
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, et al.
Computers & Security (2019) Vol. 86, pp. 291-317
Closed Access | Times Cited: 140
Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, et al.
Computers & Security (2019) Vol. 86, pp. 291-317
Closed Access | Times Cited: 140
Showing 1-25 of 140 citing articles:
An effective intrusion detection approach using SVM with naïve Bayes feature embedding
Jie Gu, Shan Lu
Computers & Security (2020) Vol. 103, pp. 102158-102158
Closed Access | Times Cited: 228
Jie Gu, Shan Lu
Computers & Security (2020) Vol. 103, pp. 102158-102158
Closed Access | Times Cited: 228
AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection
Aechan Kim, Mohyun Park, Dong Hoon Lee
IEEE Access (2020) Vol. 8, pp. 70245-70261
Open Access | Times Cited: 187
Aechan Kim, Mohyun Park, Dong Hoon Lee
IEEE Access (2020) Vol. 8, pp. 70245-70261
Open Access | Times Cited: 187
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 5986-5986
Open Access | Times Cited: 187
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, et al.
Sensors (2022) Vol. 22, Iss. 16, pp. 5986-5986
Open Access | Times Cited: 187
Cyber risk and cybersecurity: a systematic review of data availability
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Frank Cremer, Barry Sheehan, Michael Fortmann, et al.
The Geneva Papers on Risk and Insurance Issues and Practice (2022) Vol. 47, Iss. 3, pp. 698-736
Open Access | Times Cited: 180
Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method
Mona Alduailij, Qazi Waqas Khan, Muhammad Tahir, et al.
Symmetry (2022) Vol. 14, Iss. 6, pp. 1095-1095
Open Access | Times Cited: 108
Mona Alduailij, Qazi Waqas Khan, Muhammad Tahir, et al.
Symmetry (2022) Vol. 14, Iss. 6, pp. 1095-1095
Open Access | Times Cited: 108
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems
Neha Gupta, Vinita Jindal, Punam Bedi
Computers & Security (2021) Vol. 112, pp. 102499-102499
Closed Access | Times Cited: 104
Neha Gupta, Vinita Jindal, Punam Bedi
Computers & Security (2021) Vol. 112, pp. 102499-102499
Closed Access | Times Cited: 104
Survey on Evolutionary Deep Learning: Principles, Algorithms, Applications, and Open Issues
Nan Li, Lianbo Ma, Guo Yu, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 2, pp. 1-34
Open Access | Times Cited: 60
Nan Li, Lianbo Ma, Guo Yu, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 2, pp. 1-34
Open Access | Times Cited: 60
AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection
Samuel Oladiipo Olabanji, Yewande Alice Marquis, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 57-74
Open Access | Times Cited: 45
Samuel Oladiipo Olabanji, Yewande Alice Marquis, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 57-74
Open Access | Times Cited: 45
A deep learning approach for effective intrusion detection in wireless networks using CNN
B. Riyaz, Sannasi Ganapathy
Soft Computing (2020) Vol. 24, Iss. 22, pp. 17265-17278
Closed Access | Times Cited: 131
B. Riyaz, Sannasi Ganapathy
Soft Computing (2020) Vol. 24, Iss. 22, pp. 17265-17278
Closed Access | Times Cited: 131
Hybrid approach to intrusion detection in fog-based IoT environments
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2020) Vol. 180, pp. 107417-107417
Closed Access | Times Cited: 127
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, et al.
Computer Networks (2020) Vol. 180, pp. 107417-107417
Closed Access | Times Cited: 127
SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection
Neelu Khare, D Preethi, Chiranji Lal Chowdhary, et al.
Electronics (2020) Vol. 9, Iss. 4, pp. 692-692
Open Access | Times Cited: 120
Neelu Khare, D Preethi, Chiranji Lal Chowdhary, et al.
Electronics (2020) Vol. 9, Iss. 4, pp. 692-692
Open Access | Times Cited: 120
Genetic convolutional neural network for intrusion detection systems
M.T. Nguyen, Kiseon Kim
Future Generation Computer Systems (2020) Vol. 113, pp. 418-427
Closed Access | Times Cited: 118
M.T. Nguyen, Kiseon Kim
Future Generation Computer Systems (2020) Vol. 113, pp. 418-427
Closed Access | Times Cited: 118
Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud
Aanshi Bhardwaj, Veenu Mangat, Renu Vig
IEEE Access (2020) Vol. 8, pp. 181916-181929
Open Access | Times Cited: 109
Aanshi Bhardwaj, Veenu Mangat, Renu Vig
IEEE Access (2020) Vol. 8, pp. 181916-181929
Open Access | Times Cited: 109
An Enhanced Anomaly Detection in Web Traffic Using a Stack of Classifier Ensemble
Bayu Adhi Tama, Lewis Nkenyereye, S. M. Riazul Islam, et al.
