
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion Detection System using MLP and Chaotic Neural Networks
Pooja Shettar, Amit V Kachavimath, Mohammed Moin Mulla, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2021)
Closed Access | Times Cited: 23
Pooja Shettar, Amit V Kachavimath, Mohammed Moin Mulla, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2021)
Closed Access | Times Cited: 23
Showing 23 citing articles:
Distributed Deep CNN-LSTM Model for Intrusion Detection Method in IoT-Based Vehicles
Ali Alferaidi, Kusum Yadav, Yasser Alharbi, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-8
Open Access | Times Cited: 77
Ali Alferaidi, Kusum Yadav, Yasser Alharbi, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-8
Open Access | Times Cited: 77
MCGAN: Modified Conditional Generative Adversarial Network (MCGAN) for Class Imbalance Problems in Network Intrusion Detection System
Kunda Suresh Babu, Yamarthi Narasimha Rao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2576-2576
Open Access | Times Cited: 16
Kunda Suresh Babu, Yamarthi Narasimha Rao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2576-2576
Open Access | Times Cited: 16
Research on intrusion detection model based on improved MLP algorithm
Qihao Zhao, Fuwei Wang, Weimin Wang, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Qihao Zhao, Fuwei Wang, Weimin Wang, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Network traffic anomaly detection method based on chaotic neural network
Shaojun Sheng, Xin Wang
Alexandria Engineering Journal (2023) Vol. 77, pp. 567-579
Open Access | Times Cited: 9
Shaojun Sheng, Xin Wang
Alexandria Engineering Journal (2023) Vol. 77, pp. 567-579
Open Access | Times Cited: 9
Enhancing Threat Detection in Financial Cyber Security Through Auto Encoder-MLP Hybrid Models
Layth Almahadeen, Ghayth AlMahadin, Kathari Santosh, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 3
Layth Almahadeen, Ghayth AlMahadin, Kathari Santosh, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 3
Explainable Deep Learning-Based Feature Selection and Intrusion Detection Method on the Internet of Things
Xuejiao Chen, Minyao Liu, Z. Wang, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5223-5223
Open Access | Times Cited: 3
Xuejiao Chen, Minyao Liu, Z. Wang, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5223-5223
Open Access | Times Cited: 3
Efficient Network Representation for GNN-Based Intrusion Detection
Hamdi Friji, Alexis Olivereau, Mireille Sarkiss
Lecture notes in computer science (2023), pp. 532-554
Open Access | Times Cited: 6
Hamdi Friji, Alexis Olivereau, Mireille Sarkiss
Lecture notes in computer science (2023), pp. 532-554
Open Access | Times Cited: 6
A Hybrid Approach for Detection of DDoS Attacks using Entropy and Machine Learning in Software Defined Networks
Aditya Yadav, Arpitha S Kori, Narayn D. G, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2021), pp. 1-7
Closed Access | Times Cited: 12
Aditya Yadav, Arpitha S Kori, Narayn D. G, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2021), pp. 1-7
Closed Access | Times Cited: 12
CBA-CLSVE: A Class-Level Soft-Voting Ensemble Based on the Chaos Bat Algorithm for Intrusion Detection
Yanping Shen, Kangfeng Zheng, Yanqing Yang, et al.
Applied Sciences (2022) Vol. 12, Iss. 21, pp. 11298-11298
Open Access | Times Cited: 8
Yanping Shen, Kangfeng Zheng, Yanqing Yang, et al.
