
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improving network intrusion detection system performance through quality of service configuration and parallel technology
Waleed Bul’ajoul, Anne James, Mandeep Pannu
Journal of Computer and System Sciences (2014) Vol. 81, Iss. 6, pp. 981-999
Open Access | Times Cited: 90
Waleed Bul’ajoul, Anne James, Mandeep Pannu
Journal of Computer and System Sciences (2014) Vol. 81, Iss. 6, pp. 981-999
Open Access | Times Cited: 90
Showing 1-25 of 90 citing articles:
A comprehensive survey of Network Function Virtualization
Bo Yi, Xingwei Wang, Keqin Li, et al.
Computer Networks (2018) Vol. 133, pp. 212-262
Closed Access | Times Cited: 475
Bo Yi, Xingwei Wang, Keqin Li, et al.
Computer Networks (2018) Vol. 133, pp. 212-262
Closed Access | Times Cited: 475
Intrusion detection systems for IoT-based smart environments: a survey
Mohamed Faisal Elrawy, Ali Ismail Awad, Hesham F. A. Hamed
Journal of Cloud Computing Advances Systems and Applications (2018) Vol. 7, Iss. 1
Open Access | Times Cited: 388
Mohamed Faisal Elrawy, Ali Ismail Awad, Hesham F. A. Hamed
Journal of Cloud Computing Advances Systems and Applications (2018) Vol. 7, Iss. 1
Open Access | Times Cited: 388
A GA-LR wrapper approach for feature selection in network intrusion detection
Chaouki Khammassi, Saoussen Krichen
Computers & Security (2017) Vol. 70, pp. 255-277
Closed Access | Times Cited: 335
Chaouki Khammassi, Saoussen Krichen
Computers & Security (2017) Vol. 70, pp. 255-277
Closed Access | Times Cited: 335
A comprehensive survey on network anomaly detection
Gilberto Fernandes, Joel J. P. C. Rodrigues, Luiz F. Carvalho, et al.
Telecommunication Systems (2018) Vol. 70, Iss. 3, pp. 447-489
Closed Access | Times Cited: 289
Gilberto Fernandes, Joel J. P. C. Rodrigues, Luiz F. Carvalho, et al.
Telecommunication Systems (2018) Vol. 70, Iss. 3, pp. 447-489
Closed Access | Times Cited: 289
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, et al.
2015 IEEE Global Communications Conference (GLOBECOM) (2018), pp. 1-6
Open Access | Times Cited: 126
MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, et al.
2015 IEEE Global Communications Conference (GLOBECOM) (2018), pp. 1-6
Open Access | Times Cited: 126
A survey and taxonomy of DoS attacks in cloud computing
Mohammad Masdari, Marzie Jalali
Security and Communication Networks (2016) Vol. 9, Iss. 16, pp. 3724-3751
Closed Access | Times Cited: 118
Mohammad Masdari, Marzie Jalali
Security and Communication Networks (2016) Vol. 9, Iss. 16, pp. 3724-3751
Closed Access | Times Cited: 118
A multi-step outlier-based anomaly detection approach to network-wide traffic
Monowar Bhuyan, Dhruba K. Bhattacharyya, Jugal Kalita
Information Sciences (2016) Vol. 348, pp. 243-271
Closed Access | Times Cited: 101
Monowar Bhuyan, Dhruba K. Bhattacharyya, Jugal Kalita
Information Sciences (2016) Vol. 348, pp. 243-271
Closed Access | Times Cited: 101
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks
Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, et al.
IEEE Access (2017) Vol. 5, pp. 26190-26200
Open Access | Times Cited: 87
Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, et al.
IEEE Access (2017) Vol. 5, pp. 26190-26200
Open Access | Times Cited: 87
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
Omar Alghushairy, Raed Alsini, Zakhriya Alhassan, et al.
IEEE Access (2024) Vol. 12, pp. 24428-24441
Open Access | Times Cited: 8
Omar Alghushairy, Raed Alsini, Zakhriya Alhassan, et al.
IEEE Access (2024) Vol. 12, pp. 24428-24441
Open Access | Times Cited: 8
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 18, Iss. 2, pp. 1803-1816
Open Access | Times Cited: 51
MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 18, Iss. 2, pp. 1803-1816
Open Access | Times Cited: 51
A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM
Yu Yan, Lin Qi, Jie Wang, et al.
(2020)
Closed Access | Times Cited: 50
Yu Yan, Lin Qi, Jie Wang, et al.
(2020)
Closed Access | Times Cited: 50
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities
Bandar Alotaibi
Sensors (2023) Vol. 23, Iss. 17, pp. 7470-7470
Open Access | Times Cited: 17
Bandar Alotaibi
Sensors (2023) Vol. 23, Iss. 17, pp. 7470-7470
Open Access | Times Cited: 17
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6
Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
Xiao Liu, Mianxiong Dong, Kaoru Ota, et al.
