
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network Anomaly Traffic Detection Algorithm Based on SVM
Lei Yang
(2017), pp. 217-220
Closed Access | Times Cited: 27
Lei Yang
(2017), pp. 217-220
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Machine Learning Models for Secure Data Analytics: A taxonomy and threat model
Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, et al.
Computer Communications (2020) Vol. 153, pp. 406-440
Closed Access | Times Cited: 194
Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, et al.
Computer Communications (2020) Vol. 153, pp. 406-440
Closed Access | Times Cited: 194
Machine Learning Applications based on SVM Classification A Review
Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez
Qubahan Academic Journal (2021) Vol. 1, Iss. 2, pp. 81-90
Open Access | Times Cited: 127
Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez
Qubahan Academic Journal (2021) Vol. 1, Iss. 2, pp. 81-90
Open Access | Times Cited: 127
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning
Shi Dong, Yuanjun Xia, Tao Peng
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 4, pp. 4197-4212
Closed Access | Times Cited: 122
Shi Dong, Yuanjun Xia, Tao Peng
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 4, pp. 4197-4212
Closed Access | Times Cited: 122
Network anomaly detection using deep learning techniques
Mohammad Kazim Hooshmand, Doreswamy Hosahalli
CAAI Transactions on Intelligence Technology (2022) Vol. 7, Iss. 2, pp. 228-243
Open Access | Times Cited: 70
Mohammad Kazim Hooshmand, Doreswamy Hosahalli
CAAI Transactions on Intelligence Technology (2022) Vol. 7, Iss. 2, pp. 228-243
Open Access | Times Cited: 70
A GRU deep learning system against attacks in software defined networks
Marcos V. O. de Assis, Luiz F. Carvalho, Jaime Lloret, et al.
Journal of Network and Computer Applications (2020) Vol. 177, pp. 102942-102942
Open Access | Times Cited: 108
Marcos V. O. de Assis, Luiz F. Carvalho, Jaime Lloret, et al.
Journal of Network and Computer Applications (2020) Vol. 177, pp. 102942-102942
Open Access | Times Cited: 108
Machine Learning Techniques for Network Anomaly Detection: A Survey
Sohaila Eltanbouly, May Bashendy, Noora Al-Naimi, et al.
2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (2020), pp. 156-162
Closed Access | Times Cited: 54
Sohaila Eltanbouly, May Bashendy, Noora Al-Naimi, et al.
2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (2020), pp. 156-162
Closed Access | Times Cited: 54
Internet Threat Detection in Smart Grids Based on Network Traffic Analysis Using LSTM, IF, and SVM
Szymon Stryczek, Marek Natkaniec
Energies (2022) Vol. 16, Iss. 1, pp. 329-329
Open Access | Times Cited: 13
Szymon Stryczek, Marek Natkaniec
Energies (2022) Vol. 16, Iss. 1, pp. 329-329
Open Access | Times Cited: 13
Unsupervised Anomaly Detection Approach for Cyberattack Identification
Lander Segurola-Gil, Mikel Moreno-Moreno, Itziar Irigoien, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 11, pp. 5291-5302
Closed Access | Times Cited: 2
Lander Segurola-Gil, Mikel Moreno-Moreno, Itziar Irigoien, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 11, pp. 5291-5302
Closed Access | Times Cited: 2
Machine learning for Internet of things anomaly detection under low-quality data
Shangbin Han, Qianhong Wu, Yang Yang
International Journal of Distributed Sensor Networks (2022) Vol. 18, Iss. 10, pp. 155013292211337-155013292211337
Closed Access | Times Cited: 8
Shangbin Han, Qianhong Wu, Yang Yang
International Journal of Distributed Sensor Networks (2022) Vol. 18, Iss. 10, pp. 155013292211337-155013292211337
Closed Access | Times Cited: 8
Automatically Detecting Excavator Anomalies Based on Machine Learning
Qingqing Zhou, Chen Guo, Wenjun Jiang, et al.
Symmetry (2019) Vol. 11, Iss. 8, pp. 957-957
Open Access | Times Cited: 6
Qingqing Zhou, Chen Guo, Wenjun Jiang, et al.
Symmetry (2019) Vol. 11, Iss. 8, pp. 957-957
Open Access | Times Cited: 6
Anomaly Detection in Sequence Data Based on MSM-H with EXPoSE
Renkang Geng, Bin Sun, Liyao Ma, et al.
(2021), pp. 6052-6057
Closed Access | Times Cited: 6
Renkang Geng, Bin Sun, Liyao Ma, et al.
