
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system
Neha Gupta, Vinita Jindal, Punam Bedi
Computer Networks (2021) Vol. 192, pp. 108076-108076
Closed Access | Times Cited: 73
Neha Gupta, Vinita Jindal, Punam Bedi
Computer Networks (2021) Vol. 192, pp. 108076-108076
Closed Access | Times Cited: 73
Showing 1-25 of 73 citing articles:
Artificial intelligence for cybersecurity: Literature review and future research directions
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 243
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 243
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems
Neha Gupta, Vinita Jindal, Punam Bedi
Computers & Security (2021) Vol. 112, pp. 102499-102499
Closed Access | Times Cited: 104
Neha Gupta, Vinita Jindal, Punam Bedi
Computers & Security (2021) Vol. 112, pp. 102499-102499
Closed Access | Times Cited: 104
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity
Devrim Akgün, Selman Hızal, Ünal Çavuşoğlu
Computers & Security (2022) Vol. 118, pp. 102748-102748
Closed Access | Times Cited: 94
Devrim Akgün, Selman Hızal, Ünal Çavuşoğlu
Computers & Security (2022) Vol. 118, pp. 102748-102748
Closed Access | Times Cited: 94
A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 66
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 66
A survey on imbalanced learning: latest research, applications and future directions
Wuxing Chen, Kaixiang Yang, Zhiwen Yu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Open Access | Times Cited: 51
Wuxing Chen, Kaixiang Yang, Zhiwen Yu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Open Access | Times Cited: 51
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Maiada M. Mahmoud, Yasser Omar, Ayman Abdel-Hamid
Future Internet (2025) Vol. 17, Iss. 1, pp. 25-25
Open Access | Times Cited: 2
Maiada M. Mahmoud, Yasser Omar, Ayman Abdel-Hamid
Future Internet (2025) Vol. 17, Iss. 1, pp. 25-25
Open Access | Times Cited: 2
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 35
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 35
Towards an efficient model for network intrusion detection system (IDS): systematic literature review
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 23
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 23
Applying self-supervised learning to network intrusion detection for network flows with graph neural network
Renjie Xu, Guangwei Wu, Weiping Wang, et al.
Computer Networks (2024) Vol. 248, pp. 110495-110495
Open Access | Times Cited: 12
Renjie Xu, Guangwei Wu, Weiping Wang, et al.
Computer Networks (2024) Vol. 248, pp. 110495-110495
Open Access | Times Cited: 12
Class overlap handling methods in imbalanced domain: A comprehensive survey
A. Kumar, Dinesh Singh, Rama Shankar Yadav
Multimedia Tools and Applications (2024) Vol. 83, Iss. 23, pp. 63243-63290
Closed Access | Times Cited: 11
A. Kumar, Dinesh Singh, Rama Shankar Yadav
Multimedia Tools and Applications (2024) Vol. 83, Iss. 23, pp. 63243-63290
Closed Access | Times Cited: 11
Effective network intrusion detection using stacking-based ensemble approach
Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1781-1798
Open Access | Times Cited: 19
Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1781-1798
Open Access | Times Cited: 19
Intrusion detection for Industrial Internet of Things based on deep learning
Yaoyao Lu, Senchun Chai, Yuhan Suo, et al.
Neurocomputing (2023) Vol. 564, pp. 126886-126886
Closed Access | Times Cited: 17
Yaoyao Lu, Senchun Chai, Yuhan Suo, et al.