Journal of Computer and System Sciences (2016) Vol. 98, pp. 1-26
Open Access | Times Cited: 60
Xiao Liu, Mianxiong Dong, Kaoru Ota, et al.
Journal of Computer and System Sciences (2016) Vol. 98, pp. 1-26
Open Access | Times Cited: 60
Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures
José Francisco Colom, David Gil, Higinio Mora, et al.
Journal of Network and Computer Applications (2018) Vol. 108, pp. 76-86
Open Access | Times Cited: 47
José Francisco Colom, David Gil, Higinio Mora, et al.
Journal of Network and Computer Applications (2018) Vol. 108, pp. 76-86
Open Access | Times Cited: 47
A Novel Hybrid IDS Based on Modified NSGAII-ANN and Random Forest
Anahita Golrang, Alale Mohammadi Golrang, Sule Yildirim Yayilgan, et al.
Electronics (2020) Vol. 9, Iss. 4, pp. 577-577
Open Access | Times Cited: 39
Anahita Golrang, Alale Mohammadi Golrang, Sule Yildirim Yayilgan, et al.
Electronics (2020) Vol. 9, Iss. 4, pp. 577-577
Open Access | Times Cited: 39
Cyber Intrusion Detection Using Ensemble of Deep Learning with Prediction Scoring Based Optimized Feature Sets for IOT Networks
Deepesh M. Dhanvijay, Mrinai M. Dhanvijay, Vaishali H. Kamble
Cyber Security and Applications (2025), pp. 100088-100088
Open Access
Deepesh M. Dhanvijay, Mrinai M. Dhanvijay, Vaishali H. Kamble
Cyber Security and Applications (2025), pp. 100088-100088
Open Access
An Ensemble Approach for Intrusion Detection System Using Machine Learning Algorithms
Rohit Kumar Singh Gautam, Amit Doegar
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2018), pp. 14-15
Closed Access | Times Cited: 43
Rohit Kumar Singh Gautam, Amit Doegar
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2018), pp. 14-15
Closed Access | Times Cited: 43
Active learning to detect DDoS attack using ranked features
Rup Kumar Deka, Dhruba K. Bhattacharyya, Jugal Kalita
Computer Communications (2019) Vol. 145, pp. 203-222
Closed Access | Times Cited: 38
Rup Kumar Deka, Dhruba K. Bhattacharyya, Jugal Kalita
Computer Communications (2019) Vol. 145, pp. 203-222
Closed Access | Times Cited: 38
Multi-layer perceptron for network intrusion detection
Arnaud Rosay, Kévin Riou, Florent Carlier, et al.
Annals of Telecommunications (2021) Vol. 77, Iss. 5-6, pp. 371-394
Closed Access | Times Cited: 24
Arnaud Rosay, Kévin Riou, Florent Carlier, et al.
Annals of Telecommunications (2021) Vol. 77, Iss. 5-6, pp. 371-394
Closed Access | Times Cited: 24
A Quantum Generative Adversarial Network-based Intrusion Detection System
Md. Abdur Rahman, Hossain Shahriar, Victor Clincy, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1810-1815
Closed Access | Times Cited: 10
Md. Abdur Rahman, Hossain Shahriar, Victor Clincy, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1810-1815
Closed Access | Times Cited: 10
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-based Solutions, and Edge Computing Opportunities
Bandar Alotaibi
(2023)
Open Access | Times Cited: 9
Bandar Alotaibi
(2023)
Open Access | Times Cited: 9
A New Architecture for Network Intrusion Detection and Prevention
Waleed Bul’ajoul, Anne James, Siraj Ahmed Shaikh
IEEE Access (2019) Vol. 7, pp. 18558-18573
Open Access | Times Cited: 29
Waleed Bul’ajoul, Anne James, Siraj Ahmed Shaikh
IEEE Access (2019) Vol. 7, pp. 18558-18573
Open Access | Times Cited: 29
Slowcomm: Design, development and performance evaluation of a new slow DoS attack
Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello
Journal of Information Security and Applications (2017) Vol. 35, pp. 23-31
Closed Access | Times Cited: 28
Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello
Journal of Information Security and Applications (2017) Vol. 35, pp. 23-31
Closed Access | Times Cited: 28
An Enhanced Approach to Fuzzy C-means Clustering for Anomaly Detection
Ruby Sharma, Sandeep Chaurasia
Smart innovation, systems and technologies (2018), pp. 623-636
Closed Access | Times Cited: 25
Ruby Sharma, Sandeep Chaurasia
Smart innovation, systems and technologies (2018), pp. 623-636
Closed Access | Times Cited: 25