OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis
Shengwei Lei, Chunhe Xia, Zhong Li, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 4, pp. 3257-3274
Closed Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28

Extreme minority class detection in imbalanced data for network intrusion
Marija Milosevic, Vladimir Ćirić
Computers & Security (2022) Vol. 123, pp. 102940-102940
Closed Access | Times Cited: 23

Network Intrusion Detection with Two-Phased Hybrid Ensemble Learning and Automatic Feature Selection
Asanka Kavinda Mananayaka, Sun Sunnie Chung
IEEE Access (2023) Vol. 11, pp. 45154-45167
Open Access | Times Cited: 15

An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification
Huan Wang, Xiaoqiang Di, Yan Wang, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 11, pp. 3561-3572
Closed Access | Times Cited: 13

Malicious Traffic Classification Algorithm Based on Multimodal Fusion
X. L. Li, Mingshu He
Lecture notes in electrical engineering (2025), pp. 229-245
Closed Access

Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks
Kaijiao Huang, Lifei Wang, Faisal Mehmood, et al.
Computers & Security (2025), pp. 104353-104353
Closed Access

Non-bifurcation regulation of chaos in a memristive Hopfield neural network
Xin Zhang, Chunbiao Li, Irene M. Moroz, et al.
Nonlinear Dynamics (2025)
Closed Access

Machine learning-based intrusion detection for imbalanced network traffic
C. Satish Kumar, J. W. Beeman, Manikanda Prabu Athyaseelan, et al.
AIP conference proceedings (2025) Vol. 3279, pp. 020025-020025
Closed Access

An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN
Zhihua Liu, Shengquan Liu, Zhang Jian
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 411-433
Open Access | Times Cited: 3

An efficient intrusion detection systems in fog computing using forward selection and BiLSTM
Fadi Abu Zwayed, Mohammed Anbar, Selvakumar Manickam, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2586-2603
Open Access | Times Cited: 3

Few-Shot network intrusion detection based on prototypical capsule network with attention mechanism
Handi Sun, Liang Wan, Mengying Liu, et al.
PLoS ONE (2023) Vol. 18, Iss. 4, pp. e0284632-e0284632
Open Access | Times Cited: 8

A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection
Jinghong Lan, Xudong Liu, Bo Li, et al.
Applied Intelligence (2022) Vol. 53, Iss. 10, pp. 11705-11726
Closed Access | Times Cited: 12

Deep learning-based network intrusion detection in smart healthcare enterprise systems
Vinayakumar Ravi
Multimedia Tools and Applications (2023)
Closed Access | Times Cited: 5

Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection
Xintong Wang, Zixuan Wang, Enliang Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103636-103636
Closed Access | Times Cited: 4

Forensic Evidence Management Using Blockchain Technology
Mohammed Mustafa M, T C Kishore, N. Krithika, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 268-273
Open Access | Times Cited: 1

A Robust Intrusion Detection System Empowered by Generative Adversarial Networks
V. Vijayaganth, Dharshana M.G., P. Sureka, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 663-668
Open Access | Times Cited: 1

Dynamic Attack Detection in IoT Networks: An Ensemble Learning Approach with Q-Learning and Explainable AI
Padmasri Turaka, Saroj Kumar Panigrahy
IEEE Access (2024) Vol. 12, pp. 161925-161940
Open Access | Times Cited: 1

Incremental Update Intrusion Detection for Industry 5.0 Security: A Graph Attention Network-Enabled Approach
Yixuan Wu, Laisen Nie, Xuanrui Xiong, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 2004-2017
Closed Access | Times Cited: 3

A Brief Analysis on Efficient Machine Learning Techniques for Intrusion Detection Model to Provide Network Security
A. Sirisha, Premamayudu Bulla
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 105-112
Closed Access | Times Cited: 2

Intrusion detection method on the network using modified random forest for identifying various network attacks
G. Sandhya, V. Anusuya Devi, S. Vedha, et al.
AIP conference proceedings (2024) Vol. 3214, pp. 020058-020058
Closed Access

SENTINEL: Insider Threat Detection Based on Multi-Timescale User Behavior Interaction Graph Learning
Fengrui Xiao, Shuangwu Chen, S.J. Chen, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 12, Iss. 2, pp. 774-790
Closed Access

Machine Learning-Based Anomaly Detection for Imbalanced Network Traffic
P Keerthana, M D Devith, G. Hariharan, et al.
(2024), pp. 1-5
Closed Access

An empirical study of reflection attacks using NetFlow data
Edward Chuah, Neeraj Suri
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access

IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT
Wenmin Zeng, Dezhi Han, Mingming Cui, et al.
(2023)
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top