OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Multi-layer hybrid machine learning techniques for anomalies detection and classification approach
Amira Sayed A. Aziz, Aboul Ella Hassanien, Sanaa El-Ola Hanaf, et al.
(2013)
Closed Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
Elike Hodo, Xavier Bellekens, Andrew D. Hamilton, et al.
arXiv (Cornell University) (2017)
Open Access | Times Cited: 192

Early Detection of the Advanced Persistent Threat Attack Using Performance Analysis of Deep Learning
Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, et al.
IEEE Access (2020) Vol. 8, pp. 186125-186137
Open Access | Times Cited: 71

Comparison of classification techniques applied for network intrusion detection and classification
Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien
Journal of Applied Logic (2016) Vol. 24, pp. 109-118
Open Access | Times Cited: 74

A Systematic Review on Hybrid Intrusion Detection System
Elijah M. Maseno, Zenghui Wang, Hongyan Xing
Security and Communication Networks (2022) Vol. 2022, pp. 1-23
Open Access | Times Cited: 27

An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks
Majd Latah, Levent Toker
CCF Transactions on Networking (2020) Vol. 3, Iss. 3-4, pp. 261-271
Closed Access | Times Cited: 44

Intrusion Detection based on a Novel Hybrid Learning Approach
leila khalvati, Manijeh Keshtgary, Negar Rikhtegar
Journal of artificial intelligence and data mining (2018) Vol. 6, Iss. 1, pp. 157-162
Closed Access | Times Cited: 38

Towards an efficient anomaly‐based intrusion detection for software‐defined networks
Majd Latah, Levent Toker
IET Networks (2018) Vol. 7, Iss. 6, pp. 453-459
Open Access | Times Cited: 31

An Optimized Artificial Neural Network Approach Based on Sperm Whale Optimization Algorithm for Predicting Fertility Quality
Engy El-Shafeiy, Ali I. El-Desouky, Sally M. Elghamrawy
Studies in Informatics and Control (2018) Vol. 27, Iss. 3, pp. 349-358
Open Access | Times Cited: 30

Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems
Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri
The Scientific World JOURNAL (2015) Vol. 2015, Iss. 1
Open Access | Times Cited: 25

An Approach on Cyber Threat Intelligence Using Recurrent Neural Network
U. Sakthivelu, C. N. S. Vinoth Kumar
Lecture notes in networks and systems (2022), pp. 429-439
Closed Access | Times Cited: 12

Analytics: Key to Go from Generating Big Data to Deriving Business Value
Deepali Arora, Piyush Malik
(2015), pp. 446-452
Closed Access | Times Cited: 21

Machine Learning for APT Detection
Abdullah Said Al-Aamri, Rawad Abdulghafor, Sherzod Turaev, et al.
Sustainability (2023) Vol. 15, Iss. 18, pp. 13820-13820
Open Access | Times Cited: 5

Refinements In Zeek Intrusion Detection System
Asheesh Tiwari, Shivam Saraswat, Utkarsh Dixit, et al.
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (2022), pp. 974-979
Closed Access | Times Cited: 8

Hybrid machine learning algorithms for fault detection in android smartphones
Keshav K. Jogarah, Keshav Soopaul, Yogesh Beeharry, et al.
Transactions on Emerging Telecommunications Technologies (2018) Vol. 29, Iss. 2
Closed Access | Times Cited: 10

An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks
Majd Latah, Levent Toker
arXiv (Cornell University) (2018)
Closed Access | Times Cited: 10

Machine learning for network resilience: The start of a journey
Ali Hussein, Ali Chehab, Ayman Kayssi, et al.
(2018), pp. 59-66
Closed Access | Times Cited: 9

Comparative Analysis of the Performance of Network Intrusion Detection Systems: Snort, Suricata and Bro Intrusion Detection Systems in Perspective
Godwin Kudjo Bada, Williams Kwame Nabare, Daniel Kwame Kwansah Quansah
International Journal of Computer Applications (2020) Vol. 176, Iss. 40, pp. 39-44
Open Access | Times Cited: 8

Multi-agent Artificial Immune System for Network Intrusion Detection and Classification
Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien
Advances in intelligent systems and computing (2014), pp. 145-154
Closed Access | Times Cited: 7

A Study of Feature Reduction Techniques and Classification for Network Anomaly Detection
Meenal Jain, Gagandeep Kaur
Journal of Computing and Information Technology (2020) Vol. 27, Iss. 4, pp. 1-16
Open Access | Times Cited: 6

K-Nearest Neighbor and Boundary Cutting Algorithm for Intrusion Detection System
Punam Mulak, D. P. Gaikwad, Nitin Rameshrao Talhar
Advances in intelligent systems and computing (2016), pp. 269-278
Open Access | Times Cited: 5

Intrusion Detection System in Network using Decision Tree
Avula Venkata Srinadh Reddy, Boddu Prasanth Reddy, L. Sujihelen, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2022), pp. 1186-1190
Closed Access | Times Cited: 4

Multilayer Machine Learning-Based Intrusion Detection System
Amira Sayed A. Aziz, Aboul Ella Hassanien
Intelligent systems reference library (2014), pp. 225-247
Closed Access | Times Cited: 3

Enhancing cyber-attack prediction through optimized feature representation and advanced learning techniques
Yogitha Akkineni, S. P. Harsha
SCT Proceedings in Interdisciplinary Insights and Innovations. (2024) Vol. 3, pp. 378-378
Closed Access

Approaches for Anomaly Detection in Network: A Survey
Anuja A. Sawant, Pravin Game
(2018), pp. 1-6
Closed Access | Times Cited: 3

DOS Attacks on WSN and Their Classifications With Countermeasures - A Survey
Jahanzeb Shahid, Shahzad Saleem, Muhammad Nauman Qureshi
NUST Journal of Engineering Sciences (2016) Vol. 9, Iss. 2, pp. 50-59
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top