
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine learning methods for cyber security intrusion detection: Datasets and comparative study
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür
Computer Networks (2021) Vol. 188, pp. 107840-107840
Closed Access | Times Cited: 280
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür
Computer Networks (2021) Vol. 188, pp. 107840-107840
Closed Access | Times Cited: 280
Showing 1-25 of 280 citing articles:
Federated Learning for intrusion detection system: Concepts, challenges and future directions
Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, et al.
Computer Communications (2022) Vol. 195, pp. 346-361
Open Access | Times Cited: 198
Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, et al.
Computer Communications (2022) Vol. 195, pp. 346-361
Open Access | Times Cited: 198
Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
A New Ensemble-Based Intrusion Detection System for Internet of Things
Adeel Abbas, Muazzam A. Khan, Shahid Latif, et al.
Arabian Journal for Science and Engineering (2021) Vol. 47, Iss. 2, pp. 1805-1819
Open Access | Times Cited: 118
Adeel Abbas, Muazzam A. Khan, Shahid Latif, et al.
Arabian Journal for Science and Engineering (2021) Vol. 47, Iss. 2, pp. 1805-1819
Open Access | Times Cited: 118
The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review
Iraqi Journal for Computer Science and Mathematics (2023), pp. 87-101
Open Access | Times Cited: 69
Iraqi Journal for Computer Science and Mathematics (2023), pp. 87-101
Open Access | Times Cited: 69
Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 61
Tehseen Mazhar, Dhani Bux Talpur, Tamara Al Shloul, et al.
Brain Sciences (2023) Vol. 13, Iss. 4, pp. 683-683
Open Access | Times Cited: 61
Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning
Ahmed M. Abdel‐Khalek, Maggie Mashaly
The Journal of Supercomputing (2023) Vol. 79, Iss. 10, pp. 10611-10644
Open Access | Times Cited: 49
Ahmed M. Abdel‐Khalek, Maggie Mashaly
The Journal of Supercomputing (2023) Vol. 79, Iss. 10, pp. 10611-10644
Open Access | Times Cited: 49
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective
Amit Kumar Mishra, Shweta Paliwal
Cluster Computing (2022) Vol. 26, Iss. 4, pp. 2339-2350
Closed Access | Times Cited: 53
Amit Kumar Mishra, Shweta Paliwal
Cluster Computing (2022) Vol. 26, Iss. 4, pp. 2339-2350
Closed Access | Times Cited: 53
A literature review of financial losses statistics for cyber security and future trend
Md Haris Uddin Sharif, Mehmood Ali Mohammed
World Journal of Advanced Research and Reviews (2022) Vol. 15, Iss. 1, pp. 138-156
Open Access | Times Cited: 52
Md Haris Uddin Sharif, Mehmood Ali Mohammed
World Journal of Advanced Research and Reviews (2022) Vol. 15, Iss. 1, pp. 138-156
Open Access | Times Cited: 52
Transfer-Learning-Based Intrusion Detection Framework in IoT Networks
Eva Rodríguez, Pol Valls, Beatriz Otero, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5621-5621
Open Access | Times Cited: 41
Eva Rodríguez, Pol Valls, Beatriz Otero, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5621-5621
Open Access | Times Cited: 41
A novel optimized probabilistic neural network approach for intrusion detection and categorization
Nadir Omer, Ahmed H. Samak, Ahmed I. Taloba, et al.
Alexandria Engineering Journal (2023) Vol. 72, pp. 351-361
Open Access | Times Cited: 39
Nadir Omer, Ahmed H. Samak, Ahmed I. Taloba, et al.
Alexandria Engineering Journal (2023) Vol. 72, pp. 351-361
Open Access | Times Cited: 39
ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model
Kezhou Ren, Yifan Zeng, Zhiqin Cao, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 38
Kezhou Ren, Yifan Zeng, Zhiqin Cao, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 38
Network Security in Cyberspace Using Machine Learning Techniques
Chitra Sabapathy Ranganathan, Ramakrishnan Raman, Kamal Sutaria, et al.
