OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel approach to intrusion detection using SVM ensemble with feature augmentation
Jie Gu, Lihong Wang, Huiwen Wang, et al.
Computers & Security (2019) Vol. 86, pp. 53-62
Closed Access | Times Cited: 152

Showing 1-25 of 152 citing articles:

An effective intrusion detection approach using SVM with naïve Bayes feature embedding
Jie Gu, Shan Lu
Computers & Security (2020) Vol. 103, pp. 102158-102158
Closed Access | Times Cited: 226

AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection
Aechan Kim, Mohyun Park, Dong Hoon Lee
IEEE Access (2020) Vol. 8, pp. 70245-70261
Open Access | Times Cited: 186

Network Intrusion Detection Based on PSO-Xgboost Model
Hui Jiang, Zheng He, Gang Ye, et al.
IEEE Access (2020) Vol. 8, pp. 58392-58401
Open Access | Times Cited: 175

Machine learning-based lung and colon cancer detection using deep feature extraction and ensemble learning
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, et al.
Expert Systems with Applications (2022) Vol. 205, pp. 117695-117695
Open Access | Times Cited: 168

A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM
Jingmei Liu, Yuanbo Gao, Fengjie Hu
Computers & Security (2021) Vol. 106, pp. 102289-102289
Closed Access | Times Cited: 148

Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges
Geeta Kocher, Gulshan Kumar
Soft Computing (2021) Vol. 25, Iss. 15, pp. 9731-9763
Closed Access | Times Cited: 117

Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 19572-19585
Open Access | Times Cited: 107

An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Multimedia Tools and Applications (2023) Vol. 82, Iss. 15, pp. 23615-23633
Closed Access | Times Cited: 66

A systematic literature review for network intrusion detection system (IDS)
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
International Journal of Information Security (2023) Vol. 22, Iss. 5, pp. 1125-1162
Closed Access | Times Cited: 61

Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 311-320
Open Access | Times Cited: 57

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 43

Multi-Channel Deep Feature Learning for Intrusion Detection
Giuseppina Andresini, Annalisa Appice, Nicola Di Mauro, et al.
IEEE Access (2020) Vol. 8, pp. 53346-53359
Open Access | Times Cited: 110

A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71

An Intrusion Detection Method Based on Decision Tree-Recursive Feature Elimination in Ensemble Learning
Wenjuan Lian, Guoqing Nie, Bin Jia, et al.
Mathematical Problems in Engineering (2020) Vol. 2020, pp. 1-15
Open Access | Times Cited: 69

Machine Learning in Network Anomaly Detection: A Survey
Song Wang, Juan Fernando Balarezo, Sithamparanathan Kandeepan, et al.
IEEE Access (2021) Vol. 9, pp. 152379-152396
Open Access | Times Cited: 67

A Deep Learning-Based Smart Framework for Cyber-Physical and Satellite System Security Threats Detection
Imran Ashraf, Manideep Narra, Muhammad Umer, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 667-667
Open Access | Times Cited: 40

An effective intrusion detection approach based on ensemble learning for IIoT edge computing
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 4, pp. 469-481
Closed Access | Times Cited: 38

A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks
Zhenpeng Liu, Yihang Wang, Fan Feng, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 6176-6176
Open Access | Times Cited: 27

An approach to classify lung and colon cancer of histopathology images using deep feature extraction and an ensemble method
Onkar Singh, Koushlendra Kumar Singh
International Journal of Information Technology (2023) Vol. 15, Iss. 8, pp. 4149-4160
Closed Access | Times Cited: 26

Towards an efficient model for network intrusion detection system (IDS): systematic literature review
Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed
Wireless Networks (2023) Vol. 30, Iss. 1, pp. 453-482
Closed Access | Times Cited: 22

Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security
Chaimae Hazman, Azidine Guezzaz, Said Benkirane, et al.
Tsinghua Science & Technology (2024) Vol. 29, Iss. 4, pp. 929-947
Open Access | Times Cited: 11

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8

Malicious detection model with artificial neural network in IoT-based smart farming security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7307-7322
Closed Access | Times Cited: 7

A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44

Page 1 - Next Page

Scroll to top