82824
Open Access | Times Cited: 5
Israt Ara, Brian Kelley
IEEE Access (2024) Vol. 12, pp. 82800-82824
Open Access | Times Cited: 5
Quasi‐bipartite synchronization for delayed coupled inertial neural networks having cooperative and competitive communication via pinning control strategy
Chesintha Chenthamarakshan, Soundararajan Ganesan, K. Sivakumar, et al.
IET Control Theory and Applications (2025) Vol. 19, Iss. 1
Open Access
Chesintha Chenthamarakshan, Soundararajan Ganesan, K. Sivakumar, et al.
IET Control Theory and Applications (2025) Vol. 19, Iss. 1
Open Access
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2
A variable-order fractional memristor neural network: Secure image encryption and synchronization via a smooth and robust control approach
Abdullah Al-Barakati, Fatiha Mesdoui, Stelios Bekiros, et al.
Chaos Solitons & Fractals (2024) Vol. 186, pp. 115135-115135
Closed Access | Times Cited: 1
Abdullah Al-Barakati, Fatiha Mesdoui, Stelios Bekiros, et al.
Chaos Solitons & Fractals (2024) Vol. 186, pp. 115135-115135
Closed Access | Times Cited: 1
A Machine Learning Approach on Outlier Removal for Decision Tree Regression Method
Agus Sihabuddin, Nur Rokhman, Erwin Eko Wahyudi
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 4, pp. 1397-1403
Open Access
Agus Sihabuddin, Nur Rokhman, Erwin Eko Wahyudi
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 4, pp. 1397-1403
Open Access
Network Traffic Anomaly Detection Using t-Distributed Stochastic Neighbor Embedding and Variational Autoencoder Approach
Chandra Sekar P, G U Vasanthakumar, Myasar Mundher Adnan, et al.
(2024), pp. 1-4
Closed Access
Chandra Sekar P, G U Vasanthakumar, Myasar Mundher Adnan, et al.
(2024), pp. 1-4
Closed Access
Data-Driven Method for Predicting the Transportable Maximum Gas–Oil Ratio
D.S. Yan, Haiyang Yu, Yunlu Ma, et al.
Journal of Pipeline Systems Engineering and Practice (2024) Vol. 15, Iss. 4
Closed Access
D.S. Yan, Haiyang Yu, Yunlu Ma, et al.
Journal of Pipeline Systems Engineering and Practice (2024) Vol. 15, Iss. 4
Closed Access
Deep Learning-Powered Intrusion Detection Systems Networks Using LSTM
T. Sharath, A. Muthukumaravel
Advances in computer and electrical engineering book series (2024), pp. 105-126
Closed Access
T. Sharath, A. Muthukumaravel
Advances in computer and electrical engineering book series (2024), pp. 105-126
Closed Access
Feedforward Mutual-Information Anomaly Detection: Application to Autonomous Vehicles
Sasha M. McKee, Osama S. Haddadin, Kam K. Leang
Journal of Autonomous Vehicles and Systems (2022) Vol. 2, Iss. 4
Closed Access | Times Cited: 1
Sasha M. McKee, Osama S. Haddadin, Kam K. Leang
Journal of Autonomous Vehicles and Systems (2022) Vol. 2, Iss. 4
Closed Access | Times Cited: 1