OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
Geeta Singh, Neelu Khare
International Journal of Computers and Applications (2021) Vol. 44, Iss. 7, pp. 659-669
Closed Access | Times Cited: 74

Showing 1-25 of 74 citing articles:

Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Ad Hoc Networks (2024) Vol. 155, pp. 103407-103407
Open Access | Times Cited: 46

Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game
Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane, et al.
IEEE Transactions on Vehicular Technology (2022) Vol. 71, Iss. 10, pp. 11089-11102
Closed Access | Times Cited: 42

Design and Testing Novel One-Class Classifier Based on Polynomial Interpolation With Application to Networking Security
Pierpaolo Dini, Andrea Begni, Stefano Ciavarella, et al.
IEEE Access (2022) Vol. 10, pp. 67910-67924
Open Access | Times Cited: 38

FlowTransformer: A transformer framework for flow-based network intrusion detection systems
Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, et al.
Expert Systems with Applications (2023) Vol. 241, pp. 122564-122564
Open Access | Times Cited: 34

A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks
Zhenpeng Liu, Yihang Wang, Fan Feng, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 6176-6176
Open Access | Times Cited: 27

Anomaly Detection Dataset for Industrial Control Systems
Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, et al.
IEEE Access (2023) Vol. 11, pp. 107982-107996
Open Access | Times Cited: 23

Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems
Bassey Isong, Otshepeng Kgote, Adnan M. Abu‐Mahfouz
Electronics (2024) Vol. 13, Iss. 12, pp. 2370-2370
Open Access | Times Cited: 6

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6

Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review
James Halvorsen, Clemente Izurieta, Haipeng Cai, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 10, pp. 1-33
Open Access | Times Cited: 5

Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
M. K. Nallakaruppan, Siva Rama Krishnan Somayaji, Siddhesh Fuladi, et al.
IEEE Access (2024) Vol. 12, pp. 31788-31797
Open Access | Times Cited: 4

Next-gen distributed denial-of-service detection and mitigation in software-defined networking using hybrid machine learning approach
Abhishek Yadav, Manjot Kaur, Chirag Sharma, et al.
Elsevier eBooks (2025), pp. 97-133
Closed Access

A Review of Machine Learning and Transfer Learning Strategies for Intrusion Detection Systems in 5G and Beyond
Kinzah Noor, Agbotiname Lucky Imoize, Chun‐Ta Li, et al.
Mathematics (2025) Vol. 13, Iss. 7, pp. 1088-1088
Open Access

Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions
Gulshan Kumar, Hamed Alqahtani
Computer Modeling in Engineering & Sciences (2022) Vol. 134, Iss. 1, pp. 89-119
Open Access | Times Cited: 14

Hybrid feature selection and BWTDO enabled DeepCNN-TL for intrusion detection in fuzzy cloud computing
Meghana G Raj, Santosh Kumar Pani
Soft Computing (2023)
Closed Access | Times Cited: 7

A Study on Heuristic Algorithms Combined With LR on a DNN-Based IDS Model to Detect IoT Attacks
Trần Thị Thanh Thủy, Luong Duc Thuan, Nguyen Hong Duc, et al.
MENDEL (2023) Vol. 29, Iss. 1, pp. 62-70
Open Access | Times Cited: 7

A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems
Milan Samantaray, Ram Chandra Barik, Anil Kumar Biswal
Decision Analytics Journal (2024) Vol. 11, pp. 100478-100478
Open Access | Times Cited: 2

Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks
Meysam Miryahyaei, Mehdi Fartash, Javad Akbari Torkestani
Sensors (2024) Vol. 24, Iss. 19, pp. 6335-6335
Open Access | Times Cited: 2

Machine Learning Based Predictive Model for Intrusion Detection
Somya Srivastav, Kalpna Guleria, Shagun Sharma
(2023), pp. 1-5
Closed Access | Times Cited: 6

MuDeLA: multi-level deep learning approach for intrusion detection systems
Wathiq Laftah Al-Yaseen, Ali Kadhum Idrees
International Journal of Computers and Applications (2023) Vol. 45, Iss. 12, pp. 755-763
Closed Access | Times Cited: 6

Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security
Sundaramoorthy Krishnasamy, Mutlaq B. Aldajani, Lolwah Alehaideb, et al.
Sensors (2023) Vol. 23, Iss. 22, pp. 9294-9294
Open Access | Times Cited: 6

Signature-Based Intrusion Detection System in Wireless 6G IoT Networks
Mansoor Farooq, Mubashir Hassan Khan
Journal on internet of things (2022) Vol. 4, Iss. 3, pp. 155-168
Open Access | Times Cited: 10

A Novel Deep Clustering Variational Auto-Encoder for Anomaly-based Network Intrusion Detection
Van Quân Nguyen, Viet Hung Nguyen, Tuan-Hao Hoang, et al.
(2022), pp. 1-7
Closed Access | Times Cited: 9

Low-Latency Dimensional Expansion and Anomaly Detection Empowered Secure IoT Network
Wenhao Shao, Yanyan Wei, Praboda Rajapaksha, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 3865-3879
Open Access | Times Cited: 5

Page 1 - Next Page

Scroll to top