
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Intelligent Fuzzy Rule based Feature Selection for Effective Intrusion Detection
B. Riyaz, Sannasi Ganapathy
(2018), pp. 206-211
Closed Access | Times Cited: 13
B. Riyaz, Sannasi Ganapathy
(2018), pp. 206-211
Closed Access | Times Cited: 13
Showing 13 citing articles:
Supervised feature selection techniques in network intrusion detection: A critical review
Mario Di Mauro, Giovanni Galatro, Giancarlo Fortino, et al.
Engineering Applications of Artificial Intelligence (2021) Vol. 101, pp. 104216-104216
Open Access | Times Cited: 134
Mario Di Mauro, Giovanni Galatro, Giancarlo Fortino, et al.
Engineering Applications of Artificial Intelligence (2021) Vol. 101, pp. 104216-104216
Open Access | Times Cited: 134
Intrusion Detection System Using PCA with Random Forest Approach
Subhash Waskle, Lokesh Parashar, Upendra Singh
2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (2020), pp. 803-808
Closed Access | Times Cited: 96
Subhash Waskle, Lokesh Parashar, Upendra Singh
2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (2020), pp. 803-808
Closed Access | Times Cited: 96
Improved intrusion detection method for communication networks using association rule mining and artificial neural networks
Fatemeh Safara, Alireza Souri, Masoud Serrizadeh
IET Communications (2020) Vol. 14, Iss. 7, pp. 1192-1197
Closed Access | Times Cited: 37
Fatemeh Safara, Alireza Souri, Masoud Serrizadeh
IET Communications (2020) Vol. 14, Iss. 7, pp. 1192-1197
Closed Access | Times Cited: 37
Multi-layer perceptron for network intrusion detection
Arnaud Rosay, Kévin Riou, Florent Carlier, et al.
Annals of Telecommunications (2021) Vol. 77, Iss. 5-6, pp. 371-394
Closed Access | Times Cited: 24
Arnaud Rosay, Kévin Riou, Florent Carlier, et al.
Annals of Telecommunications (2021) Vol. 77, Iss. 5-6, pp. 371-394
Closed Access | Times Cited: 24
A systematic literature review of intrusion detection systems in the cloud‐based IoT environments
Gang Luo, Zhiyuan Chen, Bayan Omar Mohammed
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 10
Closed Access | Times Cited: 14
Gang Luo, Zhiyuan Chen, Bayan Omar Mohammed
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 10
Closed Access | Times Cited: 14
Feed-forward neural network for Network Intrusion Detection
Arnaud Rosay, Florent Carlier, Pascal Leroux
(2020), pp. 1-6
Closed Access | Times Cited: 23
Arnaud Rosay, Florent Carlier, Pascal Leroux
(2020), pp. 1-6
Closed Access | Times Cited: 23
JARVIS: An Intelligent Network Intrusion Detection and Prevention System
Annapurna P. Patil, Harivind Premkumar, M H M Kiran, et al.
(2022) Vol. 10, pp. 1-6
Closed Access | Times Cited: 6
Annapurna P. Patil, Harivind Premkumar, M H M Kiran, et al.
(2022) Vol. 10, pp. 1-6
Closed Access | Times Cited: 6
A Cloud-Based Method for Detecting Intrusions in PROFINET Communication Networks Based on Anomaly Detection
Afonso Celso Turcato, Luisa Helena Bartocci Liboni Negri, André Luís Dias, et al.
Journal of Control Automation and Electrical Systems (2021) Vol. 32, Iss. 5, pp. 1177-1188
Closed Access | Times Cited: 8
Afonso Celso Turcato, Luisa Helena Bartocci Liboni Negri, André Luís Dias, et al.
Journal of Control Automation and Electrical Systems (2021) Vol. 32, Iss. 5, pp. 1177-1188
Closed Access | Times Cited: 8
A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System
Matida Churu, Dewald Blaauw, Bruce W. Watson
Communications in computer and information science (2024), pp. 151-168
Closed Access
Matida Churu, Dewald Blaauw, Bruce W. Watson
Communications in computer and information science (2024), pp. 151-168
Closed Access
Intrusion detection system based on QBSO-FS
XiangXin Cheng, Wei Li, Zhuo Xiao, et al.
(2020), pp. 372-377
Closed Access | Times Cited: 1
XiangXin Cheng, Wei Li, Zhuo Xiao, et al.
(2020), pp. 372-377
Closed Access | Times Cited: 1
Application of High-Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection
Limin Shen, Zhongkui Sun, Lei Chen, et al.
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 1
Limin Shen, Zhongkui Sun, Lei Chen, et al.
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 1
BLB-GAFS: An Efficient, Multi-Objective Genetic Algorithm Based Feature Selection Method for Intrusion Detection Systems
Arihant Singh, Kaushik Roy
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2023), pp. 856-861
Closed Access
Arihant Singh, Kaushik Roy
2021 IEEE Symposium Series on Computational Intelligence (SSCI) (2023), pp. 856-861
Closed Access
Dimensionality Reduction and Supervised Learning for Intrusion Detection
Ibrahim Obeidat, Wafa’ Eleisah, Kinda A. Magableh
(2022), pp. 86-91
Closed Access
Ibrahim Obeidat, Wafa’ Eleisah, Kinda A. Magableh
(2022), pp. 86-91
Closed Access