OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Improved intrusion detection method for communication networks using association rule mining and artificial neural networks
Fatemeh Safara, Alireza Souri, Masoud Serrizadeh
IET Communications (2020) Vol. 14, Iss. 7, pp. 1192-1197
Closed Access | Times Cited: 37

Showing 1-25 of 37 citing articles:

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
Albara Awajan
Computers (2023) Vol. 12, Iss. 2, pp. 34-34
Open Access | Times Cited: 119

SAAE-DNN: Deep Learning Method on Intrusion Detection
Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao
Symmetry (2020) Vol. 12, Iss. 10, pp. 1695-1695
Open Access | Times Cited: 73

Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks
Samah Almutlaq, Abdelouahid Derhab, Mohammad Mehedi Hassan, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 24, Iss. 12, pp. 15687-15701
Closed Access | Times Cited: 28

Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System
Murtaza Ahmed Siddiqi, Wooguil Pak
Electronics (2020) Vol. 9, Iss. 12, pp. 2114-2114
Open Access | Times Cited: 48

A Residual Learning-Based Network Intrusion Detection System
Jiarui Man, Guozi Sun
Security and Communication Networks (2021) Vol. 2021, pp. 1-9
Open Access | Times Cited: 39

A Fog Computing Framework for Intrusion Detection of Energy-Based Attacks on UAV-Assisted Smart Farming
Junaid Sajid, Kadhim Hayawi, Asad Waqar Malik, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3857-3857
Open Access | Times Cited: 14

Re-mining method of painted ceramic sculpture artistic material based on association rule algorithm
Du Mingda, Zhao Xi
Intelligent Decision Technologies (2025)
Closed Access

Anomaly detection in network traffic using 1D CNNs: Insights from explainable AI techniques
Muntaha Hameed Battah, Karim Hashim Al-Saedi
AIP conference proceedings (2025) Vol. 3282, pp. 020008-020008
Closed Access

Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection
Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkaravarthy
Cluster Computing (2022) Vol. 25, Iss. 5, pp. 3129-3144
Closed Access | Times Cited: 20

Toward feasible machine learning model updates in network-based intrusion detection
Pedro Horchulhack, Eduardo K. Viegas, Altair O. Santin
Computer Networks (2021) Vol. 202, pp. 108618-108618
Closed Access | Times Cited: 25

A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
Alireza Souri, Monire Norouzi, Yousef Alsenani
Cluster Computing (2023) Vol. 27, Iss. 3, pp. 3639-3655
Closed Access | Times Cited: 9

Feature Extraction and Anomaly Detection Using Different Autoencoders for Modeling Intrusion Detection Systems
Arrun Sivasubramanian, Mithil Devisetty, Premjith Bhavukam
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 13061-13073
Closed Access | Times Cited: 3

A novel cloud architecture approach to detect network intrusions using an enhanced artificial neural network
Preeti Lakhani, Bhavya Alankar, Syed Shahabuddin Ashraf, et al.
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3929-3939
Closed Access | Times Cited: 3

Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm
Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 553-574
Open Access | Times Cited: 8

Different Coping Patterns among US Graduate and Undergraduate Students during COVID-19 Pandemic: A Machine Learning Approach
Yijun Zhao, Yi Ding, Yangqian Shen, et al.
International Journal of Environmental Research and Public Health (2022) Vol. 19, Iss. 4, pp. 2430-2430
Open Access | Times Cited: 11

Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks
Yingshu Wang, Jian Ding, Xiaomeng He, et al.
Mobile Networks and Applications (2023)
Closed Access | Times Cited: 5

A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks
Manjur Kolhar, Sultan Mesfer Aldossary
Designs (2023) Vol. 7, Iss. 6, pp. 139-139
Open Access | Times Cited: 5

An efficient SGM based IDS in cloud environment
Partha Ghosh, Zaid Alam, Ritu Raj Sharma, et al.
Computing (2022) Vol. 104, Iss. 3, pp. 553-576
Closed Access | Times Cited: 8

Detection of Intrusion behavior in cloud applications using Pearson's chi-squared distribution and decision tree classifiers
N Sathish, K Valarmathi
Pattern Recognition Letters (2022) Vol. 162, pp. 15-21
Closed Access | Times Cited: 7

Malicious attacks detection using GRU-BWFA classifier in pervasive computing
P. Rajasekaran, V. Magudeeswaran
Biomedical Signal Processing and Control (2022) Vol. 79, pp. 104219-104219
Closed Access | Times Cited: 6

Generative Boltzmann Adversarial Network in Manet Attack Detection and QOS Enhancement with Latency
Arun Kumar Marandi, Ms.Richa Dogra, Rahul Bhatt, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2022) Vol. 14, Iss. 3, pp. 199-213
Open Access | Times Cited: 6

Attacks detection and decision framework based on generative adversarial network approach: Case of vehicular edge computing network
Hichem Sedjelmaci
Transactions on Emerging Telecommunications Technologies (2020) Vol. 33, Iss. 10
Closed Access | Times Cited: 6

Malicious Intrusion Data Mining Algorithm of Wireless Personal Communication Network Supported by Legal Big Data
Kai Ji
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 5

Page 1 - Next Page

Scroll to top