Neurocomputing (2023) Vol. 564, pp. 126886-126886
Closed Access | Times Cited: 17
MCGAN: Modified Conditional Generative Adversarial Network (MCGAN) for Class Imbalance Problems in Network Intrusion Detection System
Kunda Suresh Babu, Yamarthi Narasimha Rao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2576-2576
Open Access | Times Cited: 16
Kunda Suresh Babu, Yamarthi Narasimha Rao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2576-2576
Open Access | Times Cited: 16
EESNN: Hybrid Deep Learning Empowered Spatial–Temporal Features for Network Intrusion Detection System
Jalaiah Saikam, C. K. Rao
IEEE Access (2024) Vol. 12, pp. 15930-15945
Open Access | Times Cited: 6
Jalaiah Saikam, C. K. Rao
IEEE Access (2024) Vol. 12, pp. 15930-15945
Open Access | Times Cited: 6
Intrusion detection: A model based on the improved vision transformer
Yu‐Guang Yang, Hong‐Mei Fu, Shang Gao, et al.
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 9
Closed Access | Times Cited: 25
Yu‐Guang Yang, Hong‐Mei Fu, Shang Gao, et al.
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 9
Closed Access | Times Cited: 25
A CNN-transformer hybrid approach for an intrusion detection system in advanced metering infrastructure
Ruizhe Yao, Ning Wang, Peng Chen, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 13, pp. 19463-19486
Closed Access | Times Cited: 25
Ruizhe Yao, Ning Wang, Peng Chen, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 13, pp. 19463-19486
Closed Access | Times Cited: 25
An Enhanced Intrusion Detection System for IoT Networks Based on Deep Learning and Knowledge Graph
Xiuzhang Yang, Guojun Peng, Dongni Zhang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 24
Xiuzhang Yang, Guojun Peng, Dongni Zhang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 24
An efficient pattern-based approach for insider threat classification using the image-based feature representation
Krunal Randive, R. Mohan, Ambairam Muthu Sivakrishna
Journal of Information Security and Applications (2023) Vol. 73, pp. 103434-103434
Closed Access | Times Cited: 13
Krunal Randive, R. Mohan, Ambairam Muthu Sivakrishna
Journal of Information Security and Applications (2023) Vol. 73, pp. 103434-103434
Closed Access | Times Cited: 13
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Mateus Komarchesqui, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124982-124982
Closed Access | Times Cited: 5
Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques
V. N., V. S. Shankar Sriram
International Journal of Innovative Technology and Exploring Engineering (2025) Vol. 14, Iss. 2, pp. 12-20
Closed Access
V. N., V. S. Shankar Sriram
International Journal of Innovative Technology and Exploring Engineering (2025) Vol. 14, Iss. 2, pp. 12-20
Closed Access
Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access
Huiyao Dong, Igor Kotenko
Knowledge and Information Systems (2025)
Closed Access
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration
Samia Saidane, Francesco Telch, Kussai Shahin, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104013-104013
Open Access
Samia Saidane, Francesco Telch, Kussai Shahin, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104013-104013
Open Access
Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment
Mahmoud Ragab, Maha Farouk S. Sabir
Sustainable Energy Technologies and Assessments (2022) Vol. 52, pp. 102311-102311
Closed Access | Times Cited: 21
Mahmoud Ragab, Maha Farouk S. Sabir
Sustainable Energy Technologies and Assessments (2022) Vol. 52, pp. 102311-102311
Closed Access | Times Cited: 21
Review for Meta-Heuristic Optimization Propels Machine Learning Computations Execution on Spam Comment Area Under Digital Security Aegis Region
Biswajit Mondal, Debkanta Chakraborty, Niloy Kumar Bhattacherjee, et al.
Studies in computational intelligence (2022), pp. 343-361
Closed Access | Times Cited: 20
Biswajit Mondal, Debkanta Chakraborty, Niloy Kumar Bhattacherjee, et al.
Studies in computational intelligence (2022), pp. 343-361
Closed Access | Times Cited: 20
MTCR-AE: A Multiscale Temporal Convolutional Recurrent Autoencoder for unsupervised malicious network traffic detection
Mukhtar Ahmed, Jinfu Chen, Ernest Akpaku, et al.
Computer Networks (2025), pp. 111147-111147
Closed Access
Mukhtar Ahmed, Jinfu Chen, Ernest Akpaku, et al.
Computer Networks (2025), pp. 111147-111147
Closed Access