
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques
Deepak Kshirsagar, Sandeep Kumar
Cyber-Physical Systems (2022) Vol. 9, Iss. 3, pp. 244-259
Closed Access | Times Cited: 22
Deepak Kshirsagar, Sandeep Kumar
Cyber-Physical Systems (2022) Vol. 9, Iss. 3, pp. 244-259
Closed Access | Times Cited: 22
Showing 22 citing articles:
Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2043-e2043
Open Access | Times Cited: 5
Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
TrIDS: an intelligent behavioural trust based IDS for smart healthcare system
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Cluster Computing (2022) Vol. 26, Iss. 2, pp. 903-925
Closed Access | Times Cited: 13
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
Cluster Computing (2022) Vol. 26, Iss. 2, pp. 903-925
Closed Access | Times Cited: 13
Network intrusion detection leveraging multimodal features
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
Array (2024) Vol. 22, pp. 100349-100349
Open Access | Times Cited: 1
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
Array (2024) Vol. 22, pp. 100349-100349
Open Access | Times Cited: 1
AUTH: An Adversarial Autoencoder Based Unsupervised Insider Threat Detection Scheme for Multisource Logs
Xingjian Zhu, Jiankuo Dong, Jin Qi, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 9, pp. 10954-10965
Closed Access | Times Cited: 1
Xingjian Zhu, Jiankuo Dong, Jin Qi, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 9, pp. 10954-10965
Closed Access | Times Cited: 1
Optimized Ensemble Learning Models Based on Clustering and Hybrid Deep Learning for Wireless Intrusion Detection
Perumal Pitchandi, M. Nivaashini, R. Kingsy Grace
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7787-7807
Closed Access | Times Cited: 1
Perumal Pitchandi, M. Nivaashini, R. Kingsy Grace
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7787-7807
Closed Access | Times Cited: 1
Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data
Sidahmed Benabderrahmane, Ngoc T. Hoang, Petko Valtchev, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 926-941
Open Access | Times Cited: 1
Sidahmed Benabderrahmane, Ngoc T. Hoang, Petko Valtchev, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 926-941
Open Access | Times Cited: 1
Extraction of Minimal Set of Traffic Features Using Ensemble of Classifiers and Rank Aggregation for Network Intrusion Detection Systems
Jacek Krupski, Marcin Iwanowski, Waldemar Graniszewski
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6995-6995
Open Access | Times Cited: 1
Jacek Krupski, Marcin Iwanowski, Waldemar Graniszewski
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 6995-6995
Open Access | Times Cited: 1
Revolutionizing network management with an AI-driven intrusion detection system
G S Vijay, Meenakshi Sharma, Roma Khanna
Multidisciplinary Science Journal (2023) Vol. 5, pp. 2023ss0313-2023ss0313
Open Access | Times Cited: 3
G S Vijay, Meenakshi Sharma, Roma Khanna
Multidisciplinary Science Journal (2023) Vol. 5, pp. 2023ss0313-2023ss0313
Open Access | Times Cited: 3
A study of feature selection methods for android malware detection
Deepak Kshirsagar, Pooja V. Agrawal
Journal of Information and Optimization Sciences (2022) Vol. 43, Iss. 8, pp. 2111-2120
Closed Access | Times Cited: 5
Deepak Kshirsagar, Pooja V. Agrawal
Journal of Information and Optimization Sciences (2022) Vol. 43, Iss. 8, pp. 2111-2120
Closed Access | Times Cited: 5
A Comparative Study on Deep Learning-Based Algorithms For Intruder Detection Systems and Cyber Security
Vineeta Shrivastava, Megha Kamble
SAMRIDDHI A Journal of Physical Sciences Engineering and Technology (2023) Vol. 15, Iss. 01, pp. 154-160
Open Access | Times Cited: 2
Vineeta Shrivastava, Megha Kamble
SAMRIDDHI A Journal of Physical Sciences Engineering and Technology (2023) Vol. 15, Iss. 01, pp. 154-160
Open Access | Times Cited: 2
Hack Me If You Can: Aggregating Autoencoders for Countering Persistent Access Threats within Highly Imbalanced Data
Sidahmed Benabderrahmane, Ngoc T. Hoang, Petko Valtchev, et al.
(2024)
Open Access
Sidahmed Benabderrahmane, Ngoc T. Hoang, Petko Valtchev, et al.
(2024)
Open Access
Whale Optimization Algorithm-Enhanced Long Short-Term Memory Classifier with Novel Wrapped Feature Selection for Intrusion Detection
Haider AL-Husseini, Mohammad Mehdi Hosseini, Ahmad Yousofi, et al.
Journal of Sensor and Actuator Networks (2024) Vol. 13, Iss. 6, pp. 73-73
Open Access
Haider AL-Husseini, Mohammad Mehdi Hosseini, Ahmad Yousofi, et al.
Journal of Sensor and Actuator Networks (2024) Vol. 13, Iss. 6, pp. 73-73
Open Access
Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach
Raed Basfar, Mohamed Yehia Dahab, Abdullah Ali, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 19001-19008
Open Access
Raed Basfar, Mohamed Yehia Dahab, Abdullah Ali, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 19001-19008
Open Access
Exploring the Effectiveness of Selection of Feature Techniques for Incursion Detection in Cyber-Physical Systems
Ram Ji, Devanand Padha, Yashwant Singh
Advances in intelligent systems and computing (2024), pp. 65-81
Closed Access
Ram Ji, Devanand Padha, Yashwant Singh
Advances in intelligent systems and computing (2024), pp. 65-81
Closed Access
Intrusion Detection in the IoT-Fog Adopting the GRU and CNN: A Deep Learning-Based Approach
Zahraa Majeed Al-Khuzaie, Salah Albermany, Mohammed Ahmed AbdlNibe
Lecture notes in networks and systems (2023), pp. 379-389
Closed Access
Zahraa Majeed Al-Khuzaie, Salah Albermany, Mohammed Ahmed AbdlNibe
Lecture notes in networks and systems (2023), pp. 379-389
Closed Access
A Comprehensive Study of DDoS Attack on Internet of Things Network
Nitin Anand, Khundrakpam Johnson Singh
Lecture notes in electrical engineering (2023), pp. 573-586
Closed Access
Nitin Anand, Khundrakpam Johnson Singh
Lecture notes in electrical engineering (2023), pp. 573-586
Closed Access
Network Intrusion Detection Leveraging Multimodal Features
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
(2023)
Open Access
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, et al.
(2023)
Open Access
Enhancing Darknet Traffic Analysis through Top Ranked Feature Selection Methods
Prashant Bhapkar, Deepak Kshirsagar
(2023), pp. 1-5
Closed Access
Prashant Bhapkar, Deepak Kshirsagar
(2023), pp. 1-5
Closed Access
Hybrid Feature Selection (RFEMI) Techniques and Intrusion Detection Systems for Web Attacks Detection Using Supervised Machine Learning Algorithms.
Ibrahim Abobaker
(2023) Vol. 94, pp. 78-86
Closed Access
Ibrahim Abobaker
(2023) Vol. 94, pp. 78-86
Closed Access
Intrusion Detection and Prevention Algorithm of Teacher Management Information System in private higher vocational colleges based on AvroAvro framework
Jun Zhao
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 790-794
Closed Access
Jun Zhao
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 790-794
Closed Access