
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi‐Alli, et al.
Information Security Journal A Global Perspective (2020) Vol. 29, Iss. 6, pp. 267-283
Closed Access | Times Cited: 60
Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi‐Alli, et al.
Information Security Journal A Global Perspective (2020) Vol. 29, Iss. 6, pp. 267-283
Closed Access | Times Cited: 60
Showing 1-25 of 60 citing articles:
Intrusion Detection in Industrial Internet of Things Network‐Based on Deep Learning Model with Rule‐Based Feature Selection
Joseph Bamidele Awotunde, Chinmay Chakraborty, Abidemi Emmanuel Adeniyi
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 139
Joseph Bamidele Awotunde, Chinmay Chakraborty, Abidemi Emmanuel Adeniyi
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 139
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71
Azidine Guezzaz, Said Benkirane, Mourade Azrour, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-8
Open Access | Times Cited: 71
Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
Tarek Gaber, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, et al.
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 29
Tarek Gaber, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, et al.
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-15
Open Access | Times Cited: 29
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
A. E. M. Eljialy, Mohammed Yousuf Uddin, Sultan Ahmad
Tsinghua Science & Technology (2024) Vol. 29, Iss. 4, pp. 948-958
Open Access | Times Cited: 11
A. E. M. Eljialy, Mohammed Yousuf Uddin, Sultan Ahmad
Tsinghua Science & Technology (2024) Vol. 29, Iss. 4, pp. 948-958
Open Access | Times Cited: 11
Crypto-Stegno based model for securing medical information on IOMT platform
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Abidemi Emmanuel Adeniyi, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 21-23, pp. 31705-31727
Closed Access | Times Cited: 40
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Abidemi Emmanuel Adeniyi, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 21-23, pp. 31705-31727
Closed Access | Times Cited: 40
Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks
Joseph Bamidele Awotunde, Sanjay Misra
Lecture notes on data engineering and communications technologies (2022), pp. 21-44
Closed Access | Times Cited: 36
Joseph Bamidele Awotunde, Sanjay Misra
Lecture notes on data engineering and communications technologies (2022), pp. 21-44
Closed Access | Times Cited: 36
A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System
Joseph Bamidele Awotunde, Moses Kazeem Abiodun, Abidemi Emmanuel Adeniyi, et al.
Communications in computer and information science (2022), pp. 50-62
Closed Access | Times Cited: 34
Joseph Bamidele Awotunde, Moses Kazeem Abiodun, Abidemi Emmanuel Adeniyi, et al.
Communications in computer and information science (2022), pp. 50-62
Closed Access | Times Cited: 34
AiIoMT: IoMT-Based System-Enabled Artificial Intelligence for Enhanced Smart Healthcare Systems
Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Sunday Adeola Ajagbe, et al.
Springer eBooks (2022), pp. 229-254
Closed Access | Times Cited: 30
Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Sunday Adeola Ajagbe, et al.
Springer eBooks (2022), pp. 229-254
Closed Access | Times Cited: 30
Harnessing the Power and Simplicity of Decision Trees to Detect IoT Malware
Marwan Omar, Rebet Jones, Darrell Norman Burrell, et al.
Advances in business strategy and competitive advantage book series (2023), pp. 215-229
Closed Access | Times Cited: 18
Marwan Omar, Rebet Jones, Darrell Norman Burrell, et al.
Advances in business strategy and competitive advantage book series (2023), pp. 215-229
Closed Access | Times Cited: 18
EESNN: Hybrid Deep Learning Empowered Spatial–Temporal Features for Network Intrusion Detection System
Jalaiah Saikam, C. K. Rao
IEEE Access (2024) Vol. 12, pp. 15930-15945
Open Access | Times Cited: 6
Jalaiah Saikam, C. K. Rao
IEEE Access (2024) Vol. 12, pp. 15930-15945
Open Access | Times Cited: 6
Machine Learning-Based Multilevel Intrusion Detection Approach
Jiasheng Ling, Lei Zhang, Chenyang Liu, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 323-323
Open Access
Jiasheng Ling, Lei Zhang, Chenyang Liu, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 323-323
Open Access
Fuzzy-Rule Based Optimized Hybrid Deep Learning Model for Network Intrusion Detection in SDN Enabled IoT Network
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access
T Johnpeter, K. Sakthisudhan
Computers & Security (2025), pp. 104372-104372
Closed Access
DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT
Shahid Latif, Zeba Idrees, Zhuo Zou, et al.
