
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Datasets are not enough: Challenges in labeling network traffic
Jorge Luis Guerra, Carlos Catania, Eduardo Veas
Computers & Security (2022) Vol. 120, pp. 102810-102810
Open Access | Times Cited: 52
Jorge Luis Guerra, Carlos Catania, Eduardo Veas
Computers & Security (2022) Vol. 120, pp. 102810-102810
Open Access | Times Cited: 52
Showing 1-25 of 52 citing articles:
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Raphael Ferreira, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 5941-5941
Open Access | Times Cited: 177
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Raphael Ferreira, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 5941-5941
Open Access | Times Cited: 177
A deep learning approach for intrusion detection in Internet of Things using focal loss function
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Internet of Things (2023) Vol. 22, pp. 100699-100699
Closed Access | Times Cited: 68
Ayesha S. Dina, A. B. Siddique, D. Manivannan
Internet of Things (2023) Vol. 22, pp. 100699-100699
Closed Access | Times Cited: 68
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders
Marta Catillo, Antonio Pecchia, Umberto Villano
Computers & Security (2023) Vol. 129, pp. 103210-103210
Open Access | Times Cited: 42
Marta Catillo, Antonio Pecchia, Umberto Villano
Computers & Security (2023) Vol. 129, pp. 103210-103210
Open Access | Times Cited: 42
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
Marek Pawlicki, Rafał Kozik, Michał Choraś
Neurocomputing (2022) Vol. 500, pp. 1075-1087
Open Access | Times Cited: 48
Marek Pawlicki, Rafał Kozik, Michał Choraś
Neurocomputing (2022) Vol. 500, pp. 1075-1087
Open Access | Times Cited: 48
Anomaly Detection Dataset for Industrial Control Systems
Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, et al.
IEEE Access (2023) Vol. 11, pp. 107982-107996
Open Access | Times Cited: 23
Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, et al.
IEEE Access (2023) Vol. 11, pp. 107982-107996
Open Access | Times Cited: 23
Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 22
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 22
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018
Lisa Liu, Gints Engelen, Timothy Lynar, et al.
(2022), pp. 254-262
Closed Access | Times Cited: 31
Lisa Liu, Gints Engelen, Timothy Lynar, et al.
(2022), pp. 254-262
Closed Access | Times Cited: 31
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing, Qilei Yin, Xinhao Deng, et al.
(2024)
Open Access | Times Cited: 7
Yuqi Qing, Qilei Yin, Xinhao Deng, et al.
(2024)
Open Access | Times Cited: 7
Exploring Traffic Patterns Through Network Programmability: Introducing SDNFLow, a Comprehensive OpenFlow-Based Statistics Dataset for Attack Detection
Jorge Buzzio-García, Jaime Vergara, Santiago Ríos-Guiral, et al.
IEEE Access (2024) Vol. 12, pp. 42163-42180
Open Access | Times Cited: 4
Jorge Buzzio-García, Jaime Vergara, Santiago Ríos-Guiral, et al.
IEEE Access (2024) Vol. 12, pp. 42163-42180
Open Access | Times Cited: 4
MultiCIDS: Anomaly-based collective intrusion detection by deep learning on IoT/CPS multivariate time series
Marta Catillo, Antonio Pecchia, Umberto Villano
Internet of Things (2025), pp. 101519-101519
Closed Access
Marta Catillo, Antonio Pecchia, Umberto Villano
Internet of Things (2025), pp. 101519-101519
Closed Access
Empowered Cyber-Physical Systems security using both network and physical data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting
Josef Koumar, Karel Hynek, Tomáš Čejka, et al.
Scientific Data (2025) Vol. 12, Iss. 1
Open Access
Josef Koumar, Karel Hynek, Tomáš Čejka, et al.
Scientific Data (2025) Vol. 12, Iss. 1
Open Access
BoAu: Malicious traffic detection with noise labels based on boundary augmentation
Qingjun Yuan, Chang Liu, Wentao Yu, et al.
Computers & Security (2023) Vol. 131, pp. 103300-103300
Closed Access | Times Cited: 11
Qingjun Yuan, Chang Liu, Wentao Yu, et al.
