
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning Approach for Intelligent Intrusion Detection System
R. Vinayakumar, Mamoun Alazab, K. P. Soman, et al.
IEEE Access (2019) Vol. 7, pp. 41525-41550
Open Access | Times Cited: 1347
R. Vinayakumar, Mamoun Alazab, K. P. Soman, et al.
IEEE Access (2019) Vol. 7, pp. 41525-41550
Open Access | Times Cited: 1347
Showing 1-25 of 1347 citing articles:
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Zeeshan Ahmad, Adnan Shahid Khan, Cheah Wai Shiang, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 32, Iss. 1
Open Access | Times Cited: 777
Zeeshan Ahmad, Adnan Shahid Khan, Cheah Wai Shiang, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 32, Iss. 1
Open Access | Times Cited: 777
Analysis of Dimensionality Reduction Techniques on Big Data
Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Kuruva Lakshmanna, et al.
IEEE Access (2020) Vol. 8, pp. 54776-54788
Open Access | Times Cited: 681
Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Kuruva Lakshmanna, et al.
IEEE Access (2020) Vol. 8, pp. 54776-54788
Open Access | Times Cited: 681
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computer Networks (2020) Vol. 171, pp. 107138-107138
Closed Access | Times Cited: 379
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computer Networks (2020) Vol. 171, pp. 107138-107138
Closed Access | Times Cited: 379
A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, et al.
IEEE Access (2020) Vol. 8, pp. 222310-222354
Open Access | Times Cited: 348
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, et al.
IEEE Access (2020) Vol. 8, pp. 222310-222354
Open Access | Times Cited: 348
A hybrid deep learning model for efficient intrusion detection in big data environment
Mohammad Mehedi Hassan, Abdu Gumaei, Ahmed Alsanad, et al.
Information Sciences (2019) Vol. 513, pp. 386-396
Closed Access | Times Cited: 321
Mohammad Mehedi Hassan, Abdu Gumaei, Ahmed Alsanad, et al.
Information Sciences (2019) Vol. 513, pp. 386-396
Closed Access | Times Cited: 321
A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU
Sweta Bhattacharya, Siva Rama Krishnan S, Praveen Kumar Reddy Maddikunta, et al.
Electronics (2020) Vol. 9, Iss. 2, pp. 219-219
Open Access | Times Cited: 316
Sweta Bhattacharya, Siva Rama Krishnan S, Praveen Kumar Reddy Maddikunta, et al.
Electronics (2020) Vol. 9, Iss. 2, pp. 219-219
Open Access | Times Cited: 316
Image-Based malware classification using ensemble of CNN architectures (IMCEC)
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computers & Security (2020) Vol. 92, pp. 101748-101748
Closed Access | Times Cited: 307
Danish Vasan, Mamoun Alazab, Sobia Wassan, et al.
Computers & Security (2020) Vol. 92, pp. 101748-101748
Closed Access | Times Cited: 307
Deep learning and big data technologies for IoT security
Mohamed Ahzam Amanullah, Riyaz Ahamed Ariyaluran Habeeb, Fariza Hanum Nasaruddin, et al.
Computer Communications (2020) Vol. 151, pp. 495-517
Closed Access | Times Cited: 303
Mohamed Ahzam Amanullah, Riyaz Ahamed Ariyaluran Habeeb, Fariza Hanum Nasaruddin, et al.
Computer Communications (2020) Vol. 151, pp. 495-517
Closed Access | Times Cited: 303
Early Detection of Diabetic Retinopathy Using PCA-Firefly Based Deep Learning Model
Thippa Reddy Gadekallu, Neelu Khare, Sweta Bhattacharya, et al.
Electronics (2020) Vol. 9, Iss. 2, pp. 274-274
Open Access | Times Cited: 292
Thippa Reddy Gadekallu, Neelu Khare, Sweta Bhattacharya, et al.
Electronics (2020) Vol. 9, Iss. 2, pp. 274-274
Open Access | Times Cited: 292
Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things
Bimal Ghimire, Danda B. Rawat
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 11, pp. 8229-8249
Open Access | Times Cited: 283
Bimal Ghimire, Danda B. Rawat
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 11, pp. 8229-8249
Open Access | Times Cited: 283
A deep learning method with wrapper based feature extraction for wireless intrusion detection system
Sydney Mambwe Kasongo, Yanxia Sun
Computers & Security (2020) Vol. 92, pp. 101752-101752
Closed Access | Times Cited: 279
Sydney Mambwe Kasongo, Yanxia Sun
Computers & Security (2020) Vol. 92, pp. 101752-101752
Closed Access | Times Cited: 279
Deep learning methods in network intrusion detection: A survey and an objective comparison
Sunanda Gamage, Jagath Samarabandu
Journal of Network and Computer Applications (2020) Vol. 169, pp. 102767-102767
Closed Access | Times Cited: 278
Sunanda Gamage, Jagath Samarabandu
Journal of Network and Computer Applications (2020) Vol. 169, pp. 102767-102767
Closed Access | Times Cited: 278
Anomaly-based intrusion detection system for IoT networks through deep learning model
Tanzila Saba, Amjad Rehman, Tariq Sadad, et al.
