
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Sang-Woong Lee, Haval Mohammed Sidqi, Mokhtar Mohammadi, et al.
Journal of Network and Computer Applications (2021) Vol. 187, pp. 103111-103111
Closed Access | Times Cited: 93
Sang-Woong Lee, Haval Mohammed Sidqi, Mokhtar Mohammadi, et al.
Journal of Network and Computer Applications (2021) Vol. 187, pp. 103111-103111
Closed Access | Times Cited: 93
Showing 1-25 of 93 citing articles:
Federated Learning for intrusion detection system: Concepts, challenges and future directions
Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, et al.
Computer Communications (2022) Vol. 195, pp. 346-361
Open Access | Times Cited: 198
Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, et al.
Computer Communications (2022) Vol. 195, pp. 346-361
Open Access | Times Cited: 198
A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 91
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 91
Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
Danial Javaheri, Saeid Gorgin, Jeong–A Lee, et al.
Information Sciences (2023) Vol. 626, pp. 315-338
Closed Access | Times Cited: 66
Danial Javaheri, Saeid Gorgin, Jeong–A Lee, et al.
Information Sciences (2023) Vol. 626, pp. 315-338
Closed Access | Times Cited: 66
A survey of deep learning-based intrusion detection in automotive applications
Brooke Lampe, Weizhi Meng
Expert Systems with Applications (2023) Vol. 221, pp. 119771-119771
Open Access | Times Cited: 50
Brooke Lampe, Weizhi Meng
Expert Systems with Applications (2023) Vol. 221, pp. 119771-119771
Open Access | Times Cited: 50
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things
Guowen Wu, Lanlan Xie, Hong Zhang, et al.
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103608-103608
Closed Access | Times Cited: 43
Guowen Wu, Lanlan Xie, Hong Zhang, et al.
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103608-103608
Closed Access | Times Cited: 43
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning
Aliya Tabassum, Aiman Erbad, Wadha Lebda, et al.
Computer Communications (2022) Vol. 192, pp. 299-310
Open Access | Times Cited: 63
Aliya Tabassum, Aiman Erbad, Wadha Lebda, et al.
Computer Communications (2022) Vol. 192, pp. 299-310
Open Access | Times Cited: 63
Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A survey
Yahya Rbah, Mohammed Mahfoudi, Younes Balboul, et al.
2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (2022)
Closed Access | Times Cited: 53
Yahya Rbah, Mohammed Mahfoudi, Younes Balboul, et al.
2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (2022)
Closed Access | Times Cited: 53
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET
R Reka, R. Karthick, Reshma Ram, et al.
Computers & Security (2023) Vol. 136, pp. 103526-103526
Closed Access | Times Cited: 38
R Reka, R. Karthick, Reshma Ram, et al.
Computers & Security (2023) Vol. 136, pp. 103526-103526
Closed Access | Times Cited: 38
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 38
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 38
HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32
A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy
Asadullah Momand, Sana Ullah Jan, Naeem Ramzan
Journal of Sensors (2023) Vol. 2023, pp. 1-18
Open Access | Times Cited: 23
Asadullah Momand, Sana Ullah Jan, Naeem Ramzan
Journal of Sensors (2023) Vol. 2023, pp. 1-18
Open Access | Times Cited: 23
NLP methods in host-based intrusion detection systems: A systematic review and future directions
Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103761-103761
Open Access | Times Cited: 22
Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103761-103761
Open Access | Times Cited: 22
Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System
Ankit Thakkar, Nandish Kikani, Rebakah Geddam
Applied Soft Computing (2024) Vol. 154, pp. 111378-111378
Closed Access | Times Cited: 13
Ankit Thakkar, Nandish Kikani, Rebakah Geddam
Applied Soft Computing (2024) Vol. 154, pp. 111378-111378
Closed Access | Times Cited: 13
An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach
Mohamed Aly Bouke, Azizol Abdullah
e-Prime - Advances in Electrical Engineering Electronics and Energy (2024) Vol. 8, pp. 100590-100590
Open Access | Times Cited: 8
Mohamed Aly Bouke, Azizol Abdullah
e-Prime - Advances in Electrical Engineering Electronics and Energy (2024) Vol. 8, pp. 100590-100590
Open Access | Times Cited: 8
A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City
Asmaa Elsaeidy, Abbas Jamalipour, Kumudu S. Munasinghe
IEEE Access (2021) Vol. 9, pp. 154864-154875
Open Access | Times Cited: 44
Asmaa Elsaeidy, Abbas Jamalipour, Kumudu S. Munasinghe
IEEE Access (2021) Vol. 9, pp. 154864-154875
Open Access | Times Cited: 44
Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
Deepak Kumar Jain, Weiping Ding, Ketan Kotecha
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 6, pp. 2221-2237
Closed Access | Times Cited: 19
Deepak Kumar Jain, Weiping Ding, Ketan Kotecha
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 6, pp. 2221-2237
Closed Access | Times Cited: 19
Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 18
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 18
A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping
Mingshu He, Yuanming Huang, Xinlei Wang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2935-2949
Closed Access | Times Cited: 18
Mingshu He, Yuanming Huang, Xinlei Wang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2935-2949
Closed Access | Times Cited: 18
A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection
Neeraj Saini, Vivekananda Bhat Kasaragod, Krishna Prakash, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 28
Open Access | Times Cited: 18
Neeraj Saini, Vivekananda Bhat Kasaragod, Krishna Prakash, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 28
Open Access | Times Cited: 18
A data-driven network intrusion detection system using feature selection and deep learning
Lianming Zhang, Kui Liu, Xiaowei Xie, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103606-103606
Closed Access | Times Cited: 17
Lianming Zhang, Kui Liu, Xiaowei Xie, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103606-103606
Closed Access | Times Cited: 17
A deep learning approach to predict the number of k -barriers for intrusion detection over a circular region using wireless sensor networks
Abhilash Singh, J. Amutha, Jaiprakash Nagar, et al.
Expert Systems with Applications (2022) Vol. 211, pp. 118588-118588
Open Access | Times Cited: 24
Abhilash Singh, J. Amutha, Jaiprakash Nagar, et al.
Expert Systems with Applications (2022) Vol. 211, pp. 118588-118588
Open Access | Times Cited: 24
SoK: Content Moderation for End-to-End Encryption
Sarah Scheffler, Jonathan Mayer
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 403-429
Open Access | Times Cited: 13
Sarah Scheffler, Jonathan Mayer
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 403-429
Open Access | Times Cited: 13
NE-GConv: A lightweight node edge graph convolutional network for intrusion detection
Tanzeela Altaf, Xu Wang, Wei Ni, et al.
Computers & Security (2023) Vol. 130, pp. 103285-103285
Closed Access | Times Cited: 13
Tanzeela Altaf, Xu Wang, Wei Ni, et al.
Computers & Security (2023) Vol. 130, pp. 103285-103285
Closed Access | Times Cited: 13
An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification
Huan Wang, Xiaoqiang Di, Yan Wang, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 11, pp. 3561-3572
Closed Access | Times Cited: 12
Huan Wang, Xiaoqiang Di, Yan Wang, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 11, pp. 3561-3572
Closed Access | Times Cited: 12
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
Sami Ahmed Haider, Mohammad Zia Ur Rahman, Sachin Gupta, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 1631-1639
Closed Access | Times Cited: 4
Sami Ahmed Haider, Mohammad Zia Ur Rahman, Sachin Gupta, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 1631-1639
Closed Access | Times Cited: 4