Computers & Security (2023) Vol. 131, pp. 103300-103300
Closed Access | Times Cited: 11
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems
Joaquín Gaspar Medina-Arco, Roberto Magán-Carrión, Rafael A. Rodríguez‐Gómez, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 479-479
Open Access | Times Cited: 3
Joaquín Gaspar Medina-Arco, Roberto Magán-Carrión, Rafael A. Rodríguez‐Gómez, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 479-479
Open Access | Times Cited: 3
FSA-IDS: A Flow-based Self-Active Intrusion Detection System
Mehrdad Hajizadeh, Sudip Barua, Pegah Golchin
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (2023), pp. 1-9
Closed Access | Times Cited: 7
Mehrdad Hajizadeh, Sudip Barua, Pegah Golchin
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (2023), pp. 1-9
Closed Access | Times Cited: 7
The Westermo network traffic data set
Per Erik Strandberg, David Söderman, Alireza Dehlaghi-Ghadim, et al.
Data in Brief (2023) Vol. 50, pp. 109512-109512
Open Access | Times Cited: 7
Per Erik Strandberg, David Söderman, Alireza Dehlaghi-Ghadim, et al.
Data in Brief (2023) Vol. 50, pp. 109512-109512
Open Access | Times Cited: 7
A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks
S M Mostaq Hossain, Sidi‐Mohammed Senouci, Bouziane Brik, et al.
Ad Hoc Networks (2024), pp. 103674-103674
Open Access | Times Cited: 2
S M Mostaq Hossain, Sidi‐Mohammed Senouci, Bouziane Brik, et al.
Ad Hoc Networks (2024), pp. 103674-103674
Open Access | Times Cited: 2
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS?
Marta Catillo, Antonio Pecchia, Umberto Villano
(2023)
Closed Access | Times Cited: 5
Marta Catillo, Antonio Pecchia, Umberto Villano
(2023)
Closed Access | Times Cited: 5
Human-guided auto-labeling for network traffic data: The GELM approach
Meejoung Kim, Inkyu Lee
Neural Networks (2022) Vol. 152, pp. 510-526
Closed Access | Times Cited: 8
Meejoung Kim, Inkyu Lee
Neural Networks (2022) Vol. 152, pp. 510-526
Closed Access | Times Cited: 8
Stream clustering guided supervised learning for classifying NIDS alerts
Risto Vaarandi, Alejandro Guerra-Manzanares
Future Generation Computer Systems (2024) Vol. 155, pp. 231-244
Closed Access | Times Cited: 1
Risto Vaarandi, Alejandro Guerra-Manzanares
Future Generation Computer Systems (2024) Vol. 155, pp. 231-244
Closed Access | Times Cited: 1
Hybrid Deep Learning Approaches for Data Security in Cloud Environments
S. Rekha, Manish Sharma, Sathish Kannan, et al.
(2024), pp. 467-472
Closed Access | Times Cited: 1
S. Rekha, Manish Sharma, Sathish Kannan, et al.
(2024), pp. 467-472
Closed Access | Times Cited: 1
Always be Pre-Training: Representation Learning for Network Intrusion Detection with GNNs
Zhengyao Gu, Diego Troy Lopez, Lilas Alrahis, et al.
(2024), pp. 1-8
Open Access | Times Cited: 1
Zhengyao Gu, Diego Troy Lopez, Lilas Alrahis, et al.
(2024), pp. 1-8
Open Access | Times Cited: 1
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise
Qingjun Yuan, Yuefei Zhu, Gang Xiong, et al.
The Computer Journal (2023) Vol. 67, Iss. 3, pp. 976-987
Closed Access | Times Cited: 3
Qingjun Yuan, Yuefei Zhu, Gang Xiong, et al.
The Computer Journal (2023) Vol. 67, Iss. 3, pp. 976-987
Closed Access | Times Cited: 3
SyNIG: Synthetic Network Traffic Generation through Time Series Imaging
Nirhoshan Sivaroopan, Chamara Madarasingha, Shashika R. Muramudalige, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 3
Nirhoshan Sivaroopan, Chamara Madarasingha, Shashika R. Muramudalige, et al.
(2023), pp. 1-9
Closed Access | Times Cited: 3
Hybrid Detection Technique for IP Packet Header Modifications Associated with Store-and-Forward Operations
Asmaa Munshi
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10229-10229
Open Access | Times Cited: 2
Asmaa Munshi
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10229-10229
Open Access | Times Cited: 2