
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SeNet-I: An approach for detecting network intrusions through serialized network traffic images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107169-107169
Closed Access | Times Cited: 11
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107169-107169
Closed Access | Times Cited: 11
Showing 11 citing articles:
Deep learning for enhanced porosity detection in AZ91 magnesium alloys using windowed perception and aggregated sensing
Minghui An, Zhiwei Zheng, Cheng Xing, et al.
Journal of Materials Informatics (2025) Vol. 5, Iss. 2
Open Access
Minghui An, Zhiwei Zheng, Cheng Xing, et al.
Journal of Materials Informatics (2025) Vol. 5, Iss. 2
Open Access
Towards Real-time Network Intrusion Detection with Image-based Sequential Packets Representation
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
IEEE Transactions on Big Data (2024) Vol. 11, Iss. 1, pp. 157-173
Open Access | Times Cited: 4
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
IEEE Transactions on Big Data (2024) Vol. 11, Iss. 1, pp. 157-173
Open Access | Times Cited: 4
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Computers & Security (2024) Vol. 144, pp. 103982-103982
Closed Access | Times Cited: 3
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Computers & Security (2024) Vol. 144, pp. 103982-103982
Closed Access | Times Cited: 3
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2023), pp. 121-126
Open Access | Times Cited: 8
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2023), pp. 121-126
Open Access | Times Cited: 8
CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network
Md Rezanur Islam, Mahdi Sahlabadi, K.H. Kim, et al.
IEEE Access (2023) Vol. 12, pp. 13971-13985
Open Access | Times Cited: 4
Md Rezanur Islam, Mahdi Sahlabadi, K.H. Kim, et al.
IEEE Access (2023) Vol. 12, pp. 13971-13985
Open Access | Times Cited: 4
Crowd Flow Prediction: An Integrated Approach Using Dynamic Spatial–Temporal Adaptive Modeling for Pattern Flow Relationships
Zain Ul Abideen, Xiaodong Sun, Chao Sun
Journal of Forecasting (2024)
Closed Access | Times Cited: 1
Zain Ul Abideen, Xiaodong Sun, Chao Sun
Journal of Forecasting (2024)
Closed Access | Times Cited: 1
Research on Medical Ultrasound Image Information Extraction Model Based on Riesz Transform
Pengju Lv
Advances in transdisciplinary engineering (2024)
Open Access
Pengju Lv
Advances in transdisciplinary engineering (2024)
Open Access
Descriptive analysis of wide area network flow control internet traffic on Metro-E 100 Mbps campus network
Nor Paezah Abdullah, Murizah Kassim, Sayang Mohd Deni, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2738-2749
Open Access
Nor Paezah Abdullah, Murizah Kassim, Sayang Mohd Deni, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2738-2749
Open Access
Real-time traffic intrusion detection based on CNN-LSTM deep neural networks
Runjie Liu, Yinpu Ma, Xu Gao, et al.
(2024)
Closed Access
Runjie Liu, Yinpu Ma, Xu Gao, et al.
(2024)
Closed Access
ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection
Irfan Khan, Yasir Ali Farrukh, Syed Wali
ICC 2022 - IEEE International Conference on Communications (2024), pp. 2731-2736
Open Access
Irfan Khan, Yasir Ali Farrukh, Syed Wali
ICC 2022 - IEEE International Conference on Communications (2024), pp. 2731-2736
Open Access
Semi-supervised anomaly traffic detection via multi-frequency reconstruction
Xinglin Lian, Yu Zheng, Zhangxuan Dang, et al.
Pattern Recognition (2024), pp. 111215-111215
Closed Access
Xinglin Lian, Yu Zheng, Zhangxuan Dang, et al.
Pattern Recognition (2024), pp. 111215-111215
Closed Access
Ais-Nids: An Intelligent and Self-Sustaining Network Intrusion Detection System
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
(2023)
Closed Access | Times Cited: 1
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
(2023)
Closed Access | Times Cited: 1