OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Attack classification of an intrusion detection system using deep learning and hyperparameter optimization
Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, et al.
Journal of Information Security and Applications (2021) Vol. 58, pp. 102804-102804
Closed Access | Times Cited: 150

Showing 1-25 of 150 citing articles:

Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks
Imtiaz Ullah, Qusay H. Mahmoud
IEEE Access (2021) Vol. 9, pp. 103906-103926
Open Access | Times Cited: 267

A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning
Chao Liu, Zhaojun Gu, Jialiang Wang
IEEE Access (2021) Vol. 9, pp. 75729-75740
Open Access | Times Cited: 113

An Efficient Hybrid-DNN for DDoS Detection and Classification in Software-Defined IIoT Networks
Ahmad Zainudin, Love Allen Chijioke Ahakonye, Rubina Akter, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8491-8504
Closed Access | Times Cited: 68

Enhancing IoT network security through deep learning-powered Intrusion Detection System
Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, et al.
Internet of Things (2023) Vol. 24, pp. 100936-100936
Open Access | Times Cited: 59

A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset
Saud Alzughaibi, Salim El Khediri
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2276-2276
Open Access | Times Cited: 54

An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks
Nashmia Khalid, Sadaf Hina, Shabih Zaidi, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0306747-e0306747
Open Access | Times Cited: 1

Dynamic worker allocation in Seru production systems with actor-critic and pointer networks
Dongni Li, Hongbo Jin, Yaoxin Zhang
European Journal of Operational Research (2025)
Closed Access | Times Cited: 1

A LSTM-FCNN based multi-class intrusion detection using scalable framework
Santosh Kumar Sahu, Durga Prasad Mohapatra, Jitendra Kumar Rout, et al.
Computers & Electrical Engineering (2022) Vol. 99, pp. 107720-107720
Closed Access | Times Cited: 59

A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
Marek Pawlicki, Rafał Kozik, Michał Choraś
Neurocomputing (2022) Vol. 500, pp. 1075-1087
Open Access | Times Cited: 48

A comprehensive intrusion detection framework using boosting algorithms
Ilhan Firat Kilinçer, Fatih Ertam, Abdulkadir Şengür
Computers & Electrical Engineering (2022) Vol. 100, pp. 107869-107869
Closed Access | Times Cited: 46

Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game
Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane, et al.
IEEE Transactions on Vehicular Technology (2022) Vol. 71, Iss. 10, pp. 11089-11102
Closed Access | Times Cited: 41

A novel optimized probabilistic neural network approach for intrusion detection and categorization
Nadir Omer, Ahmed H. Samak, Ahmed I. Taloba, et al.
Alexandria Engineering Journal (2023) Vol. 72, pp. 351-361
Open Access | Times Cited: 38

Genetic algorithm-based hyperparameter optimization of deep learning models for PM2.5 time-series prediction
Caner Erden
International Journal of Environmental Science and Technology (2023) Vol. 20, Iss. 3, pp. 2959-2982
Closed Access | Times Cited: 35

A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system
S. Siva Shankar, Bùi Thanh Hùng, Prąsun Chakrabarti, et al.
Education and Information Technologies (2023) Vol. 29, Iss. 4, pp. 3859-3883
Closed Access | Times Cited: 35

Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems
Jiacheng Huang, Guo‐Qiang Zeng, Guanggang Geng, et al.
Computers & Security (2023) Vol. 132, pp. 103310-103310
Closed Access | Times Cited: 34

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32

Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier
Mhamad Bakro, Rakesh Ranjan Kumar, Amerah Alabrah, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2427-2427
Open Access | Times Cited: 27

A novel ensemble method for enhancing Internet of Things device security against botnet attacks
Amina Arshad, Maira Jabeen, Saqib Ubaid, et al.
Decision Analytics Journal (2023) Vol. 8, pp. 100307-100307
Open Access | Times Cited: 24

TGA: A Novel Network Intrusion Detection Method Based on TCN, BiGRU and Attention Mechanism
Yangyang Song, Nurbol Luktarhan, Zhaolei Shi, et al.
Electronics (2023) Vol. 12, Iss. 13, pp. 2849-2849
Open Access | Times Cited: 22

Research on the prediction and influencing factors of heavy duty truck fuel consumption based on LightGBM
Xinyi Zhu, X. Y. Shen, Kailiang Chen, et al.
Energy (2024) Vol. 296, pp. 131221-131221
Closed Access | Times Cited: 11

Securing Mobile Edge Computing Using Hybrid Deep Learning Method
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, et al.
Computers (2024) Vol. 13, Iss. 1, pp. 25-25
Open Access | Times Cited: 8

An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction
Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1619-1648
Closed Access | Times Cited: 8

An Intrusion Detection System Based on Deep Belief Networks
Othmane Belarbi, Aftab Khan, Pietro Carnelli, et al.
Lecture notes in computer science (2022), pp. 377-392
Closed Access | Times Cited: 29

Temporal feature aggregation with attention for insider threat detection from activity logs
Preetam Pal, Pratik Chattopadhyay, Mayank Swarnkar
Expert Systems with Applications (2023) Vol. 224, pp. 119925-119925
Closed Access | Times Cited: 18

Intelligent approach for the industrialization of deep learning solutions applied to fault detection
Ivo Perez Colo, Carolina Saavedra Sueldo, Mariano De Paula, et al.
Expert Systems with Applications (2023) Vol. 233, pp. 120959-120959
Closed Access | Times Cited: 17

Page 1 - Next Page

Scroll to top