
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network Intrusion Detection with Two-Phased Hybrid Ensemble Learning and Automatic Feature Selection
Asanka Kavinda Mananayaka, Sun Sunnie Chung
IEEE Access (2023) Vol. 11, pp. 45154-45167
Open Access | Times Cited: 15
Asanka Kavinda Mananayaka, Sun Sunnie Chung
IEEE Access (2023) Vol. 11, pp. 45154-45167
Open Access | Times Cited: 15
Showing 15 citing articles:
Empowering Cybersecurity Using Enhanced Rat Swarm Optimization With Deep Stack-Based Ensemble Learning Approach
P. Manickam, M. Girija, Ashit Kumar Dutta, et al.
IEEE Access (2024) Vol. 12, pp. 62492-62501
Open Access | Times Cited: 5
P. Manickam, M. Girija, Ashit Kumar Dutta, et al.
IEEE Access (2024) Vol. 12, pp. 62492-62501
Open Access | Times Cited: 5
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
C. Rajathi, P. Rukmani
Systems Science & Control Engineering (2025) Vol. 13, Iss. 1
Open Access
C. Rajathi, P. Rukmani
Systems Science & Control Engineering (2025) Vol. 13, Iss. 1
Open Access
Enhanced cloud security: a novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier
E. Silambarasan, Rajashree Suryawanshi, S. Reshma
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3837-3845
Closed Access | Times Cited: 3
E. Silambarasan, Rajashree Suryawanshi, S. Reshma
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 3837-3845
Closed Access | Times Cited: 3
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2
Hybrid Learning Model for intrusion detection system: A combination of parametric and non-parametric classifiers
C. Rajathi, P. Rukmani
Alexandria Engineering Journal (2024) Vol. 112, pp. 384-396
Open Access | Times Cited: 2
C. Rajathi, P. Rukmani
Alexandria Engineering Journal (2024) Vol. 112, pp. 384-396
Open Access | Times Cited: 2
Feature Drift Aware for Intrusion Detection System Using Developed Variable Length Particle Swarm Optimization in Data Stream
Mustafa Sabah Noori, R.K.Z. Sahbudin, Aduwati Sali, et al.
IEEE Access (2023) Vol. 11, pp. 128596-128617
Open Access | Times Cited: 6
Mustafa Sabah Noori, R.K.Z. Sahbudin, Aduwati Sali, et al.
IEEE Access (2023) Vol. 11, pp. 128596-128617
Open Access | Times Cited: 6
An improved intrusion detection method for IIoT using attention mechanisms, BiGRU, and Inception-CNN
Kai Yang, Jiaming Wang, MinJing Li
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Kai Yang, Jiaming Wang, MinJing Li
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder
Yu Li, Liuquan Xu, Xuefeng Jiang
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12492-12492
Open Access | Times Cited: 4
Yu Li, Liuquan Xu, Xuefeng Jiang
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12492-12492
Open Access | Times Cited: 4
Balanced Multi-Class Network Intrusion Detection Using Machine Learning
Faraz Ahmad Khan, Asghar Ali Shah, Nizal Alshammry, et al.
IEEE Access (2024) Vol. 12, pp. 178222-178236
Open Access | Times Cited: 1
Faraz Ahmad Khan, Asghar Ali Shah, Nizal Alshammry, et al.
IEEE Access (2024) Vol. 12, pp. 178222-178236
Open Access | Times Cited: 1
Influencing factors and prediction of overcapacity of new energy enterprises in China
Wen-Qian Lou, Bin Wu, Bo-Wen Zhu
Kybernetes (2023) Vol. 54, Iss. 1, pp. 223-242
Closed Access | Times Cited: 2
Wen-Qian Lou, Bin Wu, Bo-Wen Zhu
Kybernetes (2023) Vol. 54, Iss. 1, pp. 223-242
Closed Access | Times Cited: 2
Fed-Deep CTRL (Light GBM)-Scalable, Interpretable, and Privacy-Preserving Federated Learning Framework for Wireless Intrusion Detection System
Sudaroli Vijayakumar, V. Muthumanikandan
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 442-453
Open Access
Sudaroli Vijayakumar, V. Muthumanikandan
Journal of Computer Science (2024) Vol. 20, Iss. 4, pp. 442-453
Open Access
An Effective Technique to Detect WIFI Unauthorized Access using Deep Belief Network
S. Rajakumar, P. William, Mabel Rose R. A., et al.
International journal of electrical and computer engineering systems (2024) Vol. 15, Iss. 2, pp. 137-144
Open Access
S. Rajakumar, P. William, Mabel Rose R. A., et al.
International journal of electrical and computer engineering systems (2024) Vol. 15, Iss. 2, pp. 137-144
Open Access
NIDS-FGPA: A federated learning network intrusion detection algorithm based on secure aggregation of gradient similarity models
Jiaming Wang, Kai Yang, MinJing Li
PLoS ONE (2024) Vol. 19, Iss. 10, pp. e0308639-e0308639
Open Access
Jiaming Wang, Kai Yang, MinJing Li
PLoS ONE (2024) Vol. 19, Iss. 10, pp. e0308639-e0308639
Open Access
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things
Zhendong Wang, Biao Xie, Shuxin Yang, et al.
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access
Zhendong Wang, Biao Xie, Shuxin Yang, et al.
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access
An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder
Yu Li, Liuquan Xu, Xuefeng Jiang
(2023)
Open Access | Times Cited: 1
Yu Li, Liuquan Xu, Xuefeng Jiang
(2023)
Open Access | Times Cited: 1