OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems
Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, et al.
IEEE Access (2022) Vol. 10, pp. 64761-64784
Open Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks
Nashmia Khalid, Sadaf Hina, Shabih Zaidi, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0306747-e0306747
Open Access | Times Cited: 1

Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Kousik Barik, Sanjay Misra, Luis Fernández Sanz
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2353-2376
Open Access | Times Cited: 8

A data-driven network intrusion detection system using feature selection and deep learning
Lianming Zhang, Kui Liu, Xiaowei Xie, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103606-103606
Closed Access | Times Cited: 17

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al‐Bander, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 339-376
Open Access | Times Cited: 6

Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs
Krzysztof Uszko, Maciej Kasprzyk, Marek Natkaniec, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2355-2355
Open Access | Times Cited: 13

On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs
Christos Smiliotopoulos, Georgios Kambourakis, Konstantia Barbatsalou
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1893-1919
Open Access | Times Cited: 13

Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection
Hongle Liu, Ming Liu, Lansheng Han, et al.
Computers & Security (2025), pp. 104387-104387
Closed Access

Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features
Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5633-5633
Open Access | Times Cited: 16

Wireless Local Area Networks Threat Detection Using 1D-CNN
Marek Natkaniec, Marcin Bednarz
Sensors (2023) Vol. 23, Iss. 12, pp. 5507-5507
Open Access | Times Cited: 8

Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rahman, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 368-368
Open Access | Times Cited: 2

WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, et al.
Cryptography (2022) Vol. 6, Iss. 4, pp. 53-53
Open Access | Times Cited: 11

A soft actor-critic reinforcement learning algorithm for network intrusion detection
Zhengfa Li, Chuanhe Huang, Shuhua Deng, et al.
Computers & Security (2023) Vol. 135, pp. 103502-103502
Closed Access | Times Cited: 6

Beam-Selection for 5G/B5G Networks Using Machine Learning: A Comparative Study
Efstratios Chatzoglou, Sotirios K. Goudos
Sensors (2023) Vol. 23, Iss. 6, pp. 2967-2967
Open Access | Times Cited: 5

Development of an Efficiency Platform Based on MQTT for UAV Controlling and DoS Attack Detection
Leandro Marcos da Silva, Henrique Bonini de Britto Menezes, Matheus dos Santos Luccas, et al.
Sensors (2022) Vol. 22, Iss. 17, pp. 6567-6567
Open Access | Times Cited: 9

Random forest evaluation using multi-key homomorphic encryption and lookup tables
Diana-Elena Petrean, Rodica Potolea
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2023-2041
Open Access | Times Cited: 1

Enhanced an Intrusion Detection System for IoT networks through machine learning techniques: an examination utilizing the AWID dataset
Fursan Thabit, Ozgu Can, Sana Abdaljlil, et al.
Cogent Engineering (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1

ARP spoofing detection using machine learning classifiers: an experimental study
Sharmistha Majumder, Mrinal Kanti Deb Barma, Ashim Saha
Knowledge and Information Systems (2024) Vol. 67, Iss. 1, pp. 727-766
Closed Access | Times Cited: 1

WPFD: Active User-Side Detection of Evil Twins
Fu‐Hau Hsu, Min-Hao Wu, Yanling Hwang, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8088-8088
Open Access | Times Cited: 6

Analysis and Identification of Evil Twin Attack through Data Science Techniques Using AWID3 Dataset
Leandro Marcos da Silva, Vinícius Moraes Andreghetti, Roseli Aparecida Francelin Romero, et al.
(2023)
Closed Access | Times Cited: 2

Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
Abdallah Elhigazi Abdallah, Mosab Hamdan, Shukor Abd Razak, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 5607-5623
Open Access | Times Cited: 3

Cyber Attack Identification System Using Deep Learning
Muhammad Majid Hussain, Nashmia Khalid, Anila Amjad, et al.
(2024), pp. 1-13
Closed Access

A risk-aware and recommender distributed intrusion detection system for home robots
Mohammadreza Shahlaei, Seyyed Mohsen Hashemi
Journal of Information Security and Applications (2024) Vol. 83, pp. 103777-103777
Closed Access

Improving Performance With Feature Selection, Extraction, and Learning
Varsha K. Patil, V. S. Shinde, Ritika Singh, et al.
(2024), pp. 99-127
Open Access

Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS
Konstantinos E. Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, et al.
Research Square (Research Square) (2024)
Open Access

Page 1 - Next Page

Scroll to top