OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets
Yasir Ali Farrukh, Irfan Khan, Syed Wali, et al.
(2022), pp. 58-67
Closed Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Detecting Cyber Threats With a Graph-Based NIDPS
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, et al.
Advances in logistics, operations, and management science book series (2023), pp. 36-74
Closed Access | Times Cited: 16

Applications of Certainty Scoring for Machine Learning Classification and Out-of-Distribution Detection
Alexander Berenbeim, Adam D. Cobb, Anirban Roy, et al.
ACM transactions on probabilistic machine learning. (2025)
Closed Access

A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Muhammet Onur Kaya, Mehmet Özdem, Resul Daş
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems (2025) Vol. 12, Iss. 2
Open Access

RADIANT: Reactive Autoencoder Defense for Industrial Adversarial Network Threats
Irfan Khan, Syed Wali, Yasir Ali Farrukh
Computers & Security (2025), pp. 104403-104403
Closed Access

SeNet-I: An approach for detecting network intrusions through serialized network traffic images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 107169-107169
Closed Access | Times Cited: 12

Towards Real-time Network Intrusion Detection with Image-based Sequential Packets Representation
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
IEEE Transactions on Big Data (2024) Vol. 11, Iss. 1, pp. 157-173
Open Access | Times Cited: 4

AIS-NIDS: An intelligent and self-sustaining network intrusion detection system
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
Computers & Security (2024) Vol. 144, pp. 103982-103982
Closed Access | Times Cited: 4

Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems
Marc Chalé, Bruce Cox, Jeffery D. Weir, et al.
Optimization Letters (2023)
Closed Access | Times Cited: 9

Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs
Taki Eddine Toufik Djaidja, Bouziane Brik, Sidi‐Mohammed Senouci, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7783-7793
Closed Access | Times Cited: 3

Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2023), pp. 121-126
Open Access | Times Cited: 8

SeNet-I: An Approach for Detecting Network Intrusions Through Serialized Network Traffic Images
Yasir Ali Farrukh, Syed Wali, Irfan Khan, et al.
(2023)
Closed Access | Times Cited: 4

Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems
Gaspard Baye, Priscila Silva, Alexandre Broggi, et al.
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (2023)
Closed Access | Times Cited: 4

Uncertainty-Quantified, Robust Deep Learning for Network Intrusion Detection
Joshua A. Wong, Alexander Berenbeim, David Bierbrauer, et al.
2018 Winter Simulation Conference (WSC) (2023), pp. 2470-2481
Closed Access | Times Cited: 3

Radiant: Reactive Autoencoder Defense for Industrial Adversarial Network Threats
Irfan Khan, Syed Wali, Yasir Ali Farrukh
(2023)
Closed Access | Times Cited: 2

Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection
Galamo Monkam, Michael J. De Lucia, Nathaniel D. Bastian
(2023), pp. 1-8
Closed Access | Times Cited: 2

A novel framework for analyzing internet of things datasets for machine learning and deep learning-based intrusion detection systems
Muhammad Arief, Made Gunawan, Agung Septiadi, et al.
IAES International Journal of Artificial Intelligence (2024) Vol. 13, Iss. 2, pp. 1574-1574
Open Access

A Neuro-Symbolic Artificial Intelligence Network Intrusion Detection System
Alice Bizzarri, Brian Jalaian, Fabrizio Riguzzi, et al.
(2024), pp. 1-9
Closed Access

ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection
Irfan Khan, Yasir Ali Farrukh, Syed Wali
ICC 2022 - IEEE International Conference on Communications (2024), pp. 2731-2736
Open Access

Enhancing Multiclass Network Intrusion Detection Systems Using Continuous Wavelet Transform on Network Traffic
Abdulaziz A. Alsulami, Badraddin Alturki
Data & Metadata (2024) Vol. 4, pp. 474-474
Closed Access

Transformer-based Intrusion Detection Model with Packet Payload Analysis and Oversampling
T.-H. Lee, Soojin Lee
The Journal of Korean Institute of Information Technology (2024) Vol. 22, Iss. 10, pp. 27-34
Closed Access

Neuro-Symbolic Integration for Open Set Recognition in Network Intrusion Detection
Alice Bizzarri, Chung-En Yu, Brian Jalaian, et al.
Lecture notes in computer science (2024), pp. 50-63
Closed Access

Towards Real-time Network Intrusion Detection with Image-based Sequential Packets Representation
Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian
(2023)
Open Access | Times Cited: 1

OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification
Ofek Bader, Adi Lichy, Amit Dvir, et al.
Computer Communications (2023) Vol. 213, pp. 271-284
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top