(2021), pp. 6052-6057
Closed Access | Times Cited: 6
Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid
K. Rithesh, Adwaith V. Gautham, Biswajit Kar
Communications in computer and information science (2019), pp. 257-270
Closed Access | Times Cited: 3
K. Rithesh, Adwaith V. Gautham, Biswajit Kar
Communications in computer and information science (2019), pp. 257-270
Closed Access | Times Cited: 3
Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer
K. Rithesh
Lecture notes in electrical engineering (2019), pp. 23-35
Closed Access | Times Cited: 3
K. Rithesh
Lecture notes in electrical engineering (2019), pp. 23-35
Closed Access | Times Cited: 3
Identifying IP Usage Scenarios: Problems, Data, and Benchmarks
Fan Zhou, Weifeng Zhang, Yong Wang, et al.
IEEE Network (2022) Vol. 36, Iss. 3, pp. 152-158
Closed Access | Times Cited: 2
Fan Zhou, Weifeng Zhang, Yong Wang, et al.
IEEE Network (2022) Vol. 36, Iss. 3, pp. 152-158
Closed Access | Times Cited: 2
Creating Smart Environments: Analysis of Improving Security on Smart Homes
Ivan Del Pozo, Denise Cangrejo
(2018), pp. 303-310
Closed Access | Times Cited: 2
Ivan Del Pozo, Denise Cangrejo
(2018), pp. 303-310
Closed Access | Times Cited: 2
A Method of Malicious Bot Traffic Detection
Mengying Wu, Zhendong Wu, Hao Lv, et al.
Lecture notes in computer science (2019), pp. 67-76
Closed Access | Times Cited: 2
Mengying Wu, Zhendong Wu, Hao Lv, et al.
Lecture notes in computer science (2019), pp. 67-76
Closed Access | Times Cited: 2
Cloud-Based Business Intelligence for a Cellular IoT Network
Johann Holm, Leon William Moolman, Gabriel Petrus Rossouw van der Merwe
(2019), pp. 1-8
Closed Access | Times Cited: 2
Johann Holm, Leon William Moolman, Gabriel Petrus Rossouw van der Merwe
(2019), pp. 1-8
Closed Access | Times Cited: 2
An application of support vector machine to detect anomalies in time series data
Yoga S. Satriawan, Joko Slamet Saputro
AIP conference proceedings (2020) Vol. 2217, pp. 030201-030201
Closed Access | Times Cited: 1
Yoga S. Satriawan, Joko Slamet Saputro
AIP conference proceedings (2020) Vol. 2217, pp. 030201-030201
Closed Access | Times Cited: 1
IoT Anomaly Detection and Attack Identification Using Smart Traffic Classification Techniques
Chérif Diallo
(2022), pp. 51-58
Closed Access | Times Cited: 1
Chérif Diallo
(2022), pp. 51-58
Closed Access | Times Cited: 1
Shrink AutoEncoder for Federated Learning-based IoT Anomaly Detection
Thai An Vu, Tuan Phong Tran, Ly Vu, et al.
2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (2022), pp. 383-388
Closed Access | Times Cited: 1
Thai An Vu, Tuan Phong Tran, Ly Vu, et al.
2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (2022), pp. 383-388
Closed Access | Times Cited: 1
UX Framework including Imbalanced UX Dataset Reduction Method for Analyzing Interaction Trends of Agent Systems
Bonwoo Gu, Yunsick Sung
Sensors (2023) Vol. 23, Iss. 3, pp. 1651-1651
Open Access
Bonwoo Gu, Yunsick Sung
Sensors (2023) Vol. 23, Iss. 3, pp. 1651-1651
Open Access
The Role of Artificial Intelligence in Cyber Security
Karmel Arockiasamy
Advances in information security, privacy, and ethics book series (2023), pp. 1-24
Closed Access
Karmel Arockiasamy
Advances in information security, privacy, and ethics book series (2023), pp. 1-24
Closed Access
Adversarial Learning Aided Malicious Network Traffic Detection Based on EDE Framework
Lanping Zhang, Yu Wang, Tomoaki Ohtsuki, et al.
2022 IEEE/CIC International Conference on Communications in China (ICCC) (2023), pp. 1-6
Closed Access
Lanping Zhang, Yu Wang, Tomoaki Ohtsuki, et al.
2022 IEEE/CIC International Conference on Communications in China (ICCC) (2023), pp. 1-6
Closed Access
Abnormal Traffic Detection Model Based on GAN for Information Security in Smart Grid
Qionglan Na, Shijun Zhang, Xin Li, et al.
(2023), pp. 76-79
Closed Access
Qionglan Na, Shijun Zhang, Xin Li, et al.
(2023), pp. 76-79
Closed Access
A Systematic Framework for Malicious Traffic Detection Based on Feature Repository
Shuai Liu, Yong Zhang, Lei Jin, et al.
Lecture notes in computer science (2019), pp. 601-612
Closed Access
Shuai Liu, Yong Zhang, Lei Jin, et al.
Lecture notes in computer science (2019), pp. 601-612
Closed Access