OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques
Deepak Kshirsagar, Sandeep Kumar
Cyber-Physical Systems (2022) Vol. 9, Iss. 3, pp. 244-259
Closed Access | Times Cited: 22

Showing 22 citing articles:

Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5

Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5

Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

TrIDS: an intelligent behavioural trust based IDS for smart healthcare system
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Cluster Computing (2022) Vol. 26, Iss. 2, pp. 903-925
Closed Access | Times Cited: 13

Network intrusion detection leveraging multimodal features
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
Array (2024) Vol. 22, pp. 100349-100349
Open Access | Times Cited: 1

AUTH: An Adversarial Autoencoder Based Unsupervised Insider Threat Detection Scheme for Multisource Logs
Xingjian Zhu, Jiankuo Dong, Jin Qi, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 9, pp. 10954-10965
Closed Access | Times Cited: 1

Optimized Ensemble Learning Models Based on Clustering and Hybrid Deep Learning for Wireless Intrusion Detection
Perumal Pitchandi, M. Nivaashini, R. Kingsy Grace
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7787-7807
Closed Access | Times Cited: 1

Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data
Sidahmed Benabderrahmane, Ngoc T. Hoang, Petko Valtchev, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 926-941
Open Access | Times Cited: 1

Extraction of Minimal Set of Traffic Features Using Ensemble of Classifiers and Rank Aggregation for Network Intrusion Detection Systems
Jacek Krupski, Marcin Iwanowski, Waldemar Graniszewski
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6995-6995
Open Access | Times Cited: 1

Revolutionizing network management with an AI-driven intrusion detection system
G S Vijay, Meenakshi Sharma, Roma Khanna
Multidisciplinary Science Journal (2023) Vol. 5, pp. 2023ss0313-2023ss0313
Open Access | Times Cited: 3

A study of feature selection methods for android malware detection
Deepak Kshirsagar, Pooja V. Agrawal
Journal of Information and Optimization Sciences (2022) Vol. 43, Iss. 8, pp. 2111-2120
Closed Access | Times Cited: 5

A Comparative Study on Deep Learning-Based Algorithms For Intruder Detection Systems and Cyber Security
Vineeta Shrivastava, Megha Kamble
SAMRIDDHI A Journal of Physical Sciences Engineering and Technology (2023) Vol. 15, Iss. 01, pp. 154-160
Open Access | Times Cited: 2

Whale Optimization Algorithm-Enhanced Long Short-Term Memory Classifier with Novel Wrapped Feature Selection for Intrusion Detection
Haider AL-Husseini, Mohammad Mehdi Hosseini, Ahmad Yousofi, et al.
Journal of Sensor and Actuator Networks (2024) Vol. 13, Iss. 6, pp. 73-73
Open Access

Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach
Raed Basfar, Mohamed Yehia Dahab, Abdullah Ali, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 19001-19008
Open Access

Exploring the Effectiveness of Selection of Feature Techniques for Incursion Detection in Cyber-Physical Systems
Ram Ji, Devanand Padha, Yashwant Singh
Advances in intelligent systems and computing (2024), pp. 65-81
Closed Access

Intrusion Detection in the IoT-Fog Adopting the GRU and CNN: A Deep Learning-Based Approach
Zahraa Majeed Al-Khuzaie, Salah Albermany, Mohammed Ahmed AbdlNibe
Lecture notes in networks and systems (2023), pp. 379-389
Closed Access

A Comprehensive Study of DDoS Attack on Internet of Things Network
Nitin Anand, Khundrakpam Johnson Singh
Lecture notes in electrical engineering (2023), pp. 573-586
Closed Access

Network Intrusion Detection Leveraging Multimodal Features
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
(2023)
Open Access

Enhancing Darknet Traffic Analysis through Top Ranked Feature Selection Methods
Prashant Bhapkar, Deepak Kshirsagar
(2023), pp. 1-5
Closed Access

Intrusion Detection and Prevention Algorithm of Teacher Management Information System in private higher vocational colleges based on AvroAvro framework
Jun Zhao
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 790-794
Closed Access

Page 1

Scroll to top