Computers & Electrical Engineering (2022) Vol. 99, pp. 107810-107810
Open Access | Times Cited: 253
Tanzila Saba, Amjad Rehman, Tariq Sadad, et al.
Computers & Electrical Engineering (2022) Vol. 99, pp. 107810-107810
Open Access | Times Cited: 253
InSDN: A Novel SDN Intrusion Dataset
Mahmoud Said Elsayed, Nhien‐An Le‐Khac, Anca Delia Jurcut
IEEE Access (2020) Vol. 8, pp. 165263-165284
Open Access | Times Cited: 249
Mahmoud Said Elsayed, Nhien‐An Le‐Khac, Anca Delia Jurcut
IEEE Access (2020) Vol. 8, pp. 165263-165284
Open Access | Times Cited: 249
A Survey of Android Malware Detection with Deep Neural Models
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 241
Junyang Qiu, Jun Zhang, Wei Luo, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 6, pp. 1-36
Closed Access | Times Cited: 241
Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder
Sultan Zavrak, Murat İskefiyeli
IEEE Access (2020) Vol. 8, pp. 108346-108358
Open Access | Times Cited: 239
Sultan Zavrak, Murat İskefiyeli
IEEE Access (2020) Vol. 8, pp. 108346-108358
Open Access | Times Cited: 239
Intrusion Detection Systems: A Survey and Taxonomy
Oliver Coates
(2022)
Open Access | Times Cited: 236
Oliver Coates
(2022)
Open Access | Times Cited: 236
An Explainable Machine Learning Framework for Intrusion Detection Systems
Maonan Wang, Kangfeng Zheng, Yanqing Yang, et al.
IEEE Access (2020) Vol. 8, pp. 73127-73141
Open Access | Times Cited: 232
Maonan Wang, Kangfeng Zheng, Yanqing Yang, et al.
IEEE Access (2020) Vol. 8, pp. 73127-73141
Open Access | Times Cited: 232
Cyber security in smart cities: A review of deep learning-based applications and case studies
Dongliang Chen, Paweł Wawrzyński, Zhihan Lv
Sustainable Cities and Society (2020) Vol. 66, pp. 102655-102655
Closed Access | Times Cited: 229
Dongliang Chen, Paweł Wawrzyński, Zhihan Lv
Sustainable Cities and Society (2020) Vol. 66, pp. 102655-102655
Closed Access | Times Cited: 229
Deep neural networks to predict diabetic retinopathy
Thippa Reddy Gadekallu, Neelu Khare, Sweta Bhattacharya, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 14, Iss. 5, pp. 5407-5420
Closed Access | Times Cited: 228
Thippa Reddy Gadekallu, Neelu Khare, Sweta Bhattacharya, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 14, Iss. 5, pp. 5407-5420
Closed Access | Times Cited: 228
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, et al.
Energies (2020) Vol. 13, Iss. 10, pp. 2509-2509
Open Access | Times Cited: 224
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, et al.
Energies (2020) Vol. 13, Iss. 10, pp. 2509-2509
Open Access | Times Cited: 224
An efficient XGBoost–DNN-based classification model for network intrusion detection system
D Preethi, Neelu Khare
Neural Computing and Applications (2020) Vol. 32, Iss. 16, pp. 12499-12514
Closed Access | Times Cited: 212
D Preethi, Neelu Khare
Neural Computing and Applications (2020) Vol. 32, Iss. 16, pp. 12499-12514
Closed Access | Times Cited: 212
Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
AKM Bahalul Haque, Bharat Bhushan, Gaurav Dhiman
Expert Systems (2021) Vol. 39, Iss. 5
Closed Access | Times Cited: 212
AKM Bahalul Haque, Bharat Bhushan, Gaurav Dhiman
Expert Systems (2021) Vol. 39, Iss. 5
Closed Access | Times Cited: 212
A hybrid deep learning image-based analysis for effective malware detection
Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar
Journal of Information Security and Applications (2019) Vol. 47, pp. 377-389
Closed Access | Times Cited: 209
Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar
Journal of Information Security and Applications (2019) Vol. 47, pp. 377-389
Closed Access | Times Cited: 209
A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid
Mamoun Alazab, Suleman Khan, Siva Rama Krishnan Somayaji, et al.
IEEE Access (2020) Vol. 8, pp. 85454-85463
Open Access | Times Cited: 196
Mamoun Alazab, Suleman Khan, Siva Rama Krishnan Somayaji, et al.
IEEE Access (2020) Vol. 8, pp. 85454-85463
Open Access | Times Cited: 196