OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Multivariate Abnormal Detection for Industrial Control Systems Using 1D CNN and GRU
Xin Xie, Bin Wang, Tiancheng Wan, et al.
IEEE Access (2020) Vol. 8, pp. 88348-88359
Open Access | Times Cited: 67

Showing 1-25 of 67 citing articles:

Network Intrusion Detection Model Based on CNN and GRU
Bo Cao, Chenghai Li, Yafei Song, et al.
Applied Sciences (2022) Vol. 12, Iss. 9, pp. 4184-4184
Open Access | Times Cited: 97

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
Mayra Macas, Chunming Wu, Walter Fuertes
Computer Networks (2022) Vol. 212, pp. 109032-109032
Closed Access | Times Cited: 92

A GRU deep learning system against attacks in software defined networks
Marcos V. O. de Assis, Luiz F. Carvalho, Jaime Lloret, et al.
Journal of Network and Computer Applications (2020) Vol. 177, pp. 102942-102942
Open Access | Times Cited: 108

A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks
Izhar Ahmed Khan, Dechang Pi, Nasrullah Khan, et al.
Applied Intelligence (2021) Vol. 51, Iss. 10, pp. 7306-7321
Closed Access | Times Cited: 74

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Izhar Ahmed Khan, Marwa Keshk, Dechang Pi, et al.
Ad Hoc Networks (2022) Vol. 134, pp. 102930-102930
Closed Access | Times Cited: 62

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 42

DANTD: A Deep Abnormal Network Traffic Detection Model for Security of Industrial Internet of Things Using High-Order Features
Guolong Shi, Xinyi Shen, Fuke Xiao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21143-21153
Closed Access | Times Cited: 29

Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation
Olga Tushkanova, Diana Levshun, Alexander Branitskiy, et al.
Algorithms (2023) Vol. 16, Iss. 2, pp. 85-85
Open Access | Times Cited: 25

Real-Time Anomaly Detection for Water Quality Sensor Monitoring Based on Multivariate Deep Learning Technique
Engy El-Shafeiy, Maazen Alsabaan, Mohamed I. Ibrahem, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8613-8613
Open Access | Times Cited: 22

A feature selection based on genetic algorithm for intrusion detection of industrial control systems
Yushan Fang, Yu Yao, Xiaoli Lin, et al.
Computers & Security (2023) Vol. 139, pp. 103675-103675
Closed Access | Times Cited: 22

CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units
Yakubu Imrana, Yanping Xiang, Liaqat Ali, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 3353-3370
Open Access | Times Cited: 9

Wearable IMU-Based Human Activity Recognition Algorithm for Clinical Balance Assessment Using 1D-CNN and GRU Ensemble Model
Yeon-Wook Kim, Joa Kyunglim, Han-young Jeong, et al.
Sensors (2021) Vol. 21, Iss. 22, pp. 7628-7628
Open Access | Times Cited: 42

Anomaly Detection Based on Multidimensional Data Processing for Protecting Vital Devices in 6G-Enabled Massive IIoT
Guangjie Han, Juntao Tu, Li Liu, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 7, pp. 5219-5229
Closed Access | Times Cited: 41

Optimization of the Random Forest Hyperparameters for Power Industrial Control Systems Intrusion Detection Using an Improved Grid Search Algorithm
Ningyuan Zhu, Chaoyang Zhu, Liang Zhou, et al.
Applied Sciences (2022) Vol. 12, Iss. 20, pp. 10456-10456
Open Access | Times Cited: 34

An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things
Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha
Computer Communications (2022) Vol. 198, pp. 108-116
Closed Access | Times Cited: 32

State of charge estimation of an electric vehicle's battery using tiny neural network embedded on small microcontroller units
Yahia Mazzi, Hicham Ben Sassi, Ahmed Gaga, et al.
International Journal of Energy Research (2022) Vol. 46, Iss. 6, pp. 8102-8119
Closed Access | Times Cited: 30

Hybrid honey badger-world cup algorithm-based deep learning for malicious intrusion detection in industrial control systems
S. Nagarajan, S. Kayalvizhi, R. Subhashini, et al.
Computers & Industrial Engineering (2023) Vol. 180, pp. 109166-109166
Closed Access | Times Cited: 16

BiGRU-CNN Neural Network Applied to Electric Energy Theft Detection
Lucas Duarte Soares, Altamira de Souza Queiroz, Gloria P. López, et al.
Electronics (2022) Vol. 11, Iss. 5, pp. 693-693
Open Access | Times Cited: 27

Lightweight Long Short-Term Memory Variational Auto-Encoder for Multivariate Time Series Anomaly Detection in Industrial Control Systems
Daniel Fährmann, Naser Damer, Florian Kirchbuchner, et al.
Sensors (2022) Vol. 22, Iss. 8, pp. 2886-2886
Open Access | Times Cited: 26

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data
Abdullah Alsaedi, Zahir Tari, Redowan Mahmud, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 1, pp. 724-739
Closed Access | Times Cited: 25

High ECG diagnosis rate using novel machine learning techniques with Distributed Arithmetic (DA) based gated recurrent units
K.A. Sharada, K S N Sushma, V. Muthukumaran, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104796-104796
Closed Access | Times Cited: 15

Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU
Bo Cao, Chenghai Li, Yafei Song, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 21

Detection and Isolation of DoS and Integrity Cyber Attacks in Cyber-Physical Systems with a Neural Network-Based Architecture
Carlos M. Paredes, Diego Martínez-Castro, Vrani Ibarra‐Junquera, et al.
Electronics (2021) Vol. 10, Iss. 18, pp. 2238-2238
Open Access | Times Cited: 26

Enhanced Anomaly Detection in Manufacturing Processes Through Hybrid Deep Learning Techniques
Kyung Sung Lee, Seong Beom Kim, Hee‐Woong Kim
IEEE Access (2023) Vol. 11, pp. 93368-93380
Open Access | Times Cited: 10

Ship Abnormal Behavior Detection Method Based on Optimized GRU Network
Hongdan Liu, Yan Liu, Bing Li, et al.
Journal of Marine Science and Engineering (2022) Vol. 10, Iss. 2, pp. 249-249
Open Access | Times Cited: 11

Page 1 - Next Page

Scroll to top