2020 International Conference on UK-China Emerging Technologies (UCET) (2020), pp. 1-4
Closed Access | Times Cited: 44
Shahid Latif, Zeba Idrees, Zhuo Zou, et al.
2020 International Conference on UK-China Emerging Technologies (UCET) (2020), pp. 1-4
Closed Access | Times Cited: 44
A genomic rule-based KNN model for fast flux botnet detection
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 2, pp. 313-325
Open Access | Times Cited: 13
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 2, pp. 313-325
Open Access | Times Cited: 13
An Intrusion Detection Model using election-Based Feature Selection and K-NN
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Microprocessors and Microsystems (2023), pp. 104966-104966
Closed Access | Times Cited: 13
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Microprocessors and Microsystems (2023), pp. 104966-104966
Closed Access | Times Cited: 13
Knowledge-based anomaly detection: Survey, challenges, and future directions
Abdul Qadir Khan, Saad El Jaouhari, Nouredine Tamani, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108996-108996
Closed Access | Times Cited: 4
Abdul Qadir Khan, Saad El Jaouhari, Nouredine Tamani, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108996-108996
Closed Access | Times Cited: 4
HDL-IDS: Integrating feature selection methods with hybrid deep learning for improved intrusion detection systems
Marwa Mohammad Obaid, Muna Hadi Saleh
AIP conference proceedings (2025) Vol. 3264, pp. 040026-040026
Closed Access
Marwa Mohammad Obaid, Muna Hadi Saleh
AIP conference proceedings (2025) Vol. 3264, pp. 040026-040026
Closed Access
Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network
Danalakshmi Durairaj, V. Thiruppathy Kesavan, Abolfazl Mehbodniya, et al.
Energy Sources Part A Recovery Utilization and Environmental Effects (2022) Vol. 46, Iss. 1, pp. 1519-1541
Closed Access | Times Cited: 21
Danalakshmi Durairaj, V. Thiruppathy Kesavan, Abolfazl Mehbodniya, et al.
Energy Sources Part A Recovery Utilization and Environmental Effects (2022) Vol. 46, Iss. 1, pp. 1519-1541
Closed Access | Times Cited: 21
An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19
Yang Zhang, Hongpo Zhang, Bo Zhang
Information (2022) Vol. 13, Iss. 7, pp. 314-314
Open Access | Times Cited: 19
Privacy and Security Enhancement of Smart Cities using Hybrid Deep Learning-enabled Blockchain
Joseph Bamidele Awotunde, Tarek Gaber, L V Narasimha Prasad, et al.
Scalable Computing Practice and Experience (2023) Vol. 24, Iss. 3, pp. 561-584
Open Access | Times Cited: 12
Joseph Bamidele Awotunde, Tarek Gaber, L V Narasimha Prasad, et al.
Scalable Computing Practice and Experience (2023) Vol. 24, Iss. 3, pp. 561-584
Open Access | Times Cited: 12
ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications
Mohammed Al-Ambusaidi, Yinjun Zhang, Yar Muhammad, et al.
Soft Computing (2023) Vol. 28, Iss. 2, pp. 1765-1784
Closed Access | Times Cited: 12
Mohammed Al-Ambusaidi, Yinjun Zhang, Yar Muhammad, et al.
Soft Computing (2023) Vol. 28, Iss. 2, pp. 1765-1784
Closed Access | Times Cited: 12
Robust genetic machine learning ensemble model for intrusion detection in network traffic
M. A. Akhtar, Syed Muhammad Owais Qadri, Maria Andleeb Siddiqui, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 10
M. A. Akhtar, Syed Muhammad Owais Qadri, Maria Andleeb Siddiqui, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 10
Advancing IoT Security Posture K-Means Clustering for Malware Detection
Ali Dayoub, Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 221-239
Closed Access | Times Cited: 3
Ali Dayoub, Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 221-239
Closed Access | Times Cited: 3
Current Status and Challenges and Future Trends of Deep Learning-Based Intrusion Detection Models
Yuqiang Wu, Bailin Zou, Yifei Cao
Journal of Imaging (2024) Vol. 10, Iss. 10, pp. 254-254
Open Access | Times Cited: 3
Yuqiang Wu, Bailin Zou, Yifei Cao
Journal of Imaging (2024) Vol. 10, Iss. 10, pp. 254-254
Open Access | Times Cited: 3
Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
International Journal of Emerging Science and Engineering (2022) Vol. 10, Iss. 7, pp. 1-16
Open Access | Times Cited: 15
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
International Journal of Emerging Science and Engineering (2022) Vol. 10, Iss. 7, pp. 1-16
Open Access | Times Cited: 15