
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network
Adnan Shahid Khan, Zeeshan Ahmad, Johari Abdullah, et al.
IEEE Access (2021) Vol. 9, pp. 87079-87093
Open Access | Times Cited: 67
Adnan Shahid Khan, Zeeshan Ahmad, Johari Abdullah, et al.
IEEE Access (2021) Vol. 9, pp. 87079-87093
Open Access | Times Cited: 67
Showing 1-25 of 67 citing articles:
A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 87
Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 54
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 54
Anomaly Detection Using Deep Neural Network for IoT Architecture
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, et al.
Applied Sciences (2021) Vol. 11, Iss. 15, pp. 7050-7050
Open Access | Times Cited: 93
Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 30
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 30
Estimating water levels and discharges in tidal rivers and estuaries: Review of machine learning approaches
Anna Maria Mihel, Jonatan Lerga, Nino Krvavica
Environmental Modelling & Software (2024) Vol. 176, pp. 106033-106033
Closed Access | Times Cited: 9
Anna Maria Mihel, Jonatan Lerga, Nino Krvavica
Environmental Modelling & Software (2024) Vol. 176, pp. 106033-106033
Closed Access | Times Cited: 9
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
Kumar Saurabh, Vaidik Sharma, Uphar Singh, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 8
Kumar Saurabh, Vaidik Sharma, Uphar Singh, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access | Times Cited: 8
Tier-Based Optimization for Synthesized Network Intrusion Detection System
Murtaza Ahmed Siddiqi, Wooguil Pak
IEEE Access (2022) Vol. 10, pp. 108530-108544
Open Access | Times Cited: 27
Murtaza Ahmed Siddiqi, Wooguil Pak
IEEE Access (2022) Vol. 10, pp. 108530-108544
Open Access | Times Cited: 27
Artificial intelligence advances in anomaly detection for telecom networks
Enerst Edozie, Aliyu Nuhu Shuaibu, Bashir Olaniyi Sadiq, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Enerst Edozie, Aliyu Nuhu Shuaibu, Bashir Olaniyi Sadiq, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access
Cost-Efficient Hybrid Filter-Based Parameter Selection Scheme for Intrusion Detection System in IoT
Gabriel Chukwunonso Amaizu, Akshita Maradapu Vera Venkata Sai, Madhuri Siddula, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 726-726
Open Access
Gabriel Chukwunonso Amaizu, Akshita Maradapu Vera Venkata Sai, Madhuri Siddula, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 726-726
Open Access
Time-Frequency Analysis and Autoencoder Approach for Network Traffic Anomaly Detection
Ruchira Purohit, Satish Kumar, Sameer Sayyad, et al.
MethodsX (2025) Vol. 14, pp. 103228-103228
Open Access
Ruchira Purohit, Satish Kumar, Sameer Sayyad, et al.
MethodsX (2025) Vol. 14, pp. 103228-103228
Open Access
Efficient Classification of Enciphered SCADA Network Traffic in Smart Factory Using Decision Tree Algorithm
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Jae‐Min Lee, et al.
IEEE Access (2021) Vol. 9, pp. 154892-154901
Open Access | Times Cited: 35
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Jae‐Min Lee, et al.
IEEE Access (2021) Vol. 9, pp. 154892-154901
Open Access | Times Cited: 35
Network intrusion detection system: A survey on artificial intelligence‐based techniques
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu
Expert Systems (2022) Vol. 39, Iss. 9
Closed Access | Times Cited: 22
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4
Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
DCFF-MTAD: A Multivariate Time-Series Anomaly Detection Model Based on Dual-Channel Feature Fusion
Zheng Xu, Yumeng Yang, Xinwen Gao, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 3910-3910
Open Access | Times Cited: 10
Zheng Xu, Yumeng Yang, Xinwen Gao, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 3910-3910
Open Access | Times Cited: 10
Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
Kan He, Wei Zhang, Xuejun Zong, et al.
IEEE Access (2024) Vol. 12, pp. 44335-44350
Open Access | Times Cited: 3
A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
Rashad Mahmood Saqib, Adnan Shahid Khan, Yasir Javed, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1633-1647
Open Access | Times Cited: 19
Rashad Mahmood Saqib, Adnan Shahid Khan, Yasir Javed, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1633-1647
Open Access | Times Cited: 19
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection
Sevvandi Kandanaarachchi, Hideya Ochiai, Asha Rao
Expert Systems with Applications (2022) Vol. 201, pp. 117073-117073
Open Access | Times Cited: 11
Sevvandi Kandanaarachchi, Hideya Ochiai, Asha Rao
Expert Systems with Applications (2022) Vol. 201, pp. 117073-117073
Open Access | Times Cited: 11
Zeeshan Ahmad, Adnan Shahid Khan, Kartinah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6
A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare
Sehrish Aqeel, Adnan Shahid Khan, Zeeshan Ahmad, et al.
EDPACS (2021) Vol. 66, Iss. 3, pp. 1-17
Closed Access | Times Cited: 14
Sehrish Aqeel, Adnan Shahid Khan, Zeeshan Ahmad, et al.
EDPACS (2021) Vol. 66, Iss. 3, pp. 1-17
Closed Access | Times Cited: 14
Comparative analysis of various feature extraction techniques for classification of speech disfluencies
Nitin Mohan Sharma, Vikas Kumar, Prasant Kumar Mahapatra, et al.
Speech Communication (2023) Vol. 150, pp. 23-31
Closed Access | Times Cited: 5
Nitin Mohan Sharma, Vikas Kumar, Prasant Kumar Mahapatra, et al.
Speech Communication (2023) Vol. 150, pp. 23-31
Closed Access | Times Cited: 5
A Lightweight Bearing Fault Diagnosis Method Based on Multi-Channel Depthwise Separable Convolutional Neural Network
Liuyi Ling, Qi Wu, Kaiwen Huang, et al.
Electronics (2022) Vol. 11, Iss. 24, pp. 4110-4110
Open Access | Times Cited: 9
Liuyi Ling, Qi Wu, Kaiwen Huang, et al.
Electronics (2022) Vol. 11, Iss. 24, pp. 4110-4110
Open Access | Times Cited: 9
DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates
M. Nalini, B. Yamini, P. Sinthia, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7137-7148
Closed Access | Times Cited: 1
M. Nalini, B. Yamini, P. Sinthia, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7137-7148
Closed Access | Times Cited: 1
HEADS: Hybrid Ensemble Anomaly Detection System for Internet-of-Things Networks
Zeeshan Ahmad, Andrei Petrovski, Murshedul Arifeen, et al.
Communications in computer and information science (2024), pp. 178-190
Closed Access | Times Cited: 1
Zeeshan Ahmad, Andrei Petrovski, Murshedul Arifeen, et al.
Communications in computer and information science (2024), pp. 178-190
Closed Access | Times Cited: 1