IEEE Access (2020) Vol. 8, pp. 24120-24134
Open Access | Times Cited: 87
Bayu Adhi Tama, Lewis Nkenyereye, S. M. Riazul Islam, et al.
IEEE Access (2020) Vol. 8, pp. 24120-24134
Open Access | Times Cited: 87
Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks
S. Velliangiri, P. Karthikeyan, V. Vinoth Kumar
Journal of Experimental & Theoretical Artificial Intelligence (2020) Vol. 33, Iss. 3, pp. 405-424
Closed Access | Times Cited: 83
S. Velliangiri, P. Karthikeyan, V. Vinoth Kumar
Journal of Experimental & Theoretical Artificial Intelligence (2020) Vol. 33, Iss. 3, pp. 405-424
Closed Access | Times Cited: 83
Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
Said El Kafhali, Iman El Mir, Mohamed Hanini
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 1, pp. 223-246
Closed Access | Times Cited: 82
Said El Kafhali, Iman El Mir, Mohamed Hanini
Archives of Computational Methods in Engineering (2021) Vol. 29, Iss. 1, pp. 223-246
Closed Access | Times Cited: 82
A comprehensive survey on optimizing deep learning models by metaheuristics
Bahriye Akay, Derviş Karaboğa, Rüştü Akay
Artificial Intelligence Review (2021) Vol. 55, Iss. 2, pp. 829-894
Closed Access | Times Cited: 82
Bahriye Akay, Derviş Karaboğa, Rüştü Akay
Artificial Intelligence Review (2021) Vol. 55, Iss. 2, pp. 829-894
Closed Access | Times Cited: 82
SAAE-DNN: Deep Learning Method on Intrusion Detection
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73
A Survey on Evolutionary Construction of Deep Neural Networks
Xun Zhou, A. K. Qin, Maoguo Gong, et al.
IEEE Transactions on Evolutionary Computation (2021) Vol. 25, Iss. 5, pp. 894-912
Open Access | Times Cited: 72
Xun Zhou, A. K. Qin, Maoguo Gong, et al.
IEEE Transactions on Evolutionary Computation (2021) Vol. 25, Iss. 5, pp. 894-912
Open Access | Times Cited: 72
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 72
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 72
Intrusion detection for network based cloud computing by custom RC-NN and optimization
T. Thilagam, R. Aruna
ICT Express (2021) Vol. 7, Iss. 4, pp. 512-520
Open Access | Times Cited: 63
T. Thilagam, R. Aruna
ICT Express (2021) Vol. 7, Iss. 4, pp. 512-520
Open Access | Times Cited: 63
A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 57
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 57
Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods
K. Samunnisa, G. Sunil Vijaya Kumar, Karanam Madhavi
Measurement Sensors (2022) Vol. 25, pp. 100612-100612
Open Access | Times Cited: 50
K. Samunnisa, G. Sunil Vijaya Kumar, Karanam Madhavi
Measurement Sensors (2022) Vol. 25, pp. 100612-100612
Open Access | Times Cited: 50
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments
Amir Javadpour, Pedro Pinto, Forough Ja’fari, et al.
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 367-384
Closed Access | Times Cited: 44
Amir Javadpour, Pedro Pinto, Forough Ja’fari, et al.
Cluster Computing (2022) Vol. 26, Iss. 1, pp. 367-384
Closed Access | Times Cited: 44
Reviewing methods of deep learning for diagnosing COVID-19, its variants and synergistic medicine combinations
Qandeel Rafique, Ali Rehman, Muhammad Sher Afghan, et al.
Computers in Biology and Medicine (2023) Vol. 163, pp. 107191-107191
Open Access | Times Cited: 23
Qandeel Rafique, Ali Rehman, Muhammad Sher Afghan, et al.
Computers in Biology and Medicine (2023) Vol. 163, pp. 107191-107191
Open Access | Times Cited: 23