OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Enhanced Anomaly Detection in Web Traffic Using a Stack of Classifier Ensemble
Bayu Adhi Tama, Lewis Nkenyereye, S. M. Riazul Islam, et al.
IEEE Access (2020) Vol. 8, pp. 24120-24134
Open Access | Times Cited: 88

Showing 1-25 of 88 citing articles:

Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset
Ziadoon Kamil Maseer, Robiah Yusof, Nazrulazhar Bahaman, et al.
IEEE Access (2021) Vol. 9, pp. 22351-22370
Open Access | Times Cited: 280

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 132

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation
Bayu Adhi Tama, Sunghoon Lim
Computer Science Review (2020) Vol. 39, pp. 100357-100357
Open Access | Times Cited: 131

Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic
Andrey Ferriyan, Achmad Husni Thamrin, Keiji Takeda, et al.
Applied Sciences (2021) Vol. 11, Iss. 17, pp. 7868-7868
Open Access | Times Cited: 59

DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection
Ziadoon Kamil Maseer, Robiah Yusof, Salama A. Mostafa, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 69, Iss. 3, pp. 3945-3966
Open Access | Times Cited: 57

An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Oumaima Chakir, Abdeslam Rehaimi, Yassine Sadqi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 3, pp. 103-119
Open Access | Times Cited: 30

Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework
Ruyue Xin, Hongyun Liu, Peng Chen, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 25

Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
Deepak Adhikari, Wei Jiang, Jinyu Zhan, et al.
Computer Science Review (2024) Vol. 54, pp. 100665-100665
Closed Access | Times Cited: 8

Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review
Ruyue Xin, Jingye Wang, Peng Chen, et al.
ACM Computing Surveys (2025) Vol. 57, Iss. 5, pp. 1-37
Open Access | Times Cited: 1

Towards Effective Network Intrusion Detection: From Concept to Creation on Azure Cloud
Smitha Rajagopal, Poornima Panduranga Kundapur, K S Hareesha
IEEE Access (2021) Vol. 9, pp. 19723-19742
Open Access | Times Cited: 53

Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection
Aniss Chohra, Paria Shirani, ElMouatez Billah Karbab, et al.
Computers & Security (2022) Vol. 117, pp. 102684-102684
Closed Access | Times Cited: 36

Network intrusion detection based on ensemble classification and feature selection method for cloud computing
S. Krishnaveni, Sivanandam Sivamohan, S. S. Sridhar, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 11
Closed Access | Times Cited: 31

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
Jyoti Verma, Abhinav Bhandari, Gurpreet Singh
Computer Communications (2022) Vol. 195, pp. 227-247
Closed Access | Times Cited: 29

Distributed and explainable GHSOM for anomaly detection in sensor networks
Paolo Mignone, Roberto Corizzo, Michelangelo Ceci
Machine Learning (2024) Vol. 113, Iss. 7, pp. 4445-4486
Open Access | Times Cited: 7

Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
Manish Snehi, Abhinav Bhandari, Jyoti Verma
Computers & Security (2024) Vol. 139, pp. 103702-103702
Closed Access | Times Cited: 6

A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
Majid Torabi, Nur Izura Udzir, Mohd Taufik Abdullah, et al.
International Journal of Advanced Computer Science and Applications (2021) Vol. 12, Iss. 5
Open Access | Times Cited: 33

Efficient KPI Anomaly Detection Through Transfer Learning for Large-Scale Web Services
Shenglin Zhang, Zhenyu Zhong, Dongwen Li, et al.
IEEE Journal on Selected Areas in Communications (2022) Vol. 40, Iss. 8, pp. 2440-2455
Closed Access | Times Cited: 26

A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
Tomás Sureda Riera, Juan Ramón Bermejo Higuera, Javier Bermejo Higuera, et al.
Computers & Security (2022) Vol. 120, pp. 102788-102788
Open Access | Times Cited: 25

Network Intrusion Detection with Two-Phased Hybrid Ensemble Learning and Automatic Feature Selection
Asanka Kavinda Mananayaka, Sun Sunnie Chung
IEEE Access (2023) Vol. 11, pp. 45154-45167
Open Access | Times Cited: 15

An intrusion detection system based on stacked ensemble learning for IoT network
Yongzhong Cao, Zhihui Wang, Hongwei Ding, et al.
Computers & Electrical Engineering (2023) Vol. 110, pp. 108836-108836
Closed Access | Times Cited: 13

A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Wahida Ferdose Urmi, Mohammed Nasir Uddin, Md Ashraf Uddin, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 316-331
Open Access | Times Cited: 5

Intrusion Detection System Using Stacked Ensemble Learning with Light Gradient Boosting Machine and Decision Tree
Anil Kumar Dasari, Saroj Kr. Biswas, Barnana Baruah, et al.
Lecture notes in networks and systems (2025), pp. 291-303
Closed Access

Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
P. Mamatha, S. Balaji, S. Sai Anuraghav
International Journal of Computational Intelligence Systems (2025) Vol. 18, Iss. 1
Open Access

New Bagging Based Ensemble Learning Algorithm Distinguishing Short and Long Texts for Document Classification
Youwei Wang, Lizhou Feng
ACM Transactions on Asian and Low-Resource Language Information Processing (2025)
Closed Access

Machine learning-based intrusion detection for imbalanced network traffic
C. Satish Kumar, J. W. Beeman, Manikanda Prabu Athyaseelan, et al.
AIP conference proceedings (2025) Vol. 3279, pp. 020025-020025
Closed Access

Page 1 - Next Page

Scroll to top