
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
Wisam Elmasry, Akhan Akbulut, Abdül Halim Zaim
Computer Networks (2019) Vol. 168, pp. 107042-107042
Closed Access | Times Cited: 218
Wisam Elmasry, Akhan Akbulut, Abdül Halim Zaim
Computer Networks (2019) Vol. 168, pp. 107042-107042
Closed Access | Times Cited: 218
Showing 1-25 of 218 citing articles:
An effective intrusion detection approach using SVM with naïve Bayes feature embedding
Jie Gu, Shan Lu
Computers & Security (2020) Vol. 103, pp. 102158-102158
Closed Access | Times Cited: 226
Jie Gu, Shan Lu
Computers & Security (2020) Vol. 103, pp. 102158-102158
Closed Access | Times Cited: 226
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Ankit Thakkar, Ritika Lohiya
Artificial Intelligence Review (2021) Vol. 55, Iss. 1, pp. 453-563
Closed Access | Times Cited: 173
Ankit Thakkar, Ritika Lohiya
Artificial Intelligence Review (2021) Vol. 55, Iss. 1, pp. 453-563
Closed Access | Times Cited: 173
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection
Hongwei Ding, Leiyang Chen, Liang Dong, et al.
Future Generation Computer Systems (2022) Vol. 131, pp. 240-254
Closed Access | Times Cited: 140
Hongwei Ding, Leiyang Chen, Liang Dong, et al.
Future Generation Computer Systems (2022) Vol. 131, pp. 240-254
Closed Access | Times Cited: 140
Application of Meta-Heuristic Algorithms for Training Neural Networks and Deep Learning Architectures: A Comprehensive Review
Mehrdad Kaveh, Mohammad Saadi Mesgari
Neural Processing Letters (2022) Vol. 55, Iss. 4, pp. 4519-4622
Open Access | Times Cited: 118
Mehrdad Kaveh, Mohammad Saadi Mesgari
Neural Processing Letters (2022) Vol. 55, Iss. 4, pp. 4519-4622
Open Access | Times Cited: 118
Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways
Xuan-Ha Nguyen, Xuan-Duong Nguyen, Hoang-Hai Huynh, et al.
Sensors (2022) Vol. 22, Iss. 2, pp. 432-432
Open Access | Times Cited: 76
Xuan-Ha Nguyen, Xuan-Duong Nguyen, Hoang-Hai Huynh, et al.
Sensors (2022) Vol. 22, Iss. 2, pp. 432-432
Open Access | Times Cited: 76
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 72
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 72
Ensuring network security with a robust intrusion detection system using ensemble-based machine learning
Md. Alamgir Hossain, Md. Saiful Islam
Array (2023) Vol. 19, pp. 100306-100306
Open Access | Times Cited: 70
Md. Alamgir Hossain, Md. Saiful Islam
Array (2023) Vol. 19, pp. 100306-100306
Open Access | Times Cited: 70
A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 61
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 61
Fed-ANIDS: Federated learning for anomaly-based network intrusion detection systems
Meryem Janati Idrissi, Hamza Alami, Abdelkader El Mahdaouy, et al.
Expert Systems with Applications (2023) Vol. 234, pp. 121000-121000
Closed Access | Times Cited: 58
Meryem Janati Idrissi, Hamza Alami, Abdelkader El Mahdaouy, et al.
Expert Systems with Applications (2023) Vol. 234, pp. 121000-121000
Closed Access | Times Cited: 58
Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks
Ashfaq Ahmad Najar, S. Manohar Naik
Computers & Security (2024) Vol. 139, pp. 103716-103716
Closed Access | Times Cited: 25
Ashfaq Ahmad Najar, S. Manohar Naik
Computers & Security (2024) Vol. 139, pp. 103716-103716
Closed Access | Times Cited: 25
Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud
Aanshi Bhardwaj, Veenu Mangat, Renu Vig
IEEE Access (2020) Vol. 8, pp. 181916-181929
Open Access | Times Cited: 108
Aanshi Bhardwaj, Veenu Mangat, Renu Vig
IEEE Access (2020) Vol. 8, pp. 181916-181929
Open Access | Times Cited: 108
Deep belief network based intrusion detection techniques: A survey
Insoo Sohn
Expert Systems with Applications (2020) Vol. 167, pp. 114170-114170
Closed Access | Times Cited: 104
Insoo Sohn
Expert Systems with Applications (2020) Vol. 167, pp. 114170-114170
Closed Access | Times Cited: 104
A Survey on Data-driven Network Intrusion Detection
Dylan Chou, Meng Jiang
ACM Computing Surveys (2021) Vol. 54, Iss. 9, pp. 1-36
Open Access | Times Cited: 91
Dylan Chou, Meng Jiang
ACM Computing Surveys (2021) Vol. 54, Iss. 9, pp. 1-36
Open Access | Times Cited: 91
Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things
Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, et al.
Electronics (2021) Vol. 10, Iss. 11, pp. 1341-1341
Open Access | Times Cited: 88
Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, et al.
Electronics (2021) Vol. 10, Iss. 11, pp. 1341-1341
Open Access | Times Cited: 88
Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 87
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 87
SAAE-DNN: Deep Learning Method on Intrusion Detection
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning
Zhendong Wang, Zeyu Li, Daojing He, et al.
Expert Systems with Applications (2022) Vol. 206, pp. 117671-117671
Closed Access | Times Cited: 60
Zhendong Wang, Zeyu Li, Daojing He, et al.
Expert Systems with Applications (2022) Vol. 206, pp. 117671-117671
Closed Access | Times Cited: 60
Multi-step influenza outbreak forecasting using deep LSTM network and genetic algorithm
Ahmet Kara
Expert Systems with Applications (2021) Vol. 180, pp. 115153-115153
Closed Access | Times Cited: 58
Ahmet Kara
Expert Systems with Applications (2021) Vol. 180, pp. 115153-115153
Closed Access | Times Cited: 58
A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 55
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 55
A novel automated CNN arrhythmia classifier with memory-enhanced artificial hummingbird algorithm
Evren Kıymaç, Yasin Kaya
Expert Systems with Applications (2022) Vol. 213, pp. 119162-119162
Closed Access | Times Cited: 44
Evren Kıymaç, Yasin Kaya
Expert Systems with Applications (2022) Vol. 213, pp. 119162-119162
Closed Access | Times Cited: 44
Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
Romany F. Mansour
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 39
Romany F. Mansour
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 39
Optimization of Intrusion Detection Using Likely Point PSO and Enhanced LSTM-RNN Hybrid Technique in Communication Networks
A. A. Donkol, Ali G. Hafez, Aziza I. Hussein, et al.
IEEE Access (2023) Vol. 11, pp. 9469-9482
Open Access | Times Cited: 35
A. A. Donkol, Ali G. Hafez, Aziza I. Hussein, et al.
IEEE Access (2023) Vol. 11, pp. 9469-9482
Open Access | Times Cited: 35
A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35
DDoS attack detection and mitigation using deep neural network in SDN environment
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 32
Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong-Nhung Nguyen, et al.
Computers & Security (2023) Vol. 138, pp. 103661-103661
Closed Access | Times Cited: 32