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2023), pp. 1755-1759
Closed Access | Times Cited: 35
Chitra Sabapathy Ranganathan, Ramakrishnan Raman, Kamal Sutaria, et al.
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2023), pp. 1755-1759
Closed Access | Times Cited: 35
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Mohamed Aly Bouke, Azizol Abdullah, Sameer Hamoud ALshatebi, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104823-104823
Closed Access | Times Cited: 33
Mohamed Aly Bouke, Azizol Abdullah, Sameer Hamoud ALshatebi, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104823-104823
Closed Access | Times Cited: 33
An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 31
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
IEEE Access (2023) Vol. 11, pp. 64228-64247
Open Access | Times Cited: 31
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework
Olivia Jullian, Beatriz Otero, Eva Rodríguez, et al.
Journal of Network and Systems Management (2023) Vol. 31, Iss. 2
Open Access | Times Cited: 29
Olivia Jullian, Beatriz Otero, Eva Rodríguez, et al.
Journal of Network and Systems Management (2023) Vol. 31, Iss. 2
Open Access | Times Cited: 29
Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27
Strategic Role of Trust in Digital Communication: Critical Insights into Building Organizational Sustainability
Miftachul Huda, Abdul Hadi Borham, Azmil Hashim, et al.
Lecture notes in networks and systems (2023), pp. 387-403
Closed Access | Times Cited: 22
Miftachul Huda, Abdul Hadi Borham, Azmil Hashim, et al.
Lecture notes in networks and systems (2023), pp. 387-403
Closed Access | Times Cited: 22
Exploring the Intersection of Machine Learning and Big Data: A Survey
Ηλίας Δρίτσας, Μαρία Τρίγκα
Machine Learning and Knowledge Extraction (2025) Vol. 7, Iss. 1, pp. 13-13
Open Access | Times Cited: 1
Ηλίας Δρίτσας, Μαρία Τρίγκα
Machine Learning and Knowledge Extraction (2025) Vol. 7, Iss. 1, pp. 13-13
Open Access | Times Cited: 1
Towards an Explainable Universal Feature Set for IoT Intrusion Detection
Mohammed M. Alani, Ali Miri
Sensors (2022) Vol. 22, Iss. 15, pp. 5690-5690
Open Access | Times Cited: 31
Mohammed M. Alani, Ali Miri
Sensors (2022) Vol. 22, Iss. 15, pp. 5690-5690
Open Access | Times Cited: 31
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28
Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
Heba Kadry, Ahmed Farouk, E. A. Zanaty, et al.
Alexandria Engineering Journal (2023) Vol. 71, pp. 491-500
Open Access | Times Cited: 19
Heba Kadry, Ahmed Farouk, E. A. Zanaty, et al.
Alexandria Engineering Journal (2023) Vol. 71, pp. 491-500
Open Access | Times Cited: 19
Effective network intrusion detection using stacking-based ensemble approach
Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1781-1798
Open Access | Times Cited: 19
Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1781-1798
Open Access | Times Cited: 19
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset
Tuan-Hong Chua, Iftekhar Salam
Symmetry (2023) Vol. 15, Iss. 6, pp. 1251-1251
Open Access | Times Cited: 17
Tuan-Hong Chua, Iftekhar Salam
Symmetry (2023) Vol. 15, Iss. 6, pp. 1251-1251
Open Access | Times Cited: 17
Federated learning for reliable model updates in network-based intrusion detection
Roger R. dos Santos, Eduardo K. Viegas, Altair O. Santin, et al.
Computers & Security (2023) Vol. 133, pp. 103413-103413
Closed Access | Times Cited: 17
Roger R. dos Santos, Eduardo K. Viegas, Altair O. Santin, et al.
Computers & Security (2023) Vol. 133, pp. 103413-103413
Closed Access | Times Cited: 17
IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100664-100664
Open Access | Times Cited: 6
Kousik Barik, Sanjay Misra
Software Impacts (2024) Vol. 21, pp. 100664-100664
Open Access | Times Cited: 6