Applied Sciences (2022) Vol. 12, Iss. 21, pp. 11298-11298
Open Access | Times Cited: 8
Intrusion Detection System Using Generative Adversarial Network (GAN)
Antony Sophia N, A. S. V Sivasai, S. Sachin Kumar
(2024) Vol. 5, pp. 917-922
Closed Access | Times Cited: 1
Antony Sophia N, A. S. V Sivasai, S. Sachin Kumar
(2024) Vol. 5, pp. 917-922
Closed Access | Times Cited: 1
Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System
Hartina Hiromi Satyanegara, Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2022) Vol. 6, Iss. 3, pp. 387-396
Open Access | Times Cited: 6
Hartina Hiromi Satyanegara, Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2022) Vol. 6, Iss. 3, pp. 387-396
Open Access | Times Cited: 6
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network
Adedayo Aribisala, Mohammad S. Khan, Ghaith Husari
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2022), pp. 0099-0105
Closed Access | Times Cited: 4
Adedayo Aribisala, Mohammad S. Khan, Ghaith Husari
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2022), pp. 0099-0105
Closed Access | Times Cited: 4
ASR-Fed: agnostic straggler-resilient semi-asynchronous federated learning technique for secured drone network
Vivian Ukamaka Ihekoronye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 11, pp. 5303-5319
Closed Access
Vivian Ukamaka Ihekoronye, Cosmas Ifeanyi Nwakanma, Dong‐Seong Kim, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 11, pp. 5303-5319
Closed Access
Efficient Complex Event Processing in Intrusion Detection System Using CNN-BiLSTM Model
Aditya Singh, Sakshi Chauhan, S. Sandosh
Lecture notes in networks and systems (2024), pp. 551-566
Closed Access
Aditya Singh, Sakshi Chauhan, S. Sandosh
Lecture notes in networks and systems (2024), pp. 551-566
Closed Access
ASR-FED: Agnostic Straggler Resilient Federated Algorithm for Drone Networks Security
Vivian Ukamaka Ihekoronye, Urslla Uchechi Izuazu, Cosmas Ifeanyi Nwakanma, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2024), pp. 1-6
Closed Access
Vivian Ukamaka Ihekoronye, Urslla Uchechi Izuazu, Cosmas Ifeanyi Nwakanma, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2024), pp. 1-6
Closed Access
Reinforcing Cybersecurity with GAN-Enabled Intrusion Detection
Smt. BH D D Priyankav, N Srujana, K Sai Lakshmi, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 71-82
Open Access
Smt. BH D D Priyankav, N Srujana, K Sai Lakshmi, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 71-82
Open Access
Enhancing intrusion detection performance using explainable ensemble deep learning
Chiheb-Eddine Ben N’cir, Mohamed Aymen Ben HajKacem, Mohammed Alattas
PeerJ Computer Science (2024) Vol. 10, pp. e2289-e2289
Open Access
Chiheb-Eddine Ben N’cir, Mohamed Aymen Ben HajKacem, Mohammed Alattas
PeerJ Computer Science (2024) Vol. 10, pp. e2289-e2289
Open Access
Mitigation of DDoS Attacks in SDN using Access Control List, Entropy and Puzzle-based Mechanisms
Amit Ladigatti, Vinayak Merawade, Shashvi Jain, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 1
Amit Ladigatti, Vinayak Merawade, Shashvi Jain, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 1
A Collaborative Approach to Detect DDoS Attacks in OpenStack-based Cloud using Entropy and Machine Learning
Ritesh Patil, Gururaj Kandakur, Rishab Vardhamane, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-5
Closed Access | Times Cited: 1
Ritesh Patil, Gururaj Kandakur, Rishab Vardhamane, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-5
Closed Access | Times Cited: 1
Multilayer Statistical Intrusion Detection Model for Wireless Network
Anita Gehlot, Abhishek Joshi
2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (2022), pp. 1-7
Closed Access | Times Cited: 1
Anita Gehlot, Abhishek Joshi
2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (2022), pp. 1-7
Closed Access | Times Cited: 1
Traffic Intrusion Detection of Medical Consumption Electronics in the Field of Medical Management Based on Integrated Learning
Tianyi Sun, Xinyue Zhang, Xinyi Wang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1334-1341
Closed Access
Tianyi Sun, Xinyue Zhang, Xinyi Wang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1334-1341
Closed Access
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks
D. S. Lavrova, O. A. Izotova
Automatic Control and Computer Sciences (2023) Vol. 57, Iss. 8, pp. 1047-1054
Closed Access
D. S. Lavrova, O. A. Izotova
Automatic Control and Computer Sciences (2023) Vol. 57, Iss. 8, pp. 1047-1054
Closed Access
Machine Learning-based Fuzzy Attack Detection in Intelligent Vehicular System
Ankit Manderna, Sushil Kumar, Upasana Dohare
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2022), pp. 812-817
Closed Access
Ankit Manderna, Sushil Kumar, Upasana Dohare
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2022), pp. 812-817
Closed Access